The Final Revision

Download Report

Transcript The Final Revision

The Final Revision
IT Essentials PC Hardware &
Software
1- ABC Company wants to configure laptops to
automatically power components off to improve
battery life. Which power management control
can be used to accomplish this?
•
•
•
•
•
ACPI
AMD
UPS
BIOS
PnP BIOS
1- ABC Company wants to configure laptops to
automatically power components off to improve
battery life. Which power management control
can be used to accomplish this?
•
•
•
•
•
ACPI
AMD
UPS
BIOS
PnP BIOS
2- A technician is asked to configure the time the system must
be idle before the hard disk spins down on all the Windowsbased laptops in the company. The technician configured the
power options in Windows but it appears to have no effect.
Where should the technician look to enable power
management?
•
•
•
•
•
Administrative Tools
BIOS
Command Prompt
Safe mode
System Registry
2- A technician is asked to configure the time the system must
be idle before the hard disk spins down on all the Windowsbased laptops in the company. The technician configured the
power options in Windows but it appears to have no effect.
Where should the technician look to enable power
management?
•
•
•
•
•
Administrative Tools
BIOS
Command Prompt
Safe mode
System Registry
3- Refer to the exhibit. What is the correct order of
steps to safely remove one of several hot-swappable
devices using the least amount of steps?
•
•
•
•
2, 3, 5, 6
1, 3, 5, 6
1, 4, 5, 6
2, 5, 6
3- Refer to the exhibit. What is the correct order of
steps to safely remove one of several hot-swappable
devices using the least amount of steps?
•
•
•
•
2, 3, 5, 6
1, 3, 5, 6
1, 4, 5, 6
2, 5, 6
4- Which utility can be used to
determine end-to-end connectivity
between source and destination?
•
•
•
•
Ipconfig
Nbstat
Netstat
Ping
4- Which utility can be used to
determine end-to-end connectivity
between source and destination?
•
•
•
•
Ipconfig
Nbstat
Netstat
Ping
5- Which topology has only one central point of
failure, is easy to troubleshoot, and is most
commonly implemented in newer networks?
•
•
•
•
bus
mesh
ring
star
5- Which topology has only one central point of
failure, is easy to troubleshoot, and is most
commonly implemented in newer networks?
•
•
•
•
bus
mesh
ring
star
6- A user is reporting that a new external hard drive is
defective. The laptop will allow access to the drive at
times, and then will report that the drive cannot be found.
Upon an initial examination of the laptop, it is discovered
that the user has ten USB devices connected to the laptop.
What is the best quick solution to this problem?
• Remove all the peripherals except the hard drive and
observe the results.
• Move the laptop to another location and observe the
results.
• Replace the power adapter and observe the results.
• Replace the USB hub and observe the results.
• Flash the BIOS on the laptop and observe the results.
6- A user is reporting that a new external hard drive is
defective. The laptop will allow access to the drive at
times, and then will report that the drive cannot be found.
Upon an initial examination of the laptop, it is discovered
that the user has ten USB devices connected to the laptop.
What is the best quick solution to this problem?
• Remove all the peripherals except the hard drive and
observe the results.
• Move the laptop to another location and observe the
results.
• Replace the power adapter and observe the results.
• Replace the USB hub and observe the results.
• Flash the BIOS on the laptop and observe the results.
7- Which Windows XP command
displays the route taken by packets
crossing an IP network?
•
•
•
•
•
iproute
netview
nslookup
ping
tracert
7- Which Windows XP command
displays the route taken by packets
crossing an IP network?
•
•
•
•
•
iproute
netview
nslookup
ping
tracert
8- Which type of program causes banners
and ads to appear on the desktop without
any user intervention?
•
•
•
•
adware
spyware
stealth virus
trojan horse
8- Which type of program causes banners
and ads to appear on the desktop without
any user intervention?
•
•
•
•
adware
spyware
stealth virus
trojan horse
9- Why do mobile devices such as laptop
computers use specifically designed CPUs?
•
•
•
•
They consume less power.
They are smaller.
They are lighter.
They require customized cooling
mechanisms.
• They need to fit proprietary motherboards.
9- Why do mobile devices such as laptop
computers use specifically designed CPUs?
•
•
•
•
They consume less power.
They are smaller.
They are lighter.
They require customized cooling
mechanisms.
• They need to fit proprietary motherboards.
10- Where can a user change the idle
time after which a laptop will switch to
standby mode?
• Right-click the desktop, then click Power Modes
> Standby.
• Right-click My Computer, then click Properties
> Hardware > Device Manager > ACPI.
• Left-click Start > Control Panel > Power Options,
then click the Power Schemes tab.
• Left-click Start > All Programs > Accessories
> System Tools > Power Management.
10- Where can a user change the idle
time after which a laptop will switch to
standby mode?
• Right-click the desktop, then click Power Modes
> Standby.
• Right-click My Computer, then click Properties
> Hardware > Device Manager > ACPI.
• Left-click Start > Control Panel > Power
Options, then click the Power Schemes tab.
• Left-click Start > All Programs > Accessories
> System Tools > Power Management.
11- A technician thinks that the file system on a
computer has a problem because Windows XP is
reporting integrity data issues. Which Windows
XP utility will check the file system for errors?
•
•
•
•
Attrib
Chkdsk
Fdisk
Format
11- A technician thinks that the file system on a
computer has a problem because Windows XP is
reporting integrity data issues. Which Windows XP
utility will check the file system for errors?
•
•
•
•
Attrib
Chkdsk
Fdisk
Format
12- Which specification was developed to
resolve the problem of hardware conflicts?
•
•
•
•
•
AGP
HAL
IRQ-and-DMA
OSR2
PnP
12- Which specification was developed to
resolve the problem of hardware conflicts?
•
•
•
•
•
AGP
HAL
IRQ-and-DMA
OSR2
PnP
13- Which three rules increase the level
of password strength? (Choose three.)
• Passwords should never expire.
• Passwords should be a combination of letters
and numbers.
• Passwords should combine a user's special
dates and initials so they can be alphanumeric.
• Passwords should be changed by the user after
specific periods of time.
• Password expiration and lockout policies should
be clearly defined.
• Passwords should be short to reduce the
chances of users forgetting them.
13- Which three rules increase the level
of password strength? (Choose three.)
• Passwords should never expire.
• Passwords should be a combination of letters
and numbers.
• Passwords should combine a user's special
dates and initials so they can be alphanumeric.
• Passwords should be changed by the user after
specific periods of time.
• Password expiration and lockout policies should
be clearly defined.
• Passwords should be short to reduce the
chances of users forgetting them.
14- Which set of related files store all the
settings of a Windows XP installation?
•
•
•
•
Registry
Control Panel
.ini
HWINFO.EXE
14- Which set of related files store all the
settings of a Windows XP installation?
•
•
•
•
Registry
Control Panel
.ini
HWINFO.EXE
15- What characterizes a DDoS attack?
•
•
•
•
Many hosts participate in a coordinated attack.
Infected computers are called Daemons.
It is easy to identify the source of the attack.
All hosts must be in the same geographic area.
15- What characterizes a DDoS attack?
•
•
•
•
Many hosts participate in a coordinated attack.
Infected computers are called Daemons.
It is easy to identify the source of the attack.
All hosts must be in the same geographic area.
16- What characterizes spoofing?
• Making data appear to come from a source
other than the actual source.
• Sending abnormally large amounts of data to a
remote server to prevent user access to the
server services.
• Intercepting or inserting false information in
traffic between two hosts.
• Sending bulk e-mail to individuals, lists, or
domains intending to prevent users from
accessing e-mail.
16- What characterizes spoofing?
• Making data appear to come from a source
other than the actual source.
• Sending abnormally large amounts of data to a
remote server to prevent user access to the
server services.
• Intercepting or inserting false information in
traffic between two hosts.
• Sending bulk e-mail to individuals, lists, or
domains intending to prevent users from
accessing e-mail.
17- A technician has been asked to install memory
that detects multiple bit errors and corrects single bit
errors in memory. Which type of memory should be
installed if the motherboard supports these
features?
•
•
•
•
parity
ECC
non-parity
CRC
17- A technician has been asked to install memory
that detects multiple bit errors and corrects single bit
errors in memory. Which type of memory should be
installed if the motherboard supports these
features?
•
•
•
•
parity
ECC
non-parity
CRC
18- PATA data cables are available in two
different types. The types are distinguished
by the number of conductors. Which two
types are available? (Choose two.)
•
•
•
•
•
6
40
68
80
120
18- PATA data cables are available in two
different types. The types are distinguished
by the number of conductors. Which two
types are available? (Choose two.)
•
•
•
•
•
6
40
68
80
120
19- How many conductors are
found in a SATA data cable?
•
•
•
•
•
3
4
7
10
12
19- How many conductors are
found in a SATA data cable?
•
•
•
•
•
3
4
7
10
12
20- When installing a network adapter into a client
computer, a technician notices that the contacts on
the adapter need to be cleaned. Which solution
should the technician use to clean the contacts?
•
•
•
•
•
glass cleaner
isopropyl alcohol
mild detergent
rubbing alcohol
slightly abrasive cleanser
20- When installing a network adapter into a client
computer, a technician notices that the contacts on
the adapter need to be cleaned. Which solution
should the technician use to clean the contacts?
•
•
•
•
•
glass cleaner
isopropyl alcohol
mild detergent
rubbing alcohol
slightly abrasive cleanser
21- ABC Inc. decided to integrate redundancy by
connecting multiple hard disks to duplicate the
information they store. Which type of adapter will
need to be installed on the servers to accomplish
the desired redundancy?
•
•
•
•
•
NIC
Wireless NIC
USB gateway
RAID adapter
multiple slave hard disk adapter
21- ABC Inc. decided to integrate redundancy by
connecting multiple hard disks to duplicate the
information they store. Which type of adapter will
need to be installed on the servers to accomplish
the desired redundancy?
•
•
•
•
•
NIC
Wireless NIC
USB gateway
RAID adapter
multiple slave hard disk adapter
22- Which three system resources are
commonly used for communication between
the CPU and other components in the
computer? (Choose three.)
•
•
•
•
•
•
IRQ
DMA
UDP
I/O port address
USB
PnP
22- Which three system resources are
commonly used for communication between
the CPU and other components in the
computer? (Choose three.)
•
•
•
•
•
•
IRQ
DMA
UDP
I/O port address
USB
PnP
23- Which three computer components contain
hazardous materials and require special
handling for disposal? (Choose three.)
•
•
•
•
•
•
•
batteries
floppy drives
monitors
optical drives
parallel cables
printer toner
cartridges
23- Which three computer components contain
hazardous materials and require special
handling for disposal? (Choose three.)
•
•
•
•
•
•
•
batteries
floppy drives
monitors
optical drives
parallel cables
printer toner
cartridges
24- Which two tools can help protect
against ESD? (Choose two.)
•
•
•
•
•
antistatic wrist strap
compressed air
antistatic mat
safety glasses
rubber-sole shoes
24- Which two tools can help protect
against ESD? (Choose two.)
•
•
•
•
•
antistatic wrist strap
compressed air
antistatic mat
safety glasses
rubber-sole shoes
25- Which Windows tool should be run
before upgrading the operating system?
•
•
•
•
Convert
Fdisk
Msconfig
Ntbackup
25- Which Windows tool should be run
before upgrading the operating system?
•
•
•
•
Convert
Fdisk
Msconfig
Ntbackup
26- Which three tools will optimize
computer performance after using the
Internet? (Choose three.)
•
•
•
•
•
•
Fdisk
Spyware Remover
Defrag
Disk Cleanup
BIOS updater
Disk Management utility
26- Which three tools will optimize
computer performance after using the
Internet? (Choose three.)
•
•
•
•
•
•
Fdisk
Spyware Remover
Defrag
Disk Cleanup
BIOS updater
Disk Management utility
27- Which tool should be used if a user
needs to optimize space on a hard drive?
•
•
•
•
Defrag
Disk Management
Fdisk
Format
27- Which tool should be used if a user
needs to optimize space on a hard drive?
•
•
•
•
Defrag
Disk Management
Fdisk
Format
28- A technician is installing a new power
supply in a computer. Which type of power
connector should be used to connect to a
floppy drive?
• Berg
• Molex
• 20-pin ATX connector
• SATA connector
28- A technician is installing a new power
supply in a computer. Which type of power
connector should be used to connect to a
floppy drive?
• Berg
• Molex
• 20-pin ATX connector
• SATA connector
29- Logical addressing and routing function
at which layer of the OSI model?
•
•
•
•
•
Application
Data Link
Network
Physical
Transport
29- Logical addressing and routing function
at which layer of the OSI model?
•
•
•
•
•
Application
Data Link
Network
Physical
Transport
30- A computer can access devices on the same
network but can not access devices on other
networks. What is the probable cause of this
problem?
•
•
•
•
The cable is not connected properly to the NIC.
The computer has an invalid IP address.
The computer has an incorrect subnet mask.
The computer has an invalid default gateway
address.
30- A computer can access devices on the same
network but can not access devices on other
networks. What is the probable cause of this
problem?
•
•
•
•
The cable is not connected properly to the NIC.
The computer has an invalid IP address.
The computer has an incorrect subnet mask.
The computer has an invalid default gateway
address.
31- A technician is assembling a new computer.
Which two components are often easier to install
before mounting the motherboard in the case?
(Choose two.)
•
•
•
•
•
CPU
memory
NIC
sound card
video card
31- A technician is assembling a new computer.
Which two components are often easier to install
before mounting the motherboard in the case?
(Choose two.)
•
•
•
•
•
CPU
memory
NIC
sound card
video card
32- Which port is typically used
for external wireless NICs?
•
•
•
•
Parallel
PS/2
SCSI
USB
32- Which port is typically used
for external wireless NICs?
•
•
•
•
Parallel
PS/2
SCSI
USB
33-The ABC Company manager is calculating the
TCO for an inkjet printer that the company needs
to purchase. Which three factors should be
included in this calculation? (Choose three.)
•
•
•
•
•
•
warranty
software costs
user training
price per page
purchase price
environmental requirements
33-The ABC Company manager is calculating the
TCO for an inkjet printer that the company needs
to purchase. Which three factors should be
included in this calculation? (Choose three.)
•
•
•
•
•
•
warranty
software costs
user training
price per page
purchase price
environmental requirements
34- Refer to the exhibit. Which sequence of steps describes
the printing process used by a laser printer?
•
•
•
•
1,2,3,4,5,6
2,5,3,4,1,6
3,4,1,6,2,5
4,2,6,5,3,1
34- Refer to the exhibit. Which sequence of steps describes
the printing process used by a laser printer?
•
•
•
•
1,2,3,4,5,6
2,5,3,4,1,6
3,4,1,6,2,5
4,2,6,5,3,1
35- Which technology is used by
laser printers?
•
•
•
•
•
digital drop
electro photographic
electrostatic spray
impact
ink melting
35- Which technology is used by
laser printers?
•
•
•
•
•
digital drop
electro photographic
electrostatic spray
impact
ink melting
36-The technician has been asked to upgrade
the printer driver for an old printer. What is the
best source for a new driver?
•
•
•
•
•
manufacturer's website
Microsoft Update website
printer installation disk
Windows Device Manager
Windows hardware profiles
36-The technician has been asked to upgrade
the printer driver for an old printer. What is the
best source for a new driver?
•
•
•
•
•
manufacturer's website
Microsoft Update website
printer installation disk
Windows Device Manager
Windows hardware profiles
37- Which three factors are reasons to choose
a client/server model for a network instead of
peer-to-peer? (Choose three.)
• The network is small with less than eight users.
• The company network requires secure access to
confidential information.
• The users need a central database to store
inventory and sales information.
• Each user understands how to safely share files
across a network.
• The data gathered by the employees is critical
and should be backed up on a regular basis.
• All employees passed a strict background check
as part of the corporate hiring practices.
37- Which three factors are reasons to choose
a client/server model for a network instead of
peer-to-peer? (Choose three.)
• The network is small with less than eight users.
• The company network requires secure access to
confidential information.
• The users need a central database to store
inventory and sales information.
• Each user understands how to safely share files
across a network.
• The data gathered by the employees is critical
and should be backed up on a regular basis.
• All employees passed a strict background check
as part of the corporate hiring practices.
38- Which type of scanner generally has high
costs but produces top-quality images?
•
•
•
•
all-in-one
drum
handheld
flatbed
38- Which type of scanner generally has high
costs but produces top-quality images?
•
•
•
•
all-in-one
drum
handheld
flatbed
39- Which Windows XP command displays
the route taken by packets crossing an IP
network?
•
•
•
•
•
iproute
netview
nslookup
ping
tracert
39- Which Windows XP command displays
the route taken by packets crossing an IP
network?
•
•
•
•
•
iproute
netview
nslookup
ping
tracert
40- A technician is troubleshooting a computer that
is experiencing hardware failure detected by the
BIOS. What is one way this failure is indicated?
• The computer automatically boots into Safe
Mode and displays a warning on the screen.
• The screen flashes with a red background and
displays a warning message.
• The computer emits a pattern of beeps
indicating the failing device.
• The computer returns an error message
indicating the I/O address of the failing device.
40- A technician is troubleshooting a computer that
is experiencing hardware failure detected by the
BIOS. What is one way this failure is indicated?
• The computer automatically boots into Safe
Mode and displays a warning on the screen.
• The screen flashes with a red background and
displays a warning message.
• The computer emits a pattern of beeps
indicating the failing device.
• The computer returns an error message
indicating the I/O address of the failing device.
41- In the event of a catastrophic system or
hardware failure, which Windows XP utility
provides a framework for saving and recovering
the operating system?
•
•
•
•
•
Emergency Repair Disk (ERD)
Automated System Recovery (ASR)
Windows Recovery Manager (WRM)
Automated Windows Recovery (AWR)
Windows System Recovery (WSR)
41- In the event of a catastrophic system or
hardware failure, which Windows XP utility
provides a framework for saving and recovering
the operating system?
•
•
•
•
•
Emergency Repair Disk (ERD)
Automated System Recovery (ASR)
Windows Recovery Manager (WRM)
Automated Windows Recovery (AWR)
Windows System Recovery (WSR)
42- A technician receives a call from a customer
dissatisfied with past service who continually
complains about the service during the call. How
should the technician handle this call?
• Remind the customer that his company is
probably better than the competition.
• Advise the customer that they can always leave
his company and do business with the
competition.
• Listen to the complaint and advise the customer
that he will make every effort to avoid what they
are complaining about.
• Ask the customer to submit his complaint in
writing.
42- A technician receives a call from a customer
dissatisfied with past service who continually
complains about the service during the call. How
should the technician handle this call?
• Remind the customer that his company is
probably better than the competition.
• Advise the customer that they can always leave
his company and do business with the
competition.
• Listen to the complaint and advise the customer
that he will make every effort to avoid what they
are complaining about.
• Ask the customer to submit his complaint in
writing.
43- A customer is angry and calls to complain that the
service scheduled on his computer took longer than
expected. The technician reviews the work order and notices
that the service was performed by a new employee. How
should the technician respond?
• Verify that the computer is working properly now.
• Listen to the complaint and then apologize for
any inconvenience caused by the lengthy
service on the computer.
• Explain that the repair technician sent to perform
the repair is inexperienced.
• Put the customer on hold until a supervisor is
available.
43- A customer is angry and calls to complain that the
service scheduled on his computer took longer than
expected. The technician reviews the work order and
notices that the service was performed by a new employee.
How should the technician respond?
• Verify that the computer is working properly now.
• Listen to the complaint and then apologize for
any inconvenience caused by the lengthy
service on the computer.
• Explain that the repair technician sent to perform
the repair is inexperienced.
• Put the customer on hold until a supervisor is
available.
44- Which type of cable standard uses a
9-pin connector and supports data rates
in excess of 800 Mbps?
•
•
•
•
•
DB-9
DB-25
IEEE 1284
IEEE 1394a
IEEE 1394b
44- Which type of cable standard uses a
9-pin connector and supports data rates
in excess of 800 Mbps?
•
•
•
•
•
DB-9
DB-25
IEEE 1284
IEEE 1394a
IEEE 1394b
45- What is the purpose of an IRQ?
• Perform input/output between the CPU
and peripherals.
• Establish peer-to-peer communication
between devices and software.
• Request information from the CPU.
• Access the computer RAM for reading and
writing.
45- What is the purpose of an IRQ?
• Perform input/output between the CPU
and peripherals.
• Establish peer-to-peer communication
between devices and software.
• Request information from the CPU.
• Access the computer RAM for reading and
writing.
46- A technician is installing dual operating systems
on a computer. Which disk management tool should
be used to create two partitions on the hard disk?
•
•
•
•
•
Chkdsk
Defrag
Fdisk
Format
Scandisk
46- A technician is installing dual operating systems
on a computer. Which disk management tool should
be used to create two partitions on the hard disk?
•
•
•
•
•
Chkdsk
Defrag
Fdisk
Format
Scandisk
47- A customer calls to report a computer problem.
Which two actions can the technician use to
establish a good rapport with the customer?
(Choose two.)
• Personalize the call by periodically asking
questions unrelated to the computer problem.
• Allow the customer to speak without interruption.
• Use technical terms to determine the level of
knowledge the customer possesses.
• Ask only closed-ended questions.
• Refer to the customer by name whenever
possible.
47- A customer calls to report a computer problem.
Which two actions can the technician use to
establish a good rapport with the customer?
(Choose two.)
• Personalize the call by periodically asking
questions unrelated to the computer problem.
• Allow the customer to speak without interruption.
• Use technical terms to determine the level of
knowledge the customer possesses.
• Ask only closed-ended questions.
• Refer to the customer by name whenever
possible.
48- When a Windows XP computer has completed
the POST for each adapter card that has a BIOS,
what is the next step during the boot sequence?
• BIOS reads the MBR.
• NTDETECT.COM is used to detect any
installed hardware.
• NTDLR reads the registry files.
• The WINLOGON.EXE program is started.
48- When a Windows XP computer has completed
the POST for each adapter card that has a BIOS,
what is the next step during the boot sequence?
• BIOS reads the MBR.
• NTDETECT.COM is used to detect any
installed hardware.
• NTDLR reads the registry files.
• The WINLOGON.EXE program is started.
49- Which three benefits are gained by
networking computers? (Choose three.)
•
•
•
•
•
•
decreased need of personal training
fewer peripherals needed
decreased computer-to-user ratio
lower cost licensing
increased user specialization
increased communication capabilities
49- Which three benefits are gained by
networking computers? (Choose three.)
•
•
•
•
•
•
decreased need of personal training
fewer peripherals needed
decreased computer-to-user ratio
lower cost licensing
increased user specialization
increased communication capabilities
50- When analyzing a protocol used on the
network, it is discovered that multicast
messages are being sent to network devices.
Which class of IP addressing is being used to
send these messages?
•
•
•
•
•
A
B
C
D
E
50- When analyzing a protocol used on the
network, it is discovered that multicast
messages are being sent to network devices.
Which class of IP addressing is being used to
send these messages?
•
•
•
•
•
A
B
C
D
E
51- A fingerprint reader is an example of
which security technology?
•
•
•
•
•
authorization
biometric
key logging
secure ware
smartcard
51- A fingerprint reader is an example of
which security technology?
•
•
•
•
•
authorization
biometric
key logging
secure ware
smartcard
52- What is the default subnet mask for
a Class A network?
•
•
•
•
•
•
0.0.0.255
0.0.255.255
0.255.255.255
255.0.0.0
255.255.0.0
255.255.255.0
52- What is the default subnet mask for
a Class A network?
•
•
•
•
•
•
0.0.0.255
0.0.255.255
0.255.255.255
255.0.0.0
255.255.0.0
255.255.255.0
53- Which protocol adds security to
remote connections?
•
•
•
•
•
FTP
HTTP
NetBEUI
POP
SSH
53- Which protocol adds security to
remote connections?
•
•
•
•
•
FTP
HTTP
NetBEUI
POP
SSH
54- Which network device uses a MAC
address table to segment the network?
•
•
•
•
•
concentrator
hub
PBX
router
switch
54- Which network device uses a MAC
address table to segment the network?
•
•
•
•
•
concentrator
hub
PBX
router
switch
55- What is the logical topology
used for the Ethernet architecture?
•
•
•
•
bus
double ring
extended star
ring star
55- What is the logical topology
used for the Ethernet architecture?
•
•
•
•
bus
double ring
extended star
ring star
56- A network administrator is troubleshooting a server that
keeps crashing. While monitoring traffic to the server, the
administrator notices repeated, larger than normal pings to
the server. What is the name of this type of attack?
•
•
•
•
•
•
multi-ping attack
phishing
ping bomb
ping of death
spoofing
zombie attack
56- A network administrator is troubleshooting a server that
keeps crashing. While monitoring traffic to the server, the
administrator notices repeated, larger than normal pings to
the server. What is the name of this type of attack?
•
•
•
•
•
•
multi-ping attack
phishing
ping bomb
ping of death
spoofing
zombie attack
57- Which two types of connectors can
be found on DVI cables? (Choose two.)
•
•
•
•
•
3-pin
15-pin
24-pin
29-pin
32-pin
57- Which two types of connectors can
be found on DVI cables? (Choose two.)
•
•
•
•
•
3-pin
15-pin
24-pin
29-pin
32-pin
58- Which two quick solutions are commonly
recommended when a technician is
troubleshooting a laptop? (Choose two.)
•
•
•
•
•
Reboot the laptop.
Reinstall the operating system.
Disconnect the peripherals.
Have the customer verify the problem.
Call a level-2 technician.
58- Which two quick solutions are commonly
recommended when a technician is
troubleshooting a laptop? (Choose two.)
•
•
•
•
•
Reboot the laptop.
Reinstall the operating system.
Disconnect the peripherals.
Have the customer verify the problem.
Call a level-2 technician.
59- Which protocol dynamically assigns
IP addresses to network devices?
•
•
•
•
•
DHCP
DNS
ICMP
RARP
TCP
59- Which protocol dynamically assigns
IP addresses to network devices?
•
•
•
•
•
DHCP
DNS
ICMP
RARP
TCP
60- Which is an effective method to
protect against data loss?
•
•
•
•
biometrics
data backup
encryption
smartcards
60- Which is an effective method to
protect against data loss?
•
•
•
•
biometrics
data backup
encryption
smartcards
61- What are two examples of
malware? (Choose two.)
•
•
•
•
•
registry cleaner
pop-up blocker
spyware
e-mail
grayware
61- What are two examples of
malware? (Choose two.)
•
•
•
•
•
registry cleaner
pop-up blocker
spyware
e-mail
grayware
62- Which wireless security technology is a
good choice when using Cisco equipment in
conjunction with operating systems such as
Windows and Linux?
•
•
•
•
LEAP
WEP
WPA
WTLS
62- Which wireless security technology is a
good choice when using Cisco equipment in
conjunction with operating systems such as
Windows and Linux?
•
•
•
•
LEAP
WEP
WPA
WTLS
63- A technician needs to upgrade the file system
on a Windows XP computer from FAT32 to NTFS.
Which course of action should be taken to upgrade
the file system to NTFS?
• Format all the existing files with the NTFS File tool.
• Create a new NTFS partition and copy the files into
the new partition. The existing partition can not be
changed.
• Run the Microsoft Convert utility.
• Overwrite the FAT32 file system with NTFS. Files
will automatically be added to the new file system.
63- A technician needs to upgrade the file system
on a Windows XP computer from FAT32 to NTFS.
Which course of action should be taken to upgrade
the file system to NTFS?
• Format all the existing files with the NTFS File tool.
• Create a new NTFS partition and copy the files into
the new partition. The existing partition can not be
changed.
• Run the Microsoft Convert utility.
• Overwrite the FAT32 file system with NTFS. Files
will automatically be added to the new file system.
64- A technician has many new computers to set
up. The technician completely configures one
master computer and makes an image of the hard
drive. This image is then installed on the other
computers. What is this process called?
•
•
•
•
•
disk array
disk copying
disk cloning
disk mirroring
disk multiplexing
64- A technician has many new computers to set
up. The technician completely configures one
master computer and makes an image of the hard
drive. This image is then installed on the other
computers. What is this process called?
•
•
•
•
•
disk array
disk copying
disk cloning
disk mirroring
disk multiplexing
65- While performing preventive maintenance,
a technician notices that the operating system
is missing updates. How can the technician
enable automatic updates?
• Run the Sysedit utility from the command line.
• Run the Autoupdate utility from the command line.
• Run the Automatic Updates utility from the Control
Panel.
• Click the Update icon in the System Tray.
• Right-click My Computer and then choose
Advanced > Updates
65- While performing preventive maintenance,
a technician notices that the operating system
is missing updates. How can the technician
enable automatic updates?
• Run the Sysedit utility from the command line.
• Run the Autoupdate utility from the command line.
• Run the Automatic Updates utility from the Control
Panel.
• Click the Update icon in the System Tray.
• Right-click My Computer and then choose
Advanced > Updates
66- When booting the Windows XP
operating system, which file will be read to
find the path to the boot partition?
•
•
•
•
AUTOEXEC.BAT
BOOT.INI
NTBOOTDD.SYS
NTDETECT.COM
66- When booting the Windows XP
operating system, which file will be read to
find the path to the boot partition?
•
•
•
•
AUTOEXEC.BAT
BOOT.INI
NTBOOTDD.SYS
NTDETECT.COM
67- Which command adds a
permanent IP-to-MAC address map?
•
•
•
•
•
mac -s
arp -s
ipconfig -s
ping -s
rarp -s
67- Which command adds a
permanent IP-to-MAC address map?
•
•
•
•
•
mac -s
arp -s
ipconfig -s
ping -s
rarp -s
68- Which command provides a list of
currently active TCP/IP connections on a
Windows NT/XP/2000 computer?
•
•
•
•
•
•
ping
netstat
nslookup
tracert
telnet
ipconfig
68- Which command provides a list of
currently active TCP/IP connections on a
Windows NT/XP/2000 computer?
•
•
•
•
•
•
ping
netstat
nslookup
tracert
telnet
ipconfig
69-Which utility displays TCP/IP
configuration information on a Windows
9x computer?
•
•
•
•
•
ifconfig
netconfig
winipcfg
config
ixconfig
69-Which utility displays TCP/IP
configuration information on a Windows
9x computer?
•
•
•
•
•
ifconfig
netconfig
winipcfg
config
ixconfig
70-Which utility tests application layer
connectivity between two devices?
•
•
•
•
•
•
ping
telnet
netconfig
arp
tracert
netstat
70-Which utility tests application layer
connectivity between two devices?
•
•
•
•
•
•
ping
telnet
netconfig
arp
tracert
netstat