أحدث الأخبار
Loading...

الأربعاء، 9 مايو 2012

Final Exam 2012






أعلى النموذج
Which two general precautions should be taken before replacing any non-hot-swappable laptop component? (Choose two.)
Disconnect the power cord.
Keep any component in a plastic bag until installation.
Remove any batteries.
Use carpets in cool areas.
Wear rubber-soled shoes to work with the computer.
أسفل النموذج
What is a benefit of using the USB or FireWire ports to connect peripherals to a laptop?

The peripherals can be plugged in and out without turning the laptop off.

Data transfer is more controlled than using the parallel or serial ports.

The peripherals do not need drivers to communicate with the OS.

Connections are much more reliable.







أعلى النموذج
A user is reporting that a new external hard drive is defective. The laptop will allow access to the drive at times, and then will report that the drive cannot be found. Upon an initial examination of the laptop, it is discovered that the user has ten USB devices connected to the laptop.

What is the best quick solution to this problem?
Remove all the peripherals except the hard drive and observe the results.
Move the laptop to another location and observe the results.
Replace the power adapter and observe the results.
Replace the USB hub and observe the results.
Flash the BIOS on the laptop and observe the results.
أسفل النموذج

أعلى النموذج
Which power mode should be used by a laptop so that all the data is saved, all the applications the user was working on are left open, and there is no power used by the laptop?
Hibernate
Suspend
Left on with no power mode
Soft shutdown
أسفل النموذج

أعلى النموذج
ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?
NIC
Wireless NIC
USB gateway
RAID adapter
multiple slave hard disk adapter
أسفل النموذج
أعلى النموذج
Which Windows tool should be run before upgrading the operating system?
Convert
Fdisk
Msconfig
Ntbackup
أسفل النموذج




أعلى النموذج
When installing the Windows XP operating system, a technician is given a choice of file systems to use. If security is a requirement, which file system should be chosen?
FAT32
HPFS
NFS
NTFS
أسفل النموذج

أعلى النموذج
A computer can access devices on the same network but can not access devices on other networks. What is the probable cause of this problem?
The cable is not connected properly to the NIC.
The computer has an invalid IP address.
The computer has an incorrect subnet mask.
The computer has an invalid default gateway address.
أسفل النموذج

أعلى النموذج
The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver?
manufacturer's website
Microsoft Update website
printer installation disk
Windows Device Manager
Windows hardware profiles
أسفل النموذج
A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and diagnostic utilities. Where would the technician set the boot order for the PC?

My Computer

Control Panel

Device Manager

BIOS

Start Menu







أعلى النموذج
A customer is angry and calls to complain that the service scheduled on his computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?
Verify that the computer is working properly now.
Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer.
Explain that the repair technician sent to perform the repair is inexperienced.
Put the customer on hold until a supervisor is available.
أسفل النموذج

أعلى النموذج
Which two quick solutions are commonly recommended when a technician is troubleshooting a laptop? (Choose two.)
Reboot the laptop.
Reinstall the operating system.
Disconnect the peripherals.
Have the customer verify the problem.
Call a level-2 technician.
أسفل النموذج

أعلى النموذج
When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?
BIOS reads the MBR.
NTDETECT.COM is used to detect any installed hardware.
NTDLR reads the registry files.
The WINLOGON.EXE program is started.
أسفل النموذج
A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack?

multi-ping attack

phishing

ping bomb

ping of death

spoofing

zombie attack






أعلى النموذج
Which two types of connectors can be found on DVI cables? (Choose two.)






-
أعلى النموذج
A customer needs to purchase a new power supply for a computer. What must be considered when selecting an appropriate power supply?
The power supply converts DC to AC.
The power supply has sufficient wattage to support all components inside the computer.
The power supply provides at least 800 V.
The power supply must have both a P-8 and P-9 connector.



أعلى النموذج
Which motherboard feature controls the amount of data that a CPU transfers at one time?
pin grid array
front side bus
MMX instructions
read-only memory
أسفل النموذج
أعلى النموذج
A customer reports that after using a computer for over a year, the computer now takes more time to access the files. Which management tool can be used first, before any other complex procedure?
fdisk
format
defrag
disk management
system file checker
-

أعلى النموذج
A technician is designing a hardware preventive maintenance plan for a company. Which strategy should be included in the plan?
Avoid performing maintenance operations on plug and play devices that are controlled by the operating system.
Only clean equipment that is requested by the customer.
Omit performing maintenance operations on components until the equipment malfunction.
Schedule and document routine maintenance tasks.
أسفل النموذج

أعلى النموذج
When installing a service pack or security patches on an operating system, what should be done to protect the system in the event of a faulty or aborted installation?
Create a restore point.
Check the updates for the latest ones.
Disable Automatic Updates to prevent interference with the current operation.
Test all aspects to ensure that the update is correct for the operating system.
أسفل النموذج
أعلى النموذج
A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file?
Defrag
CHKDSK
MSCONFIG
REGEDIT.EXE
-

أعلى النموذج
A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?
LAN
MAN
WAN
WLAN
أسفل النموذج



أعلى النموذج
A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files are missing. What should the customer do next?
Run convertFAT32.exe.
Restore the data files that were backed up in preparation for the conversion.
Reset the file attribute to show hidden files.
Restart the computer after updating the hard drive to FAT32.
أسفل النموذج

أعلى النموذج
A technician is asked to set up one hard drive that will support two operating systems and will store data files in three separate drive locations. Which partition settings will support these requirements?
1 primary, 3 active, 1 extended, 2 logical
2 logical, 2 active, 3 extended
2 primary, 1 active, 1 extended, 3 logical
3 primary, 1 active, 2 extended
أسفل النموذج
A technician notices that a data floppy disk is in the floppy disk drive of a computer when it is powered on. Which error message could this potentially cause?

device / service failed to start

floppy disk corrupted

invalid system disk

corrupted driver





-

أعلى النموذج
A technician is asked to wire a network that supports CSMA/CD. Which architecture and physical topology should the technician use for supporting this access control method?
Ethernet and Star
FDDI and Ring
Token Ring and Double Ring
Wireless and Ring
أسفل النموذج

أعلى النموذج
A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)
Inkjet printers are less expensive than laser printers.
A laser printer is significantly slower than an inkjet printer.
Both laser and inkjet printers produce poor quality images.
The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.
Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.
أسفل النموذج
The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?

APIPA

DHCP

DIPS

ICMP





-

أعلى النموذج
Which two computer components can be used to permanently store data? (Choose two.)
1 MB of L2 cache
320 GB SATA hard drive
3 GB DDR2 RAM
1919 MB of TurboCache
8x Multi-format DVD+ R/RW drive
أسفل النموذج

Refer to the exhibit. A Cisco Networking Academy instructor is trying to print a flash graphic from the curriculum. The print job has gone into the print queue as shown. Based on the output, what should be the next step in solving this problem?

Check the printer for status messages.

Restart the computer.

Upgrade the printer driver.

Reinstall the printer driver.

Check the printer cabling and power.





-
A directly-attached printer has always failed to work. Print jobs and the printer test page fail to print, but the printer self-test page prints OK. If the cabling is installed correctly, what is most likely the problem?
a dry print cartridge
an incorrect printer driver
an outdated system BIOS
a missing Windows service pack

---------------------------------------------------
Which measures can help control RFI effects?
Ensure the humidity and temperature levels are set as low as possible.
Ensure the number of wireless NICs exceeds the number of wireless phones.
Ensure the wireless network is on a different frequency than the offending source.
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
-
أعلى النموذج
Which firewall port number or number combination must be open in order to remotely access a network device using SSH?
20/21
22
23
25
80





Refer to the exhibit. What command was typed to produce the output that is shown?
ipconfig
ipconfig /all
ping
telnet
-
Which feature allows a technician to manage power settings through a Microsoft Windows control panel?
setting two motherboard pins using a jumper
enabling ACPI through system BIOS settings
using a combination of the Fn key and another keystroke
sliding the selective power switch to the on position on the power supply
----------------------------------------------------

أعلى النموذج
Which statement correctly identifies extended memory?
memory allocation from 640 KB to 1 MB
memory allocation form 0 KB to 1 MB
memory allocation from 640 KB to 2 MB
memory allocation from 1 MB to the amount of RAM that is installed
أسفل النموذج



أعلى النموذج
What is the purpose of Windows Vista 64-bit Kernel Patch Protection?
It prevents third party drivers from modifying the operating system kernel.
It permits the 64-bit operating system to patch the operating system at a much higher rate.
It prevents the use of additional operating system kernels from being added to Vista.
It allows the use of unsigned drivers to be used within the 64-bit Vista operating system.
It prevents the use of 32-bit drivers with the 64-bit Visa operating system.
أسفل النموذج

أعلى النموذج
What are three main differences between a Windows 32-bit and a Windows 64-bit operating system? (Choose three.)
The 64-bit operating system runs on a RISC chip architecture.
The 64-bit operating system can recognize up to 128 GB of RAM.
The 64-bit operating system has fewer registers to manage applications.
The 64-bit operating system has additional modes of operation.
The 64-bit operating system memory management system enhances program performance.
The 64-bit operating system has additional security features such as mandatory Driver Signing.
أسفل النموذج

أعلى النموذج
A technician is repairing Windows XP and wants to keep all of the application settings in the operating system. The technician is using the Repair XP option and has rebooted the computer. A message appears on the screen stating "Press any key to boot from the CD or DVD." What should the technician do?
The technician should press the space bar so that the installation can continue.
The technician should ignore the message and allow XP to repair the operating system without deleting any of the applications.
The technician should press the F8 key so that the restore options can be displayed on the screen.
The technician should press the windows key so that the operations can continue and the XP CD can be removed.
أسفل النموذج

أعلى النموذج
Which two security tasks should be included in a computer preventive maintenance plan? (Choose two.)
an update of spyware removal tools
a centralization of network administration
an update of antivirus scanner software
an update of network cable termination information
documentation of network protocols such as DHCP and DNS
أسفل النموذج

أعلى النموذج
A technician is tasked with connecting a printer directly to the network and making it accessible to all staff in the general vicinity. What type of network cable is most likely used to connect the printer?
coaxial
fiber-optic
RJ-11
twisted-pair
أسفل النموذج
أعلى النموذج
A school is adding computers to a classroom that has none. What type of LAN would the school choose to take advantage of commonly implemented wired technologies?
802.11n
Ethernet
FDDI
Token Ring
-
Which technique is used to reduce the amount of power used by the CPU in a laptop computer?
throttling
overclocking
defragmenting
hyperthreading
-



أعلى النموذج
A computer technician opens a PC and notices an empty AGP slot on the motherboard. What type of adapter can take advantage of this slot?
video card
sound card
modem card
network interface card
أسفل النموذج

أعلى النموذج
A user calls the help desk and complains that a networked printer that is controlled by a printer server cannot be accessed. The user mentions that the printer worked fine just an hour earlier. The support technician asks the user if other employees in the same office can print to the networked printer and the user responds that they have the same access problem. What should the technician do next to determine the exact cause?
Reinstall the printer driver.
Restart the print spooler on the server.
Reconfigure the printer on a different port.
Replace the network cable connection to the printer.
أسفل النموذج
Which type of network attack involves randomly opening many Telnet requests to a router and results in a valid network administrator not being able to access the device?

spoofing

man-in-the-middle

SYN flooding

DNS poisoning





-

أعلى النموذج
A technician just terminated some fiber optic cable and needs to properly dispose of the hazardous waste created during the termination. What document would the technician use to identify the proper disposal method for the waste?
FEMA 1
ESD
CHIP 3
MSDS
أسفل النموذج



أعلى النموذج
What two actions are appropriate for a help desk technician to take when assisting customers? (Choose two.)
Interrupt customers if they start to solve their own problems.
Comfort a customer by minimizing the customer problem.
Let a customer finish talking before asking additional questions.
If you have to put the customer on hold, ask the customer for permission.
As soon as you detect customer anger, pass the angry customer to the next level.
أسفل النموذج

Refer to the exhibit. Which sequence of steps describes the printing process used by a laser printer?

1,2,3,4,5,6

2,5,3,4,1,6

3,4,1,6,2,5

4,2,6,5,3,1





-

أعلى النموذج
Which two memory types are installed using Dual Inline Memory Module (DIMM) slots? (Choose two.)
cache memory
DDR SDRAM
FPM DRAM
SDRAM
SRAM
أسفل النموذج
Please Share it! :)

0 التعليقات:

إرسال تعليق

elglaad

 
;