Monday, February 28, 2011

DHomesb Chapter 2 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1   
Which method of interacting with an operating system involves typing commands at a command prompt?
    #CLI

2   
What occurs when computers are configured to receive their network configurations dynamically?
    #Each computer requests configuration information from a server.

3   
An operating system is severely damaged. All data on the partition needs to be deleted, and all application software must be reinstalled. Which installation method should be used to correct the problem?
    #clean install

4   
Which Windows file system is more likely to be used in an enterprise-level environment?
    #NTFS

5   
What are two ways that a user can interact with an operating system shell? (Choose two.)
    #CLI
    #GUI

6   
Windows XP has a known problem with specific Intel processors. What is the best course of action to take in this situation?
    #Download and install the Windows patch that fixes this problem.

7   
The Lesson TaskMaster application from ChalkBoard has a problem. Every time the software is installed and loaded on a Windows XP-based Dell computer, and the moment something is typed followed by a tab, two tabs are inserted instead of one. What would be the best solution to this problem?
    #Download, install, and apply a patch from ChalkBoard.

8   
Which two statements are true about drive partitions? (Choose two.)
    #Partitions are necessary in multi-boot installations.
    #A hard drive can be divided into an operating system partition and a data partition.

9   
What is the purpose of a default gateway?
    #identifies the device that allows local network computers to communicate with devices on other networks

10   
What Explorer menu option is used to determine the Windows XP version installed on a computer?
    #Help

11   
Which three resource specifications are given by the manufacturer to ensure that an operating system performs as designed? (Choose three.)
    #required hard disk space
    #processor type and speed
    #recommended amount of RAM

12   
Which three pieces of information must be specified on a computer to allow that computer to send and receive information across networks? (Choose three.)
    #IP address
    #subnet mask
    #default gateway

13   
Which Windows XP Automatic Update option allows you to select the time when a Windows update is executed?
    #Automatic (recommended).

14   
Which two items must be unique to each computer and cannot be duplicated on a network? (Choose two.)
    #computer name
    #IP address

15   
Which two statements should be included in a pre-installation checklist when upgrading an operating system? (Choose two.)
    #Verify that the hardware resources meet or exceed the published minimum requirements.
    #Complete a full backup of all important files and data.

16   
What two items are available from the About Windows option through the Windows Explorer Help menu? (Choose two.)
    #the end-user license agreement
    #the operating system version number

17   
What are three characteristics of an operating system that is released under the GPL (GNU Public License)? (Choose three.)
    #full access to source code
    #software often available free
    #support normally user-based and often free

18   
Which statement is true about installing an operating system on computers in a networked environment?
    #The computer name must be unique for all computers on the same network.

19   
A computer in the Advanced Technology Center computer room on the second floor, room number 217, has the computer name ATC_217_7. What fact is true about the computer name?
    #The name makes it easier for users to reference the device when connecting to it to share resources.

20   
Which operating system patch installation method is used when a user is notified of a security update for remotely accessing a computer, but wishes not to install this patch?
    #prompt for permission

DHomesb Chapter 2 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1   
Which method of interacting with an operating system involves typing commands at a command prompt?
    #CLI

2   
What occurs when computers are configured to receive their network configurations dynamically?
    #Each computer requests configuration information from a server.

3   
An operating system is severely damaged. All data on the partition needs to be deleted, and all application software must be reinstalled. Which installation method should be used to correct the problem?
    #clean install

4   
Which Windows file system is more likely to be used in an enterprise-level environment?
    #NTFS

5   
What are two ways that a user can interact with an operating system shell? (Choose two.)
    #CLI
    #GUI

6   
Windows XP has a known problem with specific Intel processors. What is the best course of action to take in this situation?
    #Download and install the Windows patch that fixes this problem.

7   
The Lesson TaskMaster application from ChalkBoard has a problem. Every time the software is installed and loaded on a Windows XP-based Dell computer, and the moment something is typed followed by a tab, two tabs are inserted instead of one. What would be the best solution to this problem?
    #Download, install, and apply a patch from ChalkBoard.

8   
Which two statements are true about drive partitions? (Choose two.)
    #Partitions are necessary in multi-boot installations.
    #A hard drive can be divided into an operating system partition and a data partition.

9   
What is the purpose of a default gateway?
    #identifies the device that allows local network computers to communicate with devices on other networks

10   
What Explorer menu option is used to determine the Windows XP version installed on a computer?
    #Help

11   
Which three resource specifications are given by the manufacturer to ensure that an operating system performs as designed? (Choose three.)
    #required hard disk space
    #processor type and speed
    #recommended amount of RAM

12   
Which three pieces of information must be specified on a computer to allow that computer to send and receive information across networks? (Choose three.)
    #IP address
    #subnet mask
    #default gateway

13   
Which Windows XP Automatic Update option allows you to select the time when a Windows update is executed?
    #Automatic (recommended).

14   
Which two items must be unique to each computer and cannot be duplicated on a network? (Choose two.)
    #computer name
    #IP address

15   
Which two statements should be included in a pre-installation checklist when upgrading an operating system? (Choose two.)
    #Verify that the hardware resources meet or exceed the published minimum requirements.
    #Complete a full backup of all important files and data.

16   
What two items are available from the About Windows option through the Windows Explorer Help menu? (Choose two.)
    #the end-user license agreement
    #the operating system version number

17   
What are three characteristics of an operating system that is released under the GPL (GNU Public License)? (Choose three.)
    #full access to source code
    #software often available free
    #support normally user-based and often free

18   
Which statement is true about installing an operating system on computers in a networked environment?
    #The computer name must be unique for all computers on the same network.

19   
A computer in the Advanced Technology Center computer room on the second floor, room number 217, has the computer name ATC_217_7. What fact is true about the computer name?
    #The name makes it easier for users to reference the device when connecting to it to share resources.

20   
Which operating system patch installation method is used when a user is notified of a security update for remotely accessing a computer, but wishes not to install this patch?
    #prompt for permission

Chapter 6 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1.Which two laptop ports are used primarily for communication and network connectivity? (Choose two.)
*Ethernet
*Modem

2.Refer to the exhibit. A laptop has these graphics on specific keys on the keyboard. Which key would be used in conjunction with the Fn key to connect a laptop to an external monitor?
*F8

3.hat is the major difference between desktop and laptop motherboards?
*Desktop motherboards typically have a standard form factor and are interchangeable while laptop motherboards are proprietary.

4.During the set up of a network connection, which option can be double-clicked to configure an IP address on an Ethernet NIC?
*TCP/IP or TCP/IPv4

5.How should a hot-swappable device normally be removed from a laptop?
*Use the Safely Remove Hardware systray icon.

6.Which two characteristics make laptops a better choice than desktop computers? (Choose two.)
*Mobility
*Size

7.hich two devices can be individually configured within Windows XP to power off after the laptop has been idle for a given period of time? (Choose two.)
*Disk Drive
*Moitor

8.Which generation of cell-phone standards was the first to deal with how to send and receive text, photographs, and video?
*Third

9.Where can a technician change the power schemes on a laptop running Windows XP?
*Select Power Options from within the Control Panel.

10.What power mode is commonly known in the Windows environment as suspend mode?
*S4

11.Which type of interface do current laptops use to achieve similar expansion capabilities as desktops?
*PC Express Card

12.Refer to the exhibit. Which two form factors are supported by the devices shown in the graphic? (Choose two.)
*34
*54

13. technician is replacing a laptop SODIMM. With what component is the technician working?
*RAM

14.What is meant by a laptop device being hot-swappable?
*The laptop does not need to be powered off to install or remove the device.

15.A technician is responding to a helpdesk ticket for a laptop that has a distorted image of the Windows desktop. What is one possible solution?
*Obtain an updated display driver from the laptop manufacturer.

16.Which three components are interchangeable between desktop and laptop computers? (Choose three.
*Printer *Scanner *USB Drive

17.Which internal laptop component may be designed as a hot-swappable device?
*Optical Drive

18.Refer to the exhibit. What is the correct order of steps to remove a laptop battery?
*2341

19.Which two actions should be performed to clean the surface of CDs and DVDs? (Choose two.)
*Use a lint-free cotton cloth.
*Wipe the disc from the center outward.

20. Which display technology is most commonly found in modern laptop computers?
*LCD

21.A technician has been called in to troubleshoot a laptop that fails to power on. The technician repeatedly pushes the power button without any results. What should the technician do next?
*Attach the AC adapter.

22.Which Windows XP or Vista control panel is used to reduce power when the computer has not been used by anyone for an hour?
*Power Options

23.What feature is provided by an auto-switching power supply on a laptop?
*The laptop can switch from AC input power or battery-provided power instantaneously.

24.Which three components commonly connect to USB or FireWire ports? (Choose three.)
*Camera *Printer *Scanner

25.Which option within the Windows Control Panel is used to install a modem?
*Phone and Modem Options

26.Which name is given to the collection of settings that control the power settings of a laptop?
*Power schemes

27.What is the proper way to clean optical drives?
*Use a cleaning disc for optical drives.

28.Which two devices are commonly hot-swappable on laptops? (Choose two.)
*PC Card
*USB Drive

Good luck :)

Chapter 6 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1.Which two laptop ports are used primarily for communication and network connectivity? (Choose two.)
*Ethernet
*Modem

2.Refer to the exhibit. A laptop has these graphics on specific keys on the keyboard. Which key would be used in conjunction with the Fn key to connect a laptop to an external monitor?
*F8

3.hat is the major difference between desktop and laptop motherboards?
*Desktop motherboards typically have a standard form factor and are interchangeable while laptop motherboards are proprietary.

4.During the set up of a network connection, which option can be double-clicked to configure an IP address on an Ethernet NIC?
*TCP/IP or TCP/IPv4

5.How should a hot-swappable device normally be removed from a laptop?
*Use the Safely Remove Hardware systray icon.

6.Which two characteristics make laptops a better choice than desktop computers? (Choose two.)
*Mobility
*Size

7.hich two devices can be individually configured within Windows XP to power off after the laptop has been idle for a given period of time? (Choose two.)
*Disk Drive
*Moitor

8.Which generation of cell-phone standards was the first to deal with how to send and receive text, photographs, and video?
*Third

9.Where can a technician change the power schemes on a laptop running Windows XP?
*Select Power Options from within the Control Panel.

10.What power mode is commonly known in the Windows environment as suspend mode?
*S4

11.Which type of interface do current laptops use to achieve similar expansion capabilities as desktops?
*PC Express Card

12.Refer to the exhibit. Which two form factors are supported by the devices shown in the graphic? (Choose two.)
*34
*54

13. technician is replacing a laptop SODIMM. With what component is the technician working?
*RAM

14.What is meant by a laptop device being hot-swappable?
*The laptop does not need to be powered off to install or remove the device.

15.A technician is responding to a helpdesk ticket for a laptop that has a distorted image of the Windows desktop. What is one possible solution?
*Obtain an updated display driver from the laptop manufacturer.

16.Which three components are interchangeable between desktop and laptop computers? (Choose three.
*Printer *Scanner *USB Drive

17.Which internal laptop component may be designed as a hot-swappable device?
*Optical Drive

18.Refer to the exhibit. What is the correct order of steps to remove a laptop battery?
*2341

19.Which two actions should be performed to clean the surface of CDs and DVDs? (Choose two.)
*Use a lint-free cotton cloth.
*Wipe the disc from the center outward.

20. Which display technology is most commonly found in modern laptop computers?
*LCD

21.A technician has been called in to troubleshoot a laptop that fails to power on. The technician repeatedly pushes the power button without any results. What should the technician do next?
*Attach the AC adapter.

22.Which Windows XP or Vista control panel is used to reduce power when the computer has not been used by anyone for an hour?
*Power Options

23.What feature is provided by an auto-switching power supply on a laptop?
*The laptop can switch from AC input power or battery-provided power instantaneously.

24.Which three components commonly connect to USB or FireWire ports? (Choose three.)
*Camera *Printer *Scanner

25.Which option within the Windows Control Panel is used to install a modem?
*Phone and Modem Options

26.Which name is given to the collection of settings that control the power settings of a laptop?
*Power schemes

27.What is the proper way to clean optical drives?
*Use a cleaning disc for optical drives.

28.Which two devices are commonly hot-swappable on laptops? (Choose two.)
*PC Card
*USB Drive

Good luck :)

Thursday, February 17, 2011

Final Exam for ch 1-10 - IT Essentials: PC Hardware and Software (Version 4.1)

1
A computer user buys a low priced replacement monitor but finds that there is a lot of flicker. The flicker makes the monitor unusable. Which characteristic of a monitor needs to be considered to ensure flicker-free viewing?
#refresh rate

2
When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages?
#D

3
A technician notices that a data floppy disk is in the floppy disk drive of a computer when it is powered on. Which error message could this potentially cause?
#invalid system disk

4
What characterizes spoofing?
#Making data appear to come from a source other than the actual source.

5
When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?
#BIOS reads the MBR.

6
When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumables. Which two consumables are associated with an inkjet printer? (Choose two.)
#ink cartridge
#paper

7
Which protocol adds security to remote connections?
#SSH

8
What is the purpose of an IRQ?
#Request information from the CPU.

9
A wireless LAN is being deployed inside the new park ranger, one room office that is located at the highest part of the national park. When the testing was completed, the technicians reported that occasionally, the wireless LAN signal is affected by some type of interference. What are two possible causes of the signal distortion? (Choose two.)
#the number of wireless devices that are used in the wireless LAN
#the large number of trees that surround the office

10
When installing a service pack or security patches on an operating system, what should be done to protect the system in the event of a faulty or aborted installation?
#Create a restore point.

11
A technician is asked to wire a network that supports CSMA/CD. Which architecture and physical topology should the technician use for supporting this access control method?
#Ethernet and Star

12
What is the best way to fully ensure that data is unable to be recovered from a hard drive?
#shattering the hard drive platters with a hammer

13
A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?
#System Registry

14
A printer has a paper jam. An impatient user has sent multiple print jobs of the same document to this printer. What can be done to remove these print jobs?
#Cancel the jobs in the printer queue.

15
ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?
#RAID adapter

16
A call center technician has asked a customer to perform a simple operation to fix a problem on a computer. The customer seems unable to perform the task. What should the technician do?
#Determine whether the customer would prefer to receive the instructions in another form, such as e-mailed, illustrated written instructions.

17
Which two technologies enable printers to be accessed by multiple network users? (Choose two.)
#Wi-Fi
#Ethernet

18
A user reports that a printer is printing unknown characters on documents. What is a possible solution to this issue?
#Uninstall and reinstall the printer driver.

19
Which network device uses a MAC address table to segment the network?
#router

20
A technician needs to configure the hard drive on a computer so that there appears to be one drive for the operating system and four drives for data from different applications. How can the hard drive be configured to provide this perception?
#Create one primary partition and one logical partition with four logical drives within it.

21
A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?
#The technician interrupted a number of times to ask questions.

22
A technician is troubleshooting a user complaint that a printer is not printing a report. Which step is one of the first that the technician should take?
#Check the Device Manager on the user computer for hardware problems.

23
Which Registry file contains information about all software that is installed on a Windows XP computer?
#HKEY_LOCAL_MACHINE

24
A hacker is detected using commonly available wireless hacking tools to access encrypted wireless network communication. Which resolution would prevent this action?
#Change the SSID that is being used on the wireless network.

25
Which two general precautions should be taken before replacing any non-hot-swappable laptop component? (Choose two.)
#Disconnect the power cord.
#Remove any batteries.

26
Which power mode should be used by a laptop so that all the data is saved, all the applications the user was working on are left open, and there is no power used by the laptop?
#Hibernate

27
What is the purpose of SCSI and RAID adapters?
#to connect storage devices such as hard disk drives to a PC

28
Which network protocol is used to automatically assign an IP address to a computer on a network?
#DHCP

29
A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files are missing. What should the customer do next?
#Restore the data files that were backed up in preparation for the conversion.

30
Which two components normally require a laptop to be powered down and the battery removed before removing the components? (Choose two.)
#internal hard drive
#RAM

31
A customer reports that after using a computer for over a year, the computer now takes more time to access the files. Which management tool can be used first, before any other complex procedure?
#defrag

32
A customer needs to purchase a new power supply for a computer. What must be considered when selecting an appropriate power supply?
#The power supply has sufficient wattage to support all components inside the computer.

33
What is a benefit of using the USB or FireWire ports to connect peripherals to a laptop?
#The peripherals can be plugged in and out without turning the laptop off.

34
A small business has used a high quality configurable flatbed scanner to scan a number of photographs to print as large posters. However, the quality of the images printed as posters is poor. What should the user do?
#Increase the resolution of the scanner.

35
A user has been writing data to a USB flash memory drive. What should the user do before removing the device?
#Click on the Safely Remove Hardware icon in the system tray then on the device.

36
A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can only receive a response from local workstations. What could be causing the problem?
#The default gateway is not set.

37
A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)
#Inkjet printers are less expensive than laser printers.
#The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.

38
A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack?
#ping of death

39
A technician wants to create a new partition on a new additional hard drive. Which tool should be used?
#Disk Management

40
Which two quick solutions are commonly recommended when a technician is troubleshooting a laptop? (Choose two.)
#Reboot the laptop.
#Disconnect the peripherals.

41
A company uses a single computer to receive and test all Windows updates. When the most recent update was installed, several programs failed. What is the first course of action that a technician should attempt to remove the update?
#Run a System Restore from the last restore point.

42
A mobile training room uses a generator to power the PCs, servers, and printers. The company that runs the room upgraded the equipment but then found that when all the devices are powered up they become unreliable, with some PCs shutting down. What may cause this power problem?
#The power consumption of all devices is too much for the electrical circuit that is provided.

43
When installing the Windows XP operating system, a technician is given a choice of file systems to use. If security is a requirement, which file system should be chosen?
#NTFS

44
A technician has replaced a failing floppy drive. While testing the new drive, the technician notices that the floppy drive light remains lit constantly. What is most likely the cause of the problem?
#The ribbon cable is installed incorrectly.

45
Which two types of connectors can be found on DVI cables? (Choose two.)




46
Which Windows tool should be run before upgrading the operating system?
#Ntbackup

47
The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver?
#manufacturer's website

48
Where can a user change the idle time after which a laptop will switch to standby mode?
#Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.

49
A home computer owner has a PC system that runs Windows XP. For security reasons the owner has been using a limited local user account for a number of years. The owner wishes to install a new piece of software, but the user account does not have the necessary permissions. Which type of account does the owner need to use to install the new software?
#administrator

50
A student enables file sharing on a laptop so that a friend can access music files. Which type of service is being configured?
#peer-to-peer

51
What do the terms refresh rate, interlace, and aspect ratio explain?
#image properties of a monitor

52
A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and diagnostic utilities. Where would the technician set the boot order for the PC?
#BIOS

Final Exam for ch 1-10 - IT Essentials: PC Hardware and Software (Version 4.1)

1
A computer user buys a low priced replacement monitor but finds that there is a lot of flicker. The flicker makes the monitor unusable. Which characteristic of a monitor needs to be considered to ensure flicker-free viewing?
#refresh rate

2
When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages?
#D

3
A technician notices that a data floppy disk is in the floppy disk drive of a computer when it is powered on. Which error message could this potentially cause?
#invalid system disk

4
What characterizes spoofing?
#Making data appear to come from a source other than the actual source.

5
When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?
#BIOS reads the MBR.

6
When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumables. Which two consumables are associated with an inkjet printer? (Choose two.)
#ink cartridge
#paper

7
Which protocol adds security to remote connections?
#SSH

8
What is the purpose of an IRQ?
#Request information from the CPU.

9
A wireless LAN is being deployed inside the new park ranger, one room office that is located at the highest part of the national park. When the testing was completed, the technicians reported that occasionally, the wireless LAN signal is affected by some type of interference. What are two possible causes of the signal distortion? (Choose two.)
#the number of wireless devices that are used in the wireless LAN
#the large number of trees that surround the office

10
When installing a service pack or security patches on an operating system, what should be done to protect the system in the event of a faulty or aborted installation?
#Create a restore point.

11
A technician is asked to wire a network that supports CSMA/CD. Which architecture and physical topology should the technician use for supporting this access control method?
#Ethernet and Star

12
What is the best way to fully ensure that data is unable to be recovered from a hard drive?
#shattering the hard drive platters with a hammer

13
A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?
#System Registry

14
A printer has a paper jam. An impatient user has sent multiple print jobs of the same document to this printer. What can be done to remove these print jobs?
#Cancel the jobs in the printer queue.

15
ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?
#RAID adapter

16
A call center technician has asked a customer to perform a simple operation to fix a problem on a computer. The customer seems unable to perform the task. What should the technician do?
#Determine whether the customer would prefer to receive the instructions in another form, such as e-mailed, illustrated written instructions.

17
Which two technologies enable printers to be accessed by multiple network users? (Choose two.)
#Wi-Fi
#Ethernet

18
A user reports that a printer is printing unknown characters on documents. What is a possible solution to this issue?
#Uninstall and reinstall the printer driver.

19
Which network device uses a MAC address table to segment the network?
#router

20
A technician needs to configure the hard drive on a computer so that there appears to be one drive for the operating system and four drives for data from different applications. How can the hard drive be configured to provide this perception?
#Create one primary partition and one logical partition with four logical drives within it.

21
A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?
#The technician interrupted a number of times to ask questions.

22
A technician is troubleshooting a user complaint that a printer is not printing a report. Which step is one of the first that the technician should take?
#Check the Device Manager on the user computer for hardware problems.

23
Which Registry file contains information about all software that is installed on a Windows XP computer?
#HKEY_LOCAL_MACHINE

24
A hacker is detected using commonly available wireless hacking tools to access encrypted wireless network communication. Which resolution would prevent this action?
#Change the SSID that is being used on the wireless network.

25
Which two general precautions should be taken before replacing any non-hot-swappable laptop component? (Choose two.)
#Disconnect the power cord.
#Remove any batteries.

26
Which power mode should be used by a laptop so that all the data is saved, all the applications the user was working on are left open, and there is no power used by the laptop?
#Hibernate

27
What is the purpose of SCSI and RAID adapters?
#to connect storage devices such as hard disk drives to a PC

28
Which network protocol is used to automatically assign an IP address to a computer on a network?
#DHCP

29
A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files are missing. What should the customer do next?
#Restore the data files that were backed up in preparation for the conversion.

30
Which two components normally require a laptop to be powered down and the battery removed before removing the components? (Choose two.)
#internal hard drive
#RAM

31
A customer reports that after using a computer for over a year, the computer now takes more time to access the files. Which management tool can be used first, before any other complex procedure?
#defrag

32
A customer needs to purchase a new power supply for a computer. What must be considered when selecting an appropriate power supply?
#The power supply has sufficient wattage to support all components inside the computer.

33
What is a benefit of using the USB or FireWire ports to connect peripherals to a laptop?
#The peripherals can be plugged in and out without turning the laptop off.

34
A small business has used a high quality configurable flatbed scanner to scan a number of photographs to print as large posters. However, the quality of the images printed as posters is poor. What should the user do?
#Increase the resolution of the scanner.

35
A user has been writing data to a USB flash memory drive. What should the user do before removing the device?
#Click on the Safely Remove Hardware icon in the system tray then on the device.

36
A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can only receive a response from local workstations. What could be causing the problem?
#The default gateway is not set.

37
A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)
#Inkjet printers are less expensive than laser printers.
#The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.

38
A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack?
#ping of death

39
A technician wants to create a new partition on a new additional hard drive. Which tool should be used?
#Disk Management

40
Which two quick solutions are commonly recommended when a technician is troubleshooting a laptop? (Choose two.)
#Reboot the laptop.
#Disconnect the peripherals.

41
A company uses a single computer to receive and test all Windows updates. When the most recent update was installed, several programs failed. What is the first course of action that a technician should attempt to remove the update?
#Run a System Restore from the last restore point.

42
A mobile training room uses a generator to power the PCs, servers, and printers. The company that runs the room upgraded the equipment but then found that when all the devices are powered up they become unreliable, with some PCs shutting down. What may cause this power problem?
#The power consumption of all devices is too much for the electrical circuit that is provided.

43
When installing the Windows XP operating system, a technician is given a choice of file systems to use. If security is a requirement, which file system should be chosen?
#NTFS

44
A technician has replaced a failing floppy drive. While testing the new drive, the technician notices that the floppy drive light remains lit constantly. What is most likely the cause of the problem?
#The ribbon cable is installed incorrectly.

45
Which two types of connectors can be found on DVI cables? (Choose two.)




46
Which Windows tool should be run before upgrading the operating system?
#Ntbackup

47
The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver?
#manufacturer's website

48
Where can a user change the idle time after which a laptop will switch to standby mode?
#Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.

49
A home computer owner has a PC system that runs Windows XP. For security reasons the owner has been using a limited local user account for a number of years. The owner wishes to install a new piece of software, but the user account does not have the necessary permissions. Which type of account does the owner need to use to install the new software?
#administrator

50
A student enables file sharing on a laptop so that a friend can access music files. Which type of service is being configured?
#peer-to-peer

51
What do the terms refresh rate, interlace, and aspect ratio explain?
#image properties of a monitor

52
A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and diagnostic utilities. Where would the technician set the boot order for the PC?
#BIOS

Thursday, February 3, 2011

Chapter 7 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

Chapter 7 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1.Instead of the document that was expected, a printer is printing unusual characters. What should be the next steps in solving this printer problem?
#Check the printer data cabling. If the cabling is secure on both ends, replace the print cartridge or ribbon.

2.Which printing technology uses the vibration of a crystal to control the flow of ink onto the paper to produce an image?
#piezoelectric


3.Which unit is commonly used to measure the print quality of an inkjet printer?
#DPI

4.What is the best source for a Windows-compatible scanner driver?
#website for scanner manufacturer

5.What is an advantage of using a solid-ink printer instead of an inkjet printer?
#It produces vivid color prints.

6.What are two advantages of using impact printers? (Choose two.)
#carbon-copy printing ability
#inexpensive consumables

7.What is typical of a network printer installation?
#the use of Ethernet or wireless

8.Which software converts scanned pages into text?
#Optical Character Recognition

9.Which three functions are commonly included in the all-in-one devices? (Choose three.)
#fax
#printer
#scanner

10.Which step of the laser printing process is the last step performed by a laser printer when printing a document?
#fusing

11.Which technology is used by laser printers?
#electrophotographic

12.Which two modes of operation within the IEEE 1284 standard allow bi-directional communication? (Choose two.)
#ECP
#EPP

13.Which standard governs the use of parallel printer ports?
#IEEE 1284

14.Which printer technology is used in low-cost, photo-quality printers?
#inkjet


15.Which type of printer is commonly used in stores to produce cash register receipts?
#thermal

16.A museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-quality reproduction?
#drum


17.Which software, embedded in a printer, controls how the printer operates and can be upgraded?
#firmware

18.What is the maximum number of devices that can be connected to a single FireWire interface?
#63

19.Which laser printer component is a metal cylinder that is coated with a light-sensitive insulating material?
#drum

20.Which two names refer to the IEEE 1394 standard? (Choose two.)
#FireWire
#i.Link


21.Which step of the laser printing process involves scanning the photosensitive drum with a laser?
#writing

22.Which Windows XP command sends a file named example.txt to the default printer?
#print example.txt

23.Which two Wi-Fi standards are used to provide a wireless connection between printers and computers? (Choose two.)
#802.11b
#802.11g


24.What is a common disadvantage of inkjet printers?
#The nozzles can get obstructed.

25.What laser printer component could cause streaking?
#drum

Chapter 7 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

Chapter 7 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1.Instead of the document that was expected, a printer is printing unusual characters. What should be the next steps in solving this printer problem?
#Check the printer data cabling. If the cabling is secure on both ends, replace the print cartridge or ribbon.

2.Which printing technology uses the vibration of a crystal to control the flow of ink onto the paper to produce an image?
#piezoelectric


3.Which unit is commonly used to measure the print quality of an inkjet printer?
#DPI

4.What is the best source for a Windows-compatible scanner driver?
#website for scanner manufacturer

5.What is an advantage of using a solid-ink printer instead of an inkjet printer?
#It produces vivid color prints.

6.What are two advantages of using impact printers? (Choose two.)
#carbon-copy printing ability
#inexpensive consumables

7.What is typical of a network printer installation?
#the use of Ethernet or wireless

8.Which software converts scanned pages into text?
#Optical Character Recognition

9.Which three functions are commonly included in the all-in-one devices? (Choose three.)
#fax
#printer
#scanner

10.Which step of the laser printing process is the last step performed by a laser printer when printing a document?
#fusing

11.Which technology is used by laser printers?
#electrophotographic

12.Which two modes of operation within the IEEE 1284 standard allow bi-directional communication? (Choose two.)
#ECP
#EPP

13.Which standard governs the use of parallel printer ports?
#IEEE 1284

14.Which printer technology is used in low-cost, photo-quality printers?
#inkjet


15.Which type of printer is commonly used in stores to produce cash register receipts?
#thermal

16.A museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-quality reproduction?
#drum


17.Which software, embedded in a printer, controls how the printer operates and can be upgraded?
#firmware

18.What is the maximum number of devices that can be connected to a single FireWire interface?
#63

19.Which laser printer component is a metal cylinder that is coated with a light-sensitive insulating material?
#drum

20.Which two names refer to the IEEE 1394 standard? (Choose two.)
#FireWire
#i.Link


21.Which step of the laser printing process involves scanning the photosensitive drum with a laser?
#writing

22.Which Windows XP command sends a file named example.txt to the default printer?
#print example.txt

23.Which two Wi-Fi standards are used to provide a wireless connection between printers and computers? (Choose two.)
#802.11b
#802.11g


24.What is a common disadvantage of inkjet printers?
#The nozzles can get obstructed.

25.What laser printer component could cause streaking?
#drum

Chapter 16 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1   
A computer user cannot access the Internet. A technician, attempting to resolve the problem, can ping the proxy server, but Internet access is still denied. What is the problem?
    #The computer browser proxy server settings are wrong.

2   
What are two features of Windows Vista Backup? (Choose two.)
    #The backup files can be saved to another connected computer or server.
    #The backup files have an extension of .bkf and a maximum uncompressed file size of 200 MB.

3   
On a computer in the lab, a student can access e-mail. However, from a laptop that is owned by the student, the wireless connection to the e-mail server fails. What is the problem?
    #Windows Firewall is blocking the port that is used by the e-mail application.

4   
A network administrator has noticed that users without administrative rights are installing unauthorized applications on the Windows Vista computers. What could the administrator do to prevent the installation of these applications?
    #Reinstall the operating system and use the 64-bit version.

5   
Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
    #Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.

6   
Which encryption technology provides secure tunnels?
    #VPN

7   
A network technician has received several reports regarding missing and corrupted information on a company file server. Which course of action can the technician use to investigate any unauthorized network access?
    #Audit the event logs on the server to check for unauthorized network access.

8   
A business has a policy to automatically update and run the antivirus software on all computers each day. When is the best time to perform this security maintenance?
    #when the computers are not being used

9   
Refer to the exhibit. Which Firewall Settings tab would be used to allow an FTP connection through a Vista-based computer?
    #Advanced

10   
Which simple wireless configuration technique can make the network invisible to unauthorized users?
    #Disable SSID broadcasting.

11   
Which two file-level permissions allow a user to delete a file? (Choose two.)

    #modify
    #full control

12   
Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
    #ports
    #protocols

13   
Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
    #All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

14   
Which Windows XP command initiates a backup from the command line?
    #ntbackup
    #zip

15   
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
    #It does not impact the processing performance of the equipment it protects.
    #It is designed to protect more than one computer.

16   
What is the result of changing the default username and password on a wireless access point?
    #It reduces the chance of someone accessing the device and changing settings.

17   
A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician?
    #NTFS

18   
After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
    #the manufacturer FAQ for network devices
    #technical websites

19   
What is the default setting for Windows XP operating system updates?
    #automatic

20   
On a Windows Vista computer, which CLI command is used to repair the master boot record that has been damaged by a virus?
    #bootrec.exe/fixmbr

21   
A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
    #The computer has been infected with spyware.

22   
Which three physical security measures are employed to prevent security breaches and loss of data? (Choose three.)
    #conduit
    #card key
    #security guard

23   
The ABC Company network designers are designing the new corporate WiFi network. Which two precautions should be implemented because of security concerns with wireless networks? (Choose two.)
    #Disable broadcast of the SSID.
    #Configure WPA on access points.

24   
A student has a Windows XP laptop firewall set with the Don't Allow Exceptions option enabled. What is the consequence of setting this option?
    #No applications on an outside network are allowed access to the laptop.

25   
Which method can a technician use to make sure that only specific computers connect to a wireless router?
    #MAC address filtering

26   
A network administrator has moved encrypted files from one computer to another computer on the network and now the files are not encrypted. What does the administrator need to do to correct the problem?
    #Convert the destination computer partition to NTFS.

27   
A network administrator is trying to allow everyone access to a data folder while limiting access to individual subfolders to individuals. The administrator is having problems with all users being able to view and edit all files and folders. What should the administrator look at to solve the problem?
    #Check to see if the subfolders have inherited rights from the main folder.

28   
Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
    #security key fob

29   
A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
    #The administrator does not have the correct permissions to make the change.

Chapter 16 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1   
A computer user cannot access the Internet. A technician, attempting to resolve the problem, can ping the proxy server, but Internet access is still denied. What is the problem?
    #The computer browser proxy server settings are wrong.

2   
What are two features of Windows Vista Backup? (Choose two.)
    #The backup files can be saved to another connected computer or server.
    #The backup files have an extension of .bkf and a maximum uncompressed file size of 200 MB.

3   
On a computer in the lab, a student can access e-mail. However, from a laptop that is owned by the student, the wireless connection to the e-mail server fails. What is the problem?
    #Windows Firewall is blocking the port that is used by the e-mail application.

4   
A network administrator has noticed that users without administrative rights are installing unauthorized applications on the Windows Vista computers. What could the administrator do to prevent the installation of these applications?
    #Reinstall the operating system and use the 64-bit version.

5   
Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
    #Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.

6   
Which encryption technology provides secure tunnels?
    #VPN

7   
A network technician has received several reports regarding missing and corrupted information on a company file server. Which course of action can the technician use to investigate any unauthorized network access?
    #Audit the event logs on the server to check for unauthorized network access.

8   
A business has a policy to automatically update and run the antivirus software on all computers each day. When is the best time to perform this security maintenance?
    #when the computers are not being used

9   
Refer to the exhibit. Which Firewall Settings tab would be used to allow an FTP connection through a Vista-based computer?
    #Advanced

10   
Which simple wireless configuration technique can make the network invisible to unauthorized users?
    #Disable SSID broadcasting.

11   
Which two file-level permissions allow a user to delete a file? (Choose two.)

    #modify
    #full control

12   
Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
    #ports
    #protocols

13   
Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
    #All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

14   
Which Windows XP command initiates a backup from the command line?
    #ntbackup
    #zip

15   
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
    #It does not impact the processing performance of the equipment it protects.
    #It is designed to protect more than one computer.

16   
What is the result of changing the default username and password on a wireless access point?
    #It reduces the chance of someone accessing the device and changing settings.

17   
A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician?
    #NTFS

18   
After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
    #the manufacturer FAQ for network devices
    #technical websites

19   
What is the default setting for Windows XP operating system updates?
    #automatic

20   
On a Windows Vista computer, which CLI command is used to repair the master boot record that has been damaged by a virus?
    #bootrec.exe/fixmbr

21   
A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
    #The computer has been infected with spyware.

22   
Which three physical security measures are employed to prevent security breaches and loss of data? (Choose three.)
    #conduit
    #card key
    #security guard

23   
The ABC Company network designers are designing the new corporate WiFi network. Which two precautions should be implemented because of security concerns with wireless networks? (Choose two.)
    #Disable broadcast of the SSID.
    #Configure WPA on access points.

24   
A student has a Windows XP laptop firewall set with the Don't Allow Exceptions option enabled. What is the consequence of setting this option?
    #No applications on an outside network are allowed access to the laptop.

25   
Which method can a technician use to make sure that only specific computers connect to a wireless router?
    #MAC address filtering

26   
A network administrator has moved encrypted files from one computer to another computer on the network and now the files are not encrypted. What does the administrator need to do to correct the problem?
    #Convert the destination computer partition to NTFS.

27   
A network administrator is trying to allow everyone access to a data folder while limiting access to individual subfolders to individuals. The administrator is having problems with all users being able to view and edit all files and folders. What should the administrator look at to solve the problem?
    #Check to see if the subfolders have inherited rights from the main folder.

28   
Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
    #security key fob

29   
A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
    #The administrator does not have the correct permissions to make the change.

Chapter 9 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1  
Which three suggestions are good security password policies that a company or individual should follow? (Choose three.)
    #Passwords should have an expiration period.
    #Password lockout should be enabled.
    #A mix of letters, numbers, and other characters should be used.
  
2  
Which two characteristics describe a worm? (Choose two.)
    #Is self-replicating.
    #Travels to new computers without any intervention or knowledge of the user.

3  
Which type of program causes banners and ads to appear on the desktop without any user intervention?
    #adware
  
4  
A network administrator is looking for a technology that includes both hardware and software authentication. Which technology could the administrator use?
    #Trusted Platform Module (TPM)

5  
When setting up a new wireless access point, which basic security measure should be taken?
    #Disable SSID broadcast.
  
6  
Which best practice should be included in a password protection policy?
    #Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.
  
7  
Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux?
    #LEAP
  
8  
A bank is upgrading the hard drives in a server. What should be done to the old hard drives to permanently remove any confidential data?
    #Destroy the hard drives with a hammer.

9  
Which two statements are true about username and password standards? (Choose two.)
    #The username naming convention should be kept simple.
    #Rules about password expiration and lockout should be defined.
  
10  
A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates?
    #Create a restore point.
  
11  
A financial organization is donating computers to a local charity. What is the best method to remove all data from the hard drives in the computers?
    #Use data wiping software and delete any hard drive partitions.

12  
Which three security storage features are supported by the TPM hardware module? (Choose three.)
    #encryption keys
    #digital certificates
    #passwords

13  
A fingerprint reader is an example of which security technology?
    #biometric
  
14  
Where is the safest place to store backups?
    #locked server room
  
15  
Which type of authentication is evidenced by the use of a small chip on a card that contains user identification data such as bank account numbers and digital signatures?
    #smart card

16  
Which two items can be downloaded from the Microsoft website to help protect Windows XP? (Choose two.)
    #service packs
    #security patches
  
17  
Which threat to security uses traffic from zombie computers to overwhelm servers?
    #DDoS
  
18  
What is the preferred wireless encryption technique if the wireless clients support it?
    #WPA
  
19  
Which is the best procedure to secure a laptop left at the office while the user is away for an extended period of time?
    #Place the laptop in a locked security cage designed to store computer equipment.
  
20  
What is the best method for a company to secure data being transmitted across the Internet between remote sites?
    #Use computers secured with smartcard authentication.
  
21  
Which type of software is downloaded onto the computer of a user without the knowledge of the user and causes information about various products to be displayed on the user's monitor?
    #adware
  
22  
An attacker has managed to decode the encrypted messages of a wireless network. The network uses Windows XP and Cisco equipment. The security protocol that is used is WEP with 64-bit encryption. Which action can be recommended to the technician for securing the network?
    #Upgrade to the LEAP wireless security protocol.

23  
What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses?
    #Download the latest signature files on a regular basis.
  
24  
Which statement accurately describes the WEP standard?
    #WEP is a first generation security standard for wireless communication.
  
25  
What are two examples of malware? (Choose two.)
    #spyware
    #grayware

26  
An employee for a small company inadvertently allows a visitor to see their username and password. At home, the visitor then uses this information to gain access to the company network. This is an example of what type of threat?
    #social engineering
  
27  
An attacker claiming to be a bank representative contacts a potential victim via e-mail and requests disclosure of vital account information. Which security attack is being implemented?
    #phishing

Chapter 9 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1  
Which three suggestions are good security password policies that a company or individual should follow? (Choose three.)
    #Passwords should have an expiration period.
    #Password lockout should be enabled.
    #A mix of letters, numbers, and other characters should be used.
  
2  
Which two characteristics describe a worm? (Choose two.)
    #Is self-replicating.
    #Travels to new computers without any intervention or knowledge of the user.

3  
Which type of program causes banners and ads to appear on the desktop without any user intervention?
    #adware
  
4  
A network administrator is looking for a technology that includes both hardware and software authentication. Which technology could the administrator use?
    #Trusted Platform Module (TPM)

5  
When setting up a new wireless access point, which basic security measure should be taken?
    #Disable SSID broadcast.
  
6  
Which best practice should be included in a password protection policy?
    #Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.
  
7  
Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux?
    #LEAP
  
8  
A bank is upgrading the hard drives in a server. What should be done to the old hard drives to permanently remove any confidential data?
    #Destroy the hard drives with a hammer.

9  
Which two statements are true about username and password standards? (Choose two.)
    #The username naming convention should be kept simple.
    #Rules about password expiration and lockout should be defined.
  
10  
A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates?
    #Create a restore point.
  
11  
A financial organization is donating computers to a local charity. What is the best method to remove all data from the hard drives in the computers?
    #Use data wiping software and delete any hard drive partitions.

12  
Which three security storage features are supported by the TPM hardware module? (Choose three.)
    #encryption keys
    #digital certificates
    #passwords

13  
A fingerprint reader is an example of which security technology?
    #biometric
  
14  
Where is the safest place to store backups?
    #locked server room
  
15  
Which type of authentication is evidenced by the use of a small chip on a card that contains user identification data such as bank account numbers and digital signatures?
    #smart card

16  
Which two items can be downloaded from the Microsoft website to help protect Windows XP? (Choose two.)
    #service packs
    #security patches
  
17  
Which threat to security uses traffic from zombie computers to overwhelm servers?
    #DDoS
  
18  
What is the preferred wireless encryption technique if the wireless clients support it?
    #WPA
  
19  
Which is the best procedure to secure a laptop left at the office while the user is away for an extended period of time?
    #Place the laptop in a locked security cage designed to store computer equipment.
  
20  
What is the best method for a company to secure data being transmitted across the Internet between remote sites?
    #Use computers secured with smartcard authentication.
  
21  
Which type of software is downloaded onto the computer of a user without the knowledge of the user and causes information about various products to be displayed on the user's monitor?
    #adware
  
22  
An attacker has managed to decode the encrypted messages of a wireless network. The network uses Windows XP and Cisco equipment. The security protocol that is used is WEP with 64-bit encryption. Which action can be recommended to the technician for securing the network?
    #Upgrade to the LEAP wireless security protocol.

23  
What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses?
    #Download the latest signature files on a regular basis.
  
24  
Which statement accurately describes the WEP standard?
    #WEP is a first generation security standard for wireless communication.
  
25  
What are two examples of malware? (Choose two.)
    #spyware
    #grayware

26  
An employee for a small company inadvertently allows a visitor to see their username and password. At home, the visitor then uses this information to gain access to the company network. This is an example of what type of threat?
    #social engineering
  
27  
An attacker claiming to be a bank representative contacts a potential victim via e-mail and requests disclosure of vital account information. Which security attack is being implemented?
    #phishing

Chapter 15 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1   
Which two hazards exist when working with fiber optic cabling? (Choose two.)
    #chemicals
    #glass splinters

2   
Which safety precaution should be used when working with any type of cable?
    #Wear safety glasses when working any type of cable.

3   
ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?
    #site survey

4   
Which protocol provides secure transport of data from the company web server to remote users?
    #HTTPS

5   
When planning the network in a new building, the technician notes that the company requires cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on networks?
    #Cat5e

6   
The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.)
    #availability
    #reliability
    #speed

7   
Students on the college network need to be able to view folder names and data in files stored on the Windows-based file server, but should never be allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accessing the file server?
    #read

8   
While using nslookup, a student sees the following message: "Can’t find server name for address 127.0.0.0: timed out." What is one possible problem?
    #The computer does not have at least one entry for a DNS server configured.

9   
The network administrator has physically installed wireless NICs in three new computers. Which two additional steps will complete the installation process? (Choose two.)
    #Configure the device drivers.
    #Configure the NICs with addressing information.

10   
After booting a computer running Windows 2000, the following message displays: "The IP address already exists on another computer". Which two steps will quickly obtain a new IP address from the DHCP server? (Choose two.)
    #run ipconfig /release
    #run ipconfig /renew

11   
Which two ipconfig parameters are used within Windows XP to remove and assign the IP address previously provided by a DHCP server? (Choose two.)
    #release
    #renew

12   
Which three ports are used by SMTP, POP, and IMAP? (Choose three.)
    #25
    #110
    #143

13   
What is the purpose of an analog telephone adapter in the application of VoIP services?
    #to connect a standard analog telephone to the IP network

14   
Refer to the exhibit. The tracert command was used on the local computer to verify connectivity with a remote site. Which type of address is shown in the highlighted line of the tracert command output displayed in the exhibit?
    #default gateway for the local computer

15   
What are two ways to assign an IP address to a wireless NIC? (Choose two.)
    #Assign a static address.
    #Use DHCP.

16
In Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the browser to prompt before downloading potentially unsafe content?
    #Security

17   
What would be a disadvantage of configuring a wireless router or access point to operate only in accordance with the 802.11n protocol standard?
    #Older, legacy wireless devices may be unable to connect to the wireless network.

18   
Which two methods can be used to connect IP phones to a network? (Choose two.)
    #Connect the IP phone to the Ethernet LAN using an RJ-45 connector.
    #Establish an Internet connection then use an Analog Telephone Adapter.

19   
A company adds a few refurbished computers to a network. The company finds, however, that the refurbished computers perform significantly worse than the original networked computers performed with applications that require the transfer of data over the network. What should the company technicians do?
    #Check if the network interface cards in the computers are limited to 10 Mb/s.

20   
A textbook author needs to upload a chapter from a home computer to the FTP server of the publisher. The author uses the correct username and password, but the transfer fails. What is the most likely cause of the problem?
    #The chapter document must be compressed before transmitting to an FTP server.

21   
The network technician has been asked to share a new printer on the network using the Add Printer wizard for Windows XP. Which path should the technician use to run the Add Printer wizard?
    #Start > Control Panel > Printers and Faxes > File > Add Printer

22   
While troubleshooting a computer, the technician releases and renews the IP address. A message appears: "No operation can be performed on the adapter while its media is disconnected." What is a probable cause of the message?
    #The network cable is unplugged.

23   
A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log in to the FTP server. What is the most likely cause of the problem?
    #The employee is using an incorrect username or password.

24   
A technician is configuring a network device for remote access. Which protocol is commonly used as a secure alternative to Telnet?
    #SSH

25   
A computer user cannot access a bank using HTTPS. What is one recommended solution?
    #Enable SSL through the web browser application.

26   
Which action should a user take to ensure that personal information that is entered into a website form is not retained on the computer?
    #Delete the temporary Internet files.

27   
A technician is troubleshooting a network and finds hosts with duplicate static IP addresses. Which protocol could be used to resolve this issue?
    #DHCP

28   
A technician is working on a host computer that fails to obtain an IP address. Which three actions could the technician perform to determine the cause of the problem? (Choose three.)
    #Check the DNS server to ensure that it is operating correctly.
    #Check that the DCHP server is operational.
    #Check the PC firewall settings to make sure that DHCP is allowed.

29   
A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?
    #Ask the IT department to permit port 25 through the firewall.

30   
What are two possible causes of e-mail attachments not being received with e-mail messages? (Choose two.)
    #The firewall could be blocking port 21, with the result that attachments cannot get through.
    #The e-mail server could not be receiving e-mail messages that are using POP.

Chapter 15 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1   
Which two hazards exist when working with fiber optic cabling? (Choose two.)
    #chemicals
    #glass splinters

2   
Which safety precaution should be used when working with any type of cable?
    #Wear safety glasses when working any type of cable.

3   
ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?
    #site survey

4   
Which protocol provides secure transport of data from the company web server to remote users?
    #HTTPS

5   
When planning the network in a new building, the technician notes that the company requires cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on networks?
    #Cat5e

6   
The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.)
    #availability
    #reliability
    #speed

7   
Students on the college network need to be able to view folder names and data in files stored on the Windows-based file server, but should never be allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accessing the file server?
    #read

8   
While using nslookup, a student sees the following message: "Can’t find server name for address 127.0.0.0: timed out." What is one possible problem?
    #The computer does not have at least one entry for a DNS server configured.

9   
The network administrator has physically installed wireless NICs in three new computers. Which two additional steps will complete the installation process? (Choose two.)
    #Configure the device drivers.
    #Configure the NICs with addressing information.

10   
After booting a computer running Windows 2000, the following message displays: "The IP address already exists on another computer". Which two steps will quickly obtain a new IP address from the DHCP server? (Choose two.)
    #run ipconfig /release
    #run ipconfig /renew

11   
Which two ipconfig parameters are used within Windows XP to remove and assign the IP address previously provided by a DHCP server? (Choose two.)
    #release
    #renew

12   
Which three ports are used by SMTP, POP, and IMAP? (Choose three.)
    #25
    #110
    #143

13   
What is the purpose of an analog telephone adapter in the application of VoIP services?
    #to connect a standard analog telephone to the IP network

14   
Refer to the exhibit. The tracert command was used on the local computer to verify connectivity with a remote site. Which type of address is shown in the highlighted line of the tracert command output displayed in the exhibit?
    #default gateway for the local computer

15   
What are two ways to assign an IP address to a wireless NIC? (Choose two.)
    #Assign a static address.
    #Use DHCP.

16
In Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the browser to prompt before downloading potentially unsafe content?
    #Security

17   
What would be a disadvantage of configuring a wireless router or access point to operate only in accordance with the 802.11n protocol standard?
    #Older, legacy wireless devices may be unable to connect to the wireless network.

18   
Which two methods can be used to connect IP phones to a network? (Choose two.)
    #Connect the IP phone to the Ethernet LAN using an RJ-45 connector.
    #Establish an Internet connection then use an Analog Telephone Adapter.

19   
A company adds a few refurbished computers to a network. The company finds, however, that the refurbished computers perform significantly worse than the original networked computers performed with applications that require the transfer of data over the network. What should the company technicians do?
    #Check if the network interface cards in the computers are limited to 10 Mb/s.

20   
A textbook author needs to upload a chapter from a home computer to the FTP server of the publisher. The author uses the correct username and password, but the transfer fails. What is the most likely cause of the problem?
    #The chapter document must be compressed before transmitting to an FTP server.

21   
The network technician has been asked to share a new printer on the network using the Add Printer wizard for Windows XP. Which path should the technician use to run the Add Printer wizard?
    #Start > Control Panel > Printers and Faxes > File > Add Printer

22   
While troubleshooting a computer, the technician releases and renews the IP address. A message appears: "No operation can be performed on the adapter while its media is disconnected." What is a probable cause of the message?
    #The network cable is unplugged.

23   
A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log in to the FTP server. What is the most likely cause of the problem?
    #The employee is using an incorrect username or password.

24   
A technician is configuring a network device for remote access. Which protocol is commonly used as a secure alternative to Telnet?
    #SSH

25   
A computer user cannot access a bank using HTTPS. What is one recommended solution?
    #Enable SSL through the web browser application.

26   
Which action should a user take to ensure that personal information that is entered into a website form is not retained on the computer?
    #Delete the temporary Internet files.

27   
A technician is troubleshooting a network and finds hosts with duplicate static IP addresses. Which protocol could be used to resolve this issue?
    #DHCP

28   
A technician is working on a host computer that fails to obtain an IP address. Which three actions could the technician perform to determine the cause of the problem? (Choose three.)
    #Check the DNS server to ensure that it is operating correctly.
    #Check that the DCHP server is operational.
    #Check the PC firewall settings to make sure that DHCP is allowed.

29   
A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?
    #Ask the IT department to permit port 25 through the firewall.

30   
What are two possible causes of e-mail attachments not being received with e-mail messages? (Choose two.)
    #The firewall could be blocking port 21, with the result that attachments cannot get through.
    #The e-mail server could not be receiving e-mail messages that are using POP.

Wednesday, February 2, 2011

Homesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) REV 3

1
What is the purpose of TCP?
to manage data links and physical network transmissions
to specify the format of requests and responses that are exchanged between the client and server
*to assign the logical address and encapsulate the request into packets for routing to the destination
to provide flow control and acknowledgment of packets that are exchanged between the client and server

2
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
*NIC
video card
sound card
internal modem

3
Which type of computer has an integrated mouse?
desktop
*laptop
mainframe
server
pocket PC

4
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
switch
ISR router
*firewall appliance
standalone wireless access point

5
Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
*clean install
virtualization

6
A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
*broadcast
simulcast
multicast
unicast

7
What portion of the destination IP address is used as a packet is routed through the Internet?
*subnet mask
host portion
network portion
default gateway address

8
Which layer in the hierarchical Ethernet design model ensures that traffic between local networks will be allowed?
core layer
*access layer
network layer
distribution layer

9
What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
DSL
IAB
NAP
*SLA

10
A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
*ISP
private IP addresses for each host
static IP addresses for each host
DHCP server

11
A user is not able to connect to the network. A PC technician replaces the network cable that connects the PC to the switch port. The user is now able to connect to the network. Which troubleshooting technique did the technician use?
top-down
substitution
*divide-and-conquer
a combination of top-down and divide-and-conquer

12
What component of a personal computer is responsible for the processing of all data?
RAM
*CPU
firewall
system bus
operating system

13
Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
DHCP
FTP
SMTP
*TCP
*UDP

14
Which device is often configured to act as both a DHCP client and a DHCP server?
home PC
*ISP modem
wireless-enabled laptop
integrated services router

15



Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to establish a workgroup using private addresses?
127.0.0.1 and 127.0.0.2
*172.16.4.2 and 172.16.4.3
172.16.5.1 and 192.168.3.2
198.133.219.25 and 198.133.219.26

What are two ways that a user can interact with an operating system shell? (Choose two.)
*CLI
OS
*GUI
NIC
kernel

17
A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
Place the web server in a DMZ.
*Keep the web server on the external network.
Configure a firewall device to serve as the web server.
Locate the web server in the server farm of the internal network.
*18
Which wireless component allows wireless clients to gain access to a wired network?
PDA
STA
access point
*wireless bridge

*19
Which two statements are characteristics of DHCP services? (Choose two.)
*A DHCP client determines the lease time for using the IP address that is supplied by the DHCP server.
An integrated router acts as the DHCP server to provide the IP address to the ISP.
DHCP clients send a DHCP Discover message to the destination IP address of 255.255.255.255.
*The DHCP server maps the IP addresses to host names.
The integrated router acts as a DHCP server for internal hosts on local networks.

20
What is the correct sequence of steps in the encapsulation of TCP/IP data as it passes from a source to a destination host?

A. converts data to bits for transmission
B. packages the data for end to end transport
C. adds the data-link header and trailer
D. adds the network IP address to the header of the packet
A,B,C,D
A,C,D,B
*B,D,C,A
B,C,D,A
D,C,B,A

21



Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
*the link status LED on the front of the router
the subnet mask on the host

22
Which firewall resource could include the capability of recognizing and filtering DoS attacks?
URL filtering
application filtering
*Layer 4 packet filtering
stateful packet inspection

*23
Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
brute force
denial of service
data manipulation
*social engineering

*24
Which type of network supports DHCP and DNS services for network users in a network domain?
client/server
peer-to-peer
hierarchical
*ad hoc

*25
What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
*It prevents the display of advertisement windows.
It removes unwanted e-mail.

26
What are two best practices that are used when configuring a small home WLAN? (Choose two.)
the use of EAP
the encryption of the SSID
the use of pre-shared keys
the use of open authentication
the disabling of SSID broadcasting

27
What is a service pack?
an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
*a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues

*28
Why would a corporate web server be assigned a public IP address instead of a private IP address?
The public address can be acquired at no cost.
*The public address can be routed on the Internet.
The public address provides a security advantage.
The same public address can be used on multiple servers to prevent depletion of available IP addresses.

29
When would a LAN switch use flooding to forward a frame?
when the MAC address table is empty
when retransmissions are required after a collision
after all hosts on the network are added to the MAC table
when a frame is received from a port that is connected to a hub

30



Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts. What can be done to reduce the broadcast traffic that each host receives without compromising connectivity to the corporate servers?
Separate the switches with a router.
Create a separate VLAN for the servers and hosts.
Change from Ethernet switches to FastEthernet switches.
Increase the number of switches to reduce the number of PCs that are connected to each switch.

What are two characteristics of a MAC address? (Choose two.)
*It indicates the physical location of the host within the network.
It is dynamically assigned by a DHCP server.
*It is displayed in HEX characters.
It is a physical address.
It is cable-based.

*32
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
*The user can specify high-performance components to meet specific needs.

33
What are two examples of peripheral input devices? (Choose two.)
external modem
*barcode reader
digital camera
*plotter
printer

34
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
*DSL
dial-up
satellite
cell modem
cable modem

35
Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
FTP
*POP3
SMTP
IMAP4

36
Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
*They are accessed from a remote computer.
They are stored on the local hard disk.
*They run on the computer where they are installed.

37
What is the purpose of the ipconfig /release command?
*It forces a client to give up its current IP address.
It forces a client to give up its current MAC address.
It forces the client to clear all the MAC address to IP address associations it has learned.
It shows the current IP configuration on the client.

38
Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
DNS server
MAC address
*default gateway
operating system
wireless equipment vendor

39
A user has reported a failure to connect to the network. Based on similar calls from other users in the same location, the network technician starts troubleshooting by entering the ipconfig command on the user computer. Which troubleshooting technique is the technician using?
top-down
*bottom-up
substitution
divide-and-conquer

*40
Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
They interconnect local network segments.
They interconnect the company network to the ISP.

41



Refer to the graphic. Based on the information that is shown, what statement is true?
This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address and SSID.
*All wireless devices that are connected to this access point must have an assigned SSID of Academy.
In addition to accepting wireless client requests, this access point must connect to the wired network.

42
What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
*RF
ISM
infrared
Bluetooth

*43
Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.
*DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host computers.
DNS servers are used to translate from private addresses to public addresses.

44



Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
/*NAT
WEP

*45
What procedure will help prevent users from detecting a wireless network?
Enable WEP.
Enable MAC filtering.
Disable SSID broadcasts.
Change the default administrator password on the AP.