SlideShare uma empresa Scribd logo
1 de 9
http://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.html




1
A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being
added to the queue while the printer is being repaired?
– Stop the print spooler.


2
For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.)
– regional settings
– network settings


3
Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent
updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
– 443


4
A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and
the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choose
two.)
– The monitor cable connector is loose or disconnected because the retaining screws are missing.
– The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter.


5
Which Windows hard drive partition is referred to as the C: drive?
– the first primary partition


6
A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards
based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
– USB 2.0 is one hundred times as fast as USB 1.1.


7
Which feature is characteristic of the ntbackup command?
– It is used create restore points.


8
Which safety precaution should an installer take when installing cable in the ceiling of a building?
– Wear safety glasses in case of encountering toxic materials during the installation.


9
Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control
measure provides the most secure solution for employee identification?
– biometric devices


10
Which Startup type must be selected for a service that should run each time the computer is booted?
– automatic


11
What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.)
– The computer displays an “Invalid Boot Disk” error after POST.
– The computer displays an “Inaccessible Boot Device” error after POST


12
Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is
attached to the purchase order so the correct item can be bought.


Which type of memory module is the IT department expecting to receive?
– SODIMM


13
Which recommendation should be observed when replacing existing memory?
– The new memory should be as fast or faster than existing memory.


14
Refer to the exhibit. Which utility has the IT department started on each computer?
– Defragment


15
A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse
pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem?
– Start the Vista Aero enhanced display features by launching services.msc.


16
The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures
data traveling across the public Internet as if it were traveling across the corporate LAN?
– VPN


17
When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
– thermal compound


18
Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)
– 25
– 110
– 143


19
A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a
technician create the restore point?
– Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.


20
Which two hazards are related to fiber optic installations? (Choose two.)
– light that can burn the eyes
– glass splinters that can penetrate the skin


21
A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?
– SCSI (Ultra-320)


22
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology
requires that every node is attached to every other node on the network?
– mesh


23
What is the highest risk associated with improperly charged or mishandled batteries?
– The battery can explode.


24
Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive?
– 3 logical, 1 extended, 1 free space, 1 primary
25
Which two characteristics describe a software firewall? (Choose two.)
– It typically protects only the computer it is installed on.
– It uses the CPU in the host computer.


26
What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.)
– These cables usually have 9 pins or 25 pins on both ends.
– The two available operative modes are EPP and ECP.


27
Which action should be taken first if a card key is lost or stolen?
– Disable the lost card key.


28
A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically
whenever the computer is started. What can the technician do to resolve this problem?
– Change the startup type for the utility to Automatic in Services.


29
The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the
manager take to hide the WLAN id from any access point?
– Disable the broadcast of the SSID on the access point.


30
The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the
problem?
– Defragment the hard disk.


31
A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem?
(Choose two.)
– Clean the surface of the touchpad.
– Ensure that the operating system has the correct driver for the touchpad.


32
Refer to the exhibit. Based on the information shown, which statement is true?
– The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87.


33
Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this
motherboard?
– The Intel Core i7 processor supports a maximum bus speed of 1600MHz.


34
Which interface can transfer data at a maximum speed of 480 Mbps?
– USB 2.0


35
A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type
of memory should be installed?
– RAM
1
A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being
added to the queue while the printer is being repaired?
– Stop the print spooler.
2
For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.)
– regional settings
– network settings
3
Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent
updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
– 443
4
A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and
the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choose
two.)
– The monitor cable connector is loose or disconnected because the retaining screws are missing.
– The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter.
5
Which Windows hard drive partition is referred to as the C: drive?
– the first primary partition
6
A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards
based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
– USB 2.0 is one hundred times as fast as USB 1.1.
7
Which feature is characteristic of the ntbackup command?
– It is used create restore points.
8
Which safety precaution should an installer take when installing cable in the ceiling of a building?
– Wear safety glasses in case of encountering toxic materials during the installation.
9
Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control
measure provides the most secure solution for employee identification?
– biometric devices
10
Which Startup type must be selected for a service that should run each time the computer is booted?
– automatic
11
What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.)
– The computer displays an “Invalid Boot Disk” error after POST.
– The computer displays an “Inaccessible Boot Device” error after POST
12
Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is
attached to the purchase order so the correct item can be bought.
Which type of memory module is the IT department expecting to receive?
– SODIMM
13
Which recommendation should be observed when replacing existing memory?
– The new memory should be as fast or faster than existing memory.
14
Refer to the exhibit. Which utility has the IT department started on each computer?
– Defragment
15
A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse
pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem?
– Start the Vista Aero enhanced display features by launching services.msc.
16
The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures
data traveling across the public Internet as if it were traveling across the corporate LAN?
– VPN
17
When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
– thermal compound
18
Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)
– 25
– 110
– 143
19
A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a
technician create the restore point?
– Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.
20
Which two hazards are related to fiber optic installations? (Choose two.)
– light that can burn the eyes
– glass splinters that can penetrate the skin
21
A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?
– SCSI (Ultra-320)
22
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology
requires that every node is attached to every other node on the network?
– mesh
23
What is the highest risk associated with improperly charged or mishandled batteries?
– The battery can explode.
24
Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive?
– 3 logical, 1 extended, 1 free space, 1 primary
25
Which two characteristics describe a software firewall? (Choose two.)
– It typically protects only the computer it is installed on.
– It uses the CPU in the host computer.
26
What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.)
– These cables usually have 9 pins or 25 pins on both ends.
– The two available operative modes are EPP and ECP.
27
Which action should be taken first if a card key is lost or stolen?
– Disable the lost card key.
28
A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically
whenever the computer is started. What can the technician do to resolve this problem?
– Change the startup type for the utility to Automatic in Services.
29
The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the
manager take to hide the WLAN id from any access point?
– Disable the broadcast of the SSID on the access point.
30
The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the
problem?
– Defragment the hard disk.
31
A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem?
(Choose two.)
– Clean the surface of the touchpad.
– Ensure that the operating system has the correct driver for the touchpad.
32
Refer to the exhibit. Based on the information shown, which statement is true?
– The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87.
33
Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this
motherboard?
– The Intel Core i7 processor supports a maximum bus speed of 1600MHz.
34
Which interface can transfer data at a maximum speed of 480 Mbps?
– USB 2.0
35
A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type
of memory should be installed?
– RAM




What is one advantage of a solid state drive?
– less prone to failure than a traditional drive
2
A customer has spilled some liquid into the laptop keyboard. The laptop appears to function properly except for the keys. After cleaning the
keyboard, the technician tests the keyboard and it still has failing keys. What are two possible actions the technician could take? (Choose two.)
– Replace the keyboard.
– Use an external keyboard until the laptop keyboard is replaced
3
A user mentions that the Photoshop application has been recently installed on a laptop and that the laptop runs slowly when Photoshop is running.
The computer technician checks on the laptop and notices that while the laptop responds normally when it is being used to surf the web, the hard
disk light is constantly on when Photoshop is running. What is the most likely cause of the excessive hard disk activity?
– disk fragmentation
4
Which authentication technology uses a physical characteristic of the user in conjunction with a password?
– biometrics
5
A junior technician finds preventive maintenance very boring and would prefer to fix real problems. However, what is the most important reason for
the company that the preventive maintenance be done?
– Preventive maintenance helps to protect the computer equipment against future problems.
6
A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when
transporting the heavy printer to the service area? (Choose two.)
– Avoid lifting the equipment using the strength in your back
– Lift the equipment using the strength in your legs and knees
7
Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for the
authentication to be accepted?
– smart key
8
The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range
technologies can support these types of devices? (Choose two.)
– Bluetooth
– Infrared
9
Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.)
– Disabling SSID broadcasts.
– Configuring MAC address filtering.
10
What is the issue if the status of a hard disk drive shows as “Unreadable” in the Disk Management utility?
– The drive has input/output errors, has a hardware failure, or is corrupt.
11
A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the
technician follow?
– Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.
12
After checking that a new ink jet printer has new ink cartridges, that dry paper has been installed as recommended by manufacturer, and that the
latest printer driver has been installed, a technician notes that the printer still fails to produce any output. Which three actions could possibly
resolve this problem? (Choose three.)
– Check and secure the cables.
– Set the printer to Resume Printing.
– Ensure that the printer is powered on.
13
A technician has installed new RAM in a laptop. When restarted the laptop emitted a long beep. What are two possible causes and solutions for
this problem? (Choose two.)
– The laptop BIOS should be upgraded when installing the RAM.
– The new RAM is defective and must be replaced.
14
A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type
of security should be implemented to block employees from accessing these suspicious websites?
– phishing protection
15
A user is experiencing problems with a new removable external drive. What two checks should a technician perform to ensure that a removable
external drive will be recognized by a computer? (Choose two.)
– Ensure that the correct drivers are installed.
– Check that the external ports are enabled in the BIOS settings.
16
A temporary user is trying to log in to a computer that the same user used last month, but now is unable to complete the login process. What are
two possible causes of the failed login? (Choose two.)
The user does not have the rights to log in.
– The user account has been disabled.
– The user is using an incorrect username or password.
17
A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without adding
networking devices?
– 330 ft (100 m)
18
What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?
– Change the settings of the Index service in the Advanced Options panel.
19
What is the purpose of the setupmgr.exe file?
– It helps prepare an answer file to automate the installation of Windows XP.
20
A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the
technician do to reset the monitor settings?
– Use the F8 key.
21
A laptop less than six months old shuts down after about 30 minutes of operation. When the AC power adapter is connected, the laptop continues
to shutdown after a short period of operation each time the laptop is restarted. What should be recommended as a solution?
– The laptop power scheme is set to an unsuitable environment. Have the customer adjust the power scheme through the control panel.
22
Which external connection technology would a technician choose for a customer who wants to connect a device capable of a data transfer rate of
700 Mb/s to a computer?
– IEEE 1394b (Firewire)
23
A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots
up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?
– Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.
24
A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC and monitor are turned on,
the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC.
What possible problem should the technician investigate first?
– The monitor was damaged during cleaning.
25
What is different about the default location for user files in Windows Vista compared to Windows XP?
– The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.
26
In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all pings in the class fail?
-The Windows firewall is blocking the ping.
27
Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The computer has the internal and
external ports listed in the exhibit. Which solution would be the best if optimal performance is the deciding factor?
-Attach a hard drive to an internal SATA port.
28
Why does a technician wear an antistatic wrist strap?
-to prevent damage to electronic components inside the computer
29
A technician uses an application to capture packets on the network. One such capture reveals the password that is used by a person in the
classroom to initiate a Telnet session with a school network device. What recommendation could the technician make to the person who is using
Telnet?
-If possible, enable the network device to use SSH instead of Telnet.
30
Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in
a branch office?
-Remote Desktop Protocol
31
A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the
purpose of this utility?
-It prepares a computer for imaging.
32
A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a newer video adapter?
-Is there an available compatible expansion slot on the motherboard?
33
A customer requires a computer storage system that uses no more than two drives to provide drive redundancy and the highest possible
performance. Which type of RAID should the technician install?
-RAID level 0 – data striping
34
Which would be a reason to update the BIOS of a computer?
-A computer being prepared for an upgrade is found to lack support for newer hardware devices
35
Which statement best describes how telephone calls are carried over data networks and the Internet?
-Analog voice signals are converted into digital information that is transported in IP packets
36
Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail?
(Choose two.)
-The unattend.txt file is corrupted
-The network shared folder that holds the OS files is not accessible.
37
A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to
assume ownership of the shared folder. Which permission should the administrator assign to the user?
-modify
38
A technician is working on a networked computer that has an IP address of 169.254.25.66 and no Internet access. What could the technician do to
remedy the problem?
-Reload TCP/IP on the computer.

Mais conteúdo relacionado

Mais procurados

Embedded System Design latest
Embedded System Design latestEmbedded System Design latest
Embedded System Design latestDeepak Chouhan
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded SystemsSandeep Reddy
 
It Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers
It Essentials (Version 7.0) A+ Cert Practice Exam 1 AnswersIt Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers
It Essentials (Version 7.0) A+ Cert Practice Exam 1 AnswersITExamAnswers.net
 
Embedded systems ppt
Embedded systems pptEmbedded systems ppt
Embedded systems pptShreya Thakur
 
Embedded system design: a modern approach to the electronic design.
Embedded system design: a modern approach to the electronic design.Embedded system design: a modern approach to the electronic design.
Embedded system design: a modern approach to the electronic design.Massimo Talia
 
Embedded system and development
Embedded system and developmentEmbedded system and development
Embedded system and developmentRajani Bhandari
 
Introduction to embedded systems
Introduction to embedded systemsIntroduction to embedded systems
Introduction to embedded systemsEslamSaid16
 
Embedded Systems Implementation and Applications
Embedded Systems Implementation and ApplicationsEmbedded Systems Implementation and Applications
Embedded Systems Implementation and ApplicationsKaushik Padmanabhan
 
Embedded Software Development
Embedded Software DevelopmentEmbedded Software Development
Embedded Software DevelopmentSanjay Kumar
 
Embedded System
Embedded SystemEmbedded System
Embedded Systemsurendar
 
Embedded Systems Overview
Embedded Systems OverviewEmbedded Systems Overview
Embedded Systems OverviewSameer Rapate
 

Mais procurados (19)

Ppt on embedded systems
Ppt on embedded systemsPpt on embedded systems
Ppt on embedded systems
 
Embedded System Design latest
Embedded System Design latestEmbedded System Design latest
Embedded System Design latest
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded Systems
 
Embedded system introduction
Embedded system introductionEmbedded system introduction
Embedded system introduction
 
It Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers
It Essentials (Version 7.0) A+ Cert Practice Exam 1 AnswersIt Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers
It Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers
 
Chapter # 1
Chapter # 1Chapter # 1
Chapter # 1
 
Embedded System
Embedded SystemEmbedded System
Embedded System
 
Embedded systems ppt
Embedded systems pptEmbedded systems ppt
Embedded systems ppt
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
Embedded system design: a modern approach to the electronic design.
Embedded system design: a modern approach to the electronic design.Embedded system design: a modern approach to the electronic design.
Embedded system design: a modern approach to the electronic design.
 
Embedded systems ppt
Embedded systems pptEmbedded systems ppt
Embedded systems ppt
 
Embedded system and development
Embedded system and developmentEmbedded system and development
Embedded system and development
 
Introduction to embedded systems
Introduction to embedded systemsIntroduction to embedded systems
Introduction to embedded systems
 
Embedded Systems Implementation and Applications
Embedded Systems Implementation and ApplicationsEmbedded Systems Implementation and Applications
Embedded Systems Implementation and Applications
 
Embedded Software Development
Embedded Software DevelopmentEmbedded Software Development
Embedded Software Development
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Embedded System
Embedded SystemEmbedded System
Embedded System
 
Embedded System Presentation
Embedded System PresentationEmbedded System Presentation
Embedded System Presentation
 
Embedded Systems Overview
Embedded Systems OverviewEmbedded Systems Overview
Embedded Systems Overview
 

Destaque

Brown_Working with Teachers Project
Brown_Working with Teachers ProjectBrown_Working with Teachers Project
Brown_Working with Teachers ProjectHall2b13
 
SharePoint Saturday STL: SharePoint Powershell Admins
SharePoint Saturday STL: SharePoint Powershell AdminsSharePoint Saturday STL: SharePoint Powershell Admins
SharePoint Saturday STL: SharePoint Powershell AdminsKenneth Maglio
 
William fabricio manual de sistemas sas
William fabricio manual de sistemas sasWilliam fabricio manual de sistemas sas
William fabricio manual de sistemas sasRafael Toro
 
Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...
Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...
Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...Fjulkaiseminen
 
Kerberos: The Four Letter Word
Kerberos: The Four Letter WordKerberos: The Four Letter Word
Kerberos: The Four Letter WordKenneth Maglio
 
Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...
Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...
Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...Fjulkaiseminen
 
Plagio por Internet -UFT DIPLOMADO SAIA
Plagio por Internet -UFT DIPLOMADO SAIAPlagio por Internet -UFT DIPLOMADO SAIA
Plagio por Internet -UFT DIPLOMADO SAIARafael Toro
 
SharePoint 2013 App or Not to App
SharePoint 2013 App or Not to AppSharePoint 2013 App or Not to App
SharePoint 2013 App or Not to AppKenneth Maglio
 

Destaque (10)

Brown_Working with Teachers Project
Brown_Working with Teachers ProjectBrown_Working with Teachers Project
Brown_Working with Teachers Project
 
SharePoint Saturday STL: SharePoint Powershell Admins
SharePoint Saturday STL: SharePoint Powershell AdminsSharePoint Saturday STL: SharePoint Powershell Admins
SharePoint Saturday STL: SharePoint Powershell Admins
 
William fabricio manual de sistemas sas
William fabricio manual de sistemas sasWilliam fabricio manual de sistemas sas
William fabricio manual de sistemas sas
 
Approaches
ApproachesApproaches
Approaches
 
Raadseltjevoormannen!1
Raadseltjevoormannen!1Raadseltjevoormannen!1
Raadseltjevoormannen!1
 
Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...
Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...
Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...
 
Kerberos: The Four Letter Word
Kerberos: The Four Letter WordKerberos: The Four Letter Word
Kerberos: The Four Letter Word
 
Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...
Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...
Fjulkaiseminen.com - Ilmainen, koko sivu Facebook julkaiseminen - Organisaati...
 
Plagio por Internet -UFT DIPLOMADO SAIA
Plagio por Internet -UFT DIPLOMADO SAIAPlagio por Internet -UFT DIPLOMADO SAIA
Plagio por Internet -UFT DIPLOMADO SAIA
 
SharePoint 2013 App or Not to App
SharePoint 2013 App or Not to AppSharePoint 2013 App or Not to App
SharePoint 2013 App or Not to App
 

Semelhante a Template 3

I T4 Ehapter 1,2,3,5,6,7&8
I  T4  Ehapter 1,2,3,5,6,7&8I  T4  Ehapter 1,2,3,5,6,7&8
I T4 Ehapter 1,2,3,5,6,7&8Meth Mut
 
Ccna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 AnswersCcna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 Answersccna4discovery
 
IT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam AnswersIT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam AnswersITExamAnswers.net
 
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersITExamAnswers.net
 
Data Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time ApplicationsData Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time Applicationsijsrd.com
 
IT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 7 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 7 Exam AnswersITExamAnswers.net
 
Design and Development of ARM9 Based Embedded Web Server
Design and Development of ARM9 Based Embedded Web ServerDesign and Development of ARM9 Based Embedded Web Server
Design and Development of ARM9 Based Embedded Web ServerIJERA Editor
 
Outdoor LED Billboard IPC --- function introduction
Outdoor LED Billboard IPC --- function introductionOutdoor LED Billboard IPC --- function introduction
Outdoor LED Billboard IPC --- function introductionMax Dan
 
Unified Computing System - PC Without CPU
Unified Computing System - PC Without CPUUnified Computing System - PC Without CPU
Unified Computing System - PC Without CPUErAnalSalshingikar
 
Cisco discovery d homesb module 2 - v.4 in english.
Cisco discovery   d homesb module 2 - v.4 in english.Cisco discovery   d homesb module 2 - v.4 in english.
Cisco discovery d homesb module 2 - v.4 in english.igede tirtanata
 
ProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docxProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docxwoodruffeloisa
 
Chs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioningChs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioningAdolfo Nasol
 
Chs nc2 reviewer - with oral questioning 0
Chs nc2 reviewer - with oral questioning 0Chs nc2 reviewer - with oral questioning 0
Chs nc2 reviewer - with oral questioning 0ronan213
 
Microprocessors and microcontrollers
Microprocessors and microcontrollersMicroprocessors and microcontrollers
Microprocessors and microcontrollersAditya Porwal
 
Cisco discovery d homesb module 1 - v.4 in english.
Cisco discovery   d homesb module 1 - v.4 in english.Cisco discovery   d homesb module 1 - v.4 in english.
Cisco discovery d homesb module 1 - v.4 in english.igede tirtanata
 
Network Management Card User Manual-en.pdf
Network Management Card User Manual-en.pdfNetwork Management Card User Manual-en.pdf
Network Management Card User Manual-en.pdfLuongVanLoi1
 
Computer Systems Servicing COC1-COC2
Computer Systems Servicing COC1-COC2Computer Systems Servicing COC1-COC2
Computer Systems Servicing COC1-COC2melody77776
 

Semelhante a Template 3 (20)

I T4 Ehapter 1,2,3,5,6,7&8
I  T4  Ehapter 1,2,3,5,6,7&8I  T4  Ehapter 1,2,3,5,6,7&8
I T4 Ehapter 1,2,3,5,6,7&8
 
Ccna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 AnswersCcna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 Answers
 
IT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam AnswersIT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam Answers
 
19EICN
19EICN19EICN
19EICN
 
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
 
Data Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time ApplicationsData Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time Applications
 
IT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 7 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers
 
ITE7_Chp3.pptx
ITE7_Chp3.pptxITE7_Chp3.pptx
ITE7_Chp3.pptx
 
Design and Development of ARM9 Based Embedded Web Server
Design and Development of ARM9 Based Embedded Web ServerDesign and Development of ARM9 Based Embedded Web Server
Design and Development of ARM9 Based Embedded Web Server
 
Outdoor LED Billboard IPC --- function introduction
Outdoor LED Billboard IPC --- function introductionOutdoor LED Billboard IPC --- function introduction
Outdoor LED Billboard IPC --- function introduction
 
Unified Computing System - PC Without CPU
Unified Computing System - PC Without CPUUnified Computing System - PC Without CPU
Unified Computing System - PC Without CPU
 
Current System
Current SystemCurrent System
Current System
 
Cisco discovery d homesb module 2 - v.4 in english.
Cisco discovery   d homesb module 2 - v.4 in english.Cisco discovery   d homesb module 2 - v.4 in english.
Cisco discovery d homesb module 2 - v.4 in english.
 
ProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docxProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docx
 
Chs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioningChs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioning
 
Chs nc2 reviewer - with oral questioning 0
Chs nc2 reviewer - with oral questioning 0Chs nc2 reviewer - with oral questioning 0
Chs nc2 reviewer - with oral questioning 0
 
Microprocessors and microcontrollers
Microprocessors and microcontrollersMicroprocessors and microcontrollers
Microprocessors and microcontrollers
 
Cisco discovery d homesb module 1 - v.4 in english.
Cisco discovery   d homesb module 1 - v.4 in english.Cisco discovery   d homesb module 1 - v.4 in english.
Cisco discovery d homesb module 1 - v.4 in english.
 
Network Management Card User Manual-en.pdf
Network Management Card User Manual-en.pdfNetwork Management Card User Manual-en.pdf
Network Management Card User Manual-en.pdf
 
Computer Systems Servicing COC1-COC2
Computer Systems Servicing COC1-COC2Computer Systems Servicing COC1-COC2
Computer Systems Servicing COC1-COC2
 

Template 3

  • 1. http://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.html 1 A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired? – Stop the print spooler. 2 For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.) – regional settings – network settings 3 Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem? – 443 4 A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choose two.) – The monitor cable connector is loose or disconnected because the retaining screws are missing. – The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter. 5 Which Windows hard drive partition is referred to as the C: drive? – the first primary partition 6 A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship? – USB 2.0 is one hundred times as fast as USB 1.1. 7 Which feature is characteristic of the ntbackup command? – It is used create restore points. 8 Which safety precaution should an installer take when installing cable in the ceiling of a building? – Wear safety glasses in case of encountering toxic materials during the installation. 9 Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification? – biometric devices 10 Which Startup type must be selected for a service that should run each time the computer is booted? – automatic 11 What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.) – The computer displays an “Invalid Boot Disk” error after POST. – The computer displays an “Inaccessible Boot Device” error after POST 12 Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is
  • 2. attached to the purchase order so the correct item can be bought. Which type of memory module is the IT department expecting to receive? – SODIMM 13 Which recommendation should be observed when replacing existing memory? – The new memory should be as fast or faster than existing memory. 14 Refer to the exhibit. Which utility has the IT department started on each computer? – Defragment 15 A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem? – Start the Vista Aero enhanced display features by launching services.msc. 16 The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN? – VPN 17 When upgrading a CPU what must be applied between the new CPU and the heat sink/fan? – thermal compound 18 Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.) – 25 – 110 – 143 19 A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point? – Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point. 20 Which two hazards are related to fiber optic installations? (Choose two.) – light that can burn the eyes – glass splinters that can penetrate the skin 21 A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data? – SCSI (Ultra-320) 22 A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? – mesh 23 What is the highest risk associated with improperly charged or mishandled batteries? – The battery can explode. 24 Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive? – 3 logical, 1 extended, 1 free space, 1 primary
  • 3. 25 Which two characteristics describe a software firewall? (Choose two.) – It typically protects only the computer it is installed on. – It uses the CPU in the host computer. 26 What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.) – These cables usually have 9 pins or 25 pins on both ends. – The two available operative modes are EPP and ECP. 27 Which action should be taken first if a card key is lost or stolen? – Disable the lost card key. 28 A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem? – Change the startup type for the utility to Automatic in Services. 29 The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point? – Disable the broadcast of the SSID on the access point. 30 The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem? – Defragment the hard disk. 31 A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem? (Choose two.) – Clean the surface of the touchpad. – Ensure that the operating system has the correct driver for the touchpad. 32 Refer to the exhibit. Based on the information shown, which statement is true? – The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87. 33 Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this motherboard? – The Intel Core i7 processor supports a maximum bus speed of 1600MHz. 34 Which interface can transfer data at a maximum speed of 480 Mbps? – USB 2.0 35 A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed? – RAM
  • 4. 1 A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired? – Stop the print spooler. 2 For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.) – regional settings – network settings 3 Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem? – 443 4 A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choose two.) – The monitor cable connector is loose or disconnected because the retaining screws are missing. – The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter. 5 Which Windows hard drive partition is referred to as the C: drive? – the first primary partition 6 A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship? – USB 2.0 is one hundred times as fast as USB 1.1. 7 Which feature is characteristic of the ntbackup command? – It is used create restore points. 8 Which safety precaution should an installer take when installing cable in the ceiling of a building? – Wear safety glasses in case of encountering toxic materials during the installation. 9 Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification? – biometric devices 10 Which Startup type must be selected for a service that should run each time the computer is booted? – automatic 11 What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.) – The computer displays an “Invalid Boot Disk” error after POST. – The computer displays an “Inaccessible Boot Device” error after POST 12 Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought. Which type of memory module is the IT department expecting to receive? – SODIMM 13 Which recommendation should be observed when replacing existing memory? – The new memory should be as fast or faster than existing memory.
  • 5. 14 Refer to the exhibit. Which utility has the IT department started on each computer? – Defragment 15 A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem? – Start the Vista Aero enhanced display features by launching services.msc. 16 The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN? – VPN 17 When upgrading a CPU what must be applied between the new CPU and the heat sink/fan? – thermal compound 18 Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.) – 25 – 110 – 143 19 A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point? – Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point. 20 Which two hazards are related to fiber optic installations? (Choose two.) – light that can burn the eyes – glass splinters that can penetrate the skin 21 A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data? – SCSI (Ultra-320) 22 A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? – mesh 23 What is the highest risk associated with improperly charged or mishandled batteries? – The battery can explode. 24 Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive? – 3 logical, 1 extended, 1 free space, 1 primary 25 Which two characteristics describe a software firewall? (Choose two.) – It typically protects only the computer it is installed on. – It uses the CPU in the host computer. 26 What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.) – These cables usually have 9 pins or 25 pins on both ends. – The two available operative modes are EPP and ECP.
  • 6. 27 Which action should be taken first if a card key is lost or stolen? – Disable the lost card key. 28 A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem? – Change the startup type for the utility to Automatic in Services. 29 The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point? – Disable the broadcast of the SSID on the access point. 30 The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem? – Defragment the hard disk. 31 A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem? (Choose two.) – Clean the surface of the touchpad. – Ensure that the operating system has the correct driver for the touchpad. 32 Refer to the exhibit. Based on the information shown, which statement is true? – The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87. 33 Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this motherboard? – The Intel Core i7 processor supports a maximum bus speed of 1600MHz. 34 Which interface can transfer data at a maximum speed of 480 Mbps? – USB 2.0 35 A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed? – RAM What is one advantage of a solid state drive? – less prone to failure than a traditional drive 2 A customer has spilled some liquid into the laptop keyboard. The laptop appears to function properly except for the keys. After cleaning the keyboard, the technician tests the keyboard and it still has failing keys. What are two possible actions the technician could take? (Choose two.) – Replace the keyboard. – Use an external keyboard until the laptop keyboard is replaced 3 A user mentions that the Photoshop application has been recently installed on a laptop and that the laptop runs slowly when Photoshop is running. The computer technician checks on the laptop and notices that while the laptop responds normally when it is being used to surf the web, the hard disk light is constantly on when Photoshop is running. What is the most likely cause of the excessive hard disk activity? – disk fragmentation
  • 7. 4 Which authentication technology uses a physical characteristic of the user in conjunction with a password? – biometrics 5 A junior technician finds preventive maintenance very boring and would prefer to fix real problems. However, what is the most important reason for the company that the preventive maintenance be done? – Preventive maintenance helps to protect the computer equipment against future problems. 6 A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.) – Avoid lifting the equipment using the strength in your back – Lift the equipment using the strength in your legs and knees 7 Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for the authentication to be accepted? – smart key 8 The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.) – Bluetooth – Infrared 9 Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.) – Disabling SSID broadcasts. – Configuring MAC address filtering. 10 What is the issue if the status of a hard disk drive shows as “Unreadable” in the Disk Management utility? – The drive has input/output errors, has a hardware failure, or is corrupt. 11 A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow? – Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services. 12 After checking that a new ink jet printer has new ink cartridges, that dry paper has been installed as recommended by manufacturer, and that the latest printer driver has been installed, a technician notes that the printer still fails to produce any output. Which three actions could possibly resolve this problem? (Choose three.) – Check and secure the cables. – Set the printer to Resume Printing. – Ensure that the printer is powered on. 13 A technician has installed new RAM in a laptop. When restarted the laptop emitted a long beep. What are two possible causes and solutions for this problem? (Choose two.) – The laptop BIOS should be upgraded when installing the RAM. – The new RAM is defective and must be replaced. 14 A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites? – phishing protection 15 A user is experiencing problems with a new removable external drive. What two checks should a technician perform to ensure that a removable
  • 8. external drive will be recognized by a computer? (Choose two.) – Ensure that the correct drivers are installed. – Check that the external ports are enabled in the BIOS settings. 16 A temporary user is trying to log in to a computer that the same user used last month, but now is unable to complete the login process. What are two possible causes of the failed login? (Choose two.) The user does not have the rights to log in. – The user account has been disabled. – The user is using an incorrect username or password. 17 A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without adding networking devices? – 330 ft (100 m) 18 What could be the possible solution to the Windows Vista search feature taking longer than expected to find results? – Change the settings of the Index service in the Advanced Options panel. 19 What is the purpose of the setupmgr.exe file? – It helps prepare an answer file to automate the installation of Windows XP. 20 A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings? – Use the F8 key. 21 A laptop less than six months old shuts down after about 30 minutes of operation. When the AC power adapter is connected, the laptop continues to shutdown after a short period of operation each time the laptop is restarted. What should be recommended as a solution? – The laptop power scheme is set to an unsuitable environment. Have the customer adjust the power scheme through the control panel. 22 Which external connection technology would a technician choose for a customer who wants to connect a device capable of a data transfer rate of 700 Mb/s to a computer? – IEEE 1394b (Firewire) 23 A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file? – Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit. 24 A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC and monitor are turned on, the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC. What possible problem should the technician investigate first? – The monitor was damaged during cleaning. 25 What is different about the default location for user files in Windows Vista compared to Windows XP? – The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder. 26 In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all pings in the class fail? -The Windows firewall is blocking the ping. 27 Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The computer has the internal and external ports listed in the exhibit. Which solution would be the best if optimal performance is the deciding factor? -Attach a hard drive to an internal SATA port.
  • 9. 28 Why does a technician wear an antistatic wrist strap? -to prevent damage to electronic components inside the computer 29 A technician uses an application to capture packets on the network. One such capture reveals the password that is used by a person in the classroom to initiate a Telnet session with a school network device. What recommendation could the technician make to the person who is using Telnet? -If possible, enable the network device to use SSH instead of Telnet. 30 Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office? -Remote Desktop Protocol 31 A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility? -It prepares a computer for imaging. 32 A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a newer video adapter? -Is there an available compatible expansion slot on the motherboard? 33 A customer requires a computer storage system that uses no more than two drives to provide drive redundancy and the highest possible performance. Which type of RAID should the technician install? -RAID level 0 – data striping 34 Which would be a reason to update the BIOS of a computer? -A computer being prepared for an upgrade is found to lack support for newer hardware devices 35 Which statement best describes how telephone calls are carried over data networks and the Internet? -Analog voice signals are converted into digital information that is transported in IP packets 36 Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.) -The unattend.txt file is corrupted -The network shared folder that holds the OS files is not accessible. 37 A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user? -modify 38 A technician is working on a networked computer that has an IP address of 169.254.25.66 and no Internet access. What could the technician do to remedy the problem? -Reload TCP/IP on the computer.