wew

wew

Rabu, 10 Agustus 2011

Final Exam 11-16 - IT Essentials 4.1 2011


Final Exam 11-16 - IT Essentials 4.1 2011

1
A network administrator has been informed about a problem with the network
printer. What is the most reliable way to prevent print jobs from being added to
the queue while the printer is being repaired?
– Stop the print spooler.

2
For a default installation of Windows XP Professional, which two settings are
customizable? (Choose two.)
– regional settings
– network settings

3
Several messages sent to the network administrator are reporting that access to
a secure server using HTTPS is failing. After checking recent updates to the
company firewall, the administrator learns that the firewall is blocking HTTPS.
Which port should be opened to solve the problem?
– 443

4
A computer has been relocated and all the cables reconnected. When the
computer is powered on, the correct POST audio signals are heard and the
hard drive LED shows disk activity. However, the monitor fails to display
anything. What are two possible causes of this problem? (Choose two.)
– The monitor cable connector is loose or disconnected because the retaining
screws are missing.
– The monitor is connected to the integrated video adapter on the motherboard
instead of the expansion slot adapter.

5
Which Windows hard drive partition is referred to as the C: drive?
– the first primary partition

6
A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of
speed. The user is having problems comparing the two standards based on the
values expressed in Mbps. Which explanation can the technician use that will
best describe the relationship?
– USB 2.0 is one hundred times as fast as USB 1.1.

7
Which feature is characteristic of the ntbackup command?
– It is used create restore points.

8
Which safety precaution should an installer take when installing cable in the
ceiling of a building?
– Wear safety glasses in case of encountering toxic materials during the
installation.

9
Engineers are designing a security scheme to allow only authorized persons to
access the facilities of a national bank. Which security control measure provides
the most secure solution for employee identification?
– biometric devices

10
Which Startup type must be selected for a service that should run each time the
computer is booted?
– automatic

11
What are two problems that are caused by setting an incorrect boot order in the
system BIOS? (Choose two.)
– The computer displays an “Invalid Boot Disk” error after POST.
– The computer displays an “Inaccessible Boot Device” error after POST

12
Refer to the exhibit. The IT department requested a new set of memory chips to
upgrade the old laptops. A picture of the memory chip required is attached to
the purchase order so the correct item can be bought.

Which type of memory module is the IT department expecting to receive?
– SODIMM
13
Which recommendation should be observed when replacing existing memory?
– The new memory should be as fast or faster than existing memory.

14
Refer to the exhibit. Which utility has the IT department started on each
computer?
– Defragment

15
A Windows Vista computer does not display the thumbnail views of two
windows that are currently minimized in the taskbar when the mouse pointer is
placed over the appropriate tile on the taskbar. What is a possible solution to
this problem?
– Start the Vista Aero enhanced display features by launching services.msc.

16
The corporate security policy states that all remote connections use only secure
tunnels for transport of data. Which encryption technique secures data traveling
across the public Internet as if it were traveling across the corporate LAN?
– VPN

17
When upgrading a CPU what must be applied between the new CPU and the
heat sink/fan?
– thermal compound

18
Which three ports should be left open to avoid filtering e-mail traffic? (Choose
three.)
– 25
– 110
– 143

19
A company has a preventive maintenance policy that requires every computer
have a new restore point created every six months. How can a technician
create the restore point?
– Go to Start > All Programs > Accessories > System Tools > System Restore >
Create a restore point.

20
Which two hazards are related to fiber optic installations? (Choose two.)
– light that can burn the eyes
– glass splinters that can penetrate the skin

21
A technician has been asked to connect a new scanner to a computer. Which
interface provides the fastest transfer of data?
– SCSI (Ultra-320)

22
A technician has been asked to develop a physical topology for a network that
provides a high level of redundancy. Which physical topology requires that
every node is attached to every other node on the network?
– mesh

23
What is the highest risk associated with improperly charged or mishandled
batteries?
– The battery can explode.

24
Refer to the exhibit. What type of partition arrangement does this Windows XP
computer have on its hard drive?
– 3 logical, 1 extended, 1 free space, 1 primary

25
Which two characteristics describe a software firewall? (Choose two.)
– It typically protects only the computer it is installed on.
– It uses the CPU in the host computer.

26
What are two characteristics of the IEEE 1284 parallel interface standard?
(Choose two.)
– These cables usually have 9 pins or 25 pins on both ends.
– The two available operative modes are EPP and ECP.

27
Which action should be taken first if a card key is lost or stolen?
– Disable the lost card key.

28
A technician has installed a third party utility that is used to manage a Windows
XP computer. However, the utility is unable to startup automatically whenever
the computer is started. What can the technician do to resolve this problem?
– Change the startup type for the utility to Automatic in Services.

29
The network manager decides to implement a simple security solution to the
company WLANs. Which wireless security technique should the manager take
to hide the WLAN id from any access point?
– Disable the broadcast of the SSID on the access point.

30
The production manager of a small company is experiencing slow performance
in a laptop. What should a technician try first in order to correct the problem?
– Defragment the hard disk.

31
A technician is working on a laptop with a touchpad that fails to work. Which two
actions can the technician take to try to repair the problem? (Choose two.)
– Clean the surface of the touchpad.
– Ensure that the operating system has the correct driver for the touchpad.

32
Refer to the exhibit. Based on the information shown, which statement is true?
computer is powered on, the correct POST audio signals are heard and the

hard drive LED shows disk activity. However, the monitor fails to display

anything. What are two possible causes of this problem? (Choose two.)

– The monitor cable connector is loose or disconnected because the retaining

screws are missing.

– The monitor is connected to the integrated video adapter on the motherboard

instead of the expansion slot adapter.

5

Which Windows hard drive partition is referred to as the C: drive?
– the first primary partition

6

A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of

speed. The user is having problems comparing the two standards based on the

values expressed in Mbps. Which explanation can the technician use that will

best describe the relationship?

– USB 2.0 is one hundred times as fast as USB 1.1.

7

Which feature is characteristic of the ntbackup command?

– It is used create restore points.

8

Which safety precaution should an installer take when installing cable in the

ceiling of a building?

– Wear safety glasses in case of encountering toxic materials during the

installation.

9

Engineers are designing a security scheme to allow only authorized persons to

access the facilities of a national bank. Which security control measure provides
the most secure solution for employee identification?

– biometric devices

10

Which Startup type must be selected for a service that should run each time the
computer is booted?

– automatic

11
What are two problems that are caused by setting an incorrect boot order in the – The only PC allowed on the wireless network is the one with the MAC address
00:05:4E:49:64:87.
33
Refer to the exhibit and consider the advertisement that is shown. Based on the
advertisement, which statement is accurate regarding this motherboard?
– The Intel Core i7 processor supports a maximum bus speed of 1600MHz.

34
Which interface can transfer data at a maximum speed of 480 Mbps?
– USB 2.0

35
A call center technician receives a call from a customer who wishes to add
more memory to a laptop to increase graphics performance. Which type of
memory should be installed?
– RAM

1

A network administrator has been informed about a problem with the network
printer. What is the most reliable way to prevent print jobs from being added to

the queue while the printer is being repaired?

– Stop the print spooler.

2
For a default installation of Windows XP Professional, which two settings are

customizable? (Choose two.)

– regional settings

– network settings

3

Several messages sent to the network administrator are reporting that access to
a secure server using HTTPS is failing. After checking recent updates to the

company firewall, the administrator learns that the firewall is blocking HTTPS.
Which port should be opened to solve the problem?

– 443

4
A computer has been relocated and all the cables reconnected. When the
system BIOS? (Choose two.)

– The computer displays an “Invalid Boot Disk” error after POST.

– The computer displays an “Inaccessible Boot Device” error after POST

12

Refer to the exhibit. The IT department requested a new set of memory chips to

upgrade the old laptops. A picture of the memory chip required is attached to

the purchase order so the correct item can be bought.

Which type of memory module is the IT department expecting to receive?

– SODIMM

13

Which recommendation should be observed when replacing existing memory?
– The new memory should be as fast or faster than existing memory.

14

Refer to the exhibit. Which utility has the IT department started on each
computer?

– Defragment

15

A Windows Vista computer does not display the thumbnail views of two
windows that are currently minimized in the taskbar when the mouse pointer is

placed over the appropriate tile on the taskbar. What is a possible solution to

this problem?

– Start the Vista Aero enhanced display features by launching services.msc.

16
The corporate security policy states that all remote connections use only secure

tunnels for transport of data. Which encryption technique secures data traveling

across the public Internet as if it were traveling across the corporate LAN?
– VPN

17
When upgrading a CPU what must be applied between the new CPU and the

heat sink/fan?
– thermal compound

18
Which three ports should be left open to avoid filtering e-mail traffic? (Choose
three.)
– 25

– 110

– 143

19

A company has a preventive maintenance policy that requires every computer

have a new restore point created every six months. How can a technician

create the restore point?

– Go to Start > All Programs > Accessories > System Tools > System Restore >

Create a restore point.

20

Which two hazards are related to fiber optic installations? (Choose two.)

– light that can burn the eyes

– glass splinters that can penetrate the skin

21

A technician has been asked to connect a new scanner to a computer. Which
interface provides the fastest transfer of data?

– SCSI (Ultra-320)

22

A technician has been asked to develop a physical topology for a network that
provides a high level of redundancy. Which physical topology requires that

every node is attached to every other node on the network?

– mesh

23
What is the highest risk associated with improperly charged or mishandled

batteries?

– The battery can explode.

24

Refer to the exhibit. What type of partition arrangement does this Windows XP
computer have on its hard drive?

– 3 logical, 1 extended, 1 free space, 1 primary

25

Which two characteristics describe a software firewall? (Choose two.)
– It typically protects only the computer it is installed on.
– It uses the CPU in the host computer.
26

What are two characteristics of the IEEE 1284 parallel interface standard?

(Choose two.)

– These cables usually have 9 pins or 25 pins on both ends.

– The two available operative modes are EPP and ECP.

27

Which action should be taken first if a card key is lost or stolen?

– Disable the lost card key.

28

A technician has installed a third party utility that is used to manage a Windows

XP computer. However, the utility is unable to startup automatically whenever

the computer is started. What can the technician do to resolve this problem?

– Change the startup type for the utility to Automatic in Services.

29

The network manager decides to implement a simple security solution to the
company WLANs. Which wireless security technique should the manager take

to hide the WLAN id from any access point?

– Disable the broadcast of the SSID on the access point.

30
The production manager of a small company is experiencing slow performance

in a laptop. What should a technician try first in order to correct the problem?

– Defragment the hard disk.

31
A technician is working on a laptop with a touchpad that fails to work. Which two

actions can the technician take to try to repair the problem? (Choose two.)

– Clean the surface of the touchpad.

– Ensure that the operating system has the correct driver for the touchpad.

32
Refer to the exhibit. Based on the information shown, which statement is true?

– The only PC allowed on the wireless network is the one with the MAC address

00:05:4E:49:64:87.

33
Refer to the exhibit and consider the advertisement that is shown. Based on the
advertisement, which statement is accurate regarding this motherboard?
– The Intel Core i7 processor supports a maximum bus speed of 1600MHz.
34

Which interface can transfer data at a maximum speed of 480 Mbps?

– USB 2.0

35

A call center technician receives a call from a customer who wishes to add

more memory to a laptop to increase graphics performance. Which type of

memory should be installed?

– RAM

What is one advantage of a solid state drive?

– less prone to failure than a traditional drive

2

A customer has spilled some liquid into the laptop keyboard. The laptop

appears to function properly except for the keys. After cleaning the keyboard,
the technician tests the keyboard and it still has failing keys. What are two

possible actions the technician could take? (Choose two.)

– Replace the keyboard.

– Use an external keyboard until the laptop keyboard is replaced

3

A user mentions that the Photoshop application has been recently installed on a

laptop and that the laptop runs slowly when Photoshop is running. The

computer technician checks on the laptop and notices that while the laptop

responds normally when it is being used to surf the web, the hard disk light is
constantly on when Photoshop is running. What is the most likely cause of the

excessive hard disk activity?

– disk fragmentation

4

Which authentication technology uses a physical characteristic of the user in
conjunction with a password?

– biometrics

5
A junior technician finds preventive maintenance very boring and would prefer
to fix real problems. However, what is the most important reason for the
company that the preventive maintenance be done?
– Preventive maintenance helps to protect the computer equipment against

future problems.

6

A new technician has joined the IT team and is about to service a heavy printer.

Which two precautions should be taken to avoid any injury when transporting

the heavy printer to the service area? (Choose two.)

– Avoid lifting the equipment using the strength in your back

– Lift the equipment using the strength in your legs and knees

7

Which two-factor identification method requires a user to use a small radio

transmitting device and then enter a password in order for the authentication to

be accepted?

– smart key

8

The ABC Company sales force has been provided with smartphones and
portable printers as shown in the graphic. Which two short-range technologies

can support these types of devices? (Choose two.)

– Bluetooth

– Infrared

9

Which two wireless configuration features make it harder for a hacker to see

and attach to a wireless network? (Choose two.)

– Disabling SSID broadcasts.

– Configuring MAC address filtering.

10

What is the issue if the status of a hard disk drive shows as “Unreadable” in the

Disk Management utility?

– The drive has input/output errors, has a hardware failure, or is corrupt.

11

A technician needs to stop the print spooler on a Windows XP computer

because the printer has failed. Which set of commands should the technician
follow?

– Choose Start > Control Panel > Administrative Tools >Computer
Management. Choose Services.
12

After checking that a new ink jet printer has new ink cartridges, that dry paper

has been installed as recommended by manufacturer, and that the latest printer

driver has been installed, a technician notes that the printer still fails to produce

any output. Which three actions could possibly resolve this problem? (Choose

three.)

– Check and secure the cables.

– Set the printer to Resume Printing.

– Ensure that the printer is powered on.

13

A technician has installed new RAM in a laptop. When restarted the laptop

emitted a long beep. What are two possible causes and solutions for this

problem? (Choose two.)

– The laptop BIOS should be upgraded when installing the RAM.

– The new RAM is defective and must be replaced.

14

A technician has received several reports from employees about receiving e-

mail from websites that request private bank information. Which type of security

should be implemented to block employees from accessing these suspicious

websites?

– phishing protection

15

A user is experiencing problems with a new removable external drive. What two

checks should a technician perform to ensure that a removable external drive
will be recognized by a computer? (Choose two.)

– Ensure that the correct drivers are installed.

– Check that the external ports are enabled in the BIOS settings.

16

A temporary user is trying to log in to a computer that the same user used last

month, but now is unable to complete the login process. What are two possible
causes of the failed login? (Choose two.)

The user does not have the rights to log in.
– The user account has been disabled.

– The user is using an incorrect username or password.

17

A network technician is installing network service in a new office. What is the
distance limitation of a single data run for UTP cabling without adding

networking devices?

– 330 ft (100 m)

18

What could be the possible solution to the Windows Vista search feature taking

longer than expected to find results?

– Change the settings of the Index service in the Advanced Options panel.

19
What is the purpose of the setupmgr.exe file?

– It helps prepare an answer file to automate the installation of Windows XP.

20

A computer had updates installed and was rebooted. Nothing is displaying on
the monitor that is connected to the computer. What could the technician do to

reset the monitor settings?

– Use the F8 key.

21

A laptop less than six months old shuts down after about 30 minutes of

operation. When the AC power adapter is connected, the laptop continues to

shutdown after a short period of operation each time the laptop is restarted.
What should be recommended as a solution?

– The laptop power scheme is set to an unsuitable environment. Have the

customer adjust the power scheme through the control panel.

22
Which external connection technology would a technician choose for a

customer who wants to connect a device capable of a data transfer rate of 700

Mb/s to a computer?

– IEEE 1394b (Firewire)

23
A Windows XP computer that once had three operating systems installed now

has only one operating system. However, when the computer boots up, the user

is still presented with a choice between the old systems and XP. Which path
allows the user to make changes to the BOOT.INI file?

– Click Start. Right click My Computer. Choose Properties. Choose the
Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.
24

A technician has been performing routine preventive maintenance on a PC.

After maintenance is performed and the PC and monitor are turned on, the

monitor displays a black screen. The technician does a visual inspection and

determines that there are two video ports at the back of the PC. What possible

problem should the technician investigate first?

– The monitor was damaged during cleaning.

25

What is different about the default location for user files in Windows Vista
compared to Windows XP?

– The default location for user files in Windows Vista is within a user-specific

subfolder in the Users folder.

26
In a networking class, the instructor tells the students to ping the other

computers from the command prompt. Why do all pings in the class fail?

-The Windows firewall is blocking the ping.

27

Refer to the exhibit. A customer purchased a computer three years ago and

needs to add a second hard drive. The computer has the internal and external

ports listed in the exhibit. Which solution would be the best if optimal
performance is the deciding factor?

-Attach a hard drive to an internal SATA port.

28

Why does a technician wear an antistatic wrist strap?
-to prevent damage to electronic components inside the computer

29

A technician uses an application to capture packets on the network. One such
capture reveals the password that is used by a person in the classroom to

initiate a Telnet session with a school network device. What recommendation

could the technician make to the person who is using Telnet?
-If possible, enable the network device to use SSH instead of Telnet.

30

Which Windows protocol enables a technician at company headquarters to view
the screen and control the mouse and keyboard of a computer in a branch
office?
-Remote Desktop Protocol
31

A technician is compiling a company computer support training manual. One of

the utilities that is described in the manual is Sysprep. What is the purpose of

this utility?

-It prepares a computer for imaging.

32

A user wants to upgrade the video adapter in a computer. What is the first issue

the user should consider when selecting a newer video adapter?

-Is there an available compatible expansion slot on the motherboard

33

A customer requires a computer storage system that uses no more than two

drives to provide drive redundancy and the highest possible performance.

Which type of RAID should the technician install?

-RAID level 0 – data striping

34
Which would be a reason to update the BIOS of a computer?

-A computer being prepared for an upgrade is found to lack support for newer

hardware devices

35
Which statement best describes how telephone calls are carried over data

networks and the Internet?

-Analog voice signals are converted into digital information that is transported in

IP packets

36

Using RIS, a technician is having difficulties performing a remote installation.

Which two problems would cause the remote installations to fail? (Choose two.)

-The unattend.txt file is corrupted
-The network shared folder that holds the OS files is not accessible.

37

A user on the network needs to be able to add and remove files in a shared

folder on an NTFS-formatted server. Users should never be allowed to assume
ownership of the shared folder. Which permission should the administrator
assign to the user?

-modify
38

A technician is working on a networked computer that has an IP address of

169.254.25.66 and no Internet access. What could the technician do to remedy

the problem?

-Reload TCP/IP on the computer.

More exams:
http://www.cisconet.es/english/downloads.html


1. What are two characteristics of the IEEE 1284 parallel interface standard?
* The two available operative modes are EPP and ECP
* Bi-directional communication is allowed
2. The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
* VPN
3. What are two problems that are caused by setting an incorrect boot order in the system BIOS?
* The computer displays an "Invalid Boot Disk" error after POST
* The computer displays a "Missing NTLDR" error after POST
4. A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed?
* RAM
5. The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem?
*Defragment the hard disk
6.Which safety precaution should an installer take when installing cable in the ceiling of a building?
* Wear thick gloves to minimize damage to the cable
7. Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
*22
8. Which action should be taken first if a card key is lost or stolen?
*Disable the lost card key.
9. Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?
*biometric devices
10. Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this motherboard?
*The Intel Core i7 processor supports a maximum bus speed of 1600MHz
11. A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?
*USB 2.0
12. A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network
*mesh
13. Which three ports should be left open to avoid filtering e-mail traffic?
*25
*143
*212
14. What is the highest risk associated with improperly charged or mishandled batteries?
*The battery can explode.
15. A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired?
* Stop the print spooler
16. A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem?
* Enable the Graphics Options "Tray Icon" in the Taskbar and Menu Properties window
17. Which Startup type must be selected for a service that should run each time the computer is booted?
* automatic
18.The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point?
* Disable the broadcast of the SSID on the access point
19. When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
* thermal compound
20. A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
*USB 2.0 is forty times as fast as USB 1.1.
21. A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem?
* Enable the touchpad in the system BIOS
* Ensure that the operating system has the correct driver for the touchpad
22. Which Windows hard drive partition is referred to as the C: drive?
* the first primary partition
23. A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem?
* The monitor Power Scheme settings are incorrect.
* The monitor cable connector is loose or disconnected because the retaining screws are missing
24. A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem?
*Change the startup type for the utility to Automatic in Services
25. Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard di
*3 logical, 1 extended, 1 free space, 1 primary
26. Which two hazards are related to fiber optic installations?
* glass splinters that can penetrate the skin
* risk of explosion when installed close to combustible substances
27. Which interface can transfer data at a maximum speed of 480 Mbps?
*USB 2.0
28. A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?
*Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point
29. For a default installation of Windows XP Professional, which two settings re customizable?
*regional settingsa
30. Refer to the exhibit. Which utility has the IT department started on each computer?
* Defragment
31. Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought.
Which type of memory module is the IT department expecting to receive?
* SODIMM
32. Which two characteristics describe a software firewall?
* It typically protects only the computer it is installed on.
* It uses the CPU in the host computer
33. Which feature is characteristic of the ntbackup command?
* It can be executed from a batch file.
34. Which recommendation should be observed when replacing existing memory?
* The new memory should be as fast or faster as the cache found in the processor.
35. Refer to the exhibit. Based on the information shown, which statement is true?
* The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87




practice final exam 11-16

ini soalnya :
1. What are two characteristics of the IEEE 1284 parallel interface standard?
* The two available operative modes are EPP and ECP
* Bi-directional communication is allowed
2. The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
* VPN
3. What are two problems that are caused by setting an incorrect boot order in the system BIOS?
* The computer displays an "Invalid Boot Disk" error after POST
* The computer displays a "Missing NTLDR" error after POST
4. A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed?
* RAM
5. The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem?
*Defragment the hard disk
6.Which safety precaution should an installer take when installing cable in the ceiling of a building?
* Wear thick gloves to minimize damage to the cable
7. Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
*22
8. Which action should be taken first if a card key is lost or stolen?
*Disable the lost card key.
9. Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?
*biometric devices
10. Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this motherboard?
*The Intel Core i7 processor supports a maximum bus speed of 1600MHz
11. A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?
*USB 2.0
12. A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network
*mesh
13. Which three ports should be left open to avoid filtering e-mail traffic?
*25
*143
*212
14. What is the highest risk associated with improperly charged or mishandled batteries?
*The battery can explode.
15. A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired?
* Stop the print spooler
16. A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem?
* Enable the Graphics Options "Tray Icon" in the Taskbar and Menu Properties window
17. Which Startup type must be selected for a service that should run each time the computer is booted?
* automatic
18.The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point?
* Disable the broadcast of the SSID on the access point
19. When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
* thermal compound
20. A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
*USB 2.0 is forty times as fast as USB 1.1.
21. A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem?
* Enable the touchpad in the system BIOS
* Ensure that the operating system has the correct driver for the touchpad
22. Which Windows hard drive partition is referred to as the C: drive?
* the first primary partition
23. A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem?
* The monitor Power Scheme settings are incorrect.
* The monitor cable connector is loose or disconnected because the retaining screws are missing
24. A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem?
*Change the startup type for the utility to Automatic in Services
25. Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard di
*3 logical, 1 extended, 1 free space, 1 primary
26. Which two hazards are related to fiber optic installations?
* glass splinters that can penetrate the skin
* risk of explosion when installed close to combustible substances
27. Which interface can transfer data at a maximum speed of 480 Mbps?
*USB 2.0
28. A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?
*Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point
29. For a default installation of Windows XP Professional, which two settings are customizable?
*regional settings
30. Refer to the exhibit. Which utility has the IT department started on each computer?
* Defragment
31. Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought.
Which type of memory module is the IT department expecting to receive?
* SODIMM
32. Which two characteristics describe a software firewall?
* It typically protects only the computer it is installed on.
* It uses the CPU in the host computer
33. Which feature is characteristic of the ntbackup command?
* It can be executed from a batch file.
34. Which recommendation should be observed when replacing existing memory?
* The new memory should be as fast or faster as the cache found in the processor.
35. Refer to the exhibit. Based on the information shown, which statement is true?
* The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87


1. What are two characteristics of the IEEE 1284 parallel interface standard?
* The two available operative modes are EPP and ECP
* Bi-directional communication is allowed
2. The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
* VPN
3. What are two problems that are caused by setting an incorrect boot order in the system BIOS?
* The computer displays an "Invalid Boot Disk" error after POST
* The computer displays a "Missing NTLDR" error after POST
4. A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed?
* RAM
5. The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem?
*Defragment the hard disk
6.Which safety precaution should an installer take when installing cable in the ceiling of a building?
* Wear thick gloves to minimize damage to the cable
7. Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
*22
8. Which action should be taken first if a card key is lost or stolen?
*Disable the lost card key.
9. Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?
*biometric devices
10. Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this motherboard?
*The Intel Core i7 processor supports a maximum bus speed of 1600MHz
11. A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?
*USB 2.0
12. A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network
*mesh
13. Which three ports should be left open to avoid filtering e-mail traffic?
*25
*143
*212
14. What is the highest risk associated with improperly charged or mishandled batteries?
*The battery can explode.
15. A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired?
* Stop the print spooler
16. A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem?
* Enable the Graphics Options "Tray Icon" in the Taskbar and Menu Properties window
17. Which Startup type must be selected for a service that should run each time the computer is booted?
* automatic
18.The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point?
* Disable the broadcast of the SSID on the access point
19. When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
* thermal compound
20. A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
*USB 2.0 is forty times as fast as USB 1.1.
21. A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem?
* Enable the touchpad in the system BIOS
* Ensure that the operating system has the correct driver for the touchpad
22. Which Windows hard drive partition is referred to as the C: drive?
* the first primary partition
23. A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem?
* The monitor Power Scheme settings are incorrect.
* The monitor cable connector is loose or disconnected because the retaining screws are missing
24. A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem?
*Change the startup type for the utility to Automatic in Services
25. Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard di
*3 logical, 1 extended, 1 free space, 1 primary
26. Which two hazards are related to fiber optic installations?
* glass splinters that can penetrate the skin
* risk of explosion when installed close to combustible substances
27. Which interface can transfer data at a maximum speed of 480 Mbps?
*USB 2.0
28. A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?
*Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point
29. For a default installation of Windows XP Professional, which two settings are customizable?
*regional settings
30. Refer to the exhibit. Which utility has the IT department started on each computer?
* Defragment
31. Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought.
Which type of memory module is the IT department expecting to receive?
* SODIMM
32. Which two characteristics describe a software firewall?
* It typically protects only the computer it is installed on.
* It uses the CPU in the host computer
33. Which feature is characteristic of the ntbackup command?
* It can be executed from a batch file.
34. Which recommendation should be observed when replacing existing memory?
* The new memory should be as fast or faster as the cache found in the processor.
35. Refer to the exhibit. Based on the information shown, which statement is true?
* The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87

Tidak ada komentar:

Posting Komentar