Showing posts with label Cisco. Show all posts
Showing posts with label Cisco. Show all posts

Wednesday, March 14, 2012

DHomesb Chapter 4 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1) Which definition describes the term Internet?
a group of PCs connected together on a LAN
a group of PCs connected together by an ISP
* a network of networks that connects countries around the world
a worldwide collection of networks controlled by a single organization

2) What type of connection point is a point of presence (POP)?
between a client and a host
between two local networks
between a computer and a switch
* between an ISP and a home-based LAN
3) What is the term for the group of high-speed data links that interconnect ISPs?
Internet LAN
ISP backbone
Internet gateways
Internet providers
* Internet backbone

4) Which device can act as a router, switch, and wireless access point in one package?
hub
bridge
modem
repeater
* ISR

5) What are three characteristics of business class ISP service? (Choose three.)
* fast connections
* extra web space
free Windows upgrade
cheapest cost available to all users
* additional e-mail accounts
replacement hardware at no cost

6) What is a major characteristic of asymmetric Internet service?
Download speeds and upload speeds are equal.
Download speeds are slower than upload speeds.
* Upload speeds and download speeds are different.
Upload speeds and download speeds are irrelevant.

7) Which three elements are required to successfully connect to the Internet? (Choose three.)
* an IP address
file sharing enabled
* a network connection
server services enabled
* access to an Internet service provider
an address obtained directly from the RIR

8) What term describes each router through which a packet travels when moving between source and destination networks?
NOC
ISP
* hop
segment

9) What does the tracert command test?
NIC functionality
the ISP bandwidth
* the network path to a destination
the destination application functionality

10) What type of end-user connectivity requires that an ISP have a DSLAM device in their network?
analog technology
cable modem technology
* digital subscriber line technology
wireless technology

11) Why would an ISP require a CMTS device on their network?
* to connect end users using cable technology
to connect end users using analog technology
to connect end users using wireless technology
to connect end users using digital subscriber line technology

12)










Refer to the graphic. What type of cabling is shown?
STP
UTP
coax
* fiber

 



13)







Refer to the graphic. What type of cabling is shown?
STP
* UTP
coax
fiber

14) Which two places are most appropriate to use UTP cabling? (Choose two.)
between buildings
* in a home office network
where EMI is an issue
in a cable TV network
* inside a school building
in a manufacturing environment with hundreds of electrical devices

15) What does adherence to cabling standards ensure?
data security
no loss of signal
no electromagnetic interference
* reliable data communications

16)










Refer to the graphic. What type of cable is shown?
* crossover
eight coax channels
multimode fiber
single-mode fiber
straight-through

17) What connector is used to terminate Ethernet unshielded twisted pair (UTP) cabling?
ST
BNC
RJ-11
* RJ-45

18) Which two characteristics describe copper patch panels? (Choose two.)
uses RJ-11 jacks
* uses RJ-45 jacks
supports only data transmissions
* allows quick rearrangements of network connections
forwards transmissions based on MAC addresses

19) What are two advantages of cable management? (Choose two.)
requires no preplanning
* aids in isolation of cabling problems
* protects cables from physical damage
provides compliance with future standards
provides a short-term solution for cable installation

20) What are two common causes of signal degradation when using UTP cabling? (Choose two.)
installing cables in conduit
* having improper termination
losing light over long distances
installing low quality cable shielding
* using low quality cables or connectors

21) What are three commonly followed standards for constructing and installing cabling? (Choose three.)
* pinouts
* cable lengths
connector color
* connector types
cost per meter (foot)


credit 

Sunday, February 12, 2012

DHomesb Chapter 1 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1
Applications can be grouped into general use software or industry specific software. What are two examples of industry specific software? (Choose two.)
an educational tool
presentation
spreadsheet
word processing
medical practice management software
database management
2
What characteristic of word processing software would make it a local application?
The application is shared between users.
The software is stored on the local hard drive.
The software is accessible through a web page.
The software has the ability to manipulate text and graphics
3
Which three terms describe different types of computers? (Choose three.)
operating system
network
laptop
desktop
Windows
mainframe
4
What are two benefits of connecting a laptop computer to a docking station? (Choose two.)
Mobility is increased.
Less power is required.
An external monitor can be used.
More wireless security options are available.
Alternate connectivity options may be available.
5
Why do servers often contain duplicate or redundant parts?
Servers require more power and thus require more components.
Servers should be accessible at all times.
Servers can be designed as standalone towers or rack mounted.
Servers are required by networking standards to have duplicate parts.
6
What measurement is commonly associated with computer processing speed?
bits
pixels
hertz
bytes
7
What are two advantages of purchasing a preassembled computer? (Choose two.)
usually a lower cost
exact components may be specified
extended waiting period for assembly
adequate for performing most general applications
suited for customers with special needs
8
A user needs to run multiple applications simultaneously on a computer. Which computer feature is important in the determination of how many simultaneous applications can be run?
amount of RAM
clock speed of CPU
driver for video card
amount of cache memory
size of hard disk
RPM speed of the hard disk
9
Which PC component is used to enable a computer system to exchange information with other systems on an Ethernet network?
NIC
serial port
parallel port
IR port
USB port
10
A computer user is interested in computer storage. Which storage device typically has the highest storage capacity?
Blu-ray disc
DVD disc
hard disk
static memory

11
Which low-cost component is designed to remove only overvoltages from a power line?
UPS
power supply
surge suppresor
extension cord that has an on/off switch
12
What two functions does a UPS provide that a surge protector does not? (Choose two.)
It protects the computer from voltage surges.
It provides backup power from an internal battery.
It protects the computer from sudden voltage spikes.
It gives the user time to phone the electrical company.
It gives the user time to safely shut down the computer if the power fails.
It provides backup power through a generator provided by the wall outlet.
13
Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine?
RAM
CPU
video card
sound card
operating system

14
What can be used to prevent electrostatic discharge (ESD)?
dry and non humid conditions
carpeted floor
grounding strap
uncluttered work space

15
Because of the potentially dangerous voltage levels, which two devices should you not open unless you have been specifically trained to work on them? (Choose two.)
mouse
printer
monitor
keyboard
hard drive
power supply

16
In newer operating systems, how are system resources assigned by default when components are installed?
manually assigned by the operating system
manually assigned by the administrator
statically assigned by the component to a preset resource
dynamically assigned between the component and the operating system

17
A user reports that a peripheral device that was installed correctly last week has not been functioning since the PC was booted today. All other PC functions are working properly. What are three things a service technician should do to solve the problem? (Choose three.)
Use the testing functionality on the peripheral itself, if available.
Verify that all cables are connected properly.
Disconnect all cables connected to the computer except those connected to the peripheral.
Ensure that the peripheral is powered on.
Disconnect the peripheral and verify that the computer is operating normally.
Reload the computer operating system.

18
Which two steps should be performed when installing a peripheral device? (Choose two.)
Download and install the most current driver.
Connect the peripheral using any cable and any available port on the computer.
Connect the peripheral using an appropriate cable or wireless connection.
Test the peripheral on another machine before installing it on the one where it will be used.
Check the computer documentation to see if the peripheral vendor is compatible with the PC vendor.

19
How is a server different from a workstation computer?
The server works as a standalone computer.
The server provides services to clients.
The workstation has fewer applications installed.
The workstation has more users who attach to it.

20
Administrators at a multicampus college need access to their schedules wherever the administrators go. Which computing device would be the most appropriate?
PDA
laptop
desktop
mainframe
gaming device

21
How many unique values are possible using a single binary digit?
1
2
4
8
9
16 





 Download full HERE

 Domain Knowledge - Weighted Score


Max Points: 44
Earned Points: 43
Percentage: 97.7%

Domain Knowledge - Binary Score
Max Points: 21
Earned Points: 20
Percentage: 95.2%


Monday, February 28, 2011

Chapter 6 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1.Which two laptop ports are used primarily for communication and network connectivity? (Choose two.)
*Ethernet
*Modem

2.Refer to the exhibit. A laptop has these graphics on specific keys on the keyboard. Which key would be used in conjunction with the Fn key to connect a laptop to an external monitor?
*F8

3.hat is the major difference between desktop and laptop motherboards?
*Desktop motherboards typically have a standard form factor and are interchangeable while laptop motherboards are proprietary.

4.During the set up of a network connection, which option can be double-clicked to configure an IP address on an Ethernet NIC?
*TCP/IP or TCP/IPv4

5.How should a hot-swappable device normally be removed from a laptop?
*Use the Safely Remove Hardware systray icon.

6.Which two characteristics make laptops a better choice than desktop computers? (Choose two.)
*Mobility
*Size

7.hich two devices can be individually configured within Windows XP to power off after the laptop has been idle for a given period of time? (Choose two.)
*Disk Drive
*Moitor

8.Which generation of cell-phone standards was the first to deal with how to send and receive text, photographs, and video?
*Third

9.Where can a technician change the power schemes on a laptop running Windows XP?
*Select Power Options from within the Control Panel.

10.What power mode is commonly known in the Windows environment as suspend mode?
*S4

11.Which type of interface do current laptops use to achieve similar expansion capabilities as desktops?
*PC Express Card

12.Refer to the exhibit. Which two form factors are supported by the devices shown in the graphic? (Choose two.)
*34
*54

13. technician is replacing a laptop SODIMM. With what component is the technician working?
*RAM

14.What is meant by a laptop device being hot-swappable?
*The laptop does not need to be powered off to install or remove the device.

15.A technician is responding to a helpdesk ticket for a laptop that has a distorted image of the Windows desktop. What is one possible solution?
*Obtain an updated display driver from the laptop manufacturer.

16.Which three components are interchangeable between desktop and laptop computers? (Choose three.
*Printer *Scanner *USB Drive

17.Which internal laptop component may be designed as a hot-swappable device?
*Optical Drive

18.Refer to the exhibit. What is the correct order of steps to remove a laptop battery?
*2341

19.Which two actions should be performed to clean the surface of CDs and DVDs? (Choose two.)
*Use a lint-free cotton cloth.
*Wipe the disc from the center outward.

20. Which display technology is most commonly found in modern laptop computers?
*LCD

21.A technician has been called in to troubleshoot a laptop that fails to power on. The technician repeatedly pushes the power button without any results. What should the technician do next?
*Attach the AC adapter.

22.Which Windows XP or Vista control panel is used to reduce power when the computer has not been used by anyone for an hour?
*Power Options

23.What feature is provided by an auto-switching power supply on a laptop?
*The laptop can switch from AC input power or battery-provided power instantaneously.

24.Which three components commonly connect to USB or FireWire ports? (Choose three.)
*Camera *Printer *Scanner

25.Which option within the Windows Control Panel is used to install a modem?
*Phone and Modem Options

26.Which name is given to the collection of settings that control the power settings of a laptop?
*Power schemes

27.What is the proper way to clean optical drives?
*Use a cleaning disc for optical drives.

28.Which two devices are commonly hot-swappable on laptops? (Choose two.)
*PC Card
*USB Drive

Good luck :)

Chapter 6 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1.Which two laptop ports are used primarily for communication and network connectivity? (Choose two.)
*Ethernet
*Modem

2.Refer to the exhibit. A laptop has these graphics on specific keys on the keyboard. Which key would be used in conjunction with the Fn key to connect a laptop to an external monitor?
*F8

3.hat is the major difference between desktop and laptop motherboards?
*Desktop motherboards typically have a standard form factor and are interchangeable while laptop motherboards are proprietary.

4.During the set up of a network connection, which option can be double-clicked to configure an IP address on an Ethernet NIC?
*TCP/IP or TCP/IPv4

5.How should a hot-swappable device normally be removed from a laptop?
*Use the Safely Remove Hardware systray icon.

6.Which two characteristics make laptops a better choice than desktop computers? (Choose two.)
*Mobility
*Size

7.hich two devices can be individually configured within Windows XP to power off after the laptop has been idle for a given period of time? (Choose two.)
*Disk Drive
*Moitor

8.Which generation of cell-phone standards was the first to deal with how to send and receive text, photographs, and video?
*Third

9.Where can a technician change the power schemes on a laptop running Windows XP?
*Select Power Options from within the Control Panel.

10.What power mode is commonly known in the Windows environment as suspend mode?
*S4

11.Which type of interface do current laptops use to achieve similar expansion capabilities as desktops?
*PC Express Card

12.Refer to the exhibit. Which two form factors are supported by the devices shown in the graphic? (Choose two.)
*34
*54

13. technician is replacing a laptop SODIMM. With what component is the technician working?
*RAM

14.What is meant by a laptop device being hot-swappable?
*The laptop does not need to be powered off to install or remove the device.

15.A technician is responding to a helpdesk ticket for a laptop that has a distorted image of the Windows desktop. What is one possible solution?
*Obtain an updated display driver from the laptop manufacturer.

16.Which three components are interchangeable between desktop and laptop computers? (Choose three.
*Printer *Scanner *USB Drive

17.Which internal laptop component may be designed as a hot-swappable device?
*Optical Drive

18.Refer to the exhibit. What is the correct order of steps to remove a laptop battery?
*2341

19.Which two actions should be performed to clean the surface of CDs and DVDs? (Choose two.)
*Use a lint-free cotton cloth.
*Wipe the disc from the center outward.

20. Which display technology is most commonly found in modern laptop computers?
*LCD

21.A technician has been called in to troubleshoot a laptop that fails to power on. The technician repeatedly pushes the power button without any results. What should the technician do next?
*Attach the AC adapter.

22.Which Windows XP or Vista control panel is used to reduce power when the computer has not been used by anyone for an hour?
*Power Options

23.What feature is provided by an auto-switching power supply on a laptop?
*The laptop can switch from AC input power or battery-provided power instantaneously.

24.Which three components commonly connect to USB or FireWire ports? (Choose three.)
*Camera *Printer *Scanner

25.Which option within the Windows Control Panel is used to install a modem?
*Phone and Modem Options

26.Which name is given to the collection of settings that control the power settings of a laptop?
*Power schemes

27.What is the proper way to clean optical drives?
*Use a cleaning disc for optical drives.

28.Which two devices are commonly hot-swappable on laptops? (Choose two.)
*PC Card
*USB Drive

Good luck :)

Thursday, February 17, 2011

Final Exam for ch 1-10 - IT Essentials: PC Hardware and Software (Version 4.1)

1
A computer user buys a low priced replacement monitor but finds that there is a lot of flicker. The flicker makes the monitor unusable. Which characteristic of a monitor needs to be considered to ensure flicker-free viewing?
#refresh rate

2
When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages?
#D

3
A technician notices that a data floppy disk is in the floppy disk drive of a computer when it is powered on. Which error message could this potentially cause?
#invalid system disk

4
What characterizes spoofing?
#Making data appear to come from a source other than the actual source.

5
When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?
#BIOS reads the MBR.

6
When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumables. Which two consumables are associated with an inkjet printer? (Choose two.)
#ink cartridge
#paper

7
Which protocol adds security to remote connections?
#SSH

8
What is the purpose of an IRQ?
#Request information from the CPU.

9
A wireless LAN is being deployed inside the new park ranger, one room office that is located at the highest part of the national park. When the testing was completed, the technicians reported that occasionally, the wireless LAN signal is affected by some type of interference. What are two possible causes of the signal distortion? (Choose two.)
#the number of wireless devices that are used in the wireless LAN
#the large number of trees that surround the office

10
When installing a service pack or security patches on an operating system, what should be done to protect the system in the event of a faulty or aborted installation?
#Create a restore point.

11
A technician is asked to wire a network that supports CSMA/CD. Which architecture and physical topology should the technician use for supporting this access control method?
#Ethernet and Star

12
What is the best way to fully ensure that data is unable to be recovered from a hard drive?
#shattering the hard drive platters with a hammer

13
A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?
#System Registry

14
A printer has a paper jam. An impatient user has sent multiple print jobs of the same document to this printer. What can be done to remove these print jobs?
#Cancel the jobs in the printer queue.

15
ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?
#RAID adapter

16
A call center technician has asked a customer to perform a simple operation to fix a problem on a computer. The customer seems unable to perform the task. What should the technician do?
#Determine whether the customer would prefer to receive the instructions in another form, such as e-mailed, illustrated written instructions.

17
Which two technologies enable printers to be accessed by multiple network users? (Choose two.)
#Wi-Fi
#Ethernet

18
A user reports that a printer is printing unknown characters on documents. What is a possible solution to this issue?
#Uninstall and reinstall the printer driver.

19
Which network device uses a MAC address table to segment the network?
#router

20
A technician needs to configure the hard drive on a computer so that there appears to be one drive for the operating system and four drives for data from different applications. How can the hard drive be configured to provide this perception?
#Create one primary partition and one logical partition with four logical drives within it.

21
A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?
#The technician interrupted a number of times to ask questions.

22
A technician is troubleshooting a user complaint that a printer is not printing a report. Which step is one of the first that the technician should take?
#Check the Device Manager on the user computer for hardware problems.

23
Which Registry file contains information about all software that is installed on a Windows XP computer?
#HKEY_LOCAL_MACHINE

24
A hacker is detected using commonly available wireless hacking tools to access encrypted wireless network communication. Which resolution would prevent this action?
#Change the SSID that is being used on the wireless network.

25
Which two general precautions should be taken before replacing any non-hot-swappable laptop component? (Choose two.)
#Disconnect the power cord.
#Remove any batteries.

26
Which power mode should be used by a laptop so that all the data is saved, all the applications the user was working on are left open, and there is no power used by the laptop?
#Hibernate

27
What is the purpose of SCSI and RAID adapters?
#to connect storage devices such as hard disk drives to a PC

28
Which network protocol is used to automatically assign an IP address to a computer on a network?
#DHCP

29
A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files are missing. What should the customer do next?
#Restore the data files that were backed up in preparation for the conversion.

30
Which two components normally require a laptop to be powered down and the battery removed before removing the components? (Choose two.)
#internal hard drive
#RAM

31
A customer reports that after using a computer for over a year, the computer now takes more time to access the files. Which management tool can be used first, before any other complex procedure?
#defrag

32
A customer needs to purchase a new power supply for a computer. What must be considered when selecting an appropriate power supply?
#The power supply has sufficient wattage to support all components inside the computer.

33
What is a benefit of using the USB or FireWire ports to connect peripherals to a laptop?
#The peripherals can be plugged in and out without turning the laptop off.

34
A small business has used a high quality configurable flatbed scanner to scan a number of photographs to print as large posters. However, the quality of the images printed as posters is poor. What should the user do?
#Increase the resolution of the scanner.

35
A user has been writing data to a USB flash memory drive. What should the user do before removing the device?
#Click on the Safely Remove Hardware icon in the system tray then on the device.

36
A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can only receive a response from local workstations. What could be causing the problem?
#The default gateway is not set.

37
A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)
#Inkjet printers are less expensive than laser printers.
#The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.

38
A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack?
#ping of death

39
A technician wants to create a new partition on a new additional hard drive. Which tool should be used?
#Disk Management

40
Which two quick solutions are commonly recommended when a technician is troubleshooting a laptop? (Choose two.)
#Reboot the laptop.
#Disconnect the peripherals.

41
A company uses a single computer to receive and test all Windows updates. When the most recent update was installed, several programs failed. What is the first course of action that a technician should attempt to remove the update?
#Run a System Restore from the last restore point.

42
A mobile training room uses a generator to power the PCs, servers, and printers. The company that runs the room upgraded the equipment but then found that when all the devices are powered up they become unreliable, with some PCs shutting down. What may cause this power problem?
#The power consumption of all devices is too much for the electrical circuit that is provided.

43
When installing the Windows XP operating system, a technician is given a choice of file systems to use. If security is a requirement, which file system should be chosen?
#NTFS

44
A technician has replaced a failing floppy drive. While testing the new drive, the technician notices that the floppy drive light remains lit constantly. What is most likely the cause of the problem?
#The ribbon cable is installed incorrectly.

45
Which two types of connectors can be found on DVI cables? (Choose two.)




46
Which Windows tool should be run before upgrading the operating system?
#Ntbackup

47
The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver?
#manufacturer's website

48
Where can a user change the idle time after which a laptop will switch to standby mode?
#Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.

49
A home computer owner has a PC system that runs Windows XP. For security reasons the owner has been using a limited local user account for a number of years. The owner wishes to install a new piece of software, but the user account does not have the necessary permissions. Which type of account does the owner need to use to install the new software?
#administrator

50
A student enables file sharing on a laptop so that a friend can access music files. Which type of service is being configured?
#peer-to-peer

51
What do the terms refresh rate, interlace, and aspect ratio explain?
#image properties of a monitor

52
A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and diagnostic utilities. Where would the technician set the boot order for the PC?
#BIOS

Final Exam for ch 1-10 - IT Essentials: PC Hardware and Software (Version 4.1)

1
A computer user buys a low priced replacement monitor but finds that there is a lot of flicker. The flicker makes the monitor unusable. Which characteristic of a monitor needs to be considered to ensure flicker-free viewing?
#refresh rate

2
When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages?
#D

3
A technician notices that a data floppy disk is in the floppy disk drive of a computer when it is powered on. Which error message could this potentially cause?
#invalid system disk

4
What characterizes spoofing?
#Making data appear to come from a source other than the actual source.

5
When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?
#BIOS reads the MBR.

6
When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumables. Which two consumables are associated with an inkjet printer? (Choose two.)
#ink cartridge
#paper

7
Which protocol adds security to remote connections?
#SSH

8
What is the purpose of an IRQ?
#Request information from the CPU.

9
A wireless LAN is being deployed inside the new park ranger, one room office that is located at the highest part of the national park. When the testing was completed, the technicians reported that occasionally, the wireless LAN signal is affected by some type of interference. What are two possible causes of the signal distortion? (Choose two.)
#the number of wireless devices that are used in the wireless LAN
#the large number of trees that surround the office

10
When installing a service pack or security patches on an operating system, what should be done to protect the system in the event of a faulty or aborted installation?
#Create a restore point.

11
A technician is asked to wire a network that supports CSMA/CD. Which architecture and physical topology should the technician use for supporting this access control method?
#Ethernet and Star

12
What is the best way to fully ensure that data is unable to be recovered from a hard drive?
#shattering the hard drive platters with a hammer

13
A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?
#System Registry

14
A printer has a paper jam. An impatient user has sent multiple print jobs of the same document to this printer. What can be done to remove these print jobs?
#Cancel the jobs in the printer queue.

15
ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?
#RAID adapter

16
A call center technician has asked a customer to perform a simple operation to fix a problem on a computer. The customer seems unable to perform the task. What should the technician do?
#Determine whether the customer would prefer to receive the instructions in another form, such as e-mailed, illustrated written instructions.

17
Which two technologies enable printers to be accessed by multiple network users? (Choose two.)
#Wi-Fi
#Ethernet

18
A user reports that a printer is printing unknown characters on documents. What is a possible solution to this issue?
#Uninstall and reinstall the printer driver.

19
Which network device uses a MAC address table to segment the network?
#router

20
A technician needs to configure the hard drive on a computer so that there appears to be one drive for the operating system and four drives for data from different applications. How can the hard drive be configured to provide this perception?
#Create one primary partition and one logical partition with four logical drives within it.

21
A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?
#The technician interrupted a number of times to ask questions.

22
A technician is troubleshooting a user complaint that a printer is not printing a report. Which step is one of the first that the technician should take?
#Check the Device Manager on the user computer for hardware problems.

23
Which Registry file contains information about all software that is installed on a Windows XP computer?
#HKEY_LOCAL_MACHINE

24
A hacker is detected using commonly available wireless hacking tools to access encrypted wireless network communication. Which resolution would prevent this action?
#Change the SSID that is being used on the wireless network.

25
Which two general precautions should be taken before replacing any non-hot-swappable laptop component? (Choose two.)
#Disconnect the power cord.
#Remove any batteries.

26
Which power mode should be used by a laptop so that all the data is saved, all the applications the user was working on are left open, and there is no power used by the laptop?
#Hibernate

27
What is the purpose of SCSI and RAID adapters?
#to connect storage devices such as hard disk drives to a PC

28
Which network protocol is used to automatically assign an IP address to a computer on a network?
#DHCP

29
A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files are missing. What should the customer do next?
#Restore the data files that were backed up in preparation for the conversion.

30
Which two components normally require a laptop to be powered down and the battery removed before removing the components? (Choose two.)
#internal hard drive
#RAM

31
A customer reports that after using a computer for over a year, the computer now takes more time to access the files. Which management tool can be used first, before any other complex procedure?
#defrag

32
A customer needs to purchase a new power supply for a computer. What must be considered when selecting an appropriate power supply?
#The power supply has sufficient wattage to support all components inside the computer.

33
What is a benefit of using the USB or FireWire ports to connect peripherals to a laptop?
#The peripherals can be plugged in and out without turning the laptop off.

34
A small business has used a high quality configurable flatbed scanner to scan a number of photographs to print as large posters. However, the quality of the images printed as posters is poor. What should the user do?
#Increase the resolution of the scanner.

35
A user has been writing data to a USB flash memory drive. What should the user do before removing the device?
#Click on the Safely Remove Hardware icon in the system tray then on the device.

36
A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can only receive a response from local workstations. What could be causing the problem?
#The default gateway is not set.

37
A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)
#Inkjet printers are less expensive than laser printers.
#The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.

38
A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack?
#ping of death

39
A technician wants to create a new partition on a new additional hard drive. Which tool should be used?
#Disk Management

40
Which two quick solutions are commonly recommended when a technician is troubleshooting a laptop? (Choose two.)
#Reboot the laptop.
#Disconnect the peripherals.

41
A company uses a single computer to receive and test all Windows updates. When the most recent update was installed, several programs failed. What is the first course of action that a technician should attempt to remove the update?
#Run a System Restore from the last restore point.

42
A mobile training room uses a generator to power the PCs, servers, and printers. The company that runs the room upgraded the equipment but then found that when all the devices are powered up they become unreliable, with some PCs shutting down. What may cause this power problem?
#The power consumption of all devices is too much for the electrical circuit that is provided.

43
When installing the Windows XP operating system, a technician is given a choice of file systems to use. If security is a requirement, which file system should be chosen?
#NTFS

44
A technician has replaced a failing floppy drive. While testing the new drive, the technician notices that the floppy drive light remains lit constantly. What is most likely the cause of the problem?
#The ribbon cable is installed incorrectly.

45
Which two types of connectors can be found on DVI cables? (Choose two.)




46
Which Windows tool should be run before upgrading the operating system?
#Ntbackup

47
The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver?
#manufacturer's website

48
Where can a user change the idle time after which a laptop will switch to standby mode?
#Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.

49
A home computer owner has a PC system that runs Windows XP. For security reasons the owner has been using a limited local user account for a number of years. The owner wishes to install a new piece of software, but the user account does not have the necessary permissions. Which type of account does the owner need to use to install the new software?
#administrator

50
A student enables file sharing on a laptop so that a friend can access music files. Which type of service is being configured?
#peer-to-peer

51
What do the terms refresh rate, interlace, and aspect ratio explain?
#image properties of a monitor

52
A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and diagnostic utilities. Where would the technician set the boot order for the PC?
#BIOS

Thursday, February 3, 2011

Chapter 7 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

Chapter 7 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1.Instead of the document that was expected, a printer is printing unusual characters. What should be the next steps in solving this printer problem?
#Check the printer data cabling. If the cabling is secure on both ends, replace the print cartridge or ribbon.

2.Which printing technology uses the vibration of a crystal to control the flow of ink onto the paper to produce an image?
#piezoelectric


3.Which unit is commonly used to measure the print quality of an inkjet printer?
#DPI

4.What is the best source for a Windows-compatible scanner driver?
#website for scanner manufacturer

5.What is an advantage of using a solid-ink printer instead of an inkjet printer?
#It produces vivid color prints.

6.What are two advantages of using impact printers? (Choose two.)
#carbon-copy printing ability
#inexpensive consumables

7.What is typical of a network printer installation?
#the use of Ethernet or wireless

8.Which software converts scanned pages into text?
#Optical Character Recognition

9.Which three functions are commonly included in the all-in-one devices? (Choose three.)
#fax
#printer
#scanner

10.Which step of the laser printing process is the last step performed by a laser printer when printing a document?
#fusing

11.Which technology is used by laser printers?
#electrophotographic

12.Which two modes of operation within the IEEE 1284 standard allow bi-directional communication? (Choose two.)
#ECP
#EPP

13.Which standard governs the use of parallel printer ports?
#IEEE 1284

14.Which printer technology is used in low-cost, photo-quality printers?
#inkjet


15.Which type of printer is commonly used in stores to produce cash register receipts?
#thermal

16.A museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-quality reproduction?
#drum


17.Which software, embedded in a printer, controls how the printer operates and can be upgraded?
#firmware

18.What is the maximum number of devices that can be connected to a single FireWire interface?
#63

19.Which laser printer component is a metal cylinder that is coated with a light-sensitive insulating material?
#drum

20.Which two names refer to the IEEE 1394 standard? (Choose two.)
#FireWire
#i.Link


21.Which step of the laser printing process involves scanning the photosensitive drum with a laser?
#writing

22.Which Windows XP command sends a file named example.txt to the default printer?
#print example.txt

23.Which two Wi-Fi standards are used to provide a wireless connection between printers and computers? (Choose two.)
#802.11b
#802.11g


24.What is a common disadvantage of inkjet printers?
#The nozzles can get obstructed.

25.What laser printer component could cause streaking?
#drum

Chapter 7 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

Chapter 7 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1.Instead of the document that was expected, a printer is printing unusual characters. What should be the next steps in solving this printer problem?
#Check the printer data cabling. If the cabling is secure on both ends, replace the print cartridge or ribbon.

2.Which printing technology uses the vibration of a crystal to control the flow of ink onto the paper to produce an image?
#piezoelectric


3.Which unit is commonly used to measure the print quality of an inkjet printer?
#DPI

4.What is the best source for a Windows-compatible scanner driver?
#website for scanner manufacturer

5.What is an advantage of using a solid-ink printer instead of an inkjet printer?
#It produces vivid color prints.

6.What are two advantages of using impact printers? (Choose two.)
#carbon-copy printing ability
#inexpensive consumables

7.What is typical of a network printer installation?
#the use of Ethernet or wireless

8.Which software converts scanned pages into text?
#Optical Character Recognition

9.Which three functions are commonly included in the all-in-one devices? (Choose three.)
#fax
#printer
#scanner

10.Which step of the laser printing process is the last step performed by a laser printer when printing a document?
#fusing

11.Which technology is used by laser printers?
#electrophotographic

12.Which two modes of operation within the IEEE 1284 standard allow bi-directional communication? (Choose two.)
#ECP
#EPP

13.Which standard governs the use of parallel printer ports?
#IEEE 1284

14.Which printer technology is used in low-cost, photo-quality printers?
#inkjet


15.Which type of printer is commonly used in stores to produce cash register receipts?
#thermal

16.A museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-quality reproduction?
#drum


17.Which software, embedded in a printer, controls how the printer operates and can be upgraded?
#firmware

18.What is the maximum number of devices that can be connected to a single FireWire interface?
#63

19.Which laser printer component is a metal cylinder that is coated with a light-sensitive insulating material?
#drum

20.Which two names refer to the IEEE 1394 standard? (Choose two.)
#FireWire
#i.Link


21.Which step of the laser printing process involves scanning the photosensitive drum with a laser?
#writing

22.Which Windows XP command sends a file named example.txt to the default printer?
#print example.txt

23.Which two Wi-Fi standards are used to provide a wireless connection between printers and computers? (Choose two.)
#802.11b
#802.11g


24.What is a common disadvantage of inkjet printers?
#The nozzles can get obstructed.

25.What laser printer component could cause streaking?
#drum

Chapter 16 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1   
A computer user cannot access the Internet. A technician, attempting to resolve the problem, can ping the proxy server, but Internet access is still denied. What is the problem?
    #The computer browser proxy server settings are wrong.

2   
What are two features of Windows Vista Backup? (Choose two.)
    #The backup files can be saved to another connected computer or server.
    #The backup files have an extension of .bkf and a maximum uncompressed file size of 200 MB.

3   
On a computer in the lab, a student can access e-mail. However, from a laptop that is owned by the student, the wireless connection to the e-mail server fails. What is the problem?
    #Windows Firewall is blocking the port that is used by the e-mail application.

4   
A network administrator has noticed that users without administrative rights are installing unauthorized applications on the Windows Vista computers. What could the administrator do to prevent the installation of these applications?
    #Reinstall the operating system and use the 64-bit version.

5   
Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
    #Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.

6   
Which encryption technology provides secure tunnels?
    #VPN

7   
A network technician has received several reports regarding missing and corrupted information on a company file server. Which course of action can the technician use to investigate any unauthorized network access?
    #Audit the event logs on the server to check for unauthorized network access.

8   
A business has a policy to automatically update and run the antivirus software on all computers each day. When is the best time to perform this security maintenance?
    #when the computers are not being used

9   
Refer to the exhibit. Which Firewall Settings tab would be used to allow an FTP connection through a Vista-based computer?
    #Advanced

10   
Which simple wireless configuration technique can make the network invisible to unauthorized users?
    #Disable SSID broadcasting.

11   
Which two file-level permissions allow a user to delete a file? (Choose two.)

    #modify
    #full control

12   
Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
    #ports
    #protocols

13   
Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
    #All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

14   
Which Windows XP command initiates a backup from the command line?
    #ntbackup
    #zip

15   
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
    #It does not impact the processing performance of the equipment it protects.
    #It is designed to protect more than one computer.

16   
What is the result of changing the default username and password on a wireless access point?
    #It reduces the chance of someone accessing the device and changing settings.

17   
A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician?
    #NTFS

18   
After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
    #the manufacturer FAQ for network devices
    #technical websites

19   
What is the default setting for Windows XP operating system updates?
    #automatic

20   
On a Windows Vista computer, which CLI command is used to repair the master boot record that has been damaged by a virus?
    #bootrec.exe/fixmbr

21   
A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
    #The computer has been infected with spyware.

22   
Which three physical security measures are employed to prevent security breaches and loss of data? (Choose three.)
    #conduit
    #card key
    #security guard

23   
The ABC Company network designers are designing the new corporate WiFi network. Which two precautions should be implemented because of security concerns with wireless networks? (Choose two.)
    #Disable broadcast of the SSID.
    #Configure WPA on access points.

24   
A student has a Windows XP laptop firewall set with the Don't Allow Exceptions option enabled. What is the consequence of setting this option?
    #No applications on an outside network are allowed access to the laptop.

25   
Which method can a technician use to make sure that only specific computers connect to a wireless router?
    #MAC address filtering

26   
A network administrator has moved encrypted files from one computer to another computer on the network and now the files are not encrypted. What does the administrator need to do to correct the problem?
    #Convert the destination computer partition to NTFS.

27   
A network administrator is trying to allow everyone access to a data folder while limiting access to individual subfolders to individuals. The administrator is having problems with all users being able to view and edit all files and folders. What should the administrator look at to solve the problem?
    #Check to see if the subfolders have inherited rights from the main folder.

28   
Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
    #security key fob

29   
A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
    #The administrator does not have the correct permissions to make the change.

Chapter 16 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1   
A computer user cannot access the Internet. A technician, attempting to resolve the problem, can ping the proxy server, but Internet access is still denied. What is the problem?
    #The computer browser proxy server settings are wrong.

2   
What are two features of Windows Vista Backup? (Choose two.)
    #The backup files can be saved to another connected computer or server.
    #The backup files have an extension of .bkf and a maximum uncompressed file size of 200 MB.

3   
On a computer in the lab, a student can access e-mail. However, from a laptop that is owned by the student, the wireless connection to the e-mail server fails. What is the problem?
    #Windows Firewall is blocking the port that is used by the e-mail application.

4   
A network administrator has noticed that users without administrative rights are installing unauthorized applications on the Windows Vista computers. What could the administrator do to prevent the installation of these applications?
    #Reinstall the operating system and use the 64-bit version.

5   
Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
    #Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.

6   
Which encryption technology provides secure tunnels?
    #VPN

7   
A network technician has received several reports regarding missing and corrupted information on a company file server. Which course of action can the technician use to investigate any unauthorized network access?
    #Audit the event logs on the server to check for unauthorized network access.

8   
A business has a policy to automatically update and run the antivirus software on all computers each day. When is the best time to perform this security maintenance?
    #when the computers are not being used

9   
Refer to the exhibit. Which Firewall Settings tab would be used to allow an FTP connection through a Vista-based computer?
    #Advanced

10   
Which simple wireless configuration technique can make the network invisible to unauthorized users?
    #Disable SSID broadcasting.

11   
Which two file-level permissions allow a user to delete a file? (Choose two.)

    #modify
    #full control

12   
Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
    #ports
    #protocols

13   
Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
    #All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

14   
Which Windows XP command initiates a backup from the command line?
    #ntbackup
    #zip

15   
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
    #It does not impact the processing performance of the equipment it protects.
    #It is designed to protect more than one computer.

16   
What is the result of changing the default username and password on a wireless access point?
    #It reduces the chance of someone accessing the device and changing settings.

17   
A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician?
    #NTFS

18   
After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
    #the manufacturer FAQ for network devices
    #technical websites

19   
What is the default setting for Windows XP operating system updates?
    #automatic

20   
On a Windows Vista computer, which CLI command is used to repair the master boot record that has been damaged by a virus?
    #bootrec.exe/fixmbr

21   
A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
    #The computer has been infected with spyware.

22   
Which three physical security measures are employed to prevent security breaches and loss of data? (Choose three.)
    #conduit
    #card key
    #security guard

23   
The ABC Company network designers are designing the new corporate WiFi network. Which two precautions should be implemented because of security concerns with wireless networks? (Choose two.)
    #Disable broadcast of the SSID.
    #Configure WPA on access points.

24   
A student has a Windows XP laptop firewall set with the Don't Allow Exceptions option enabled. What is the consequence of setting this option?
    #No applications on an outside network are allowed access to the laptop.

25   
Which method can a technician use to make sure that only specific computers connect to a wireless router?
    #MAC address filtering

26   
A network administrator has moved encrypted files from one computer to another computer on the network and now the files are not encrypted. What does the administrator need to do to correct the problem?
    #Convert the destination computer partition to NTFS.

27   
A network administrator is trying to allow everyone access to a data folder while limiting access to individual subfolders to individuals. The administrator is having problems with all users being able to view and edit all files and folders. What should the administrator look at to solve the problem?
    #Check to see if the subfolders have inherited rights from the main folder.

28   
Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
    #security key fob

29   
A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
    #The administrator does not have the correct permissions to make the change.