Upload
tarudin-lagi-sedih
View
218
Download
0
Embed Size (px)
Citation preview
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 1/16
Take Assessment - Practice Final Exam for ch 1-10 - IT Essentials (Version 4.0)
Top of Form
Time Remaining:
4421996
Bottom of Form
Top of Form
Showing 1 of 5 Next> Page:
1
GO <Prev
Bottom of Form
1 Top of Form
Fans that are used to help cool a system are commonly placed on which two components? (Choose tw
sound card
CMOS
video card
RAID card
CPU
Bottom of Form
2 Top of Form
A customer is considering an inkjet printer to print batches of colored documents that will be immedistacked and packaged for shipping. What advice should a technician give the customer?
The resolution of an inkjet printer is too low for this work.
An inkjet printer has limited color capability.
Immediately after printing, the ink is wet.
An inkjet printer is a high cost option.
Bottom of Form
3 Top of Form
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 2/16
Refer to the exhibit. What type of device is highlighted in white?
touch pad
mouse
biometric authentication
Bluetooth
Bottom of Form
4 Top of Form
The driver for a network interface card has been updated on a Windows XP computer. All network a been lost. Which steps in the Windows XP Classic View should be followed to roll back the networkcard driver?
Choose Start > Settings > Control Panel. Double-click System. Click the Hardware tab. ChooManager. Double-click the NIC adapter. Click the Driver tab. Click the Roll Back Driver butto
Choose Start > Settings > Control Panel. Double-click Network Connections. Right-click theChoose Properties > Uninstall.
Choose Start > Settings > Control Panel. Double-click System. Click the Hardware tab. ChooManager. Choose Action > Uninstall.
Choose Start > Settings > Control Panel. Double-click Add or Remove Programs. Click ChaBottom of Form
5 Top of Form
Which port is used only for input?
PS/2
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 3/16
component
speaker
DVI
parallel
Bottom of Form
6 Top of Form
Which type of power connector is used to connect devices such as optical drives and hard drives?
20-pin
24-pin
Berg
Molex
P8
P9
Bottom of Form
7 Top of Form
Which steps lead to the window where the performance settings can be changed on a Windows XP cthat is using the classic view display?
Choose Start > Control Panel > System > Advanced > Performance area. Choose the Setting
Choose Start > Control Panel > System > Hardware > Device Manager > View > Resources
Choose Start > Control Panel > Administrative Tools > Performance area > VMem
Choose Start > All Programs > Accessories > System Tools > System Restore
Bottom of Form
8 Top of Form
What is the default subnet mask for a Class A network?
0.0.0.255
0.0.255.255
0.255.255.255
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 4/16
255.0.0.0
255.255.0.0
255.255.255.0
Bottom of Form
9 Top of Form
Refer to the exhibit. Which type of removable media is depicted?
hard disk
USB optical drive
PC card
flash drive
Bottom of Form
10 Top of Form
A laptop user has noticed that connecting an external monitor, keyboard, and speaker each day is caudamage to the laptop connectors. What can the user do to prolong the life of the connectors?
Obtain devices which are specially designed for heavily used laptops.
Use only PCI devices.
Attach all of the devices to a USB hub.
Use a docking station.
Bottom of Form
11 Top of Form
A technician installed Windows XP on a 20 GB SCSI drive but when the computer is started a NTLDmessage is displayed. Based on this information which file was most likely corrupted during installat
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 5/16
NTBOOTDD
HAL
NTSCSILDR
NTWINHAL
Bottom of Form
12 Top of Form
What characterizes a DDoS attack?
Many hosts participate in a coordinated attack.
Infected computers are called Daemons.
It is easy to identify the source of the attack.
All hosts must be in the same geographic area.
Bottom of Form
13 Top of Form
When installing a network adapter into a client computer, a technician notices that the contacts on the to be cleaned. Which solution should the technician use to clean the contacts?
glass cleaner
isopropyl alcohol
mild detergent
rubbing alcohol
slightly abrasive cleanser
Bottom of Form
14 Top of Form
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 6/16
Refer to the exhibit. Which sequence of steps describes the printing process used by a laser printer?
1,2,3,4,5,6
2,5,3,4,1,6
3,4,1,6,2,5
4,2,6,5,3,1
Bottom of Form
15 Top of Form
Employees in the financial department have reported that an unknown technician has been asking quabout the network. Which type of attack might the employees be observing?
phishing
social engineering
spoofing
spamming
Bottom of Form
16 Top of Form
Which two items are considered proper cleaning tools? (Choose two.)
compressed air
antistatic mat
soft cloth
antistatic wrist strap
flat-head screwdriver
Bottom of Form
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 7/16
17 Top of Form
A user reports that a printer is printing unknown characters on documents. What is a possible solutioissue?
Replace the toner or ink cartridge.
Uninstall and reinstall the printer driver.
Replace the paper with some from a new ream.
Delete the print job from the queue and print again.
Bottom of Form
18 Top of Form
What are the four layers in the TCP/IP reference model?
HTTP, TCP, IP, Ethernet
TCP, IP, Ethernet, IEEE
application, transport, internet, network access
application, presentation, session, transport
physical, data link, network, transport
Bottom of Form
19Top of Form
When starting a computer, a customer can no longer select two of the operating systems that are instafile may be corrupted and causing this error?
BOOT.INI
STARTUP.INI
SYSTEM.INI
WIN.INI
Bottom of Form
20 Top of Form
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 8/16
Refer to the exhibit. Which type of device uses the connector shown in the graphic?
DVD drive
keyboard
NIC
RAM
sound card
Bottom of Form
21 Top of Form
At which TCP/IP model layer would a MAC address be found?
application
transport
internet
network access
Bottom of Form
22 Top of Form
Which three rules increase the level of password strength? (Choose three.)
Passwords should never expire.
Passwords should be a combination of letters and numbers.
Passwords should combine a user's special dates and initials so they can be alphanumeric.
Passwords should be changed by the user after specific periods of time.
Password expiration and lockout policies should be clearly defined.
Passwords should be short to reduce the chances of users forgetting them.
Bottom of Form
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 9/16
23 Top of Form
A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOone way this failure is indicated?
The computer automatically boots into Safe Mode and displays a warning on the screen.
The screen flashes with a red background and displays a warning message.
The computer emits a pattern of beeps indicating the failing device.
The computer returns an error message indicating the I/O address of the failing device.
Bottom of Form
24 Top of Form
A customer complains that a scanner has suddenly stopped producing clear images. Which preventivmaintenance task has the customer most likely forgotten to do?
update the firmware
visually inspect the scanner glass
remove dust from the fans
inspect the scanner cables
Bottom of Form
25 Top of Form
A technician has installed and configured an external projector on a laptop. What is the final task themust perform for the image to be displayed through the projector?
Press the function key sequence to activate the image on the projector.
Disconnect the laptop from AC power.
Reboot the laptop into dual monitor mode.
Turn audio and video off on the laptop and on for the projector.
Bottom of Form
26 Top of Form
A technician has been asked to find how a hacker keeps breaking in to a computer. Which security prwas most likely missed when the operating system was first installed?
A user account was not created.
The hard drive was not formatted with NTFS.
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 10/16
The OS product key was not entered.
A password was not assigned to the default administrator account.
Bottom of Form
27 Top of Form
Which power management method offers the most power management features?
ACPI
AMP
APM
UPS
WPM
Bottom of Form
28 Top of Form
What must be done before a technician cleans a very dirty LCD screen on a laptop?
Place the laptop in standby mode.
Remove the screen from the laptop.
Remove the battery.
Enable the autoclean setting in the BIOS.
Bottom of Form
29 Top of Form
A technician notices that an application is not responding to commands and that the computer seems slowly when applications are opened. What is the best administrative tool to use correct this problem
Task Manager
Add or Remove Programs
Event Viewer
System Restore
Bottom of Form
30 Top of Form
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 11/16
A student wishes to buy a computer suitable for game playing. What CPU speed would be appropria playing?
44.1 MHz
100 MB/s
3 GHz
1 TB
Bottom of Form
31 Top of Form
Which type of scanner generally has high costs but produces top-quality images?
all-in-one
drum
handheld
flatbed
Bottom of Form
32 Top of Form
Which program checks for installed hardware during the Windows XP boot process?
HALL
NTLDR
NTDETECT
NTOSKRNL
Bottom of Form
33 Top of Form
A network specialist has been hired to install a network in a company that assembles airplane engineof the nature of the business, the area is highly affected by electromagnetic noise. Which type of netwshould be recommended?
Category 5e
coaxial
fiber optic
UTP
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 12/16
Bottom of Form
34 Top of Form
Which environmental factor helps ensure optimal performance for laptops?
The humidity level should always be below 20 percent.
Temperature should be preferentially between 45 to 90 degrees Fahrenheit (7 to 32 degrees Celsioverheating.
In dusty conditions, laptop vents should be partially covered to prevent the internal components dirty.
Laptops should be cleaned every month or the internal components will be damaged.
Bottom of Form
35 Top of Form
A customer who owns a business that creates high-quality color graphic images wants a new printer.
customer already has an ink-jet printer. Which type of printer would be a good recommendation?dot-matrix
solid-ink
daisy-wheel
thermal
Bottom of Form
36 Top of Form
Which type of standard interface allows users to connect and disconnect peripheral devices while theis running without having to restart?
IDE
SATA
PATA
USB
Bottom of Form
37 Top of Form
A home PC user has been using an XP system for about a month when it suddenly refuses to comple processes. The POST completes successfully but the XP boot does not result in a login screen. What cause of this problem?
The network connection failed.
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 13/16
The printer driver is corrupted.
The keyboard or mouse is not plugged in.
The operating system has not been registered.
Bottom of Form
38 Top of Form
The company ABC reports that unauthorized communication from outside the network has caused se problems in the finance department. Which software tool will help prevent this situation from occurrthe future?
antivirus program
firewall
network analyzer
spyware program
Bottom of Form
39 Top of Form
Which key or key sequence pressed during the boot process will allow a user to restart a Windows Plast known good configuration?
F1
F8
F12
Alt-Z
Windows key
Bottom of Form
40 Top of Form
A technician powers on a computer and opens a web page. A message that the web page could not be
appears. After checking the URL, the technician verifies that this is the problem that was reported bycomputer owner. What would be the next step in the troubleshooting process for the technician?
Replace the NIC.
Replace the network cable.
Verify user permissions.
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 14/16
Verify the computer IP address information.
Bottom of Form
41 Top of Form
A network administrator has finished migrating from a peer-to-peer network to a new client-server nconfiguration. What are two advantages of the new configuration? (Choose two.)
The total cost of the new solution is considerably lower.
Data is more secure in the event of hardware failures.
Individual users are in control of their own computers and network resources.
Data resources and access are centrally controlled.
Personnel costs are lower because a dedicated network administrator is no longer necessary.
Bottom of Form
42 Top of Form
What is the purpose of using thermal compound when installing a CPU, a heat sink, and a fan assemmotherboard?
to insulate the CPU from the heat sink
to attach the heat sink firmly to the CPU
to conduct heat that is generated by the CPU to the heat sink
to ensure an electrical connection between the CPU and heat sink
Bottom of Form
43 Top of Form
A customer is experiencing repeated paper jams on a laser printer. Which quick solution might corre problem?
Power cycle the printer.
Download and install a new printer driver.
Replace the paper in the input tray with new paper.
Remove and replace the primary corona wire.
Bottom of Form
44 Top of Form
The IT department reported that the web server is receiving an abnormally high number of web pagefrom different locations simultaneously. Which attack characterizes this type of situation?
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 15/16
adware
DDoS
phishing
social engineering
spyware
Bottom of Form
45 Top of Form
Once a technician understands a customer complaint, it is common to ask close-ended questions. Whis a close-ended one?
What happened before the error occurred?
Is this the first time the error occurred?
What happened after the error occurred?
What error messages were displayed when the error occurred?
Bottom of Form
46 Top of Form
Which two memory types are installed using Dual Inline Memory Module (DIMM) slots? (Choose tw
cache memory
DDR SDRAM
FPM DRAM
SDRAM
SRAM
Bottom of Form
47 Top of Form
After Windows XP has been installed, which program would a technician use to select the programs at startup?
ntldr
regedit
8/9/2019 Answer Chapter 9
http://slidepdf.com/reader/full/answer-chapter-9 16/16
msconfig
Task Manager
Bottom of Form
48 Top of Form
What guideline should be followed when establishing a password security policy?
Passwords should be physically stored in a convenient location.
Passwords should contain mainly numbers for better encryption.
The system administrator should assign passwords to the users.
Lockout policies should be avoided in order to increase user access.
An expiration period should be established so that passwords frequently change.Bottom of Form
49 Top of Form
Why does the cable from the power supply to the motherboard have different colored wires?
A single wire could not carry enough current.
There is one wire for each motherboard component.
Each wire carries a different voltage.
The motherboard slot requires the number of wires that are represented by the different colors.
Bottom of Form
50 Top of Form
A Windows XP laptop user finds that the low battery alarm does not give enough warning. Where caadjust the alarm setting to issue an earlier warning?
in Power Options Properties
in the BIOS
in the System Tray on the desktop
on the battery
Bottom of Form