Bruno Harriston Document 1

download Bruno Harriston Document 1

of 26

Transcript of Bruno Harriston Document 1

  • 7/31/2019 Bruno Harriston Document 1

    1/26

    CHAPTER 14 IT ESSANTIALS

    Which two printer parts should be cleaned with a damp cloth? (Choose two.)

    #roller surfaces in dot matrix printers

    #print head in inkjet printers

    2

    Which Windows component allows the Windows operating system to output graphics

    to a computer screen or print device?

    #GDI

    3

    Which type of port is used for low-speed dot matrix printers?

    #Serial

    4Which two parts, one in a laser printer and one in a dot matrix printer, should be

    allowed to cool before attempting any repairs? (Choose two.)

    #fuser assembly

    #print head

    5

    Which two methods are often used to connect a lower-cost printer to a Windows XP

    network? (Choose two.)

    #Use a separate print server.

    #Connect to a networked computer and share the printer.

    6

    Which two items can help extend the life of an inkjet printer? (Choose two.)

    type of ink

    paper type

    7

    A user reports that whenever he needs to print a document, the print job process is

    automatically sent to the wrong network printer. Which path should the user follow to

    resolve this problem in Windows XP?

    #Start > Control Panel > Printers and Faxes, right-click the printer, and then selectSet as Default Printer

    8

    What two solutions would fix the problem that occurs when every page that is printed

    by a laser printer produces lines or streaks? (Choose two.)

    #Replace the drum.

    #Use the cleaning utility to clean the cartridge nozzles.

    9

    Which path will allow a user to add a printer in Windows XP?

    #Start > Control Panel > Printers and Faxes > Add a Printer

  • 7/31/2019 Bruno Harriston Document 1

    2/26

    10

    What could be a result of printing with paper that has become damp because of high

    humidity?

    #Paper jams are more frequent.

    11Which scanner option considerably affects the size of the output file?

    #resolution settings

    12

    Users in the accounting department are having trouble digitizing documents with a

    scanner. What should the technician do to resolve the problem?

    #Calibrate the scanner.

    13

    Which two pieces of software are included with most new printers and are installed by

    the user? (Choose two.)#configuration software

    #printer driver

    14

    Which type of printing option should be implemented to allow a user to change settings

    for each document sent to the printer?

    #per-document

    15

    Which two issues should be considered when purchasing RAM for a new printer?

    (Choose two.)

    physical type of memory

    number of memory slots available

    16

    A technician is installing network printer software and drivers on a Windows Vista

    computer. At the Select a Printer stage the technician wants to install a printer that is

    not listed. Which two methods are available to identify and select the required printer?

    (Choose two.)

    #name

    #IP address

    17

    As a part of the maintenance process for a laser printer, a technician should remove all

    the small particles of toner inside the printer. What is the recommended method to

    perform this task?

    #Use a vacuum cleaner with HEPA filtration.

    18

    Users working in humid environments notice that documents printed by a laser printer

    are of poor quality. It is discovered that the printer is unable to attach toner to the paper.

    What is the most likely cause of the problem?#The paper absorbed moisture from the air and is damp.

  • 7/31/2019 Bruno Harriston Document 1

    3/26

    19

    A technician has completed the routine maintenance service for all the printers in the

    accounting department. Which action helps ensure that the next routine maintenance

    service is performed at the correct time?

    #Reset the counters.

    20

    A technician is installing a new inkjet printer. The printer has successfully printed test

    pages. Which task also verifies the functionality of an inkjet printer after installing the

    printer driver?

    #using different types of paper trays for special paper sizes

    CHAPTER 15 IT ESSANTIALS

    1

    Which two hazards exist when working with fiber optic cabling? (Choose

    two.)

    #chemicals

    #glass splinters

    2

    Which safety precaution should be used when working with any type of

    cable?

    #Wear safety glasses when working any type of cable.

    3

    ABC Computer Company is in the process of planning a network for a new

    client. A network technician has been asked to perform a physical

    inspection of the facilities to determine the flow of data and protocols

    required by the client. What is this inspection called?

    #site survey

    4

    Which protocol provides secure transport of data from the company web

    server to remote users?

    #HTTPS

    5

    When planning the network in a new building, the technician notes that the

    company requires cabling that can extend up to 295 ft (90 m) with

    enhanced bandwidth support at an affordable price. Which cable type will

    the technician pick if he chooses the most common type of cabling used on

    networks?

    #Cat5e

  • 7/31/2019 Bruno Harriston Document 1

    4/26

    6

    The network technician is researching the best way to connect the branch

    offices to the main office. What are three main considerations that the

    technician should remember when choosing an Internet connection?

    (Choose three.)

    #availability

    #reliability

    #speed

    7

    Students on the college network need to be able to view folder names and

    data in files stored on the Windows-based file server, but should never be

    allowed to add or save information on the server. Occasionally, the students

    also need to run media programs to watch videos stored on the server.

    Which permission should the network technician assign to the studentsaccessing the file server?

    #read

    8

    While using nslookup, a student sees the following message: "Cant find

    server name for address 127.0.0.0: timed out." What is one possible

    problem?

    #The computer does not have at least one entry for a DNS server

    configured.

    9

    The network administrator has physically installed wireless NICs in three

    new computers. Which two additional steps will complete the installation

    process? (Choose two.)

    #Configure the device drivers.

    #Configure the NICs with addressing information.

    10

    After booting a computer running Windows 2000, the following message

    displays: "The IP address already exists on another computer". Which twosteps will quickly obtain a new IP address from the DHCP server? (Choose

    two.)

    #run ipconfig /release

    #run ipconfig /renew

    11

    Which two ipconfig parameters are used within Windows XP to remove and

    assign the IP address previously provided by a DHCP server? (Choose two.)

    #release

    #renew

  • 7/31/2019 Bruno Harriston Document 1

    5/26

    12

    Which three ports are used by SMTP, POP, and IMAP? (Choose three.)

    #25

    #110

    #143

    13

    What is the purpose of an analog telephone adapter in the application of

    VoIP services?

    #to connect a standard analog telephone to the IP network

    14

    Refer to the exhibit. The tracert command was used on the local computer

    to verify connectivity with a remote site. Which type of address is shown in

    the highlighted line of the tracert command output displayed in the exhibit?

    #default gateway for the local computer

    15

    What are two ways to assign an IP address to a wireless NIC? (Choose two.)

    #Assign a static address.

    #Use DHCP.

    16

    In Internet Explorer, after choosing Tools and then Internet Options, which

    tab would a user select to set the browser to prompt before downloading

    potentially unsafe content?#Security

    17

    What would be a disadvantage of configuring a wireless router or access

    point to operate only in accordance with the 802.11n protocol standard?

    #Older, legacy wireless devices may be unable to connect to the wireless

    network.

    18

    Which two methods can be used to connect IP phones to a network?(Choose two.)

    #Connect the IP phone to the Ethernet LAN using an RJ-45 connector.

    #Establish an Internet connection then use an Analog Telephone Adapter.

    19

    A company adds a few refurbished computers to a network. The company

    finds, however, that the refurbished computers perform significantly worse

    than the original networked computers performed with applications that

    require the transfer of data over the network. What should the company

    technicians do?#Check if the network interface cards in the computers are limited to 10

  • 7/31/2019 Bruno Harriston Document 1

    6/26

    Mb/s.

    20

    A textbook author needs to upload a chapter from a home computer to the

    FTP server of the publisher. The author uses the correct username and

    password, but the transfer fails. What is the most likely cause of the

    problem?

    #The chapter document must be compressed before transmitting to an

    FTP server.

    21

    The network technician has been asked to share a new printer on the

    network using the Add Printer wizard for Windows XP. Which path should

    the technician use to run the Add Printer wizard?

    #Start > Control Panel > Printers and Faxes > File > Add Printer

    22

    While troubleshooting a computer, the technician releases and renews the

    IP address. A message appears: "No operation can be performed on the

    adapter while its media is disconnected." What is a probable cause of the

    message?

    #The network cable is unplugged.

    23

    A new employee needs to transfer files to the corporate FTP server.

    However, the employee is unable to log in to the FTP server. What is themost likely cause of the problem?

    #The employee is using an incorrect username or password.

    24

    A technician is configuring a network device for remote access. Which

    protocol is commonly used as a secure alternative to Telnet?

    #SSH

    25

    A computer user cannot access a bank using HTTPS. What is onerecommended solution?

    #Enable SSL through the web browser application.

    26

    Which action should a user take to ensure that personal information that is

    entered into a website form is not retained on the computer?

    #Delete the temporary Internet files.

    27

    A technician is troubleshooting a network and finds hosts with duplicatestatic IP addresses. Which protocol could be used to resolve this issue?

  • 7/31/2019 Bruno Harriston Document 1

    7/26

    #DHCP

    28

    A technician is working on a host computer that fails to obtain an IP

    address. Which three actions could the technician perform to determine the

    cause of the problem? (Choose three.)

    #Check the DNS server to ensure that it is operating correctly.

    #Check that the DCHP server is operational.

    #Check the PC firewall settings to make sure that DHCP is allowed.

    29

    A user is receiving e-mail on a regular basis from a particular person. A

    problem occurs when the e-mail from this same person contains an

    attachment. What is one solution?

    #Ask the IT department to permit port 25 through the firewall.

    30

    What are two possible causes of e-mail attachments not being received with

    e-mail messages? (Choose two.)

    #The firewall could be blocking port 21, with the result that attachments

    cannot get through.

    #The e-mail server could not be receiving e-mail messages that are using

    POP.

    FINAL EXAMS FOR CHAPTER 1-10

    FINAL EXAMS FOR CHAPTER 1-10

    What are two characteristics of the IEEE 1284 parallel interface standard?

    * The two available operative modes are EPP and ECP

    * Bi-directional communication is allowed

    2. The corporate security policy states that all remote connections use

    only secure tunnels for transport of data. Which encryption technique

    secures data traveling across the public Internet as if it were travelingacross the corporate LAN?

    * VPN

    3. What are two problems that are caused by setting an incorrect boot

    order in the system BIOS?

    * The computer displays an "Invalid Boot Disk" error after POST

    * The computer displays a "Missing NTLDR" error after POST

    4. A call center technician receives a call from a customer who wishes to

    add more memory to a laptop to increase graphics performance. Which

    type of memory should be installed?

    * RAM

  • 7/31/2019 Bruno Harriston Document 1

    8/26

    5. The production manager of a small company is experiencing slow

    performance in a laptop. What should a technician try first in order to

    correct the problem?

    *Defragment the hard disk

    6.Which safety precaution should an installer take when installing cablein the ceiling of a building?

    * Wear safety glasses in case of encountering toxic materials during the

    installation.

    7. Several messages sent to the network administrator are reporting that

    access to a secure server using HTTPS is failing. After checking recent

    updates to the company firewall, the administrator learns that the firewall

    is blocking HTTPS. Which port should be opened to solve the problem?

    *22

    8. Which action should be taken first if a card key is lost or stolen?*Disable the lost card key.

    9. Engineers are designing a security scheme to allow only authorized

    persons to access the facilities of a national bank. Which security control

    measure provides the most secure solution for employee identification?

    *biometric devices

    10. Refer to the exhibit and consider the advertisement that is shown.

    Based on the advertisement, which statement is accurate regarding this

    motherboard?

    *The Intel Core i7 processor supports a maximum bus speed of 1600MHz

    11. A technician has been asked to connect a new scanner to a computer.

    Which interface provides the fastest transfer of data?

    *USB 2.0

    12. A technician has been asked to develop a physical topology for a

    network that provides a high level of redundancy. Which physical

    topology requires that every node is attached to every other node on the

    network

    *mesh

    13. Which three ports should be left open to avoid filtering e-mail traffic?

    *25*143

    *110

    14. What is the highest risk associated with improperly charged or

    mishandled batteries?

    *The battery can explode.

    15. A network administrator has been informed about a problem with the

    network printer. What is the most reliable way to prevent print jobs from

    being added to the queue while the printer is being repaired?

    * Stop the print spooler16. A Windows Vista computer does not display the thumbnail views of

  • 7/31/2019 Bruno Harriston Document 1

    9/26

    two windows that are currently minimized in the taskbar when the mouse

    pointer is placed over the appropriate tile on the taskbar. What is a

    possible solution to this problem?

    * Enable the Graphics Options "Tray Icon" in the Taskbar and Menu

    Properties window17. Which Startup type must be selected for a service that should run each

    time the computer is booted?

    * automatic

    18.The network manager decides to implement a simple security solution

    to the company WLANs. Which wireless security technique should the

    manager take to hide the WLAN id from any access point?

    * Disable the broadcast of the SSID on the access point

    19. When upgrading a CPU what must be applied between the new CPU

    and the heat sink/fan?* thermal compound

    20. A technician is trying to explain USB 1.1 and USB 2.0 to a user in

    terms of speed. The user is having problems comparing the two standards

    based on the values expressed in Mbps. Which explanation can the

    technician use that will best describe the relationship?

    *USB 2.0 is forty times as fast as USB 1.1.

    21. A technician is working on a laptop with a touchpad that fails to

    work. Which two actions can the technician take to try to repair the

    problem?

    * Enable the touchpad in the system BIOS

    * Ensure that the operating system has the correct driver for the touchpad

    22. Which Windows hard drive partition is referred to as the C: drive?

    * the first primary partition

    23. A computer has been relocated and all the cables reconnected. When

    the computer is powered on, the correct POST audio signals are heard

    and the hard drive LED shows disk activity. However, the monitor fails to

    display anything. What are two possible causes of this problem?

    * The monitor is connected to the integrated video adapter on the

    motherboard instead of the expansion slot adapter.* The monitor cable connector is loose or disconnected because the

    retaining screws are missing

    24. A technician has installed a third party utility that is used to manage a

    Windows XP computer. However, the utility is unable to startup

    automatically whenever the computer is started. What can the technician

    do to resolve this problem?

    *Change the startup type for the utility to Automatic in Services

    25. Refer to the exhibit. What type of partition arrangement does this

    Windows XP computer have on its hard drive*3 logical, 1 extended, 1 free space, 1 primary

  • 7/31/2019 Bruno Harriston Document 1

    10/26

    26. Which two hazards are related to fiber optic installations?

    * glass splinters that can penetrate the skin

    * light that can burn the eyes

    27. Which interface can transfer data at a maximum speed of 480 Mbps?

    *USB 2.028. A company has a preventive maintenance policy that requires every

    computer have a new restore point created every six months. How can a

    technician create the restore point?

    *Go to Start > All Programs > Accessories > System Tools > System

    Restore > Create a restore point

    29. For a default installation of Windows XP Professional, which two

    settings are customizable?

    *regional settings

    *network settings30. Refer to the exhibit. Which utility has the IT department started on

    each computer?

    * Defragment

    31. Refer to the exhibit. The IT department requested a new set of

    memory chips to upgrade the old laptops. A picture of the memory chip

    required is attached to the purchase order so the correct item can be

    bought.

    Which type of memory module is the IT department expecting to receive?

    * SODIMM

    32. Which two characteristics describe a software firewall?

    * It typically protects only the computer it is installed on.

    * It uses the CPU in the host computer

    33. Which feature is characteristic of the ntbackup command?

    * It can be executed from a batch file.

    34. Which recommendation should be observed when replacing existing

    memory?

    * The new memory should be as fast or faster than existing memory.

    35. Refer to the exhibit. Based on the information shown, which

    statement is true?* The only PC allowed on the wireless network is the one with the MAC

    address 00:05:4E:49:64:87

    FINAL FOR CHAPTER 11-16

    http://www.blogger.com/rearrange?blogID=6201274772826646035&widgetType=PageList&widgetId=PageList1&action=editWidget&sectionId=pagelistmenusblog
  • 7/31/2019 Bruno Harriston Document 1

    11/26

    DN-share

    Teknik Komputer Jaringan & Rekayasa Perangkat Lunak

    Home

    Programming

    Cisco Essential

    Cisco ENetwork

    Cisco ERouting

    Download

    Shop Jersey

    CISCO IT Essential v4.1 Final Exam 11-16

    1

    A network administrator has been informed about a problem with the networkprinter. What is the most reliable way to prevent print jobs from being addedto the queue while the printer is being repaired? Stop the print spooler.

    2

    For a default installation of Windows XP Professional, which two settings arecustomizable? (Choose two.) regional settings network settings

    3Several messages sent to the network administrator are reporting that accessto a secure server using HTTPS is failing. After checking recent updates tothe company firewall, the administrator learns that the firewall is blockingHTTPS. Which port should be opened to solve the problem? 443

    4A computer has been relocated and all the cables reconnected. When thecomputer is powered on, the correct POST audio signals are heard and thehard drive LED shows disk activity. However, the monitor fails to displayanything. What are two possible causes of this problem? (Choose two.) The monitor cable connector is loose or disconnected because the retainingscrews are missing.

    The monitor is connected to the integrated video adapter on themotherboard instead of the expansion slot adapter.

    http://dn-share.blogspot.com/http://dn-share.blogspot.com/http://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.htmlhttp://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.htmlhttp://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.htmlhttp://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.htmlhttp://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.htmlhttp://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.htmlhttp://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.htmlhttp://twitter.com/DerryPravitahttp://dn-share.blogspot.com/feeds/posts/defaulthttp://dn-share.blogspot.com/http://dn-share.blogspot.com/http://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.htmlhttp://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.htmlhttp://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.htmlhttp://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.htmlhttp://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.htmlhttp://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.htmlhttp://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.html
  • 7/31/2019 Bruno Harriston Document 1

    12/26

    5Which Windows hard drive partition is referred to as the C: drive? the first primary partition

    6A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms ofspeed. The user is having problems comparing the two standards based onthe values expressed in Mbps. Which explanation can the technician use thatwill best describe the relationship? USB 2.0 is one hundred times as fast as USB 1.1.

    7

    Which feature is characteristic of the ntbackup command? It is used create restore points.

    8Which safety precaution should an installer take when installing cable in theceiling of a building? Wear safety glasses in case of encountering toxic materials during theinstallation.

    9Engineers are designing a security scheme to allow only authorized personsto access the facilities of a national bank. Which security control measureprovides the most secure solution for employee identification? biometric devices

    10Which Startup type must be selected for a service that should run each timethe computer is booted?

    automatic

    11What are two problems that are caused by setting an incorrect boot order inthe system BIOS? (Choose two.) The computer displays an Invalid Boot Disk error after POST. The computer displays an Inaccessible Boot Device error after POST

    12

    Refer to the exhibit. The IT department requested a new set of memory chipsto upgrade the old laptops. A picture of the memory chip required is attached

  • 7/31/2019 Bruno Harriston Document 1

    13/26

    to the purchase order so the correct item can be bought.

    Which type of memory module is the IT department expecting to receive? SODIMM

    13Which recommendation should be observed when replacing existingmemory? The new memory should be as fast or faster than existing memory.

    14Refer to the exhibit. Which utility has the IT department started on eachcomputer?

    Defragment

    15A Windows Vista computer does not display the thumbnail views of twowindows that are currently minimized in the taskbar when the mouse pointeris placed over the appropriate tile on the taskbar. What is a possible solutionto this problem? Start the Vista Aero enhanced display features by launching services.msc.

    16The corporate security policy states that all remote connections use onlysecure tunnels for transport of data. Which encryption technique secures datatraveling across the public Internet as if it were traveling across the corporateLAN? VPN

    17When upgrading a CPU what must be applied between the new CPU and the

    heat sink/fan? thermal compound

    18Which three ports should be left open to avoid filtering e-mail traffic? (Choosethree.) 25 110 143

    19

  • 7/31/2019 Bruno Harriston Document 1

    14/26

    A company has a preventive maintenance policy that requires every computerhave a new restore point created every six months. How can a techniciancreate the restore point? Go to Start > All Programs > Accessories > System Tools > System Restore> Create a restore point.

    20Which two hazards are related to fiber optic installations? (Choose two.) light that can burn the eyes glass splinters that can penetrate the skin

    21A technician has been asked to connect a new scanner to a computer. Whichinterface provides the fastest transfer of data?

    SCSI (Ultra-320)

    22A technician has been asked to develop a physical topology for a network thatprovides a high level of redundancy. Which physical topology requires thatevery node is attached to every other node on the network? mesh

    23What is the highest risk associated with improperly charged or mishandledbatteries? The battery can explode.

    24Refer to the exhibit. What type of partition arrangement does this Windows XPcomputer have on its hard drive? 3 logical, 1 extended, 1 free space, 1 primary

    25Which two characteristics describe a software firewall? (Choose two.) It typically protects only the computer it is installed on. It uses the CPU in the host computer.

    26What are two characteristics of the IEEE 1284 parallel interface standard?(Choose two.) These cables usually have 9 pins or 25 pins on both ends.

    The two available operative modes are EPP and ECP.

  • 7/31/2019 Bruno Harriston Document 1

    15/26

    27Which action should be taken first if a card key is lost or stolen? Disable the lost card key.

    28A technician has installed a third party utility that is used to manage aWindows XP computer. However, the utility is unable to startup automaticallywhenever the computer is started. What can the technician do to resolve thisproblem? Change the startup type for the utility to Automatic in Services.

    29The network manager decides to implement a simple security solution to the

    company WLANs. Which wireless security technique should the manager taketo hide the WLAN id from any access point? Disable the broadcast of the SSID on the access point.

    30The production manager of a small company is experiencing slowperformance in a laptop. What should a technician try first in order to correctthe problem? Defragment the hard disk.

    31A technician is working on a laptop with a touchpad that fails to work. Whichtwo actions can the technician take to try to repair the problem? (Choose two.) Clean the surface of the touchpad. Ensure that the operating system has the correct driver for the touchpad.

    32Refer to the exhibit. Based on the information shown, which statement is true?

    The only PC allowed on the wireless network is the one with the MACaddress 00:05:4E:49:64:87.

    33Refer to the exhibit and consider the advertisement that is shown. Based onthe advertisement, which statement is accurate regarding this motherboard? The Intel Core i7 processor supports a maximum bus speed of 1600MHz.

    34

    Which interface can transfer data at a maximum speed of 480 Mbps? USB 2.0

  • 7/31/2019 Bruno Harriston Document 1

    16/26

    35A call center technician receives a call from a customer who wishes to addmore memory to a laptop to increase graphics performance. Which type of

    memory should be installed? RAM

    1

    A network administrator has been informed about a problem with the network

    printer. What is the most reliable way to prevent print jobs from being addedto the queue while the printer is being repaired?

    Stop the print spooler.

    2

    For a default installation of Windows XP Professional, which two settings are

    customizable? (Choose two.)

    regional settings

    network settings

    3

    Several messages sent to the network administrator are reporting that access

    to a secure server using HTTPS is failing. After checking recent updates to

    the company firewall, the administrator learns that the firewall is blocking

    HTTPS. Which port should be opened to solve the problem?

    443

    4

    A computer has been relocated and all the cables reconnected. When thecomputer is powered on, the correct POST audio signals are heard and the

    hard drive LED shows disk activity. However, the monitor fails to display

    anything. What are two possible causes of this problem? (Choose two.)

    The monitor cable connector is loose or disconnected because the retaining

    screws are missing.

    The monitor is connected to the integrated video adapter on the

    motherboard instead of the expansion slot adapter.

  • 7/31/2019 Bruno Harriston Document 1

    17/26

    5

    Which Windows hard drive partition is referred to as the C: drive?

    the first primary partition

    6A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of

    speed. The user is having problems comparing the two standards based on

    the values expressed in Mbps. Which explanation can the technician use that

    will best describe the relationship?

    USB 2.0 is one hundred times as fast as USB 1.1.

    7

    Which feature is characteristic of the ntbackup command?

    It is used create restore points.

    8

    Which safety precaution should an installer take when installing cable in the

    ceiling of a building?

    Wear safety glasses in case of encountering toxic materials during the

    installation.

    9

    Engineers are designing a security scheme to allow only authorized personsto access the facilities of a national bank. Which security control measure

    provides the most secure solution for employee identification?

    biometric devices

    10

    Which Startup type must be selected for a service that should run each time

    the computer is booted?

    automatic

    11

    What are two problems that are caused by setting an incorrect boot order in

    the system BIOS? (Choose two.)

    The computer displays an Invalid Boot Disk error after POST.

    The computer displays an Inaccessible Boot Device error after POST

    12

    Refer to the exhibit. The IT department requested a new set of memory chips

    to upgrade the old laptops. A picture of the memory chip required is attached

    to the purchase order so the correct item can be bought.

  • 7/31/2019 Bruno Harriston Document 1

    18/26

    Which type of memory module is the IT department expecting to receive?

    SODIMM

    13

    Which recommendation should be observed when replacing existingmemory?

    The new memory should be as fast or faster than existing memory.

    14

    Refer to the exhibit. Which utility has the IT department started on each

    computer?

    Defragment

    15

    A Windows Vista computer does not display the thumbnail views of two

    windows that are currently minimized in the taskbar when the mouse pointer

    is placed over the appropriate tile on the taskbar. What is a possible solution

    to this problem?

    Start the Vista Aero enhanced display features by launching services.msc.

    16

    The corporate security policy states that all remote connections use only

    secure tunnels for transport of data. Which encryption technique secures datatraveling across the public Internet as if it were traveling across the corporate

    LAN?

    VPN

    17

    When upgrading a CPU what must be applied between the new CPU and the

    heat sink/fan?

    thermal compound

    18

    Which three ports should be left open to avoid filtering e-mail traffic? (Choose

    three.)

    25

    110

    143

    19

    A company has a preventive maintenance policy that requires every computer

    have a new restore point created every six months. How can a technician

  • 7/31/2019 Bruno Harriston Document 1

    19/26

    create the restore point?

    Go to Start > All Programs > Accessories > System Tools > System Restore

    > Create a restore point.

    20Which two hazards are related to fiber optic installations? (Choose two.)

    light that can burn the eyes

    glass splinters that can penetrate the skin

    21

    A technician has been asked to connect a new scanner to a computer. Which

    interface provides the fastest transfer of data?

    SCSI (Ultra-320)

    22

    A technician has been asked to develop a physical topology for a network that

    provides a high level of redundancy. Which physical topology requires that

    every node is attached to every other node on the network?

    mesh

    23

    What is the highest risk associated with improperly charged or mishandled

    batteries? The battery can explode.

    24

    Refer to the exhibit. What type of partition arrangement does this Windows XP

    computer have on its hard drive?

    3 logical, 1 extended, 1 free space, 1 primary

    25

    Which two characteristics describe a software firewall? (Choose two.)

    It typically protects only the computer it is installed on.

    It uses the CPU in the host computer.

    26

    What are two characteristics of the IEEE 1284 parallel interface standard?

    (Choose two.)

    These cables usually have 9 pins or 25 pins on both ends.

    The two available operative modes are EPP and ECP.

  • 7/31/2019 Bruno Harriston Document 1

    20/26

    27

    Which action should be taken first if a card key is lost or stolen?

    Disable the lost card key.

    28A technician has installed a third party utility that is used to manage a

    Windows XP computer. However, the utility is unable to startup automatically

    whenever the computer is started. What can the technician do to resolve this

    problem?

    Change the startup type for the utility to Automatic in Services.

    29

    The network manager decides to implement a simple security solution to the

    company WLANs. Which wireless security technique should the manager taketo hide the WLAN id from any access point?

    Disable the broadcast of the SSID on the access point.

    30

    The production manager of a small company is experiencing slow

    performance in a laptop. What should a technician try first in order to correct

    the problem?

    Defragment the hard disk.

    31

    A technician is working on a laptop with a touchpad that fails to work. Which

    two actions can the technician take to try to repair the problem? (Choose two.)

    Clean the surface of the touchpad.

    Ensure that the operating system has the correct driver for the touchpad.

    32

    Refer to the exhibit. Based on the information shown, which statement is true?

    The only PC allowed on the wireless network is the one with the MACaddress 00:05:4E:49:64:87.

    33

    Refer to the exhibit and consider the advertisement that is shown. Based on

    the advertisement, which statement is accurate regarding this motherboard?

    The Intel Core i7 processor supports a maximum bus speed of 1600MHz.

    34

    Which interface can transfer data at a maximum speed of 480 Mbps?

    USB 2.0

  • 7/31/2019 Bruno Harriston Document 1

    21/26

    35

    A call center technician receives a call from a customer who wishes to add

    more memory to a laptop to increase graphics performance. Which type of

    memory should be installed?

    RAM

    What is one advantage of a solid state drive?

    less prone to failure than a traditional drive

    2

    A customer has spilled some liquid into the laptop keyboard. The laptop

    appears to function properly except for the keys. After cleaning the keyboard,

    the technician tests the keyboard and it still has failing keys. What are two

    possible actions the technician could take? (Choose two.)

    Replace the keyboard.

    Use an external keyboard until the laptop keyboard is replaced

    3

    A user mentions that the Photoshop application has been recently installed on

    a laptop and that the laptop runs slowly when Photoshop is running. The

    computer technician checks on the laptop and notices that while the laptop

    responds normally when it is being used to surf the web, the hard disk light is

    constantly on when Photoshop is running. What is the most likely cause of the

    excessive hard disk activity?

    disk fragmentation

    4

    Which authentication technology uses a physical characteristic of the user in

    conjunction with a password?

    biometrics

    5

    A junior technician finds preventive maintenance very boring and would prefer

    to fix real problems. However, what is the most important reason for the

    company that the preventive maintenance be done?

    Preventive maintenance helps to protect the computer equipment against

    future problems.

    6

    A new technician has joined the IT team and is about to service a heavy

  • 7/31/2019 Bruno Harriston Document 1

    22/26

    printer. Which two precautions should be taken to avoid any injury when

    transporting the heavy printer to the service area? (Choose two.)

    Avoid lifting the equipment using the strength in your back

    Lift the equipment using the strength in your legs and knees

    7

    Which two-factor identification method requires a user to use a small radio

    transmitting device and then enter a password in order for the authentication

    to be accepted?

    smart key

    8

    The ABC Company sales force has been provided with smartphones and

    portable printers as shown in the graphic. Which two short-range technologiescan support these types of devices? (Choose two.)

    Bluetooth

    Infrared

    9

    Which two wireless configuration features make it harder for a hacker to see

    and attach to a wireless network? (Choose two.)

    Disabling SSID broadcasts.

    Configuring MAC address filtering.

    10

    What is the issue if the status of a hard disk drive shows as Unreadable in

    the Disk Management utility?

    The drive has input/output errors, has a hardware failure, or is corrupt.

    11

    A technician needs to stop the print spooler on a Windows XP computer

    because the printer has failed. Which set of commands should the technicianfollow?

    Choose Start > Control Panel > Administrative Tools >Computer

    Management. Choose Services.

    12

    After checking that a new ink jet printer has new ink cartridges, that dry paper

    has been installed as recommended by manufacturer, and that the latest

    printer driver has been installed, a technician notes that the printer still fails to

    produce any output. Which three actions could possibly resolve this problem?(Choose three.)

  • 7/31/2019 Bruno Harriston Document 1

    23/26

    Check and secure the cables.

    Set the printer to Resume Printing.

    Ensure that the printer is powered on.

    13A technician has installed new RAM in a laptop. When restarted the laptop

    emitted a long beep. What are two possible causes and solutions for this

    problem? (Choose two.)

    The laptop BIOS should be upgraded when installing the RAM.

    The new RAM is defective and must be replaced.

    14

    A technician has received several reports from employees about receiving e-

    mail from websites that request private bank information. Which type ofsecurity should be implemented to block employees from accessing these

    suspicious websites?

    phishing protection

    15

    A user is experiencing problems with a new removable external drive. What

    two checks should a technician perform to ensure that a removable external

    drive will be recognized by a computer? (Choose two.)

    Ensure that the correct drivers are installed.

    Check that the external ports are enabled in the BIOS settings.

    16

    A temporary user is trying to log in to a computer that the same user used last

    month, but now is unable to complete the login process. What are two

    possible causes of the failed login? (Choose two.)

    The user does not have the rights to log in.

    The user account has been disabled.

    The user is using an incorrect username or password.

    17

    A network technician is installing network service in a new office. What is the

    distance limitation of a single data run for UTP cabling without adding

    networking devices?

    330 ft (100 m)

    18

    What could be the possible solution to the Windows Vista search feature

  • 7/31/2019 Bruno Harriston Document 1

    24/26

    taking longer than expected to find results?

    Change the settings of the Index service in the Advanced Options panel.

    19

    What is the purpose of the setupmgr.exe file? It helps prepare an answer file to automate the installation of Windows XP.

    20

    A computer had updates installed and was rebooted. Nothing is displaying on

    the monitor that is connected to the computer. What could the technician do to

    reset the monitor settings?

    Use the F8 key.

    21

    A laptop less than six months old shuts down after about 30 minutes of

    operation. When the AC power adapter is connected, the laptop continues to

    shutdown after a short period of operation each time the laptop is restarted.

    What should be recommended as a solution?

    The laptop power scheme is set to an unsuitable environment. Have the

    customer adjust the power scheme through the control panel.

    22

    Which external connection technology would a technician choose for acustomer who wants to connect a device capable of a data transfer rate of

    700 Mb/s to a computer?

    IEEE 1394b (Firewire)

    23

    A Windows XP computer that once had three operating systems installed now

    has only one operating system. However, when the computer boots up, the

    user is still presented with a choice between the old systems and XP. Which

    path allows the user to make changes to the BOOT.INI file? Click Start. Right click My Computer. Choose Properties. Choose the

    Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.

    24

    A technician has been performing routine preventive maintenance on a PC.

    After maintenance is performed and the PC and monitor are turned on, the

    monitor displays a black screen. The technician does a visual inspection and

    determines that there are two video ports at the back of the PC. What

    possible problem should the technician investigate first? The monitor was damaged during cleaning.

  • 7/31/2019 Bruno Harriston Document 1

    25/26

    25

    What is different about the default location for user files in Windows Vista

    compared to Windows XP?

    The default location for user files in Windows Vista is within a user-specific

    subfolder in the Users folder.

    26

    In a networking class, the instructor tells the students to ping the other

    computers from the command prompt. Why do all pings in the class fail?

    -The Windows firewall is blocking the ping.

    27

    Refer to the exhibit. A customer purchased a computer three years ago and

    needs to add a second hard drive. The computer has the internal and external

    ports listed in the exhibit. Which solution would be the best if optimal

    performance is the deciding factor?

    -Attach a hard drive to an internal SATA port.

    28

    Why does a technician wear an antistatic wrist strap?

    -to prevent damage to electronic components inside the computer

    29

    A technician uses an application to capture packets on the network. One such

    capture reveals the password that is used by a person in the classroom to

    initiate a Telnet session with a school network device. What recommendation

    could the technician make to the person who is using Telnet?

    -If possible, enable the network device to use SSH instead of Telnet.

    30

    Which Windows protocol enables a technician at company headquarters to

    view the screen and control the mouse and keyboard of a computer in a

    branch office?

    -Remote Desktop Protocol

    31

    A technician is compiling a company computer support training manual. One

    of the utilities that is described in the manual is Sysprep. What is the purpose

    of this utility?

    -It prepares a computer for imaging.

    32A user wants to upgrade the video adapter in a computer. What is the first

  • 7/31/2019 Bruno Harriston Document 1

    26/26

    issue the user should consider when selecting a newer video adapter?

    -Is there an available compatible expansion slot on the motherboard?

    33

    A customer requires a computer storage system that uses no more than twodrives to provide drive redundancy and the highest possible performance.

    Which type of RAID should the technician install?

    -RAID level 0 data striping

    34

    Which would be a reason to update the BIOS of a computer?

    -A computer being prepared for an upgrade is found to lack support for newer

    hardware devices

    35

    Which statement best describes how telephone calls are carried over data

    networks and the Internet?

    -Analog voice signals are converted into digital information that is transported

    in IP packets

    36

    Using RIS, a technician is having difficulties performing a remote installation.

    Which two problems would cause the remote installations to fail? (Choosetwo.)

    -The unattend.txt file is corrupted

    -The network shared folder that holds the OS files is not accessible.

    37

    A user on the network needs to be able to add and remove files in a shared

    folder on an NTFS-formatted server. Users should never be allowed to

    assume ownership of the shared folder. Which permission should the

    administrator assign to the user?-modify

    38

    A technician is working on a networked computer that has an IP address of

    169.254.25.66 and no Internet access. What could the technician do to

    remedy the problem?

    -Reload TCP/IP on the computer.