أحدث الأخبار
Loading...

IT Essentials Final exam 2e1







Another Exam Final 2012 

Final Exam 2012

 



Which two general precautions should be taken before replacing any non-hot-swappable laptop component? (Choose two.)
Disconnect the power cord.
Keep any component in a plastic bag until installation.
Remove any batteries.
Use carpets in cool areas.
Wear rubber-soled shoes to work with the computer.
What is a benefit of using the USB or FireWire ports to connect peripherals to a laptop?

The peripherals can be plugged in and out without turning the laptop off.

Data transfer is more controlled than using the parallel or serial ports.

The peripherals do not need drivers to communicate with the OS.

Connections are much more reliable.







A user is reporting that a new external hard drive is defective. The laptop will allow access to the drive at times, and then will report that the drive cannot be found. Upon an initial examination of the laptop, it is discovered that the user has ten USB devices connected to the laptop.

What is the best quick solution to this problem?
Remove all the peripherals except the hard drive and observe the results.
Move the laptop to another location and observe the results.
Replace the power adapter and observe the results.
Replace the USB hub and observe the results.
Flash the BIOS on the laptop and observe the results.

Which power mode should be used by a laptop so that all the data is saved, all the applications the user was working on are left open, and there is no power used by the laptop?
Hibernate
Suspend
Left on with no power mode
Soft shutdown

ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?
NIC
Wireless NIC
USB gateway
RAID adapter
multiple slave hard disk adapter
Which Windows tool should be run before upgrading the operating system?
Convert
Fdisk
Msconfig
Ntbackup




When installing the Windows XP operating system, a technician is given a choice of file systems to use. If security is a requirement, which file system should be chosen?
FAT32
HPFS
NFS
NTFS

A computer can access devices on the same network but can not access devices on other networks. What is the probable cause of this problem?
The cable is not connected properly to the NIC.
The computer has an invalid IP address.
The computer has an incorrect subnet mask.
The computer has an invalid default gateway address.

The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver?
manufacturer's website
Microsoft Update website
printer installation disk
Windows Device Manager
Windows hardware profiles
A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and diagnostic utilities. Where would the technician set the boot order for the PC?

My Computer

Control Panel

Device Manager

BIOS

Start Menu







A customer is angry and calls to complain that the service scheduled on his computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?
Verify that the computer is working properly now.
Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer.
Explain that the repair technician sent to perform the repair is inexperienced.
Put the customer on hold until a supervisor is available.

Which two quick solutions are commonly recommended when a technician is troubleshooting a laptop? (Choose two.)
Reboot the laptop.
Reinstall the operating system.
Disconnect the peripherals.
Have the customer verify the problem.
Call a level-2 technician.

When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?
BIOS reads the MBR.
NTDETECT.COM is used to detect any installed hardware.
NTDLR reads the registry files.
The WINLOGON.EXE program is started.
A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack?

multi-ping attack

phishing

ping bomb

ping of death

spoofing

zombie attack






Which two types of connectors can be found on DVI cables? (Choose two.)






-
A customer needs to purchase a new power supply for a computer. What must be considered when selecting an appropriate power supply?
The power supply converts DC to AC.
The power supply has sufficient wattage to support all components inside the computer.
The power supply provides at least 800 V.
The power supply must have both a P-8 and P-9 connector.



Which motherboard feature controls the amount of data that a CPU transfers at one time?
pin grid array
front side bus
MMX instructions
read-only memory
A customer reports that after using a computer for over a year, the computer now takes more time to access the files. Which management tool can be used first, before any other complex procedure?
fdisk
format
defrag
disk management
system file checker
-

A technician is designing a hardware preventive maintenance plan for a company. Which strategy should be included in the plan?
Avoid performing maintenance operations on plug and play devices that are controlled by the operating system.
Only clean equipment that is requested by the customer.
Omit performing maintenance operations on components until the equipment malfunction.
Schedule and document routine maintenance tasks.

When installing a service pack or security patches on an operating system, what should be done to protect the system in the event of a faulty or aborted installation?
Create a restore point.
Check the updates for the latest ones.
Disable Automatic Updates to prevent interference with the current operation.
Test all aspects to ensure that the update is correct for the operating system.
A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file?
Defrag
CHKDSK
MSCONFIG
REGEDIT.EXE
-

A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?
LAN
MAN
WAN
WLAN



A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files are missing. What should the customer do next?
Run convertFAT32.exe.
Restore the data files that were backed up in preparation for the conversion.
Reset the file attribute to show hidden files.
Restart the computer after updating the hard drive to FAT32.

A technician is asked to set up one hard drive that will support two operating systems and will store data files in three separate drive locations. Which partition settings will support these requirements?
1 primary, 3 active, 1 extended, 2 logical
2 logical, 2 active, 3 extended
2 primary, 1 active, 1 extended, 3 logical
3 primary, 1 active, 2 extended
A technician notices that a data floppy disk is in the floppy disk drive of a computer when it is powered on. Which error message could this potentially cause?

device / service failed to start

floppy disk corrupted

invalid system disk

corrupted driver





-

A technician is asked to wire a network that supports CSMA/CD. Which architecture and physical topology should the technician use for supporting this access control method?
Ethernet and Star
FDDI and Ring
Token Ring and Double Ring
Wireless and Ring

A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)
Inkjet printers are less expensive than laser printers.
A laser printer is significantly slower than an inkjet printer.
Both laser and inkjet printers produce poor quality images.
The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.
Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.
The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?

APIPA

DHCP

DIPS

ICMP





-

Which two computer components can be used to permanently store data? (Choose two.)
1 MB of L2 cache
320 GB SATA hard drive
3 GB DDR2 RAM
1919 MB of TurboCache
8x Multi-format DVD+ R/RW drive

Refer to the exhibit. A Cisco Networking Academy instructor is trying to print a flash graphic from the curriculum. The print job has gone into the print queue as shown. Based on the output, what should be the next step in solving this problem?

Check the printer for status messages.

Restart the computer.

Upgrade the printer driver.

Reinstall the printer driver.

Check the printer cabling and power.





-
A directly-attached printer has always failed to work. Print jobs and the printer test page fail to print, but the printer self-test page prints OK. If the cabling is installed correctly, what is most likely the problem?
a dry print cartridge
an incorrect printer driver
an outdated system BIOS
a missing Windows service pack

---------------------------------------------------
Which measures can help control RFI effects?
Ensure the humidity and temperature levels are set as low as possible.
Ensure the number of wireless NICs exceeds the number of wireless phones.
Ensure the wireless network is on a different frequency than the offending source.
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
-
Which firewall port number or number combination must be open in order to remotely access a network device using SSH?
20/21
22
23
25
80




Refer to the exhibit. What command was typed to produce the output that is shown?
ipconfig
ipconfig /all
ping
telnet
-
Which feature allows a technician to manage power settings through a Microsoft Windows control panel?
setting two motherboard pins using a jumper
enabling ACPI through system BIOS settings
using a combination of the Fn key and another keystroke
sliding the selective power switch to the on position on the power supply
----------------------------------------------------

Which statement correctly identifies extended memory?
memory allocation from 640 KB to 1 MB
memory allocation form 0 KB to 1 MB
memory allocation from 640 KB to 2 MB
memory allocation from 1 MB to the amount of RAM that is installed



What is the purpose of Windows Vista 64-bit Kernel Patch Protection?
It prevents third party drivers from modifying the operating system kernel.
It permits the 64-bit operating system to patch the operating system at a much higher rate.
It prevents the use of additional operating system kernels from being added to Vista.
It allows the use of unsigned drivers to be used within the 64-bit Vista operating system.
It prevents the use of 32-bit drivers with the 64-bit Visa operating system.

What are three main differences between a Windows 32-bit and a Windows 64-bit operating system? (Choose three.)
The 64-bit operating system runs on a RISC chip architecture.
The 64-bit operating system can recognize up to 128 GB of RAM.
The 64-bit operating system has fewer registers to manage applications.
The 64-bit operating system has additional modes of operation.
The 64-bit operating system memory management system enhances program performance.
The 64-bit operating system has additional security features such as mandatory Driver Signing.

A technician is repairing Windows XP and wants to keep all of the application settings in the operating system. The technician is using the Repair XP option and has rebooted the computer. A message appears on the screen stating "Press any key to boot from the CD or DVD." What should the technician do?
The technician should press the space bar so that the installation can continue.
The technician should ignore the message and allow XP to repair the operating system without deleting any of the applications.
The technician should press the F8 key so that the restore options can be displayed on the screen.
The technician should press the windows key so that the operations can continue and the XP CD can be removed.

Which two security tasks should be included in a computer preventive maintenance plan? (Choose two.)
an update of spyware removal tools
a centralization of network administration
an update of antivirus scanner software
an update of network cable termination information
documentation of network protocols such as DHCP and DNS

A technician is tasked with connecting a printer directly to the network and making it accessible to all staff in the general vicinity. What type of network cable is most likely used to connect the printer?
coaxial
fiber-optic
RJ-11
twisted-pair
A school is adding computers to a classroom that has none. What type of LAN would the school choose to take advantage of commonly implemented wired technologies?
802.11n
Ethernet
FDDI
Token Ring
-
Which technique is used to reduce the amount of power used by the CPU in a laptop computer?
throttling
overclocking
defragmenting
hyperthreading
-



A computer technician opens a PC and notices an empty AGP slot on the motherboard. What type of adapter can take advantage of this slot?
video card
sound card
modem card
network interface card

A user calls the help desk and complains that a networked printer that is controlled by a printer server cannot be accessed. The user mentions that the printer worked fine just an hour earlier. The support technician asks the user if other employees in the same office can print to the networked printer and the user responds that they have the same access problem. What should the technician do next to determine the exact cause?
Reinstall the printer driver.
Restart the print spooler on the server.
Reconfigure the printer on a different port.
Replace the network cable connection to the printer.
Which type of network attack involves randomly opening many Telnet requests to a router and results in a valid network administrator not being able to access the device?

spoofing

man-in-the-middle

SYN flooding

DNS poisoning





-

A technician just terminated some fiber optic cable and needs to properly dispose of the hazardous waste created during the termination. What document would the technician use to identify the proper disposal method for the waste?
FEMA 1
ESD
CHIP 3
MSDS



What two actions are appropriate for a help desk technician to take when assisting customers? (Choose two.)
Interrupt customers if they start to solve their own problems.
Comfort a customer by minimizing the customer problem.
Let a customer finish talking before asking additional questions.
If you have to put the customer on hold, ask the customer for permission.
As soon as you detect customer anger, pass the angry customer to the next level.

Refer to the exhibit. Which sequence of steps describes the printing process used by a laser printer?

1,2,3,4,5,6

2,5,3,4,1,6

3,4,1,6,2,5

4,2,6,5,3,1





-

Which two memory types are installed using Dual Inline Memory Module (DIMM) slots? (Choose two.)
cache memory
DDR SDRAM
FPM DRAM
SDRAM
SRAM


 Another final exam

What is the purpose of an IRQ?
Request information from the CPU.


ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?
RAID adapter


A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack?
ping of death


A customer reports poor telephone communications when using a copper telephone line that also has a DSL service. What is the most likely cause of the problem?
The DSL filter is faulty or not connected.


Which key or key sequence pressed during the boot process will allow a user to restart a Windows PC using the last known good configuration?
F8






Refer to the exhibit. A technician is troubleshooting a problem where a teacher is unable to connect a laptop to a wireless network. The wireless NIC is enabled and the wireless network configuration settings are correct. Which key would be used in conjunction with the Fn key to enable the wireless connection?
F7


Which steps lead to the window where the performance settings can be changed on a Windows XP computer that is using the classic view display?
Choose Start > Control Panel > Administrative Tools > Performance area > VMem


What are the four layers in the TCP/IP reference model?
application, transport, internet, network access


A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices?
SSH


Which type of memory is used for cache memory?
SRAM


Which two memory types are installed using Dual Inline Memory Module (DIMM) slots? (Choose two.)
DDR SDRAM
SDRAM


What approach should a technician take when receiving a call from a stressed customer?
Ask the customer to hold, and then wait five minutes for the customer to calm down.



 






Refer to the exhibit. Which type of device uses the connector shown in the graphic?
DVD drive


A customer needs to purchase a new power supply for a computer. What must be considered when selecting an appropriate power supply?
The power supply has sufficient wattage to support all components inside the computer.


A student enables file sharing on a laptop so that a friend can access music files. Which type of service is being configured?
peer-to-peer





Which are three steps in the laser printing process? (Choose three.)
fusing
writing
transferring


Which option is the most secure type of user authentication?
fingerprint scanner


What is the purpose of Windows Vista 64-bit Kernel Patch Protection?
It prevents the use of 32-bit drivers with the 64-bit Visa operating system.


A user has been writing data to a USB flash memory drive. What should the user do before removing the device?
Click on the Safely Remove Hardware icon in the system tray then on the device.


Which two general precautions should be taken before replacing any non-hot-swappable laptop component? (Choose two.)
Disconnect the power cord.
Remove any batteries.


A technician wants to create a new partition on a new additional hard drive. Which tool should be used?
Disk Management


Which port is used only for input?
PS/2


A technician has been asked to find how a hacker keeps breaking in to a computer. Which security precaution was most likely missed when the operating system was first installed?
A password was not assigned to the default administrator account.


What is the logical topology used for the Ethernet architecture?
bus


Once a technician understands a customer complaint, it is common to ask close-ended questions. Which question is a close-ended one?
Is this the first time the error occurred?


Which three customizable properties are available when right-clicking the Windows XP My Computer desktop icon and selecting Properties? (Choose three.)
virtual memory settings
automatic updates settings
computer name


A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?
The technician occasionally confirmed an understanding of the problem.





A newly purchased scanner is not functioning as efficiently as expected. Which step should a technician take to improve performance?
Download drivers and utilities from the manufacturer web site.


When installing the Windows XP operating system, a technician is given a choice of file systems to use. If security is a requirement, which file system should be chosen?
NTFS


A user reports that a printer is printing unknown characters on documents. What is a possible solution to this issue?
Uninstall and reinstall the printer driver.


A technician needs to purchase a new video adapter for a computer. Which factors should be considered when selecting the adapter?
expansion slot type


A company uses a single computer to receive and test all Windows updates. When the most recent update was installed, several programs failed. What is the first course of action that a technician should attempt to remove the update?
Run a System Restore from the last restore point.





Why do mobile devices such as laptop computers use specially designed CPUs?
They consume less power.


A small business has used a high quality configurable flatbed scanner to scan a number of photographs to print as large posters. However, the quality of the images printed as posters is poor. What should the user do?
Increase the resolution of the scanner.


A technician is having trouble with laptops that keep overheating. What preventive maintenance procedure can be performed on the laptops to reduce this problem?
Clean the air vents.


Which power management method offers the most power management features?
ACPI


A workstation is experiencing an error that is caused by suspected dirty RAM contacts. Which two materials should be used to clean the RAM module? (Choose two.)
isopropyl alcohol
lint-free swab


A technician is asked to set up one hard drive that will support two operating systems and will store data files in three separate drive locations. Which partition settings will support these requirements?
2 primary, 1 active, 1 extended, 3 logical





Which two file systems are available for selection during installation of Windows XP? (Choose two.)
FAT32
NTFS


What is the purpose of using thermal compound when installing a CPU, a heat sink, and a fan assembly on a motherboard?
to attach the heat sink firmly to the CPU


A technician is troubleshooting a problem where the user claims that access to the Internet is not working, but that there was access to the Internet the day before. Upon investigation, the technician determines that the user cannot access the network printer in the office either. The network printer is on the same network as the computer. The computer has 169.254.100.88 assigned as an IP address. What is the most likely problem?
The router that connects this network to other networks is down.


Employees in the financial department have reported that an unknown technician has been asking questions about the network. Which type of attack might the employees be observing?
social engineering



Refer to the exhibit. A Cisco Networking Academy instructor is trying to print a flash graphic from the curriculum. The print job has gone into the print queue as shown. Based on the output, what should be the next step in solving this problem?
Check the printer cabling and power.


When installing a service pack or security patches on an operating system, what should be done to protect the system in the event of a faulty or aborted installation?
Create a restore point.


Which network protocol is used to automatically assign an IP address to a computer on a network?
DHCP


What is the default subnet mask for a Class A network?
255.0.0.0


A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)
Individual users are in control of their own computers and network resources.
Data resources and access are centrally controlled.


What do the terms refresh rate, interlace, and aspect ratio explain?
image properties of a monitor


Where in Windows XP can the shutdown, hibernate, and standby modes be configured?
Start > Control Panel > Power Options


What must be done before a technician cleans a very dirty LCD screen on a laptop?
Remove the battery.


Which three things should be investigated first when troubleshooting a printer? (Choose three.)
equipment power
low-ink warning
out of paper


A printer has a paper jam. An impatient user has sent multiple print jobs of the same document to this printer. What can be done to remove these print jobs?
Cancel the jobs in the printer queue.






 
;