wew

wew

Rabu, 10 Agustus 2011

practice final exam 11-16

practice final exam 11-16


ini soalnya :

1. What are two characteristics of the IEEE 1284 parallel interface standard?
* The two available operative modes are EPP and ECP
* Bi-directional communication is allowed
2. The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
* VPN
3. What are two problems that are caused by setting an incorrect boot order in the system BIOS?
* The computer displays an "Invalid Boot Disk" error after POST
* The computer displays a "Missing NTLDR" error after POST
4. A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed?
* RAM
5. The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem?
*Defragment the hard disk
6.Which safety precaution should an installer take when installing cable in the ceiling of a building?
* Wear thick gloves to minimize damage to the cable
7. Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
*22
8. Which action should be taken first if a card key is lost or stolen?
*Disable the lost card key.
9. Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?
*biometric devices
10. Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this motherboard?
*The Intel Core i7 processor supports a maximum bus speed of 1600MHz
11. A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?
*USB 2.0
12. A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network
*mesh
13. Which three ports should be left open to avoid filtering e-mail traffic?
*25
*143
*212
14. What is the highest risk associated with improperly charged or mishandled batteries?
*The battery can explode.
15. A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired?
* Stop the print spooler
16. A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem?
* Enable the Graphics Options "Tray Icon" in the Taskbar and Menu Properties window
17. Which Startup type must be selected for a service that should run each time the computer is booted?
* automatic
18.The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point?
* Disable the broadcast of the SSID on the access point
19. When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
* thermal compound
20. A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
*USB 2.0 is forty times as fast as USB 1.1.
21. A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem?
* Enable the touchpad in the system BIOS
* Ensure that the operating system has the correct driver for the touchpad
22. Which Windows hard drive partition is referred to as the C: drive?
* the first primary partition
23. A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem?
* The monitor Power Scheme settings are incorrect.
* The monitor cable connector is loose or disconnected because the retaining screws are missing
24. A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem?
*Change the startup type for the utility to Automatic in Services
25. Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard di
*3 logical, 1 extended, 1 free space, 1 primary
26. Which two hazards are related to fiber optic installations?
* glass splinters that can penetrate the skin
* risk of explosion when installed close to combustible substances
27. Which interface can transfer data at a maximum speed of 480 Mbps?
*USB 2.0
28. A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?
*Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point
29. For a default installation of Windows XP Professional, which two settings are customizable?
*regional settings
30. Refer to the exhibit. Which utility has the IT department started on each computer?
* Defragment
31. Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought.
Which type of memory module is the IT department expecting to receive?
* SODIMM
32. Which two characteristics describe a software firewall?
* It typically protects only the computer it is installed on.
* It uses the CPU in the host computer
33. Which feature is characteristic of the ntbackup command?
* It can be executed from a batch file.
34. Which recommendation should be observed when replacing existing memory?
* The new memory should be as fast or faster as the cache found in the processor.
35. Refer to the exhibit. Based on the information shown, which statement is true?
* The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87
 

1
A technician needs to purchase a new video adapter for a computer. Which factors should be considered when selecting the adapter?

- expansion slot type

2
An employee is receiving e-mail from unknown banks asking for username and password information. Which type of security attack is the employee experiencing?

- Trojan horse

3
ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?

- RAID adapter

4
A technician has installed and configured an external projector on a laptop. What is the final task the technician must perform for the image to be displayed through the projector?

- Press the function key sequence to activate the image on the projector.

5
What do the terms refresh rate, interlace, and aspect ratio explain?

- scanner output

6
When installing a service pack or security patches on an operating system, what should be done to protect the system in the event of a faulty or aborted installation?

- Create a restore point.

7
Fans that are used to help cool a system are commonly placed on which two components? (Choose two.)

- CMOS
- CPU


8
A home computer owner has a PC system that runs Windows XP. For security reasons the owner has been using a limited local user account for a number of years. The owner wishes to install a new piece of software, but the user account does not have the necessary permissions. Which type of account does the owner need to use to install the new software?

- administrator

9
A computer user buys a low priced replacement monitor but finds that there is a lot of flicker. The flicker makes the monitor unusable. Which characteristic of a monitor needs to be considered to ensure flicker-free viewing?

- refresh rate

10
When installing the Windows XP operating system, a technician is given a choice of file systems to use. If security is a requirement, which file system should be chosen?

- NTFS

11
Why do mobile devices such as laptop computers use specially designed CPUs?

- They consume less power.

12
Refer to the exhibit. Which type of device uses the connector shown in the graphic?

- DVD drive

13
A printer has a paper jam. An impatient user has sent multiple print jobs of the same document to this printer. What can be done to remove these print jobs?

- Cancel the jobs in the printer queue.

14
What is the purpose of Windows Vista 64-bit Kernel Patch Protection?

- It prevents third party drivers from modifying the operating system kernel.

15
A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?

- LAN

16
What characterizes spoofing?

- Making data appear to come from a source other than the actual source.

17
Which two items are considered proper cleaning tools? (Choose two.)

- compressed air
- soft cloth


18
What are two network requirements necessary to establish a VPN connection between a remote computer and a private company LAN? (Choose two.)

- low latency network connection
- VPN client


19
A newly purchased scanner is not functioning as efficiently as expected. Which step should a technician take to improve performance?

- Download drivers and utilities from the manufacturer web site.

20
technician has been asked to find how a hacker keeps breaking in to a computer. Which security precaution was most likely missed when the operating system was first installed?

- A user account was not created.

21
A technician just terminated some fiber optic cable and needs to properly dispose of the hazardous waste created during the termination. What document would the technician use to identify the proper disposal method for the waste?

- ESD

22
A technician is troubleshooting a user complaint that a printer is not printing a report. Which step is one of the first that the technician should take?

- Check the Device Manager on the user computer for hardware problems.

23
Which type of cable standard uses a 9-pin connector and supports data rates in excess of 800 Mbps?

- IEEE 1394b

24
When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumables. Which two consumables are associated with an inkjet printer? (Choose two.)

- ink cartridge
- paper


25
Which Windows tool should be run before upgrading the operating system?

- Ntbackup

26
Refer to the exhibit. What command was typed to produce the output that is shown?

- ipconfig /all

27
A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)

- Data is more secure in the event of hardware failures.
- Data resources and access are centrally controlled.


28
Which environmental factor helps ensure optimal performance for laptops?

- Temperature should be preferentially between 45 to 90 degrees Fahrenheit (7 to 32 degrees Celsius) to avoid overheating.

29
What is the purpose of SCSI and RAID adapters?

- to connect storage devices such as hard disk drives to a PC

30
While troubleshooting a computer on which the operating system fails to boot, a technician has checked that there are no non-bootable media in the disk drives, tried using the Last Known Good Configuration option, and attempted to boot the computer in Safe Mode, all without success. Which further possible solution could be tried?

- Perform a Repair Installation of the operating system.

31
A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to use correct this problem?

- Task Manager

32
A technician needs to configure the hard drive on a computer so that there appears to be one drive for the operating system and four drives for data from different applications. How can the hard drive be configured to provide this perception?

- Create one primary partition and an extended partition with four logical drives within it.

33
A technician is having trouble with laptops that keep overheating. What preventive maintenance procedure can be performed on the laptops to reduce this problem?

- Clean the air vents.

34
When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages?

- D

35
A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?

- The technician interrupted a number of times to ask questions.

36
A call center technician answers a call from a frequent customer who is known to be impatient and lacks experience with computers. The customer has an issue with an application that the call center supports. The customer informs the technician that the problem had been reported before but the original technician was rude, did not listen, and did not fix the problem. If the technician is confident that the problem can be resolved by increasing the amount of memory in the computer, what should the technician do?

- Explain that the original technician is no good and the supervisor will be told.

37
Where in Windows XP can the shutdown, hibernate, and standby modes be configured?

- Start > Control Panel > Power Options

38
An administrator gets an e-mail message from what looks like the company bank. The e-mail asks for account information. The administrator determines the e-mail is not from the bank. What type of security threat has the administrator prevented?

- grayware

39
Refer to the exhibit. A Cisco Networking Academy instructor is trying to print a flash graphic from the curriculum. The print job has gone into the print queue as shown. Based on the output, what should be the next step in solving this problem?

- Check the printer cabling and power.

40
Which network protocol is used to automatically assign an IP address to a computer on a network?

- DHCP

41
After Windows XP has been installed, which program would a technician use to select the programs that will run at startup?

- msconfig

42
On which two occasions is it most likely that a technician will have to perform a clean operating system installation if a backup has not been performed? (Choose two.)

- The existing operating system is corrupted.
- The existing security software requires upgrading.


43
What is the purpose of wearing an antistatic wrist strap?

- to equalize the electrical charge between the user and the equipment

44
Where can a user change the idle time after which a laptop will switch to standby mode?

- Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.

45
A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?

- System Registry

46
ABC Company wants to configure laptops to automatically power components off to improve battery life. Which power management control can be used to accomplish this?

- ACPI

47
What is the logical topology used for the Ethernet architecture?

- bus

48
Which three benefits are gained by networking computers? (Choose three.)

- fewer peripherals needed
- lower cost licensing
- increased communication capabilities


49
Which three rules increase the level of password strength? (Choose three.)

- Passwords should be a combination of letters and numbers.
- Passwords should be changed by the user after specific periods of time.
- Password expiration and lockout policies should be clearly defined.


50
A company uses a single computer to receive and test all Windows updates. When the most recent update was installed, several programs failed. What is the first course of action that a technician should attempt to remove the update?

- Run a System Restore from the last restore point.

51
Which firewall port number or number combination must be open in order to remotely access a network device using SSH?

- 22

52
A network technician receives an error that there is insufficient physical disk space on an external drive to hold a file from a Windows XP computer. What is a possible cause for the problem?

- The external drive is formatted with a FAT 32 file system and the file is too large for that file system.
 

Tidak ada komentar:

Posting Komentar