loading...
iklan tautan
Dibawah ini adalah gabungan soal-soal:
*Final Exam for 1-10
*Practice Final Exam for 1-10
*Final Exam 11-16
*Practice Final Exam for 11-16
Semuanya lengkap ada disini, silahkan Ctrl+F untuk pencarian. Good luck
1. What is one thing a technician can determine about a system when using the command ipconfig?
system network configuration
2. A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?
Use jumpers on the drive to configure the drive as slave.
3. A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?
modify
4. A technician is trying to allow user access to a printer on a small network. Which solution is the lowest in cost?
computer-shared printer
5. Which technology allows a user to securely access a company LAN across a public network?
VPN
6. Refer to the exhibit. Which type of technology is most suitable to bring Internet services to the facilities that are shown in the graphic?
Satellite
7. After information has been gathered from a user about the failure of a printer, which two actions should be performed? (Choose two.)
Ensure all cables are connected correctly.
Clear any type of paper jams.
8. What two dangers exist when working on laser printers?
electrical shock
burns
9. What is the general term that is used to describe components of a laptop that should be replaced by a service center?
FRUs
10. A technician is helping a customer select additional RAM for a computer. Which two items should be considered when updating RAM? (Choose two.)
The new memory must run at least as fast as the existing memory.
The new memory must be compatible with the motherboard.
11. Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)
The computer does not have a PXE-capable NIC installed.
The network shared folder that holds the OS files is not accessible.
12. A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?
Use the F8 key.
13. A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?
Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.
14. A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?
Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.
15. What precaution should a technician take when checking a dot matrix printer that suddenly stops functioning?
Avoid the print head, which can become hot.
16. Refer to the exhibit. A customer has upgraded to a new laptop with the specifications as shown in the exhibit. The customer reports that an older cellular WAN card fails to fit in the new laptop. What is the problem?
The new laptop has an ExpressCard slot, which is incompatible with the older card.
17. A technician is helping a customer that constantly has to reset the time on a laptop. What is the probable cause of this problem?
The battery on the motherboard needs to be replaced.
18. A technician has installed new RAM in a laptop. When the laptop is rebooted, it makes a long beeping noise and fails to start. What are three probable causes? (Choose three.)
The RAM module edge contacts were damaged.
The RAM module was incompatible with the laptop motherboard.
The clips that hold the SODIMM in the slot were not locked.
19. A student is trying to upload class files to an FTP server on the school network. The connection fails from school but works fine from the home computer of the student. What is the likely problem?
The school has port 21 blocked on the firewall.
20. Which situation is affected by an invalid SSL certificate?
a connection to a web site that uses HTTPS
21. A student laptop is running slowly, and the student suspects rogue computers are accessing the laptop. Which control panel feature is used in Windows Vista to verify the firewall setting?
Security Center
22. A business is concerned that computers are susceptible to malware infection. Which two actions will help solve this problem? (Choose two.)
Enable real-time virus and spyware scanning.
Enable automatic antivirus and antispyware software updates.
23. After logging into a computer, a user can view files but is unable to download the files. What action can the administrator take to allow the user to download the files while preventing deletion of the files?
Set the file permissions to Read and Execute.
24. A network administrator has a user that is changing the rights to files in a folder for other users. What rights does the administrator need to remove from the user?
Full Control
25. Why does a technician wear an antistatic wrist strap?
to prevent damage to electronic components inside the computer
26. A computer that worked fine yesterday now locks after two hours of use. What is the problem?
CPU overheating
27. What is different about the default location for user files in Windows Vista compared to Windows XP?
The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.
28. What is the purpose of the setupmgr.exe file?
It helps prepare an answer file to automate the installation of Windows XP.
29. A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility?
It prepares a computer for imaging.
30. What is the issue if the status of a hard disk drive shows as "Unreadable" in the Disk Management utility?
The drive has input/output errors, has a hardware failure, or is corrupt.
31. A computer shows the optical drive under My Computer but fails to read a DVD disc. Which three problems could exist? (Choose three.)
The optical drive is faulty.
The DVD disc is inserted upside down.
The DVD disc is formatted incorrectly.
32. What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?
Change the settings of the Index service in the Advanced Options panel.
33. Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office?
Remote Desktop Protocol
34. Which scanner process uses an IT8 target to complete its function?
Calibration
35. What are two reasons why static IP addressing would be configured instead of DHCP when setting up a wireless network? (Choose two.)
The network has relatively few wireless devices.
Specific security polices can be applied to static IP addresses.
system network configuration
2. A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?
Use jumpers on the drive to configure the drive as slave.
3. A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?
modify
4. A technician is trying to allow user access to a printer on a small network. Which solution is the lowest in cost?
computer-shared printer
5. Which technology allows a user to securely access a company LAN across a public network?
VPN
6. Refer to the exhibit. Which type of technology is most suitable to bring Internet services to the facilities that are shown in the graphic?
Satellite
7. After information has been gathered from a user about the failure of a printer, which two actions should be performed? (Choose two.)
Ensure all cables are connected correctly.
Clear any type of paper jams.
8. What two dangers exist when working on laser printers?
electrical shock
burns
9. What is the general term that is used to describe components of a laptop that should be replaced by a service center?
FRUs
10. A technician is helping a customer select additional RAM for a computer. Which two items should be considered when updating RAM? (Choose two.)
The new memory must run at least as fast as the existing memory.
The new memory must be compatible with the motherboard.
11. Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)
The computer does not have a PXE-capable NIC installed.
The network shared folder that holds the OS files is not accessible.
12. A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?
Use the F8 key.
13. A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?
Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.
14. A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?
Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.
15. What precaution should a technician take when checking a dot matrix printer that suddenly stops functioning?
Avoid the print head, which can become hot.
16. Refer to the exhibit. A customer has upgraded to a new laptop with the specifications as shown in the exhibit. The customer reports that an older cellular WAN card fails to fit in the new laptop. What is the problem?
The new laptop has an ExpressCard slot, which is incompatible with the older card.
17. A technician is helping a customer that constantly has to reset the time on a laptop. What is the probable cause of this problem?
The battery on the motherboard needs to be replaced.
18. A technician has installed new RAM in a laptop. When the laptop is rebooted, it makes a long beeping noise and fails to start. What are three probable causes? (Choose three.)
The RAM module edge contacts were damaged.
The RAM module was incompatible with the laptop motherboard.
The clips that hold the SODIMM in the slot were not locked.
19. A student is trying to upload class files to an FTP server on the school network. The connection fails from school but works fine from the home computer of the student. What is the likely problem?
The school has port 21 blocked on the firewall.
20. Which situation is affected by an invalid SSL certificate?
a connection to a web site that uses HTTPS
21. A student laptop is running slowly, and the student suspects rogue computers are accessing the laptop. Which control panel feature is used in Windows Vista to verify the firewall setting?
Security Center
22. A business is concerned that computers are susceptible to malware infection. Which two actions will help solve this problem? (Choose two.)
Enable real-time virus and spyware scanning.
Enable automatic antivirus and antispyware software updates.
23. After logging into a computer, a user can view files but is unable to download the files. What action can the administrator take to allow the user to download the files while preventing deletion of the files?
Set the file permissions to Read and Execute.
24. A network administrator has a user that is changing the rights to files in a folder for other users. What rights does the administrator need to remove from the user?
Full Control
25. Why does a technician wear an antistatic wrist strap?
to prevent damage to electronic components inside the computer
26. A computer that worked fine yesterday now locks after two hours of use. What is the problem?
CPU overheating
27. What is different about the default location for user files in Windows Vista compared to Windows XP?
The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.
28. What is the purpose of the setupmgr.exe file?
It helps prepare an answer file to automate the installation of Windows XP.
29. A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility?
It prepares a computer for imaging.
30. What is the issue if the status of a hard disk drive shows as "Unreadable" in the Disk Management utility?
The drive has input/output errors, has a hardware failure, or is corrupt.
31. A computer shows the optical drive under My Computer but fails to read a DVD disc. Which three problems could exist? (Choose three.)
The optical drive is faulty.
The DVD disc is inserted upside down.
The DVD disc is formatted incorrectly.
32. What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?
Change the settings of the Index service in the Advanced Options panel.
33. Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office?
Remote Desktop Protocol
34. Which scanner process uses an IT8 target to complete its function?
Calibration
35. What are two reasons why static IP addressing would be configured instead of DHCP when setting up a wireless network? (Choose two.)
The network has relatively few wireless devices.
Specific security polices can be applied to static IP addresses.
1.When planning the network in a new building, the technician notes that the company requires cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on networks?
*Cat5e
2.The network administrator has physically installed wireless NICs in three new computers. Which two additional steps will complete the installation process? (Choose two.)
*Configure the device drivers.
*Configure the NICs with addressing information.
3.A company adds a few refurbished computers to a network. The company finds, however, that the refurbished computers perform significantly worse than the original networked computers performed with applications that require the transfer of data over the network. What should the company technicians do?
*Check if the network interface cards in the computers are limited to 10 Mb/s.
4.ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?
*site survey
5.Which protocol provides secure transport of data from the company web server to remote users?
*HTTPS
6.n Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the browser to prompt before downloading potentially unsafe content?
*Security
7.Which two methods can be used to connect IP phones to a network? (Choose two.)
*Connect the IP phone to the Ethernet LAN using an RJ-45 connector.
*Establish an Internet connection then use an Analog Telephone Adapter.
8. technician is working on a host computer that fails to obtain an IP address. Which three actions could the technician perform to determine the cause of the problem? (Choose three.)
*Check the local router to make sure the default gateway is correct.
*Check that the DCHP server is operational.
9.Which three ports are used by SMTP, POP, and IMAP? (Choose three.)
*25
*110
*143
10.Which two ipconfig parameters are used within Windows XP to remove and assign the IP address previously provided by a DHCP server? (Choose two.)
*release
*renew
11.The network technician has been asked to share a new printer on the network using the Add Printer wizard for Windows XP. Which path should the technician use to run the Add Printer wizard?
*Start > Control Panel > Printers and Faxes > File > Add Printer
12.Students on the college network need to be able to view folder names and data in files stored on the Windows-based file server, but should never be allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accessing the file server?
*read
13.Which two hazards exist when working with fiber optic cabling? (Choose two.)
*chemicals
*glass splinters
14.A technician is troubleshooting a network and finds hosts with duplicate static IP addresses. Which protocol could be used to resolve this issue?
*DHCP
15.Which action should a user take to ensure that personal information that is entered into a website form is not retained on the computer?
*Delete the temporary Internet files.
16.A computer user cannot access a bank using HTTPS. What is one recommended solution?
*Enable SSL through the web browser application.
17.What is the purpose of an analog telephone adapter in the application of VoIP services?
*to convert IP phone digital voice data to analog signals
18.Which safety precaution should be used when working with any type of cable?
*Wear safety glasses when working any type of cable.
19.Refer to the exhibit. The tracert command was used on the local computer to verify connectivity with a remote site. Which type of address is shown in the highlighted line of the tracert command output displayed in the exhibit?
*default gateway for the local computer
20.After booting a computer running Windows 2000, the following message displays: “The IP address already exists on another computer”. Which two steps will quickly obtain a new IP address from the DHCP server? (Choose two.)
*run ipconfig /release
*run ipconfig /renew
21.A technician is configuring a network device for remote access. Which protocol is commonly used as a secure alternative to Telnet?
*SSH
22.What would be a disadvantage of configuring a wireless router or access point to operate only in accordance with the 802.11n protocol standard?
*The 802.11n standard does not support advanced network security features.
23.What are two possible causes of e-mail attachments not being received with e-mail messages? (Choose two.)
*The e-mail attachments could be too large.
*The e-mail server could not be receiving e-mail messages that are using POP.
24.What are two ways to assign an IP address to a wireless NIC? (Choose two.)
*Assign a static address.
*Use DHCP.
25.While using nslookup, a student sees the following message: “Can’t find server name for address 127.0.0.0: timed out.” What is one possible problem?
*The computer does not have at least one entry for a DNS server configured.
26.A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?
*Ask the IT department to permit port 25 through the firewall.
27.A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log in to the FTP server. What is the most likely cause of the problem?
*An incorrect port number is configured in the FTP client.
28.A textbook author needs to upload a chapter from a home computer to the FTP server of the publisher. The author uses the correct username and password, but the transfer fails. What is the most likely cause of the problem?
*Port 21 should be enabled on the home firewall.
29.While troubleshooting a computer, the technician releases and renews the IP address. A message appears: “No operation can be performed on the adapter while its media is disconnected.” What is a probable cause of the message?
*The network cable is unplugged.
30.The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.)
*availability
*reliability
*speed
I would just like to say thanks, first of all. As far as I’m concerned you are not some stupid little teenager. I think you are a very bright and smart person.
I know that you are just saing that to be sarcastic. I wanted to ask you if you could help a stupid old guy with somemore of the it essentials exam questions and answers.
again, I’m not as young as I used to be, and I do realize that I need all the help I can get before I take the A+ exam. So, if you can help me with more material and the exams chapters 6,8,9,10,13 and 14. I would be eternally greatful to you.
keith
I noticed many of the answers here are wrong. Just analyze the questions again and use
(for example, number 22 is “Older, legacy wireless devices may be unable to connect to
(Also number 8 is missing the 3rd option, which is: #Check the PC firewall settings to make sure that DHCP is allowed.)
Also on question 8 the answer “Check the local router to make sure the default gateway is correct.” is wrong.
The correct 3 are:
- Check the PC firewall settings to make sure that DHCP is allowed.
- Check that the DCHP server is operational.
- Check that the network cable is connected.
The correct 3 are:
- Check the PC firewall settings to make sure that DHCP is allowed.
- Check that the DCHP server is operational.
- Check that the network cable is connected.
Chapter 15
A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log in to the FTP server. What is the most likely cause of the problem?
– The employee is using an incorrect username or password.
A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log in to the FTP server. What is the most likely cause of the problem?
– The employee is using an incorrect username or password.
2
Which two protocols are used to receive e-mail? (Choose two.)
– imap
– pop3
Which two protocols are used to receive e-mail? (Choose two.)
– imap
– pop3
3
A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?
– Request that the person sending the e-mail attach only one picture per e-mail message.
A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?
– Request that the person sending the e-mail attach only one picture per e-mail message.
4
ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?
– site survey
ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?
– site survey
5
In Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the browser to prompt before downloading potentially unsafe content?
– Security
In Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the browser to prompt before downloading potentially unsafe content?
– Security
6
When planning the network in a new building, the technician notes that the company requires cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on networks?
– Cat5e
When planning the network in a new building, the technician notes that the company requires cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on networks?
– Cat5e
7
A user is reporting intermittent loss of connectivity to the network. No other users have reported similar issues. What preventive maintenance task would likely identify the problem?
– Check for a damaged network cable at the user workstation
A user is reporting intermittent loss of connectivity to the network. No other users have reported similar issues. What preventive maintenance task would likely identify the problem?
– Check for a damaged network cable at the user workstation
8
Students on the college network need to be able to view folder names and data in files stored on the Windows-based file server, but should never be allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accessing the file server?
– read
Students on the college network need to be able to view folder names and data in files stored on the Windows-based file server, but should never be allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accessing the file server?
– read
9
The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.)
– availability
– reliability
– speed
The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.)
– availability
– reliability
– speed
10
A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?
– Use jumpers on the drive to configure the drive as slave.
A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?
– Use jumpers on the drive to configure the drive as slave.
11
Which three ports are used by SMTP, POP, and IMAP? (Choose three.)
– 25
– 110
– 143
Which three ports are used by SMTP, POP, and IMAP? (Choose three.)
– 25
– 110
– 143
12
A technician is troubleshooting a networked computer. The technician has gathered as much information as possible from the user and now needs to verify obvious issues. Which two actions should the technician perform? (Choose two.)
– Verify the computer IP information
– Check activity on the routers.
A technician is troubleshooting a networked computer. The technician has gathered as much information as possible from the user and now needs to verify obvious issues. Which two actions should the technician perform? (Choose two.)
– Verify the computer IP information
– Check activity on the routers.
13
Which two hazards exist when working with fiber optic cabling? (Choose two.)
– chemicals
– glass splinters
Which two hazards exist when working with fiber optic cabling? (Choose two.)
– chemicals
– glass splinters
14
A company purchases several wireless NICs at a great price. After installing the NICs, they find that the user cannot connect to the 2.4 GHz wireless network. What is a likely cause of the problem?
– The NICs are designed for the 802.11a standard.
A company purchases several wireless NICs at a great price. After installing the NICs, they find that the user cannot connect to the 2.4 GHz wireless network. What is a likely cause of the problem?
– The NICs are designed for the 802.11a standard.
15
Which statement is true about network maintenance?
– If a network device is making an unusual sound, the device should be turned off immediately.
Which statement is true about network maintenance?
– If a network device is making an unusual sound, the device should be turned off immediately.
16
Which protocol provides secure transport of data from the company web server to remote users?
– HTTPS
Which protocol provides secure transport of data from the company web server to remote users?
– HTTPS
17
A technician is concerned that a wireless router is missing current security features. What action could be taken to address this issue?
– Check for an updated firmware version.
A technician is concerned that a wireless router is missing current security features. What action could be taken to address this issue?
– Check for an updated firmware version.
18
Which action should a user take to ensure that personal information that is entered into a website form is not retained on the computer
– Delete the temporary Internet files.
Which action should a user take to ensure that personal information that is entered into a website form is not retained on the computer
– Delete the temporary Internet files.
19
A technician is working on a workstation that has an IP address of 169.254.25.35. The technician found that the computer cannot connect to the Internet and the network cable to the computer had been disconnected. Which command can a technician use to get a new IP address once the cable is reconnected?
– ipconfig /renew
A technician is working on a workstation that has an IP address of 169.254.25.35. The technician found that the computer cannot connect to the Internet and the network cable to the computer had been disconnected. Which command can a technician use to get a new IP address once the cable is reconnected?
– ipconfig /renew
20
What are two ways to assign an IP address to a wireless NIC? (Choose two.)
– Assign a static address
– Use DHCP.
What are two ways to assign an IP address to a wireless NIC? (Choose two.)
– Assign a static address
– Use DHCP.
Exam Results – Chapter 15 Exam – IT Essentials: PC Hardware and Software – Version 4.1
Date Exam was Taken: 03/30/2011
Domain Knowledge – Weighted Score
Max Points: 42
Earned Points: 40
Percentage: 95.2%
Max Points: 42
Earned Points: 40
Percentage: 95.2%
Personalized Feedback has been generated based on your responses to this exam. Click Here to view your Personalized Feedback
Domain Knowledge – Binary Score
Max Points: 20
Earned Points: 19
Percentage: 95.0%
Max Points: 20
Earned Points: 19
Percentage: 95.0%
Chapter 16
1
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
– It does not impact the processing performance of the equipment it protects.
– It is designed to protect more than one computer.
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
– It does not impact the processing performance of the equipment it protects.
– It is designed to protect more than one computer.
2
Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
– Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.
Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
– Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.
3
Which important feature is offered by the USB standard?
– It can supply power from the computer to devices.
Which important feature is offered by the USB standard?
– It can supply power from the computer to devices.
4
Which two hashing algorithms are used to ensure that messages are unaltered during transmission? (Choose two.)
– MD5
– SHA
Which two hashing algorithms are used to ensure that messages are unaltered during transmission? (Choose two.)
– MD5
– SHA
5
Which Windows XP command initiates a backup from the command line?
– NTBACKUP
Which Windows XP command initiates a backup from the command line?
– NTBACKUP
6
After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
– the manufacturer FAQ for network devices
– technical websites
After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
– the manufacturer FAQ for network devices
– technical websites
7
Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
– security key fob
Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
– security key fob
8
Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges?
– smart card
Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges?
– smart card
9
What are two features of Windows Vista Backup? (Choose two.)
– The backup files have the extension .zip.
– The backup files can be saved to another connected computer or server.
What are two features of Windows Vista Backup? (Choose two.)
– The backup files have the extension .zip.
– The backup files can be saved to another connected computer or server.
10
Why should the default username and password be changed as soon as an access point is powered on and accessed?
– The change provides a minimum level of security to the access point.
Why should the default username and password be changed as soon as an access point is powered on and accessed?
– The change provides a minimum level of security to the access point.
11
A customer has a web server for a small business. The business uses both wired and wireless networking. A Linksys WRT300N wireless router provides wireless and wired connectivity. What firewall option may be enabled in order for customers to gain access to the web server from their remote locations?
– port forwarding
A customer has a web server for a small business. The business uses both wired and wireless networking. A Linksys WRT300N wireless router provides wireless and wired connectivity. What firewall option may be enabled in order for customers to gain access to the web server from their remote locations?
– port forwarding
12
What is a feature of the firewall capability when Windows Vista is the operating system?
– The firewall can be managed manually by permitting or allowing specific ports.
What is a feature of the firewall capability when Windows Vista is the operating system?
– The firewall can be managed manually by permitting or allowing specific ports.
13
A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
– The computer has been infected with spyware.
A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
– The computer has been infected with spyware.
14
What can a homeowner who has a wireless router do to hide the wireless router signal from the surrounding neighbors?
– Disable SSID broadcast.
What can a homeowner who has a wireless router do to hide the wireless router signal from the surrounding neighbors?
– Disable SSID broadcast.
15
A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
– The administrator does not have the correct permissions to make the change.
A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
– The administrator does not have the correct permissions to make the change.
16
After logging into a computer, a user is unable to access the CIW folder. Access to this folder is necessary to complete an assignment. Which two actions can the administrator take to provide the user access to the folder? (Choose two.)
– Give the person rights to the CIW folder.
– Add the user to a group that has the rights to the CIW folder.
After logging into a computer, a user is unable to access the CIW folder. Access to this folder is necessary to complete an assignment. Which two actions can the administrator take to provide the user access to the folder? (Choose two.)
– Give the person rights to the CIW folder.
– Add the user to a group that has the rights to the CIW folder.
17
Which issue should be addressed in the detailed information that is provided by a local security policy?
– the types of intrusions that are covered by the policy
Which issue should be addressed in the detailed information that is provided by a local security policy?
– the types of intrusions that are covered by the policy
18
Which two factors should management consider when developing a security policy? (Choose two.)
– expense of the security protection
– the costs that are associated with data loss
Which two factors should management consider when developing a security policy? (Choose two.)
– expense of the security protection
– the costs that are associated with data loss
19
What are two interrelated aspects that would be involved in the physical security of an organization? (Choose two.)
– infrastructure
– type of Layer 2 devices that are used within the network
What are two interrelated aspects that would be involved in the physical security of an organization? (Choose two.)
– infrastructure
– type of Layer 2 devices that are used within the network
20
Why would security application software be implemented on a network?
– to protect the operating system
Why would security application software be implemented on a network?
– to protect the operating system
Exam Results – Chapter 16 Exam – IT Essentials: PC Hardware and Software – Version 4.1
Date Exam was Taken: 03/30/2011
Domain Knowledge – Weighted Score
Max Points: 40
Earned Points: 37
Percentage: 92.5%
Max Points: 40
Earned Points: 37
Percentage: 92.5%
Personalized Feedback has been generated based on your responses to this exam. Click Here to view your Personalized Feedback
Domain Knowledge – Binary Score
Max Points: 20
Earned Points: 18
Percentage: 90.0%
Max Points: 20
Earned Points: 18
Percentage: 90.0%
PRECEDENT :Chapter 16
1Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)– It does not impact the processing performance of the equipment it protects.– It is designed to protect more than one computer.
2Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?– Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.
3Which important feature is offered by the USB standard?– It can supply power from the computer to devices.
4Which two hashing algorithms are used to ensure that messages are unaltered during transmission? (Choose two.)– MD5– SHA
5Which Windows XP command initiates a backup from the command line?– NTBACKUP
6After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)– the manufacturer FAQ for network devices– technical websites
7Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?– security key fob
8Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges?– smart card
9What are two features of Windows Vista Backup? (Choose two.)– The backup files have the extension .zip.– The backup files can be saved to another connected computer or server.
10Why should the default username and password be changed as soon as an access point is powered on and accessed?– The change provides a minimum level of security to the access point.
11A customer has a web server for a small business. The business uses both wired and wireless networking. A Linksys WRT300N wireless router provides wireless and wired connectivity. What firewall option may be enabled in order for customers to gain access to the web server from their remote locations?– port forwarding
12What is a feature of the firewall capability when Windows Vista is the operating system?– The firewall can be managed manually by permitting or allowing specific ports.
13A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?– The computer has been infected with spyware.
14What can a homeowner who has a wireless router do to hide the wireless router signal from the surrounding neighbors?– Disable SSID broadcast.
15A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?– The administrator does not have the correct permissions to make the change.
16After logging into a computer, a user is unable to access the CIW folder. Access to this folder is necessary to complete an assignment. Which two actions can the administrator take to provide the user access to the folder? (Choose two.)– Give the person rights to the CIW folder.– Add the user to a group that has the rights to the CIW folder.
17Which issue should be addressed in the detailed information that is provided by a local security policy?– the types of intrusions that are covered by the policy
18Which two factors should management consider when developing a security policy? (Choose two.)– expense of the security protection– the costs that are associated with data loss
19What are two interrelated aspects that would be involved in the physical security of an organization? (Choose two.)– infrastructure– type of Layer 2 devices that are used within the network
20Why would security application software be implemented on a network?– to protect the operating system
Exam Results – Chapter 16 Exam – IT Essentials: PC Hardware and Software – Version 4.1
Date Exam was Taken: 03/30/2011
Domain Knowledge – Weighted ScoreMax Points: 40Earned Points: 37Percentage: 92.5%
Personalized Feedback has been generated based on your responses to this exam. Click Here to view your Personalized Feedback
Domain Knowledge – Binary ScoreMax Points: 20Earned Points: 18Percentage: 90.0%
1Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)– It does not impact the processing performance of the equipment it protects.– It is designed to protect more than one computer.
2Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?– Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.
3Which important feature is offered by the USB standard?– It can supply power from the computer to devices.
4Which two hashing algorithms are used to ensure that messages are unaltered during transmission? (Choose two.)– MD5– SHA
5Which Windows XP command initiates a backup from the command line?– NTBACKUP
6After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)– the manufacturer FAQ for network devices– technical websites
7Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?– security key fob
8Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges?– smart card
9What are two features of Windows Vista Backup? (Choose two.)– The backup files have the extension .zip.– The backup files can be saved to another connected computer or server.
10Why should the default username and password be changed as soon as an access point is powered on and accessed?– The change provides a minimum level of security to the access point.
11A customer has a web server for a small business. The business uses both wired and wireless networking. A Linksys WRT300N wireless router provides wireless and wired connectivity. What firewall option may be enabled in order for customers to gain access to the web server from their remote locations?– port forwarding
12What is a feature of the firewall capability when Windows Vista is the operating system?– The firewall can be managed manually by permitting or allowing specific ports.
13A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?– The computer has been infected with spyware.
14What can a homeowner who has a wireless router do to hide the wireless router signal from the surrounding neighbors?– Disable SSID broadcast.
15A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?– The administrator does not have the correct permissions to make the change.
16After logging into a computer, a user is unable to access the CIW folder. Access to this folder is necessary to complete an assignment. Which two actions can the administrator take to provide the user access to the folder? (Choose two.)– Give the person rights to the CIW folder.– Add the user to a group that has the rights to the CIW folder.
17Which issue should be addressed in the detailed information that is provided by a local security policy?– the types of intrusions that are covered by the policy
18Which two factors should management consider when developing a security policy? (Choose two.)– expense of the security protection– the costs that are associated with data loss
19What are two interrelated aspects that would be involved in the physical security of an organization? (Choose two.)– infrastructure– type of Layer 2 devices that are used within the network
20Why would security application software be implemented on a network?– to protect the operating system
Exam Results – Chapter 16 Exam – IT Essentials: PC Hardware and Software – Version 4.1
Date Exam was Taken: 03/30/2011
Domain Knowledge – Weighted ScoreMax Points: 40Earned Points: 37Percentage: 92.5%
Personalized Feedback has been generated based on your responses to this exam. Click Here to view your Personalized Feedback
Domain Knowledge – Binary ScoreMax Points: 20Earned Points: 18Percentage: 90.0%
Windows 7
1
A PC that is running the Windows 7 operating system has slowed down over a period of time and now takes a long time to launch applications and open various documents. What can be done to remedy the problem?
– Run Disk Defragmenter.
A PC that is running the Windows 7 operating system has slowed down over a period of time and now takes a long time to launch applications and open various documents. What can be done to remedy the problem?
– Run Disk Defragmenter.
2
What does %USERPROFILE% represent in the path C:\Users\%USERPROFILE%\AppData\Local\Temp?
– a variable set by the administrator for each user of the system
What does %USERPROFILE% represent in the path C:\Users\%USERPROFILE%\AppData\Local\Temp?
– a variable set by the administrator for each user of the system
3
Which feature of Windows 7 allows easy access to common tasks specific to a connected device, such as synching or checking for updates?
– Device Stage
Which feature of Windows 7 allows easy access to common tasks specific to a connected device, such as synching or checking for updates?
– Device Stage
4
A new Windows 7 user has used the Shake feature to effectively control the desktop. After moving to another system which also employs Windows 7, the user notices that the Shake feature does not work. What could be a possible problem?
– The computer is using Windows 7 Starter edition.
A new Windows 7 user has used the Shake feature to effectively control the desktop. After moving to another system which also employs Windows 7, the user notices that the Shake feature does not work. What could be a possible problem?
– The computer is using Windows 7 Starter edition.
5
A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly. What can the user do to fix this problem?
– Reinstall the programs in Compatibility Mode
A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly. What can the user do to fix this problem?
– Reinstall the programs in Compatibility Mode
6
A technician is trying to configure offline files and folders for a Windows 7 Home Premium desktop machine, but cannot get the feature to work. What is the most likely cause of the problem?
– Windows 7 Home Premium does not support offline files and folders.
A technician is trying to configure offline files and folders for a Windows 7 Home Premium desktop machine, but cannot get the feature to work. What is the most likely cause of the problem?
– Windows 7 Home Premium does not support offline files and folders.
7
A user is trying to run a program in Windows 7, but keeps getting an error message that states that the program must be run with elevated privileges. What should the user do to allow this program to run properly without having an impact on the security of other programs?
– From the Compatibility tab of the Properties of the program, select Run This Program as an Administrator.
A user is trying to run a program in Windows 7, but keeps getting an error message that states that the program must be run with elevated privileges. What should the user do to allow this program to run properly without having an impact on the security of other programs?
– From the Compatibility tab of the Properties of the program, select Run This Program as an Administrator.
8
Which statement about Windows 7 is correct?
– Windows 7 Starter is only available for netbook computers.
Which statement about Windows 7 is correct?
– Windows 7 Starter is only available for netbook computers.
9
A user decides to install the Windows 7 operating system on the hard drive of a PC using the default settings. The user creates a single partition using the entire space on the hard drive. What file system will the partition be formatted with during the install?
– NTFS
A user decides to install the Windows 7 operating system on the hard drive of a PC using the default settings. The user creates a single partition using the entire space on the hard drive. What file system will the partition be formatted with during the install?
– NTFS
10
Which Windows 7 feature allows you to view the contents of the desktop by moving the mouse to the right edge of the taskbar?
– Aero Peek
Which Windows 7 feature allows you to view the contents of the desktop by moving the mouse to the right edge of the taskbar?
– Aero Peek
11
A technician is planning an operating system upgrade for a user system that is currently running Windows Vista. Because the BitLocker feature embedded in the Windows Vista OS is required, there is a request that this feature be available when the new operating system is installed. Which version or versions of Windows 7 would support this feature?
– Windows 7 Ultimate
A technician is planning an operating system upgrade for a user system that is currently running Windows Vista. Because the BitLocker feature embedded in the Windows Vista OS is required, there is a request that this feature be available when the new operating system is installed. Which version or versions of Windows 7 would support this feature?
– Windows 7 Ultimate
12
A technician wants to allow users to backup and restore all the files on their computers, but does not want the users to be able to make changes to the system. How should the technician give users this functionality?
– Make the users members of a group called Backup Operators
A technician wants to allow users to backup and restore all the files on their computers, but does not want the users to be able to make changes to the system. How should the technician give users this functionality?
– Make the users members of a group called Backup Operators
13
A technician has created a partition in preparation for a Windows 7 network installation on a PC. What additional step is required to allow the PC to connect to the file server to complete the installation?
– The technician must make the partition bootable and include a network client on the local PC.
A technician has created a partition in preparation for a Windows 7 network installation on a PC. What additional step is required to allow the PC to connect to the file server to complete the installation?
– The technician must make the partition bootable and include a network client on the local PC.
14
A technician wants to deploy Windows 7 to 120 computers in an enterprise. The technician wants to use the least amount of administrative overhead in making sure that all of the computers are able to be upgraded successfully. What should the technician do to accomplish this?
– Use the Microsoft Assessment and Planning Toolkit.
A technician wants to deploy Windows 7 to 120 computers in an enterprise. The technician wants to use the least amount of administrative overhead in making sure that all of the computers are able to be upgraded successfully. What should the technician do to accomplish this?
– Use the Microsoft Assessment and Planning Toolkit.
15
A user notices that the Windows 7 UAC appears too often after upgrading the computer to Windows 7. What can the user do to correct this problem?
– Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control.
A user notices that the Windows 7 UAC appears too often after upgrading the computer to Windows 7. What can the user do to correct this problem?
– Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control.
16
After a computer is powered on, Windows 7 fails to start. What initial procedure would a technician use to deal with this failure?
– Boot from a Windows 7 installation media and access the System Restore utility.
After a computer is powered on, Windows 7 fails to start. What initial procedure would a technician use to deal with this failure?
– Boot from a Windows 7 installation media and access the System Restore utility.
17
A user on a Windows 7 Home Premium computer reports that the Aero theme does not work. What action could the technician take to resolve this issue?
– Replace the graphics card with one that meets the minimum hardware requirements for Windows 7
A user on a Windows 7 Home Premium computer reports that the Aero theme does not work. What action could the technician take to resolve this issue?
– Replace the graphics card with one that meets the minimum hardware requirements for Windows 7
18
A network technician is deploying Windows 7 and has been asked to ensure that all machines can join the domain, use jump lists, have location aware printing, and use BitLocker to secure data. What is the minimum version of Windows 7 that the technician can deploy to meet all these requirements?
– Windows 7 Ultimate
A network technician is deploying Windows 7 and has been asked to ensure that all machines can join the domain, use jump lists, have location aware printing, and use BitLocker to secure data. What is the minimum version of Windows 7 that the technician can deploy to meet all these requirements?
– Windows 7 Ultimate
19
A Windows 7 computer backup that is scheduled for a specific date and time fails to start. What could be done to address this problem?
– Choose Turn on Schedule on the Backup and Restore menu.
A Windows 7 computer backup that is scheduled for a specific date and time fails to start. What could be done to address this problem?
– Choose Turn on Schedule on the Backup and Restore menu.
20
Which operating systems can be upgraded to Windows 7?
– Windows Vista
Which operating systems can be upgraded to Windows 7?
– Windows Vista
11
How is the Microsoft Assessment and Planning toolkit software used in the upgrade to Windows 7?
– It is used to assess existing computers to determine whether they can be migrated to Windows 7
How is the Microsoft Assessment and Planning toolkit software used in the upgrade to Windows 7?
– It is used to assess existing computers to determine whether they can be migrated to Windows 7
12
How should a hard drive be partitioned to support a Windows 7 installation over a network?
– A FAT32 partition of at least 5 GB must be created.
How should a hard drive be partitioned to support a Windows 7 installation over a network?
– A FAT32 partition of at least 5 GB must be created.
13
A technician wishes to restart the print spooler on a Windows 7 client computer. Which Task Manager tab would provide support for this action?
– Services
A technician wishes to restart the print spooler on a Windows 7 client computer. Which Task Manager tab would provide support for this action?
– Services
14
In which folder are application files for 32-bit programs typically located on a computer that is running a 64-bit edition of Windows 7?
– C:\Program Files (x86)
In which folder are application files for 32-bit programs typically located on a computer that is running a 64-bit edition of Windows 7?
– C:\Program Files (x86)
15
Which statement about Windows 7 is correct?
– Windows 7 Home Premium cannot be joined to a domain
Which statement about Windows 7 is correct?
– Windows 7 Home Premium cannot be joined to a domain
24
After using a Windows 7 installation DVD to upgrade a PC from Windows Vista to Windows 7, a user finds that the DVD drive is no longer recognized. What is the probable cause of the problem?
– A registry error prevents Windows 7 from recognizing the DVD drive.
After using a Windows 7 installation DVD to upgrade a PC from Windows Vista to Windows 7, a user finds that the DVD drive is no longer recognized. What is the probable cause of the problem?
– A registry error prevents Windows 7 from recognizing the DVD drive.
25
A Windows 7 operating system fails to boot when the system is powered on. The technician suspects that the operating system has been attacked by a virus that rendered the system inoperable. What measure could be taken to restore system functionality?
– Use a system image that was created prior to the failure to restore the system.
A Windows 7 operating system fails to boot when the system is powered on. The technician suspects that the operating system has been attacked by a virus that rendered the system inoperable. What measure could be taken to restore system functionality?
– Use a system image that was created prior to the failure to restore the system.
27
A technician has determined that a cache overflow problem is having an impact on the performance of a Windows 7 computer. How could the technician correct this problem?
– Change the environment variables stored at C:\Documents and Settings\%USERPROFILE%\Local Settings\Temp.
A technician has determined that a cache overflow problem is having an impact on the performance of a Windows 7 computer. How could the technician correct this problem?
– Change the environment variables stored at C:\Documents and Settings\%USERPROFILE%\Local Settings\Temp.
31
A technician is configuring a kiosk PC in the office lobby for customer use. This kiosk needs to be able to display information in English, French, and Spanish. The technician has decided to use Multilingual User Interface packs with Windows 7 to provide the capability of switching easily between languages. What is the minimum version of Windows 7 the technician can use to support this feature?
– Windows 7 Ultimate
A technician is configuring a kiosk PC in the office lobby for customer use. This kiosk needs to be able to display information in English, French, and Spanish. The technician has decided to use Multilingual User Interface packs with Windows 7 to provide the capability of switching easily between languages. What is the minimum version of Windows 7 the technician can use to support this feature?
– Windows 7 Ultimate
28
Which two options correctly list the amount of hard drive space that is required for a Windows 7 Professional installation on 32-bit and 64-bit systems? (Choose two.)
– 20 GB of hard drive space for the 64-bit version
– 16 GB of hard drive space for the 32-bit version.
Which two options correctly list the amount of hard drive space that is required for a Windows 7 Professional installation on 32-bit and 64-bit systems? (Choose two.)
– 20 GB of hard drive space for the 64-bit version
– 16 GB of hard drive space for the 32-bit version.
18
A user downloads and uses the Windows 7 Upgrade Advisor to generate a report on a PC that is being considered for an operating system upgrade. What information would the report contain?
– recommended changes to hardware
A user downloads and uses the Windows 7 Upgrade Advisor to generate a report on a PC that is being considered for an operating system upgrade. What information would the report contain?
– recommended changes to hardware
Exam Results – Windows 7 – IT Essentials: PC Hardware and Software (Version 4.1)
Date Exam was Taken: 28/03/2011
Domain Knowledge – Weighted Score
Max Points: 64
Earned Points: 60
Percentage: 93.8%
Max Points: 64
Earned Points: 60
Percentage: 93.8%
Practice Final Exam for ch 11-16
1
A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired?
– Stop the print spooler.
A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired?
– Stop the print spooler.
2
For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.)
– regional settings
– network settings
For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.)
– regional settings
– network settings
3
Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
– 443
Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
– 443
4
A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choose two.)
– The monitor cable connector is loose or disconnected because the retaining screws are missing.
– The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter.
A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choose two.)
– The monitor cable connector is loose or disconnected because the retaining screws are missing.
– The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter.
5
Which Windows hard drive partition is referred to as the C: drive?
– the first primary partition
Which Windows hard drive partition is referred to as the C: drive?
– the first primary partition
6
A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
– USB 2.0 is one hundred times as fast as USB 1.1.
A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
– USB 2.0 is one hundred times as fast as USB 1.1.
7
Which feature is characteristic of the ntbackup command?
– It is used create restore points.
Which feature is characteristic of the ntbackup command?
– It is used create restore points.
8
Which safety precaution should an installer take when installing cable in the ceiling of a building?
– Wear safety glasses in case of encountering toxic materials during the installation.
Which safety precaution should an installer take when installing cable in the ceiling of a building?
– Wear safety glasses in case of encountering toxic materials during the installation.
9
Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?
– biometric devices
Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?
– biometric devices
10
Which Startup type must be selected for a service that should run each time the computer is booted?
– automatic
Which Startup type must be selected for a service that should run each time the computer is booted?
– automatic
11
What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.)
– The computer displays an “Invalid Boot Disk” error after POST.
– The computer displays an “Inaccessible Boot Device” error after POST
What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.)
– The computer displays an “Invalid Boot Disk” error after POST.
– The computer displays an “Inaccessible Boot Device” error after POST
12
Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought.
Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought.
Which type of memory module is the IT department expecting to receive?
– SODIMM
– SODIMM
13
Which recommendation should be observed when replacing existing memory?
– The new memory should be as fast or faster than existing memory.
Which recommendation should be observed when replacing existing memory?
– The new memory should be as fast or faster than existing memory.
14
Refer to the exhibit. Which utility has the IT department started on each computer?
– Defragment
Refer to the exhibit. Which utility has the IT department started on each computer?
– Defragment
15
A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem?
– Start the Vista Aero enhanced display features by launching services.msc.
A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem?
– Start the Vista Aero enhanced display features by launching services.msc.
16
The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
– VPN
The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
– VPN
17
When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
– thermal compound
When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
– thermal compound
18
Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)
– 25
– 110
– 143
Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)
– 25
– 110
– 143
19
A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?
– Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.
A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?
– Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.
20
Which two hazards are related to fiber optic installations? (Choose two.)
– light that can burn the eyes
– glass splinters that can penetrate the skin
Which two hazards are related to fiber optic installations? (Choose two.)
– light that can burn the eyes
– glass splinters that can penetrate the skin
21
A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?
– SCSI (Ultra-320)
A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?
– SCSI (Ultra-320)
22
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?
– mesh
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?
– mesh
23
What is the highest risk associated with improperly charged or mishandled batteries?
– The battery can explode.
What is the highest risk associated with improperly charged or mishandled batteries?
– The battery can explode.
24
Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive?
– 3 logical, 1 extended, 1 free space, 1 primary
Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive?
– 3 logical, 1 extended, 1 free space, 1 primary
25
Which two characteristics describe a software firewall? (Choose two.)
– It typically protects only the computer it is installed on.
– It uses the CPU in the host computer.
Which two characteristics describe a software firewall? (Choose two.)
– It typically protects only the computer it is installed on.
– It uses the CPU in the host computer.
26
What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.)
– These cables usually have 9 pins or 25 pins on both ends.
– The two available operative modes are EPP and ECP.
What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.)
– These cables usually have 9 pins or 25 pins on both ends.
– The two available operative modes are EPP and ECP.
27
Which action should be taken first if a card key is lost or stolen?
– Disable the lost card key.
Which action should be taken first if a card key is lost or stolen?
– Disable the lost card key.
28
A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem?
– Change the startup type for the utility to Automatic in Services.
A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem?
– Change the startup type for the utility to Automatic in Services.
29
The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point?
– Disable the broadcast of the SSID on the access point.
The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point?
– Disable the broadcast of the SSID on the access point.
30
The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem?
– Defragment the hard disk.
The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem?
– Defragment the hard disk.
31
A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem? (Choose two.)
– Clean the surface of the touchpad.
– Ensure that the operating system has the correct driver for the touchpad.
A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem? (Choose two.)
– Clean the surface of the touchpad.
– Ensure that the operating system has the correct driver for the touchpad.
32
Refer to the exhibit. Based on the information shown, which statement is true?
– The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87.
Refer to the exhibit. Based on the information shown, which statement is true?
– The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87.
33
Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this motherboard?
– The Intel Core i7 processor supports a maximum bus speed of 1600MHz.
Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this motherboard?
– The Intel Core i7 processor supports a maximum bus speed of 1600MHz.
34
Which interface can transfer data at a maximum speed of 480 Mbps?
– USB 2.0
Which interface can transfer data at a maximum speed of 480 Mbps?
– USB 2.0
35
A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed?
– RAM
A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed?
– RAM
Date Exam was Taken: 03/30/2011
Domain Knowledge – Weighted Score
Max Points: 71
Earned Points: 60
Percentage: 84.5%
Max Points: 71
Earned Points: 60
Percentage: 84.5%
Personalized Feedback has been generated based on your responses to this exam. Click Here to view your Personalized Feedback
Domain Knowledge – Binary Score
Max Points: 35
Earned Points: 28
Percentage: 80.0%
Max Points: 35
Earned Points: 28
Percentage: 80.0%
Practice Final Exam for ch 1-10
1
A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and diagnostic utilities. Where would the technician set the boot order for the PC?
-BIOS
A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and diagnostic utilities. Where would the technician set the boot order for the PC?
-BIOS
2
A technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems?
-Device Manager
A technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems?
-Device Manager
3
A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file
-CHKDSK
A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file
-CHKDSK
4
What characterizes a DDoS attack?
-Many hosts participate in a coordinated attack.
What characterizes a DDoS attack?
-Many hosts participate in a coordinated attack.
5
A technician has replaced a failing floppy drive. While testing the new drive, the technician notices that the floppy drive light remains lit constantly. What is most likely the cause of the problem?
-The ribbon cable is installed incorrectly.
A technician has replaced a failing floppy drive. While testing the new drive, the technician notices that the floppy drive light remains lit constantly. What is most likely the cause of the problem?
-The ribbon cable is installed incorrectly.
6
Refer to the exhibit. Which two port types are shown in the graphic? (Choose two.)
-network
-USB
Refer to the exhibit. Which two port types are shown in the graphic? (Choose two.)
-network
-USB
7
Which network device uses a MAC address table to segment the network?
-switch
Which network device uses a MAC address table to segment the network?
-switch
8
A customer is angry and calls to complain that the service scheduled on his computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?
-Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer.
A customer is angry and calls to complain that the service scheduled on his computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?
-Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer.
9
The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver?
-manufacturer’s website
The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver?
-manufacturer’s website
10
The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?
-DHCP
The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?
-DHCP
11
When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?
-BIOS reads the MBR.
When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?
-BIOS reads the MBR.
12
When starting a computer, a customer can no longer select two of the operating systems that are installed. Which file may be corrupted and causing this error?
-BOOT.INI
When starting a computer, a customer can no longer select two of the operating systems that are installed. Which file may be corrupted and causing this error?
-BOOT.INI
13
A technician is planning to convert a file system from FAT32 to NTFS. What step should be taken before doing the conversion?
-Create a complete system backup.
A technician is planning to convert a file system from FAT32 to NTFS. What step should be taken before doing the conversion?
-Create a complete system backup.
14
A call center technician is on a call with a customer when a colleague indicates that there is something to discuss. What should the technician do?
-Signal to the colleague to wait
A call center technician is on a call with a customer when a colleague indicates that there is something to discuss. What should the technician do?
-Signal to the colleague to wait
15
What is the best way to fully ensure that data is unable to be recovered from a hard drive?
-shattering the hard drive platters with a hammer
What is the best way to fully ensure that data is unable to be recovered from a hard drive?
-shattering the hard drive platters with a hammer
16
A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files are missing. What should the customer do next?
-Restore the data files that were backed up in preparation for the conversion
A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files are missing. What should the customer do next?
-Restore the data files that were backed up in preparation for the conversion
17
Which two security tasks should be included in a computer preventive maintenance plan? (Choose two.)
-an update of spyware removal tools
-an update of antivirus scanner software
Which two security tasks should be included in a computer preventive maintenance plan? (Choose two.)
-an update of spyware removal tools
-an update of antivirus scanner software
18
A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)
-Inkjet printers are less expensive than laser printers
-The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.
A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)
-Inkjet printers are less expensive than laser printers
-The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.
19
A customer wants to produce video recordings to sell to the public. Which two types of media should be used to accomplish this type of recording? (Choose two.)
-DVD+/-R
-BD-R
A customer wants to produce video recordings to sell to the public. Which two types of media should be used to accomplish this type of recording? (Choose two.)
-DVD+/-R
-BD-R
20
A customer complains that a scanner has suddenly stopped producing clear images. Which preventive maintenance task has the customer most likely forgotten to do?
-visually inspect the scanner glass
A customer complains that a scanner has suddenly stopped producing clear images. Which preventive maintenance task has the customer most likely forgotten to do?
-visually inspect the scanner glass
21
A new application fails to install from a CD known to be virus-free and compatible with the operating system. What is a possible solution to this problem?
-Close all other running programs before installing the new application.
A new application fails to install from a CD known to be virus-free and compatible with the operating system. What is a possible solution to this problem?
-Close all other running programs before installing the new application.
22
A user cannot log in to the network with a computer that worked yesterday. Other computers on the same network are working fine. Which troubleshooting process would be most logical to try first?
-Look at the NIC lights
A user cannot log in to the network with a computer that worked yesterday. Other computers on the same network are working fine. Which troubleshooting process would be most logical to try first?
-Look at the NIC lights
23
A customer is experiencing repeated paper jams on a laser printer. Which quick solution might correct this problem?
-Power cycle the printer
A customer is experiencing repeated paper jams on a laser printer. Which quick solution might correct this problem?
-Power cycle the printer
24
At which TCP/IP model layer would a MAC address be found?
-network access
At which TCP/IP model layer would a MAC address be found?
-network access
25
A technician powers on a computer and opens a web page. A message that the web page could not be found appears. After checking the URL, the technician verifies that this is the problem that was reported by the computer owner. What would be the next step in the troubleshooting process for the technician?
-Verify the computer IP address information
A technician powers on a computer and opens a web page. A message that the web page could not be found appears. After checking the URL, the technician verifies that this is the problem that was reported by the computer owner. What would be the next step in the troubleshooting process for the technician?
-Verify the computer IP address information
26
What should always be done prior to replacing components that are not hot-swappable in a laptop?
-Unplug the laptop and remove the battery.
What should always be done prior to replacing components that are not hot-swappable in a laptop?
-Unplug the laptop and remove the battery.
27
Which protocol adds security to remote connections?
-SSH
Which protocol adds security to remote connections?
-SSH
28
What are two functions of a VPN gateway? (Choose two.)
-provide remote user access to the VPN client software
-manage VPN tunnels
What are two functions of a VPN gateway? (Choose two.)
-provide remote user access to the VPN client software
-manage VPN tunnels
29
A technician is repairing Windows XP and wants to keep all of the application settings in the operating system. The technician is using the Repair XP option and has rebooted the computer. A message appears on the screen stating “Press any key to boot from the CD or DVD.” What should the technician do?
-The technician should press the space bar so that the installation can continue.
A technician is repairing Windows XP and wants to keep all of the application settings in the operating system. The technician is using the Repair XP option and has rebooted the computer. A message appears on the screen stating “Press any key to boot from the CD or DVD.” What should the technician do?
-The technician should press the space bar so that the installation can continue.
30
A user is experiencing slow print rates when printing files that contain large complex graphics. What could be done to improve performance?
-Add memory to the printer.
A user is experiencing slow print rates when printing files that contain large complex graphics. What could be done to improve performance?
-Add memory to the printer.
31
In the event of a catastrophic system or hardware failure, which Windows XP utility provides a framework for saving and recovering the operating system?
-Automated System Recovery (ASR)
In the event of a catastrophic system or hardware failure, which Windows XP utility provides a framework for saving and recovering the operating system?
-Automated System Recovery (ASR)
32
Refer to the exhibit. What type of device is highlighted in white?
-touch pad
Refer to the exhibit. What type of device is highlighted in white?
-touch pad
33
Which two ports on a laptop allow connection or removal of external devices, such as hard drives or printers, without powering off the computer? (Choose two.)
-FireWire
-USB
Which two ports on a laptop allow connection or removal of external devices, such as hard drives or printers, without powering off the computer? (Choose two.)
-FireWire
-USB
34
Which program checks for installed hardware during the Windows XP boot process?
-NTDETECT
Which program checks for installed hardware during the Windows XP boot process?
-NTDETECT
35
A computer can access devices on the same network but can not access devices on other networks. What is the probable cause of this problem?
-The computer has an invalid default gateway address.
A computer can access devices on the same network but can not access devices on other networks. What is the probable cause of this problem?
-The computer has an invalid default gateway address.
36
Which type of standard interface allows users to connect and disconnect peripheral devices while the computer is running without having to restart?
-USB
Which type of standard interface allows users to connect and disconnect peripheral devices while the computer is running without having to restart?
-USB
37
Which type of power connector is used to connect devices such as optical drives and hard drives?
-Molex
Which type of power connector is used to connect devices such as optical drives and hard drives?
-Molex
38
What guideline should be followed when establishing a password security policy?
-An expiration period should be established so that passwords frequently change.
What guideline should be followed when establishing a password security policy?
-An expiration period should be established so that passwords frequently change.
39
A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?
-The computer emits a pattern of beeps indicating the failing device.
A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?
-The computer emits a pattern of beeps indicating the failing device.
40
A network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic noise. Which type of network media should be recommended?
-fiber optic
A network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic noise. Which type of network media should be recommended?
-fiber optic
41
A student wishes to buy a computer suitable for game playing. What CPU speed would be appropriate for game playing?
-3 GHz
A student wishes to buy a computer suitable for game playing. What CPU speed would be appropriate for game playing?
-3 GHz
42
A customer is considering an inkjet printer to print batches of colored documents that will be immediately stacked and packaged for shipping. What advice should a technician give the customer?
-Immediately after printing, the ink is wet
A customer is considering an inkjet printer to print batches of colored documents that will be immediately stacked and packaged for shipping. What advice should a technician give the customer?
-Immediately after printing, the ink is wet
43
A technician installed Windows XP on a 20 GB SCSI drive but when the computer is started a NTLDR error message is displayed. Based on this information which file was most likely corrupted during installation?
-NTBOOTDD
A technician installed Windows XP on a 20 GB SCSI drive but when the computer is started a NTLDR error message is displayed. Based on this information which file was most likely corrupted during installation?
-NTBOOTDD
44
Which Registry file contains information about all software that is installed on a Windows XP computer?
-HKEY_LOCAL_MACHINE
Which Registry file contains information about all software that is installed on a Windows XP computer?
-HKEY_LOCAL_MACHINE
45
Refer to the exhibit. Which type of removable media is depicted?
-flash drive
Refer to the exhibit. Which type of removable media is depicted?
-flash drive
46
Which three tasks should a computer preventive maintenance plan contain? (Choose three.)
-the defragmentation of the hard drive
-an update of the operating system and applications
-an update of antivirus and other protective software
Which three tasks should a computer preventive maintenance plan contain? (Choose three.)
-the defragmentation of the hard drive
-an update of the operating system and applications
-an update of antivirus and other protective software
47
Which power mode should be used by a laptop so that all the data is saved, all the applications the user was working on are left open, and there is no power used by the laptop?
-Hibernate
Which power mode should be used by a laptop so that all the data is saved, all the applications the user was working on are left open, and there is no power used by the laptop?
-Hibernate
48
A customer requests advice about the type of storage device to use for 20 new computers. For which two conditions should SSDs be recommended as replacements for magnetic hard drives? (Choose two.)
-locations that require low power usage
-workplaces with harsh workplace conditions where the computers are subject to dust and vibration
A customer requests advice about the type of storage device to use for 20 new computers. For which two conditions should SSDs be recommended as replacements for magnetic hard drives? (Choose two.)
-locations that require low power usage
-workplaces with harsh workplace conditions where the computers are subject to dust and vibration
49
A customer is upset and wants to speak to a specific technician to resolve a problem immediately. The requested technician is away from the office for the next hour. What is the best way to handle this call?
-Make an offer to help the customer immediately, and advise the customer that otherwise the requested technician will call the customer back within two hours.
A customer is upset and wants to speak to a specific technician to resolve a problem immediately. The requested technician is away from the office for the next hour. What is the best way to handle this call?
-Make an offer to help the customer immediately, and advise the customer that otherwise the requested technician will call the customer back within two hours.
50
A technician is designing a hardware preventive maintenance plan for a company. Which strategy should be included in the plan?
-Schedule and document routine maintenance tasks.
A technician is designing a hardware preventive maintenance plan for a company. Which strategy should be included in the plan?
-Schedule and document routine maintenance tasks.
Date Exam was Taken: 03/30/2011
Domain Knowledge – Weighted Score
Max Points: 101
Earned Points: 96
Percentage: 95.0%
Max Points: 101
Earned Points: 96
Percentage: 95.0%
Personalized Feedback has been generated based on your responses to this exam. Click Here to view your Personalized Feedback
The answers to the following questions should be:
Q. A technician is repairing Windows XP and wants to keep all of the application settings in the operating system. The technician is using the Repair XP option and has rebooted the computer. A message appears on the screen stating “Press any key to boot from the CD or DVD.” What should the technician do?
A. The technician should ignore the message and allow XP to repair the operating system without deleting any of the applications.
Q. What are two functions of a VPN gateway?
A. 1. establish secure VPN connections
2. manage VPN tunnels
2. manage VPN tunnels
Q. A customer is experiencing repeated paper jams on a laser printer. Which quick solution might correct this problem?
A. Replace the paper in the input tray with new paper.
1
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
– It does not impact the processing performance of the equipment it protects.
– It is designed to protect more than one computer.
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
– It does not impact the processing performance of the equipment it protects.
– It is designed to protect more than one computer.
2
Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
– Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.
Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
– Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.
3
Which important feature is offered by the USB standard?
– It can supply power from the computer to devices.
Which important feature is offered by the USB standard?
– It can supply power from the computer to devices.
4
Which two hashing algorithms are used to ensure that messages are unaltered during transmission? (Choose two.)
– MD5
– SHA
Which two hashing algorithms are used to ensure that messages are unaltered during transmission? (Choose two.)
– MD5
– SHA
5
Which Windows XP command initiates a backup from the command line?
– NTBACKUP
Which Windows XP command initiates a backup from the command line?
– NTBACKUP
6
After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
– the manufacturer FAQ for network devices
– technical websites
After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
– the manufacturer FAQ for network devices
– technical websites
7
Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
– security key fob
Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
– security key fob
8
Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges?
– smart card
Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges?
– smart card
9
What are two features of Windows Vista Backup? (Choose two.)
– The backup files have the extension .zip.
– The backup files can be saved to another connected computer or server.
What are two features of Windows Vista Backup? (Choose two.)
– The backup files have the extension .zip.
– The backup files can be saved to another connected computer or server.
10
Why should the default username and password be changed as soon as an access point is powered on and accessed?
– The change provides a minimum level of security to the access point.
Why should the default username and password be changed as soon as an access point is powered on and accessed?
– The change provides a minimum level of security to the access point.
11
A customer has a web server for a small business. The business uses both wired and wireless networking. A Linksys WRT300N wireless router provides wireless and wired connectivity. What firewall option may be enabled in order for customers to gain access to the web server from their remote locations?
– port forwarding
A customer has a web server for a small business. The business uses both wired and wireless networking. A Linksys WRT300N wireless router provides wireless and wired connectivity. What firewall option may be enabled in order for customers to gain access to the web server from their remote locations?
– port forwarding
12
What is a feature of the firewall capability when Windows Vista is the operating system?
– The firewall can be managed manually by permitting or allowing specific ports.
What is a feature of the firewall capability when Windows Vista is the operating system?
– The firewall can be managed manually by permitting or allowing specific ports.
13
A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
– The computer has been infected with spyware.
A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
– The computer has been infected with spyware.
14
What can a homeowner who has a wireless router do to hide the wireless router signal from the surrounding neighbors?
– Disable SSID broadcast.
What can a homeowner who has a wireless router do to hide the wireless router signal from the surrounding neighbors?
– Disable SSID broadcast.
15
A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
– The administrator does not have the correct permissions to make the change.
A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
– The administrator does not have the correct permissions to make the change.
16
After logging into a computer, a user is unable to access the CIW folder. Access to this folder is necessary to complete an assignment. Which two actions can the administrator take to provide the user access to the folder? (Choose two.)
– Give the person rights to the CIW folder.
– Add the user to a group that has the rights to the CIW folder.
After logging into a computer, a user is unable to access the CIW folder. Access to this folder is necessary to complete an assignment. Which two actions can the administrator take to provide the user access to the folder? (Choose two.)
– Give the person rights to the CIW folder.
– Add the user to a group that has the rights to the CIW folder.
17
Which issue should be addressed in the detailed information that is provided by a local security policy?
– the types of intrusions that are covered by the policy
Which issue should be addressed in the detailed information that is provided by a local security policy?
– the types of intrusions that are covered by the policy
18
Which two factors should management consider when developing a security policy? (Choose two.)
– expense of the security protection
– the costs that are associated with data loss
Which two factors should management consider when developing a security policy? (Choose two.)
– expense of the security protection
– the costs that are associated with data loss
19
What are two interrelated aspects that would be involved in the physical security of an organization? (Choose two.)
– infrastructure
– type of Layer 2 devices that are used within the network
What are two interrelated aspects that would be involved in the physical security of an organization? (Choose two.)
– infrastructure
– type of Layer 2 devices that are used within the network
20
Why would security application software be implemented on a network?
– to protect the operating system
Why would security application software be implemented on a network?
– to protect the operating system
Exam Results – Chapter 16 Exam – IT Essentials: PC Hardware and Software – Version 4.1
Date Exam was Taken: 03/30/2011
Domain Knowledge – Weighted Score
Max Points: 40
Earned Points: 37
Percentage: 92.5%
Max Points: 40
Earned Points: 37
Percentage: 92.5%
Personalized Feedback has been generated based on your responses to this exam. Click Here to view your Personalized Feedback
Final Exam for ch 1-10
1
What is the purpose of wearing an antistatic wrist strap?
– to equalize the electrical charge between the user and the equipment
What is the purpose of wearing an antistatic wrist strap?
– to equalize the electrical charge between the user and the equipment
2
When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages?
– D
When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages?
– D
3
Fans that are used to help cool a system are commonly placed on which two components? (Choose two.)
– video card
– CPU
Fans that are used to help cool a system are commonly placed on which two components? (Choose two.)
– video card
– CPU
4
When installing a service pack or security patches on an operating system, what should be done to protect the system in the event of a faulty or aborted installation?
– Create a restore point.
When installing a service pack or security patches on an operating system, what should be done to protect the system in the event of a faulty or aborted installation?
– Create a restore point.
5
What are two network requirements necessary to establish a VPN connection between a remote computer and a private company LAN? (Choose two.)
– Internet access
– VPN client
What are two network requirements necessary to establish a VPN connection between a remote computer and a private company LAN? (Choose two.)
– Internet access
– VPN client
6
An employee is receiving e-mail from unknown banks asking for username and password information. Which type of security attack is the employee experiencing?
– phishing
An employee is receiving e-mail from unknown banks asking for username and password information. Which type of security attack is the employee experiencing?
– phishing
7
What is the purpose of Windows Vista 64-bit Kernel Patch Protection?
– It prevents third party drivers from modifying the operating system kernel
What is the purpose of Windows Vista 64-bit Kernel Patch Protection?
– It prevents third party drivers from modifying the operating system kernel
8
A network technician receives an error that there is insufficient physical disk space on an external drive to hold a file from a Windows XP computer. What is a possible cause for the problem?
– The external drive is formatted with a FAT 32 file system and the file is too large for that file system.
A network technician receives an error that there is insufficient physical disk space on an external drive to hold a file from a Windows XP computer. What is a possible cause for the problem?
– The external drive is formatted with a FAT 32 file system and the file is too large for that file system.
9
A network administrator is troubleshooting an e-mail server that keeps crashing. The administrator notices large amounts of spam coming to the server from a single source that is overloading the server. What type of attack is being launched against the e-mail server?
– e-mail bomb
A network administrator is troubleshooting an e-mail server that keeps crashing. The administrator notices large amounts of spam coming to the server from a single source that is overloading the server. What type of attack is being launched against the e-mail server?
– e-mail bomb
10
A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?
– WAN
A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?
– WAN
11
While troubleshooting a computer on which the operating system fails to boot, a technician has checked that there are no non-bootable media in the disk drives, tried using the Last Known Good Configuration option, and attempted to boot the computer in Safe Mode, all without success. Which further possible solution could be tried?
– Perform a Repair Installation of the operating system.
While troubleshooting a computer on which the operating system fails to boot, a technician has checked that there are no non-bootable media in the disk drives, tried using the Last Known Good Configuration option, and attempted to boot the computer in Safe Mode, all without success. Which further possible solution could be tried?
– Perform a Repair Installation of the operating system.
12
When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumables. Which two consumables are associated with an inkjet printer? (Choose two.)
– ink cartridge
– paper
When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumables. Which two consumables are associated with an inkjet printer? (Choose two.)
– ink cartridge
– paper
13
What is the logical topology used for the Ethernet architecture?
– bus
What is the logical topology used for the Ethernet architecture?
– bus
14
Where can a user change the idle time after which a laptop will switch to standby mode?
– Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.
Where can a user change the idle time after which a laptop will switch to standby mode?
– Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.
15
Which two items are considered proper cleaning tools? (Choose two.)
– compressed air
– soft cloth
Which two items are considered proper cleaning tools? (Choose two.)
– compressed air
– soft cloth
16
What characterizes spoofing?
– Making data appear to come from a source other than the actual source.
What characterizes spoofing?
– Making data appear to come from a source other than the actual source.
17
What do the terms refresh rate, interlace, and aspect ratio explain?
– image properties of a monitor
What do the terms refresh rate, interlace, and aspect ratio explain?
– image properties of a monitor
18
Which firewall port number or number combination must be open in order to remotely access a network device using SSH?
– 22
Which firewall port number or number combination must be open in order to remotely access a network device using SSH?
– 22
19
Which three rules increase the level of password strength? (Choose three.)
– Passwords should be a combination of letters and numbers.
– Passwords should combine a user’s special dates and initials so they can be alphanumeric.
– Passwords should be changed by the user after specific periods of time.
Which three rules increase the level of password strength? (Choose three.)
– Passwords should be a combination of letters and numbers.
– Passwords should combine a user’s special dates and initials so they can be alphanumeric.
– Passwords should be changed by the user after specific periods of time.
20
A technician has been asked to find how a hacker keeps breaking in to a computer. Which security precaution was most likely missed when the operating system was first installed?
– A password was not assigned to the default administrator account.
A technician has been asked to find how a hacker keeps breaking in to a computer. Which security precaution was most likely missed when the operating system was first installed?
– A password was not assigned to the default administrator account.
21
A technician is having trouble with laptops that keep overheating. What preventive maintenance procedure can be performed on the laptops to reduce this problem?
– Clean the air vents.
A technician is having trouble with laptops that keep overheating. What preventive maintenance procedure can be performed on the laptops to reduce this problem?
– Clean the air vents.
22
ABC Company wants to configure laptops to automatically power components off to improve battery life. Which power management control can be used to accomplish this?
– ACPI
ABC Company wants to configure laptops to automatically power components off to improve battery life. Which power management control can be used to accomplish this?
– ACPI
23
Why do mobile devices such as laptop computers use specially designed CPUs?
– They consume less power.
Why do mobile devices such as laptop computers use specially designed CPUs?
– They consume less power.
24
Refer to the exhibit. What command was typed to produce the output that is shown?
– ipconfig /all
Refer to the exhibit. What command was typed to produce the output that is shown?
– ipconfig /all
25
A newly purchased scanner is not functioning as efficiently as expected. Which step should a technician take to improve performance?
– Download drivers and utilities from the manufacturer web site
A newly purchased scanner is not functioning as efficiently as expected. Which step should a technician take to improve performance?
– Download drivers and utilities from the manufacturer web site
26
A printer has a paper jam. An impatient user has sent multiple print jobs of the same document to this printer. What can be done to remove these print jobs?
– Cancel the jobs in the printer queue
A printer has a paper jam. An impatient user has sent multiple print jobs of the same document to this printer. What can be done to remove these print jobs?
– Cancel the jobs in the printer queue
27
A technician has installed and configured an external projector on a laptop. What is the final task the technician must perform for the image to be displayed through the projector?
– Press the function key sequence to activate the image on the projector
A technician has installed and configured an external projector on a laptop. What is the final task the technician must perform for the image to be displayed through the projector?
– Press the function key sequence to activate the image on the projector
28
A company computer use policy recommends that hard drive defragmentation be performed every six months. What is the purpose of this preventive maintenance routine?
– increasing computer performance
A company computer use policy recommends that hard drive defragmentation be performed every six months. What is the purpose of this preventive maintenance routine?
– increasing computer performance
29
A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?
– BIOS
A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?
– BIOS
30
ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?
– RAID adapter
ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?
– RAID adapter
31
A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?
– The technician interrupted a number of times to ask questions.
A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?
– The technician interrupted a number of times to ask questions.
32
Where in Windows XP can the shutdown, hibernate, and standby modes be configured?
– Start > Control Panel > Power Options
Where in Windows XP can the shutdown, hibernate, and standby modes be configured?
– Start > Control Panel > Power Options
33
Which type of cable standard uses a 9-pin connector and supports data rates in excess of 800 Mbps?
– IEEE 1394b
Which type of cable standard uses a 9-pin connector and supports data rates in excess of 800 Mbps?
– IEEE 1394b
34
A home computer owner has a PC system that runs Windows XP. For security reasons the owner has been using a limited local user account for a number of years. The owner wishes to install a new piece of software, but the user account does not have the necessary permissions. Which type of account does the owner need to use to install the new software?
– administrator
A home computer owner has a PC system that runs Windows XP. For security reasons the owner has been using a limited local user account for a number of years. The owner wishes to install a new piece of software, but the user account does not have the necessary permissions. Which type of account does the owner need to use to install the new software?
– administrator
35
Refer to the exhibit. A Cisco Networking Academy instructor is trying to print a flash graphic from the curriculum. The print job has gone into the print queue as shown. Based on the output, what should be the next step in solving this problem?
– Check the printer cabling and power.
Refer to the exhibit. A Cisco Networking Academy instructor is trying to print a flash graphic from the curriculum. The print job has gone into the print queue as shown. Based on the output, what should be the next step in solving this problem?
– Check the printer cabling and power.
36
Which Windows tool should be run before upgrading the operating system?
– Ntbackup
Which Windows tool should be run before upgrading the operating system?
– Ntbackup
37
After Windows XP has been installed, which program would a technician use to select the programs that will run at startup?
– msconfig
After Windows XP has been installed, which program would a technician use to select the programs that will run at startup?
– msconfig
38
A company uses a single computer to receive and test all Windows updates. When the most recent update was installed, several programs failed. What is the first course of action that a technician should attempt to remove the update?
– Run a System Restore from the last restore point.
A company uses a single computer to receive and test all Windows updates. When the most recent update was installed, several programs failed. What is the first course of action that a technician should attempt to remove the update?
– Run a System Restore from the last restore point.
39
A call center technician answers a call from a frequent customer who is known to be impatient and lacks experience with computers. The customer has an issue with an application that the call center supports. The customer informs the technician that the problem had been reported before but the original technician was rude, did not listen, and did not fix the problem. If the technician is confident that the problem can be resolved by increasing the amount of memory in the computer, what should the technician do?
– Confirm the issues and give detailed instructions to solve the problem.
A call center technician answers a call from a frequent customer who is known to be impatient and lacks experience with computers. The customer has an issue with an application that the call center supports. The customer informs the technician that the problem had been reported before but the original technician was rude, did not listen, and did not fix the problem. If the technician is confident that the problem can be resolved by increasing the amount of memory in the computer, what should the technician do?
– Confirm the issues and give detailed instructions to solve the problem.
40
A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)
– Data is more secure in the event of hardware failures.
– Data resources and access are centrally controlled
A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)
– Data is more secure in the event of hardware failures.
– Data resources and access are centrally controlled
41
Which three benefits are gained by networking computers? (Choose three.)
– fewer peripherals needed
– decreased computer-to-user ratio
– increased communication capabilities
Which three benefits are gained by networking computers? (Choose three.)
– fewer peripherals needed
– decreased computer-to-user ratio
– increased communication capabilities
42
Which environmental factor helps ensure optimal performance for laptops?
– Temperature should be preferentially between 45 to 90 degrees Fahrenheit (7 to 32 degrees Celsius) to avoid overheating.
Which environmental factor helps ensure optimal performance for laptops?
– Temperature should be preferentially between 45 to 90 degrees Fahrenheit (7 to 32 degrees Celsius) to avoid overheating.
43
When installing the Windows XP operating system, a technician is given a choice of file systems to use. If security is a requirement, which file system should be chosen?
– NTFS
When installing the Windows XP operating system, a technician is given a choice of file systems to use. If security is a requirement, which file system should be chosen?
– NTFS
44
On which two occasions is it most likely that a technician will have to perform a clean operating system installation if a backup has not been performed? (Choose two.)
– The existing operating system is corrupted.
– A new replacement hard drive is installed in a computer.
On which two occasions is it most likely that a technician will have to perform a clean operating system installation if a backup has not been performed? (Choose two.)
– The existing operating system is corrupted.
– A new replacement hard drive is installed in a computer.
45
A computer user buys a low priced replacement monitor but finds that there is a lot of flicker. The flicker makes the monitor unusable. Which characteristic of a monitor needs to be considered to ensure flicker-free viewing?
– refresh rate
A computer user buys a low priced replacement monitor but finds that there is a lot of flicker. The flicker makes the monitor unusable. Which characteristic of a monitor needs to be considered to ensure flicker-free viewing?
– refresh rate
46
A technician needs to configure the hard drive on a computer so that there appears to be one drive for the operating system and four drives for data from different applications. How can the hard drive be configured to provide this perception?
– Create one primary partition and an extended partition with four logical drives within it
A technician needs to configure the hard drive on a computer so that there appears to be one drive for the operating system and four drives for data from different applications. How can the hard drive be configured to provide this perception?
– Create one primary partition and an extended partition with four logical drives within it
47
Which network protocol is used to automatically assign an IP address to a computer on a network?
– DHCP
Which network protocol is used to automatically assign an IP address to a computer on a network?
– DHCP
48
A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to use correct this problem?
– Task Manager
A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to use correct this problem?
– Task Manager
49
A technician is troubleshooting a user complaint that a printer is not printing a report. Which step is one of the first that the technician should take?
– Ensure that there is paper in the paper tray.
A technician is troubleshooting a user complaint that a printer is not printing a report. Which step is one of the first that the technician should take?
– Ensure that there is paper in the paper tray.
50
What is the purpose of SCSI and RAID adapters?
– to connect storage devices such as hard disk drives to a PC
What is the purpose of SCSI and RAID adapters?
– to connect storage devices such as hard disk drives to a PC
51
Refer to the exhibit. Which type of device uses the connector shown in the graphic?
– DVD drive
Refer to the exhibit. Which type of device uses the connector shown in the graphic?
– DVD drive
52
A technician needs to purchase a new video adapter for a computer. Which factors should be considered when selecting the adapter?
– expansion slot type
A technician needs to purchase a new video adapter for a computer. Which factors should be considered when selecting the adapter?
– expansion slot type
53
A technician just terminated some fiber optic cable and needs to properly dispose of the hazardous waste created during the termination. What document would the technician use to identify the proper disposal method for the waste?
– MSDS
A technician just terminated some fiber optic cable and needs to properly dispose of the hazardous waste created during the termination. What document would the technician use to identify the proper disposal method for the waste?
– MSDS
54
Which type of attack involves the misdirection of a user from a legitimate web site to a fake web site?
– DNS poisoning
Which type of attack involves the misdirection of a user from a legitimate web site to a fake web site?
– DNS poisoning
Date Exam was Taken: 03/30/2011
Domain Knowledge – Weighted Score
Max Points: 102
Earned Points: 100
Percentage: 98.0%
Max Points: 102
Earned Points: 100
Percentage: 98.0%
Personalized Feedback has been generated based on your responses to this exam. Click Here to view your Personalized Feedback
Domain Knowledge – Binary Score
Max Points: 50
Earned Points: 48
Percentage: 96.0%
Max Points: 50
Earned Points: 48
Percentage: 96.0%
Final Exam for Ch 11-16
1
What is one advantage of a solid state drive?
– less prone to failure than a traditional drive
What is one advantage of a solid state drive?
– less prone to failure than a traditional drive
2
A customer has spilled some liquid into the laptop keyboard. The laptop appears to function properly except for the keys. After cleaning the keyboard, the technician tests the keyboard and it still has failing keys. What are two possible actions the technician could take? (Choose two.)
– Replace the keyboard.
– Use an external keyboard until the laptop keyboard is replaced
A customer has spilled some liquid into the laptop keyboard. The laptop appears to function properly except for the keys. After cleaning the keyboard, the technician tests the keyboard and it still has failing keys. What are two possible actions the technician could take? (Choose two.)
– Replace the keyboard.
– Use an external keyboard until the laptop keyboard is replaced
3
A user mentions that the Photoshop application has been recently installed on a laptop and that the laptop runs slowly when Photoshop is running. The computer technician checks on the laptop and notices that while the laptop responds normally when it is being used to surf the web, the hard disk light is constantly on when Photoshop is running. What is the most likely cause of the excessive hard disk activity?
– disk fragmentation
A user mentions that the Photoshop application has been recently installed on a laptop and that the laptop runs slowly when Photoshop is running. The computer technician checks on the laptop and notices that while the laptop responds normally when it is being used to surf the web, the hard disk light is constantly on when Photoshop is running. What is the most likely cause of the excessive hard disk activity?
– disk fragmentation
4
Which authentication technology uses a physical characteristic of the user in conjunction with a password?
– biometrics
Which authentication technology uses a physical characteristic of the user in conjunction with a password?
– biometrics
5
A junior technician finds preventive maintenance very boring and would prefer to fix real problems. However, what is the most important reason for the company that the preventive maintenance be done?
– Preventive maintenance helps to protect the computer equipment against future problems.
A junior technician finds preventive maintenance very boring and would prefer to fix real problems. However, what is the most important reason for the company that the preventive maintenance be done?
– Preventive maintenance helps to protect the computer equipment against future problems.
6
A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.)
– Avoid lifting the equipment using the strength in your back
– Lift the equipment using the strength in your legs and knees
A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.)
– Avoid lifting the equipment using the strength in your back
– Lift the equipment using the strength in your legs and knees
7
Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for the authentication to be accepted?
– smart key
Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for the authentication to be accepted?
– smart key
8
The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.)
– Bluetooth
– Infrared
The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.)
– Bluetooth
– Infrared
9
Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.)
– Disabling SSID broadcasts.
– Configuring MAC address filtering.
Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.)
– Disabling SSID broadcasts.
– Configuring MAC address filtering.
10
What is the issue if the status of a hard disk drive shows as “Unreadable” in the Disk Management utility?
– The drive has input/output errors, has a hardware failure, or is corrupt.
What is the issue if the status of a hard disk drive shows as “Unreadable” in the Disk Management utility?
– The drive has input/output errors, has a hardware failure, or is corrupt.
11
A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?
– Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.
A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?
– Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.
12
After checking that a new ink jet printer has new ink cartridges, that dry paper has been installed as recommended by manufacturer, and that the latest printer driver has been installed, a technician notes that the printer still fails to produce any output. Which three actions could possibly resolve this problem? (Choose three.)
– Check and secure the cables.
– Set the printer to Resume Printing.
– Ensure that the printer is powered on.
After checking that a new ink jet printer has new ink cartridges, that dry paper has been installed as recommended by manufacturer, and that the latest printer driver has been installed, a technician notes that the printer still fails to produce any output. Which three actions could possibly resolve this problem? (Choose three.)
– Check and secure the cables.
– Set the printer to Resume Printing.
– Ensure that the printer is powered on.
13
A technician has installed new RAM in a laptop. When restarted the laptop emitted a long beep. What are two possible causes and solutions for this problem? (Choose two.)
– The laptop BIOS should be upgraded when installing the RAM.
– The new RAM is defective and must be replaced.
A technician has installed new RAM in a laptop. When restarted the laptop emitted a long beep. What are two possible causes and solutions for this problem? (Choose two.)
– The laptop BIOS should be upgraded when installing the RAM.
– The new RAM is defective and must be replaced.
14
A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites?
– phishing protection
A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites?
– phishing protection
15
A user is experiencing problems with a new removable external drive. What two checks should a technician perform to ensure that a removable external drive will be recognized by a computer? (Choose two.)
– Ensure that the correct drivers are installed.
– Check that the external ports are enabled in the BIOS settings.
A user is experiencing problems with a new removable external drive. What two checks should a technician perform to ensure that a removable external drive will be recognized by a computer? (Choose two.)
– Ensure that the correct drivers are installed.
– Check that the external ports are enabled in the BIOS settings.
16
A temporary user is trying to log in to a computer that the same user used last month, but now is unable to complete the login process. What are two possible causes of the failed login? (Choose two.)
The user does not have the rights to log in.
– The user account has been disabled.
– The user is using an incorrect username or password.
A temporary user is trying to log in to a computer that the same user used last month, but now is unable to complete the login process. What are two possible causes of the failed login? (Choose two.)
The user does not have the rights to log in.
– The user account has been disabled.
– The user is using an incorrect username or password.
17
A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without adding networking devices?
– 330 ft (100 m)
A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without adding networking devices?
– 330 ft (100 m)
18
What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?
– Change the settings of the Index service in the Advanced Options panel.
What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?
– Change the settings of the Index service in the Advanced Options panel.
19
What is the purpose of the setupmgr.exe file?
– It helps prepare an answer file to automate the installation of Windows XP.
What is the purpose of the setupmgr.exe file?
– It helps prepare an answer file to automate the installation of Windows XP.
20
A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?
– Use the F8 key.
A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?
– Use the F8 key.
21
A laptop less than six months old shuts down after about 30 minutes of operation. When the AC power adapter is connected, the laptop continues to shutdown after a short period of operation each time the laptop is restarted. What should be recommended as a solution?
– The laptop power scheme is set to an unsuitable environment. Have the customer adjust the power scheme through the control panel.
A laptop less than six months old shuts down after about 30 minutes of operation. When the AC power adapter is connected, the laptop continues to shutdown after a short period of operation each time the laptop is restarted. What should be recommended as a solution?
– The laptop power scheme is set to an unsuitable environment. Have the customer adjust the power scheme through the control panel.
22
Which external connection technology would a technician choose for a customer who wants to connect a device capable of a data transfer rate of 700 Mb/s to a computer?
– IEEE 1394b (Firewire)
Which external connection technology would a technician choose for a customer who wants to connect a device capable of a data transfer rate of 700 Mb/s to a computer?
– IEEE 1394b (Firewire)
23
A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?
– Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.
A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?
– Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.
24
A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC and monitor are turned on, the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC. What possible problem should the technician investigate first?
– The monitor was damaged during cleaning.
A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC and monitor are turned on, the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC. What possible problem should the technician investigate first?
– The monitor was damaged during cleaning.
25
What is different about the default location for user files in Windows Vista compared to Windows XP?
– The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.
What is different about the default location for user files in Windows Vista compared to Windows XP?
– The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.
26
In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all pings in the class fail?
-The Windows firewall is blocking the ping.
27
Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The computer has the internal and external ports listed in the exhibit. Which solution would be the best if optimal performance is the deciding factor?
-Attach a hard drive to an internal SATA port.
In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all pings in the class fail?
-The Windows firewall is blocking the ping.
27
Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The computer has the internal and external ports listed in the exhibit. Which solution would be the best if optimal performance is the deciding factor?
-Attach a hard drive to an internal SATA port.
28
Why does a technician wear an antistatic wrist strap?
-to prevent damage to electronic components inside the computer
Why does a technician wear an antistatic wrist strap?
-to prevent damage to electronic components inside the computer
29
A technician uses an application to capture packets on the network. One such capture reveals the password that is used by a person in the classroom to initiate a Telnet session with a school network device. What recommendation could the technician make to the person who is using Telnet?
-If possible, enable the network device to use SSH instead of Telnet.
A technician uses an application to capture packets on the network. One such capture reveals the password that is used by a person in the classroom to initiate a Telnet session with a school network device. What recommendation could the technician make to the person who is using Telnet?
-If possible, enable the network device to use SSH instead of Telnet.
30
Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office?
-Remote Desktop Protocol
Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office?
-Remote Desktop Protocol
31
A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility?
-It prepares a computer for imaging.
A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility?
-It prepares a computer for imaging.
32
A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a newer video adapter?
-Is there an available compatible expansion slot on the motherboard?
A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a newer video adapter?
-Is there an available compatible expansion slot on the motherboard?
33
A customer requires a computer storage system that uses no more than two drives to provide drive redundancy and the highest possible performance. Which type of RAID should the technician install?
-RAID level 0 – data striping
A customer requires a computer storage system that uses no more than two drives to provide drive redundancy and the highest possible performance. Which type of RAID should the technician install?
-RAID level 0 – data striping
34
Which would be a reason to update the BIOS of a computer?
-A computer being prepared for an upgrade is found to lack support for newer hardware devices
Which would be a reason to update the BIOS of a computer?
-A computer being prepared for an upgrade is found to lack support for newer hardware devices
35
Which statement best describes how telephone calls are carried over data networks and the Internet?
-Analog voice signals are converted into digital information that is transported in IP packets
Which statement best describes how telephone calls are carried over data networks and the Internet?
-Analog voice signals are converted into digital information that is transported in IP packets
36
Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)
-The unattend.txt file is corrupted
-The network shared folder that holds the OS files is not accessible.
Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)
-The unattend.txt file is corrupted
-The network shared folder that holds the OS files is not accessible.
37
A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?
-modify
A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?
-modify
38
A technician is working on a networked computer that has an IP address of 169.254.25.66 and no Internet access. What could the technician do to remedy the problem?
-Reload TCP/IP on the computer.
A technician is working on a networked computer that has an IP address of 169.254.25.66 and no Internet access. What could the technician do to remedy the problem?
-Reload TCP/IP on the computer.
Exam Results – Final Exam for Ch 11-16 – IT Essentials: PC Hardware and Software – Version 4.1
Date Exam was Taken: 03/28/2011
Domain Knowledge – Weighted Score
Max Points: 71
Earned Points: 61
Percentage: 85.9%
Max Points: 71
Earned Points: 61
Percentage: 85.9%
Personalized Feedback has been generated based on your responses to this exam. Click Here to view your Personalized Feedback
Domain Knowledge – Binary Score
Max Points: 35
Earned Points: 29
Percentage: 82.9%
Max Points: 35
Earned Points: 29
Percentage: 82.9%
What is one advantage of a solid state drive?
– less prone to failure than a traditional drive
– less prone to failure than a traditional drive
2
A customer has spilled some liquid into the laptop keyboard. The laptop appears to function properly except for the keys. After cleaning the keyboard, the technician tests the keyboard and it still has failing keys. What are two possible actions the technician could take? (Choose two.)
– Replace the keyboard.
– Use an external keyboard until the laptop keyboard is replaced
A customer has spilled some liquid into the laptop keyboard. The laptop appears to function properly except for the keys. After cleaning the keyboard, the technician tests the keyboard and it still has failing keys. What are two possible actions the technician could take? (Choose two.)
– Replace the keyboard.
– Use an external keyboard until the laptop keyboard is replaced
3
A user mentions that the Photoshop application has been recently installed on a laptop and that the laptop runs slowly when Photoshop is running. The computer technician checks on the laptop and notices that while the laptop responds normally when it is being used to surf the web, the hard disk light is constantly on when Photoshop is running. What is the most likely cause of the excessive hard disk activity?
– disk fragmentation
A user mentions that the Photoshop application has been recently installed on a laptop and that the laptop runs slowly when Photoshop is running. The computer technician checks on the laptop and notices that while the laptop responds normally when it is being used to surf the web, the hard disk light is constantly on when Photoshop is running. What is the most likely cause of the excessive hard disk activity?
– disk fragmentation
4
Which authentication technology uses a physical characteristic of the user in conjunction with a password?
– biometrics
Which authentication technology uses a physical characteristic of the user in conjunction with a password?
– biometrics
5
A junior technician finds preventive maintenance very boring and would prefer to fix real problems. However, what is the most important reason for the company that the preventive maintenance be done?
– Preventive maintenance helps to protect the computer equipment against future problems.
A junior technician finds preventive maintenance very boring and would prefer to fix real problems. However, what is the most important reason for the company that the preventive maintenance be done?
– Preventive maintenance helps to protect the computer equipment against future problems.
6
A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.)
– Avoid lifting the equipment using the strength in your back
– Lift the equipment using the strength in your legs and knees
A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.)
– Avoid lifting the equipment using the strength in your back
– Lift the equipment using the strength in your legs and knees
7
Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for the authentication to be accepted?
– smart key
Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for the authentication to be accepted?
– smart key
8
The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.)
– Bluetooth
– Infrared
The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.)
– Bluetooth
– Infrared
9
Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.)
– Disabling SSID broadcasts.
– Configuring MAC address filtering.
Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.)
– Disabling SSID broadcasts.
– Configuring MAC address filtering.
10
What is the issue if the status of a hard disk drive shows as “Unreadable” in the Disk Management utility?
– The drive has input/output errors, has a hardware failure, or is corrupt.
What is the issue if the status of a hard disk drive shows as “Unreadable” in the Disk Management utility?
– The drive has input/output errors, has a hardware failure, or is corrupt.
11
A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?
– Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.
A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?
– Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.
12
After checking that a new ink jet printer has new ink cartridges, that dry paper has been installed as recommended by manufacturer, and that the latest printer driver has been installed, a technician notes that the printer still fails to produce any output. Which three actions could possibly resolve this problem? (Choose three.)
– Check and secure the cables.
– Set the printer to Resume Printing.
– Ensure that the printer is powered on.
After checking that a new ink jet printer has new ink cartridges, that dry paper has been installed as recommended by manufacturer, and that the latest printer driver has been installed, a technician notes that the printer still fails to produce any output. Which three actions could possibly resolve this problem? (Choose three.)
– Check and secure the cables.
– Set the printer to Resume Printing.
– Ensure that the printer is powered on.
13
A technician has installed new RAM in a laptop. When restarted the laptop emitted a long beep. What are two possible causes and solutions for this problem? (Choose two.)
– The laptop BIOS should be upgraded when installing the RAM.
– The new RAM is defective and must be replaced.
A technician has installed new RAM in a laptop. When restarted the laptop emitted a long beep. What are two possible causes and solutions for this problem? (Choose two.)
– The laptop BIOS should be upgraded when installing the RAM.
– The new RAM is defective and must be replaced.
14
A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites?
– phishing protection
A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites?
– phishing protection
15
A user is experiencing problems with a new removable external drive. What two checks should a technician perform to ensure that a removable external drive will be recognized by a computer? (Choose two.)
– Ensure that the correct drivers are installed.
– Check that the external ports are enabled in the BIOS settings.
A user is experiencing problems with a new removable external drive. What two checks should a technician perform to ensure that a removable external drive will be recognized by a computer? (Choose two.)
– Ensure that the correct drivers are installed.
– Check that the external ports are enabled in the BIOS settings.
16
A temporary user is trying to log in to a computer that the same user used last month, but now is unable to complete the login process. What are two possible causes of the failed login? (Choose two.)
The user does not have the rights to log in.
– The user account has been disabled.
– The user is using an incorrect username or password.
A temporary user is trying to log in to a computer that the same user used last month, but now is unable to complete the login process. What are two possible causes of the failed login? (Choose two.)
The user does not have the rights to log in.
– The user account has been disabled.
– The user is using an incorrect username or password.
17
A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without adding networking devices?
– 330 ft (100 m)
A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without adding networking devices?
– 330 ft (100 m)
18
What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?
– Change the settings of the Index service in the Advanced Options panel.
What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?
– Change the settings of the Index service in the Advanced Options panel.
19
What is the purpose of the setupmgr.exe file?
– It helps prepare an answer file to automate the installation of Windows XP.
What is the purpose of the setupmgr.exe file?
– It helps prepare an answer file to automate the installation of Windows XP.
20
A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?
– Use the F8 key.
A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?
– Use the F8 key.
21
A laptop less than six months old shuts down after about 30 minutes of operation. When the AC power adapter is connected, the laptop continues to shutdown after a short period of operation each time the laptop is restarted. What should be recommended as a solution?
– The laptop power scheme is set to an unsuitable environment. Have the customer adjust the power scheme through the control panel.
A laptop less than six months old shuts down after about 30 minutes of operation. When the AC power adapter is connected, the laptop continues to shutdown after a short period of operation each time the laptop is restarted. What should be recommended as a solution?
– The laptop power scheme is set to an unsuitable environment. Have the customer adjust the power scheme through the control panel.
22
Which external connection technology would a technician choose for a customer who wants to connect a device capable of a data transfer rate of 700 Mb/s to a computer?
– IEEE 1394b (Firewire)
Which external connection technology would a technician choose for a customer who wants to connect a device capable of a data transfer rate of 700 Mb/s to a computer?
– IEEE 1394b (Firewire)
23
A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?
– Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.
A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?
– Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.
24
A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC and monitor are turned on, the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC. What possible problem should the technician investigate first?
– The monitor was damaged during cleaning.
A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC and monitor are turned on, the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC. What possible problem should the technician investigate first?
– The monitor was damaged during cleaning.
25
What is different about the default location for user files in Windows Vista compared to Windows XP?
– The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.
What is different about the default location for user files in Windows Vista compared to Windows XP?
– The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.
26
In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all pings in the class fail?
-The Windows firewall is blocking the ping.
27
Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The computer has the internal and external ports listed in the exhibit. Which solution would be the best if optimal performance is the deciding factor?
-Attach a hard drive to an internal SATA port.
In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all pings in the class fail?
-The Windows firewall is blocking the ping.
27
Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The computer has the internal and external ports listed in the exhibit. Which solution would be the best if optimal performance is the deciding factor?
-Attach a hard drive to an internal SATA port.
28
Why does a technician wear an antistatic wrist strap?
-to prevent damage to electronic components inside the computer
Why does a technician wear an antistatic wrist strap?
-to prevent damage to electronic components inside the computer
29
A technician uses an application to capture packets on the network. One such capture reveals the password that is used by a person in the classroom to initiate a Telnet session with a school network device. What recommendation could the technician make to the person who is using Telnet?
-If possible, enable the network device to use SSH instead of Telnet.
A technician uses an application to capture packets on the network. One such capture reveals the password that is used by a person in the classroom to initiate a Telnet session with a school network device. What recommendation could the technician make to the person who is using Telnet?
-If possible, enable the network device to use SSH instead of Telnet.
30
Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office?
-Remote Desktop Protocol
Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office?
-Remote Desktop Protocol
31
A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility?
-It prepares a computer for imaging.
A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility?
-It prepares a computer for imaging.
32
A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a newer video adapter?
-Is there an available compatible expansion slot on the motherboard?
A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a newer video adapter?
-Is there an available compatible expansion slot on the motherboard?
33
A customer requires a computer storage system that uses no more than two drives to provide drive redundancy and the highest possible performance. Which type of RAID should the technician install?
-RAID level 0 – data striping
A customer requires a computer storage system that uses no more than two drives to provide drive redundancy and the highest possible performance. Which type of RAID should the technician install?
-RAID level 0 – data striping
34
Which would be a reason to update the BIOS of a computer?
-A computer being prepared for an upgrade is found to lack support for newer hardware devices
Which would be a reason to update the BIOS of a computer?
-A computer being prepared for an upgrade is found to lack support for newer hardware devices
35
Which statement best describes how telephone calls are carried over data networks and the Internet?
-Analog voice signals are converted into digital information that is transported in IP packets
Which statement best describes how telephone calls are carried over data networks and the Internet?
-Analog voice signals are converted into digital information that is transported in IP packets
36
Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)
-The unattend.txt file is corrupted
-The network shared folder that holds the OS files is not accessible.
Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)
-The unattend.txt file is corrupted
-The network shared folder that holds the OS files is not accessible.
37
A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?
-modify
A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?
-modify
38
A technician is working on a networked computer that has an IP address of 169.254.25.66 and no Internet access. What could the technician do to remedy the problem?
-Reload TCP/IP on the computer.
A technician is working on a networked computer that has an IP address of 169.254.25.66 and no Internet access. What could the technician do to remedy the problem?
-Reload TCP/IP on the computer.
A user calls the help desk to report that a PC displays an error message on the screen that indicates certain system files are missing or corrupted. The computer technician suspects that some system files have been accidentally deleted or that the system files are corrupted. Which command should the computer technician perform on the PC to restore protected system files with known good versions?
defrag
msconfig
chkdsk
sfc /scannow
find this question
7. Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for the authentication to be accepted?
*Security Key Fob.
13. A technician has installed new RAM in a laptop. When restarted the laptop emitted a long beep. What are two possible causes and solutions for this problem? (Choose two.)
*The new RAM is defective and must be replaced
*Something about it not being installed properly
*Something about it not being installed properly
21. A laptop less than six months old shuts down after about 30 minutes of operation. When the AC power adapter is connected, the laptop continues to shutdown after a short period of operation each time the laptop is restarted. What should be recommended as a solution?
*Something about hard surface and Ventilation
24. A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC and monitor are turned on, the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC. What possible problem should the technician investigate first?
*something like Video connector is disabled
33. A customer requires a computer storage system that uses no more than two drives to provide drive redundancy and the highest possible performance. Which type of RAID should the technician install?
*Raid 1 – Data mirroring
36. Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)
*The network shared folder that holds the OS files is not accessible.
*Something about PXE Nic card.
*Something about PXE Nic card.
38. A technician is working on a networked computer that has an IP address of 169.254.25.66 and no Internet access. What could the technician do to remedy the problem?
*Something like Run the ipconfig /renew
1
What is the purpose of wearing an antistatic wrist strap?
– to equalize the electrical charge between the user and the equipment
What is the purpose of wearing an antistatic wrist strap?
– to equalize the electrical charge between the user and the equipment
2
When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages?
– D
When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages?
– D
3
Fans that are used to help cool a system are commonly placed on which two components? (Choose two.)
– video card
– CPU
Fans that are used to help cool a system are commonly placed on which two components? (Choose two.)
– video card
– CPU
4
When installing a service pack or security patches on an operating system, what should be done to protect the system in the event of a faulty or aborted installation?
– Create a restore point.
When installing a service pack or security patches on an operating system, what should be done to protect the system in the event of a faulty or aborted installation?
– Create a restore point.
5
What are two network requirements necessary to establish a VPN connection between a remote computer and a private company LAN? (Choose two.)
– Internet access
– VPN client
What are two network requirements necessary to establish a VPN connection between a remote computer and a private company LAN? (Choose two.)
– Internet access
– VPN client
6
An employee is receiving e-mail from unknown banks asking for username and password information. Which type of security attack is the employee experiencing?
– phishing
An employee is receiving e-mail from unknown banks asking for username and password information. Which type of security attack is the employee experiencing?
– phishing
7. Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for the authentication to be accepted?
*Security Key Fob.
8
The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.)
– Bluetooth
– Infrared
The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.)
– Bluetooth
– Infrared
9
Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.)
– Disabling SSID broadcasts.
– Configuring MAC address filtering.
Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.)
– Disabling SSID broadcasts.
– Configuring MAC address filtering.
10
What is the issue if the status of a hard disk drive shows as “Unreadable” in the Disk Management utility?
– The drive has input/output errors, has a hardware failure, or is corrupt.
What is the issue if the status of a hard disk drive shows as “Unreadable” in the Disk Management utility?
– The drive has input/output errors, has a hardware failure, or is corrupt.
11
A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?
– Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.
A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?
– Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.
12
After checking that a new ink jet printer has new ink cartridges, that dry paper has been installed as recommended by manufacturer, and that the latest printer driver has been installed, a technician notes that the printer still fails to produce any output. Which three actions could possibly resolve this problem? (Choose three.)
– Check and secure the cables.
– Set the printer to Resume Printing.
– Ensure that the printer is powered on.
After checking that a new ink jet printer has new ink cartridges, that dry paper has been installed as recommended by manufacturer, and that the latest printer driver has been installed, a technician notes that the printer still fails to produce any output. Which three actions could possibly resolve this problem? (Choose three.)
– Check and secure the cables.
– Set the printer to Resume Printing.
– Ensure that the printer is powered on.
13. A technician has installed new RAM in a laptop. When restarted the laptop emitted a long beep. What are two possible causes and solutions for this problem? (Choose two.)
*The new RAM is defective and must be replaced
*Something about it not being installed properly
*Something about it not being installed properly
14
A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites?
– phishing protection
A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites?
– phishing protection
15
A user is experiencing problems with a new removable external drive. What two checks should a technician perform to ensure that a removable external drive will be recognized by a computer? (Choose two.)
– Ensure that the correct drivers are installed.
– Check that the external ports are enabled in the BIOS settings.
A user is experiencing problems with a new removable external drive. What two checks should a technician perform to ensure that a removable external drive will be recognized by a computer? (Choose two.)
– Ensure that the correct drivers are installed.
– Check that the external ports are enabled in the BIOS settings.
16
A temporary user is trying to log in to a computer that the same user used last month, but now is unable to complete the login process. What are two possible causes of the failed login? (Choose two.)
The user does not have the rights to log in.
– The user account has been disabled.
– The user is using an incorrect username or password.
A temporary user is trying to log in to a computer that the same user used last month, but now is unable to complete the login process. What are two possible causes of the failed login? (Choose two.)
The user does not have the rights to log in.
– The user account has been disabled.
– The user is using an incorrect username or password.
17
A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without adding networking devices?
– 330 ft (100 m)
A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without adding networking devices?
– 330 ft (100 m)
18
What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?
– Change the settings of the Index service in the Advanced Options panel.
What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?
– Change the settings of the Index service in the Advanced Options panel.
19
What is the purpose of the setupmgr.exe file?
– It helps prepare an answer file to automate the installation of Windows XP.
What is the purpose of the setupmgr.exe file?
– It helps prepare an answer file to automate the installation of Windows XP.
20
A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?
– Use the F8 key.
A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?
– Use the F8 key.
21. A laptop less than six months old shuts down after about 30 minutes of operation. When the AC power adapter is connected, the laptop continues to shutdown after a short period of operation each time the laptop is restarted. What should be recommended as a solution?
*Something about hard surface and Ventilation
22
Which external connection technology would a technician choose for a customer who wants to connect a device capable of a data transfer rate of 700 Mb/s to a computer?
– IEEE 1394b (Firewire)
Which external connection technology would a technician choose for a customer who wants to connect a device capable of a data transfer rate of 700 Mb/s to a computer?
– IEEE 1394b (Firewire)
23
A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?
– Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.
A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?
– Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.
24. A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC and monitor are turned on, the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC. What possible problem should the technician investigate first?
*something like Video connector is disabled
25
What is different about the default location for user files in Windows Vista compared to Windows XP?
– The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.
What is different about the default location for user files in Windows Vista compared to Windows XP?
– The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.
26
In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all pings in the class fail?
-The Windows firewall is blocking the ping.
27
Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The computer has the internal and external ports listed in the exhibit. Which solution would be the best if optimal performance is the deciding factor?
-Attach a hard drive to an internal SATA port.
In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all pings in the class fail?
-The Windows firewall is blocking the ping.
27
Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The computer has the internal and external ports listed in the exhibit. Which solution would be the best if optimal performance is the deciding factor?
-Attach a hard drive to an internal SATA port.
28
Why does a technician wear an antistatic wrist strap?
-to prevent damage to electronic components inside the computer
Why does a technician wear an antistatic wrist strap?
-to prevent damage to electronic components inside the computer
29
A technician uses an application to capture packets on the network. One such capture reveals the password that is used by a person in the classroom to initiate a Telnet session with a school network device. What recommendation could the technician make to the person who is using Telnet?
-If possible, enable the network device to use SSH instead of Telnet.
A technician uses an application to capture packets on the network. One such capture reveals the password that is used by a person in the classroom to initiate a Telnet session with a school network device. What recommendation could the technician make to the person who is using Telnet?
-If possible, enable the network device to use SSH instead of Telnet.
30
Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office?
-Remote Desktop Protocol
Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office?
-Remote Desktop Protocol
31
A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility?
-It prepares a computer for imaging.
A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility?
-It prepares a computer for imaging.
32
A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a newer video adapter?
-Is there an available compatible expansion slot on the motherboard?
A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a newer video adapter?
-Is there an available compatible expansion slot on the motherboard?
33. A customer requires a computer storage system that uses no more than two drives to provide drive redundancy and the highest possible performance. Which type of RAID should the technician install?
*Raid 1 – Data mirroring
34
Which would be a reason to update the BIOS of a computer?
-A computer being prepared for an upgrade is found to lack support for newer hardware devices
Which would be a reason to update the BIOS of a computer?
-A computer being prepared for an upgrade is found to lack support for newer hardware devices
35
Which statement best describes how telephone calls are carried over data networks and the Internet?
-Analog voice signals are converted into digital information that is transported in IP packets
Which statement best describes how telephone calls are carried over data networks and the Internet?
-Analog voice signals are converted into digital information that is transported in IP packets
36. Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)
*The network shared folder that holds the OS files is not accessible.
*Something about PXE Nic card.
*Something about PXE Nic card.
37
A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?
-modify
A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?
-modify
38. A technician is working on a networked computer that has an IP address of 169.254.25.66 and no Internet access. What could the technician do to remedy the problem?
*Something like Run the ipconfig /renew
6
A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
USB 2.0 is forty times as fast as USB 1.1.
***
***
| |||||
| |||||
| |||||
| |||||
| |||||
| |||||
| |||||
| |||||
| |||||
| |||||||
| |||||||
| |||||
| |||||
| |||||
| |||||||||
| |||||||||
| |||||
| |||||
| |||||||
| |||||||
| |||||
| |||||
| ||||||||||
| ||||||||||
| ||||||||||
| ||||||||||
| |||||
| |||||
| ||||||
| ||||||
| ||||||
| |||||
| |||||
| ||||||||
| ||||||||
| ||||||||
| ||||||||
| |||||||
| |||||||
| |||||
| |||||
| |||||
| |||||
| |||||
| |||||||||
| |||||||||
| |||||||||
| |||||||||
| |||||||||
| |||||||||
| |||||
loading...
kurang lengkap mas... silahkan Update yg terbaru... >.<
BalasHapuskadang kalo COPAS kita kurang lihai maka jawaban gak ketemu masbro,,, COPAS soal,, klo gk dtemukan jwbnnya coba COPAS salah satu jawaban dari soal yg lagi digarap,, klo gk ktemu juga brrti emg kurang lengkap,, heheee...
BalasHapusmksh untk masukanya ntar klo ada kesempatan psti di update bro. . . ^_^