42
chapter 11-16 1. What is one thing a technician can determine about a system when using the command ipconfig? system network configuration 2. A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration? Use jumpers on the drive to configure the drive as slave. 3. A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user? modify 4. A technician is trying to allow user access to a printer on a small network. Which solution is the lowest in cost? computer-shared printer 5. Which technology allows a user to securely access a company LAN across a public network? VPN 6. Refer to the exhibit. Which type of technology is most suitable to bring Internet services to the facilities that are shown in the graphic? Satellite 7. After information has been gathered from a user about the failure of a printer, which two actions should be performed? (Choose two.) Ensure all cables are connected correctly. Clear any type of paper jams.

Final cap 11-16

Embed Size (px)

Citation preview

Page 1: Final cap 11-16

chapter 11-16 1. What is one thing a technician can determine about a system when using the command ipconfig? system network configuration

2. A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?Use jumpers on the drive to configure the drive as slave.

3. A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?modify

4. A technician is trying to allow user access to a printer on a small network. Which solution is the lowest in cost?computer-shared printer

5. Which technology allows a user to securely access a company LAN across a public network?VPN

6. Refer to the exhibit. Which type of technology is most suitable to bring Internet services to the facilities that are shown in the graphic?Satellite

7. After information has been gathered from a user about the failure of a printer, which two actions should be performed? (Choose two.)Ensure all cables are connected correctly.Clear any type of paper jams.

8. What two dangers exist when working on laser printers?electrical shockburns

9. What is the general term that is used to describe components of a laptop that should be replaced by a service center?FRUs

10. A technician is helping a customer select additional RAM for a computer. Which two items should be considered when updating RAM? (Choose two.)The new memory must run at least as fast as the existing memory.The new memory must be compatible with the motherboard.

Page 2: Final cap 11-16

11. Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)The computer does not have a PXE-capable NIC installed.The network shared folder that holds the OS files is not accessible.

12. A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?Use the F8 key.

13. A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.

14. A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.

15. What precaution should a technician take when checking a dot matrix printer that suddenly stops functioning?Avoid the print head, which can become hot.

16. Refer to the exhibit. A customer has upgraded to a new laptop with the specifications as shown in the exhibit. The customer reports that an older cellular WAN card fails to fit in the new laptop. What is the problem?The new laptop has an ExpressCard slot, which is incompatible with the older card.

17. A technician is helping a customer that constantly has to reset the time on a laptop. What is the probable cause of this problem?The battery on the motherboard needs to be replaced.

18. A technician has installed new RAM in a laptop. When the laptop is rebooted, it makes a long beeping noise and fails to start. What are three probable causes? (Choose three.)The RAM module edge contacts were damaged.The RAM module was incompatible with the laptop motherboard.The clips that hold the SODIMM in the slot were not locked.

19. A student is trying to upload class files to an FTP server on the school network. The connection fails from school but works fine from the home computer of the student. What is the likely problem?

Page 3: Final cap 11-16

The school has port 21 blocked on the firewall.

20. Which situation is affected by an invalid SSL certificate?a connection to a web site that uses HTTPS

21. A student laptop is running slowly, and the student suspects rogue computers are accessing the laptop. Which control panel feature is used in Windows Vista to verify the firewall setting?Security Center

22. A business is concerned that computers are susceptible to malware infection. Which two actions will help solve this problem? (Choose two.)Enable real-time virus and spyware scanning.Enable automatic antivirus and antispyware software updates.

23. After logging into a computer, a user can view files but is unable to download the files. What action can the administrator take to allow the user to download the files while preventing deletion of the files?Set the file permissions to Read and Execute.

24. A network administrator has a user that is changing the rights to files in a folder for other users. What rights does the administrator need to remove from the user?Full Control

25. Why does a technician wear an antistatic wrist strap?to prevent damage to electronic components inside the computer

26. A computer that worked fine yesterday now locks after two hours of use. What is the problem?CPU overheating

27. What is different about the default location for user files in Windows Vista compared to Windows XP?The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.

28. What is the purpose of the setupmgr.exe file?It helps prepare an answer file to automate the installation of Windows XP.

29. A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility?It prepares a computer for imaging.

30. What is the issue if the status of a hard disk drive shows as "Unreadable" in the Disk Management utility?The drive has input/output errors, has a hardware failure, or is corrupt.

Page 4: Final cap 11-16

31. A computer shows the optical drive under My Computer but fails to read a DVD disc. Which three problems could exist? (Choose three.)The optical drive is faulty.The DVD disc is inserted upside down.The DVD disc is formatted incorrectly.

32. What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?Change the settings of the Index service in the Advanced Options panel.

33. Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office?Remote Desktop Protocol

34. Which scanner process uses an IT8 target to complete its function?Calibration

35. What are two reasons why static IP addressing would be configured instead of DHCP when setting up a wireless network? (Choose two.)The network has relatively few wireless devices.Specific security polices can be applied to static IP addresses.

1

The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.)

Page 5: Final cap 11-16

 Bluetooth

Cellular

Infrared

WiFi

Satellite 2 What precaution should a technician take when checking a dot matrix printer that suddenly stops

functioning? 

Avoid the fuser unit, which can become hot.

Avoid the corona wire, which can retain a high voltage.

Avoid the print head, which can become hot.

Avoid the platen, which can retain a high voltage. 3 A technician needs to stop the print spooler on a Windows XP computer because the printer has

failed. Which set of commands should the technician follow? 

Choose Start > Control Panel > System. Choose Hardware tab. Choose Services.

Choose Start > All Programs > Accessories > System Tools. Choose Services. Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.Choose Start > Control Panel > Printers and Faxes. Right click the icon for the printer. ChooseProperties. Choose the Advanced tab. Choose Services.

 4 A Windows XP computer that once had three operating systems installed now has only one operating

system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file? 

Click Start > Control Panel > System. Click the Advanced tab. Click Performance OptionsRight click My Computer. Choose Manage. Click System Tools. Double-click Disk Management.Right click Start > Control Panel > Administrative Tools > Computer Management. Double-click Storage. Double-click Disk Management.Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.

 5

Page 6: Final cap 11-16

Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought.

Which type of memory module is the IT department expecting to receive? 

DIMM

DDR2

DRAM

LT-RAM

SODIMM

SORAM 6 Which security technology will control access to a data storage facility?

 enforcing network logins

fitting equipment with security screws

using cable locks

using card keys 7 A new technician has joined the IT team and is about to service a heavy printer. Which two

precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.) 

Avoid lifting the equipment using the strength in your back.

Lift the equipment using the strength in your legs and knees.

Page 7: Final cap 11-16

Avoid bending your knees when lifting the printer.

Bend your back to pick the printer up.

Avoid lifting the printer close to your body. 8 A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having

problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship? 

USB 2.0 is twice as fast as USB 1.1.

USB 2.0 is twenty times as fast as USB 1.1.

USB 2.0 is forty times as fast as USB 1.1.

USB 2.0 is one hundred times as fast as USB 1.1. 9 A technician has been asked to install a second optical drive in a computer. The technician will need

to configure the drive as slave. How can the technician accomplish this desired configuration? 

Use jumpers on the motherboard to configure the drive as slave.

List the drive as slave in the CMOS.

Connect the drive after the twist in the PATA cable.

Use jumpers on the drive to configure the drive as slave. 10 Several messages sent to the network administrator are reporting that access to a secure server using

HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem? 

22

53

80

143

443 11 A junior technician finds preventive maintenance very boring and would prefer to fix real problems.

However, what is the most important reason for the company that the preventive maintenance be done? 

It is important to train the junior technicians to become good technicians by giving them the preventive maintenance duties.Preventive maintenance helps to protect the computer equipment against future problems.Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.Preventive maintenance enables the IT manager to check on the location and state of the

Page 8: Final cap 11-16

computer assets. 12 What two dangers exist when working on laser printers?

 mercury poisoning

electrical shock

hexavalent chromium ingestion

burns

lead poisoning 13 What is one thing a technician can determine about a system when using the command ipconfig

 user e-mail address

operating system configuration

system network configuration

system password 14 A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is

connected to the computer. What could the technician do to reset the monitor settings? 

Use the BIOS.

Use the Windows installation CD.

Use internal DOS commands.

Use the F8 key.  15 A user on the network needs to be able to add and remove files in a shared folder on an NTFS-

formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user? 

modify

execute

read

write  16 Which interface can transfer data at a maximum speed of 480 Mbps?

 parallel

serial

SCSI

USB 2.0

Page 9: Final cap 11-16

IEEE 1394 17 A technician has been asked to connect a new scanner to a computer. Which interface provides the

fastest transfer of data? 

USB 2.0

SCSI (Ultra-320)

Parallel (IEEE 1284)

Serial (RS-232) 18 Using RIS, a technician is having difficulties performing a remote installation. Which two problems

would cause the remote installations to fail? (Choose two.) 

The unattend.txt file is corrupted.

The computer does not have a PXE-capable NIC installed.

The third party drive imaging utility is faulty.

The setupmgr.exe was not used to connect to the remote computer.

The network shared folder that holds the OS files is not accessible. 19 A company has a preventive maintenance policy that requires every computer have a new restore

point created every six months. How can a technician create the restore point? 

From the CLI enter the command restore /cn.Go to Start > Control Panel > Accessories > System Tools > System Restore > Create a restore point.Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.Right-click My Computer and then go to Properties > Restore > Create Restore Point.

 20 What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.)

 These cables usually have 9 pins or 25 pins on both ends.

The maximum cable length is 50 ft (15 m).

All ports that are used by this standard are also known as D-shell ports.

The two available operative modes are EPP and ECP.

Bi-directional communication is allowed. 21 After information has been gathered from a user about the failure of a printer, which two actions

should be performed? (Choose two.) 

Change the communication cable.

Page 10: Final cap 11-16

Ensure all cables are connected correctly.

Reinstall the print driver.

Clear any type of paper jams.

Clear the printer queue.

Look for any type of upgrade on the web. 22 A user wants to upgrade the video adapter in a computer. What is the first issue the user should

consider when selecting a newer video adapter? 

Is there an available compatible expansion slot on the motherboard?

Does the price of the video adapter include a comprehensive warranty?

Are video adapter drivers available for the operating system that is in use?

Does the video manufacturer have a reputation for reliable and high quality products? 23 Which Windows hard drive partition is referred to as the C: drive?

 the first volume partition

the first primary partition

the first extended partition

the first logical partition 24 A technician is helping a customer select additional RAM for a computer. Which two items should be

considered when updating RAM? (Choose two.) 

The new memory must run at least as fast as the existing memory.

The total amount of memory must not exceed the size of the swap file.

The new memory must be compatible with the motherboard.

The new memory must run at speeds as fast as the cache of the CPU.

The new memory must be compatible with the video card. 25 A technician has received several reports from employees about receiving e-mail from websites that

request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites? 

virus protection

spyware protection

adware protection

phishing protection 26 A network administrator needs to restrict access to the network. Which type of firewall allows only

Page 11: Final cap 11-16

those packets that are part of a known connection? 

stateful firewall

proxy firewall

packet filter

content engine 27 A network technician is installing network service in a new office. What is the distance limitation of a

single data run for UTP cabling without adding networking devices? 

33 ft (10 m)

100 ft (31 m)

330 ft (100 m)

500 ft (154 m) 28 Which technology allows a user to securely access a company LAN across a public network?

 MD5

SHA

TCP

VPN 29 A technician has been performing routine preventive maintenance on a PC. After maintenance is

performed and the PC and monitor are turned on, the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC. What possible problem should the technician investigate first? 

The monitor was damaged during cleaning.

The video connector has been disabled.

The computer requires two monitors for video.

The video drivers need to be updated. 30 Engineers are designing a security scheme to allow only authorized persons to access the facilities of

a national bank. Which security control measure provides the most secure solution for employee identification? 

card keys

security guards

security key fobs

biometric devices

Page 12: Final cap 11-16

 31

Refer to the exhibit. Which type of technology is most suitable to bring Internet services to the facilities that are shown in the graphic? 

ADSL

Infrared

WiFi

Satellite 32 The network manager decides to implement a simple security solution to the company WLANs. Which

wireless security technique should the manager take to hide the WLAN id from any access point? 

Configure WEP only on the access point.

Install WAP on the wireless clients.

Configure MAC address filtering on the access point.

Disable the broadcast of the SSID on the access point.

Decrease the antenna spectrum on each wireless client.  33 A technician is trying to allow user access to a printer on a small network. Which solution is the lowest

in cost? 

wired print server

dedicated PC print server

computer-shared printer

wireless print server

on-demand PC print server 34 Which external connection technology would a technician choose for a customer who wants to

Page 13: Final cap 11-16

connect a device capable of a data transfer rate of 700 Mb/s to a computer? 

USB 2.0

802.11 (Wi-Fi)

Serial (RS-232)

IEEE 1394b (Firewire) 35 A home laptop owner was warned that the brand new laptop just purchased has batteries that should

be fully discharged on a regular basis and then recharged. Which three types of battery should be treated this way? (Choose three.) 

alkaline

HgO

Li-ion

NiCd

NiMH 

1. What is one advantage of a solid state drive?*less prone to failure than a traditional drive

2. A customer has spilled some liquid into the laptop keyboard. The laptop appears to function properly except for the keys. After cleaning the keyboard, the technician tests the keyboard and it still has failing keys. What are two possible actions the technician could take? (Choose two.)*Replace the keyboard.*Use an external keyboard until the laptop keyboard is replaced

3. A user mentions that the Photoshop application has been recently installed on a laptop and that the laptop runs slowly when Photoshop is running. The computer technician checks on the laptop and notices that while the laptop responds normally when it is being used to surf the web, the hard disk light is constantly on when Photoshop is running. What is the most likely cause of the excessive hard disk activity?*disk fragmentation

4. Which authentication technology uses a physical characteristic of the user in conjunction with a password?

Page 14: Final cap 11-16

*biometrics

5. A junior technician finds preventive maintenance very boring and would prefer to fix real problems. However, what is the most important reason for the company that the preventive maintenance be done?*Preventive maintenance helps to protect the computer equipment against future problems.

6. A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.)*Avoid lifting the equipment using the strength in your back*Lift the equipment using the strength in your legs and knees

7. Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for the authentication to be accepted?*smart key

8. The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.)*Bluetooth*Infrared

9. Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.)*Disabling SSID broadcasts.*Configuring MAC address filtering.

10. What is the issue if the status of a hard disk drive shows as “Unreadable” in the Disk Management utility?*The drive has input/output errors, has a hardware failure, or is corrupt.

11. A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?*Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.

12. After checking that a new ink jet printer has new ink cartridges, that dry paper has been installed as recommended by manufacturer, and that the latest printer driver has been installed, a technician notes that the printer still fails to produce any output. Which three actions could possibly resolve this problem? (Choose three.)*Check and secure the cables.*Set the printer to Resume Printing.*Ensure that the printer is powered on.

Page 15: Final cap 11-16

13. A technician has installed new RAM in a laptop. When restarted the laptop emitted a long beep. What are two possible causes and solutions for this problem? (Choose two.)*The laptop BIOS should be upgraded when installing the RAM.*The new RAM is defective and must be replaced.

14. A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites?*phishing protection

15. A user is experiencing problems with a new removable external drive. What two checks should a technician perform to ensure that a removable external drive will be recognized by a computer? (Choose two.)*Ensure that the correct drivers are installed.*Check that the external ports are enabled in the BIOS settings.

16. A temporary user is trying to log in to a computer that the same user used last month, but now is unable to complete the login process. What are two possible causes of the failed login? (Choose two.)The user does not have the rights to log in.*The user account has been disabled.*The user is using an incorrect username or password.

17. A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without adding networking devices?*330 ft (100 m)

18. What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?*Change the settings of the Index service in the Advanced Options panel.

19. What is the purpose of the setupmgr.exe file?*It helps prepare an answer file to automate the installation of Windows XP.

20. A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?*Use the F8 key.

21. A laptop less than six months old shuts down after about 30 minutes of operation. When the AC power adapter is connected, the laptop continues to shutdown after a short period of operation each time the laptop is restarted. What should be recommended as a solution?*The laptop power scheme is set to an unsuitable environment. Have the customer

Page 16: Final cap 11-16

adjust the power scheme through the control panel.

22. Which external connection technology would a technician choose for a customer who wants to connect a device capable of a data transfer rate of 700 Mb/s to a computer?*IEEE 1394b (Firewire)

23. A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?*Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.

24. A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC and monitor are turned on, the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC. What possible problem should the technician investigate first?*The monitor was damaged during cleaning.

25. What is different about the default location for user files in Windows Vista compared to Windows XP?*The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.

26. In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all pings in the class fail?*The Windows firewall is blocking the ping.

27. Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The computer has the internal and external ports listed in the exhibit. Which solution would be the best if optimal performance is the deciding factor?*Attach a hard drive to an internal SATA port.

28. Why does a technician wear an antistatic wrist strap?*to prevent damage to electronic components inside the computer

29. A technician uses an application to capture packets on the network. One such capture reveals the password that is used by a person in the classroom to initiate a Telnet session with a school network device. What recommendation could the technician make to the person who is using Telnet?*If possible, enable the network device to use SSH instead of Telnet.

30. Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office?*Remote Desktop Protocol

Page 17: Final cap 11-16

31. A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility?*It prepares a computer for imaging.

32. A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a newer video adapter?*Is there an available compatible expansion slot on the motherboard?

33. A customer requires a computer storage system that uses no more than two drives to provide drive redundancy and the highest possible performance. Which type of RAID should the technician install?*RAID level 0 – data striping

34. Which would be a reason to update the BIOS of a computer?*A computer being prepared for an upgrade is found to lack support for newer hardware devices

35. Which statement best describes how telephone calls are carried over data networks and the Internet?*Analog voice signals are converted into digital information that is transported in IP packets

36. Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)*The unattend.txt file is corrupted*The network shared folder that holds the OS files is not accessible.

37. A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?*modify

38. A technician is working on a networked computer that has an IP address of 169.254.25.66 and no Internet access. What could the technician do to remedy the problem?*Reload TCP/IP on the computer.

1A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired?

Page 18: Final cap 11-16

– Stop the print spooler.

2For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.)– regional settings– network settings

3Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?– 443

4A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choose two.)– The monitor cable connector is loose or disconnected because the retaining screws are missing.– The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter.

5Which Windows hard drive partition is referred to as the C: drive?– the first primary partition

6A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?– USB 2.0 is one hundred times as fast as USB 1.1.

7Which feature is characteristic of the ntbackup command?– It is used create restore points.

Page 19: Final cap 11-16

8Which safety precaution should an installer take when installing cable in the ceiling of a building?– Wear safety glasses in case of encountering toxic materials during the installation.

9Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?– biometric devices

10Which Startup type must be selected for a service that should run each time the computer is booted?– automatic

11What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.)– The computer displays an “Invalid Boot Disk” error after POST.– The computer displays an “Inaccessible Boot Device” error after POST

12Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought.

Which type of memory module is the IT department expecting to receive?– SODIMM

13Which recommendation should be observed when replacing existing memory?– The new memory should be as fast or faster than existing memory.

14Refer to the exhibit. Which utility has the IT department started on each computer?

Page 20: Final cap 11-16

– Defragment

15A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem?– Start the Vista Aero enhanced display features by launching services.msc.

16The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?– VPN

17When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?– thermal compound

18Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)– 25– 110– 143

19A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?– Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.

20Which two hazards are related to fiber optic installations? (Choose two.)– light that can burn the eyes– glass splinters that can penetrate the skin

21

Page 21: Final cap 11-16

A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?– SCSI (Ultra-320)

22A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?– mesh

23What is the highest risk associated with improperly charged or mishandled batteries?– The battery can explode.

24Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive?– 3 logical, 1 extended, 1 free space, 1 primary

25Which two characteristics describe a software firewall? (Choose two.)– It typically protects only the computer it is installed on.– It uses the CPU in the host computer.

26What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.)– These cables usually have 9 pins or 25 pins on both ends.– The two available operative modes are EPP and ECP.

27Which action should be taken first if a card key is lost or stolen?– Disable the lost card key.

28A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem?

Page 22: Final cap 11-16

– Change the startup type for the utility to Automatic in Services.

29The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point?– Disable the broadcast of the SSID on the access point.

30The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem?– Defragment the hard disk.

31A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem? (Choose two.)– Clean the surface of the touchpad.– Ensure that the operating system has the correct driver for the touchpad.

32Refer to the exhibit. Based on the information shown, which statement is true?– The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87.

33Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this motherboard?– The Intel Core i7 processor supports a maximum bus speed of 1600MHz.

34Which interface can transfer data at a maximum speed of 480 Mbps?– USB 2.0

35A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed?– RAM

Page 23: Final cap 11-16

1

A network administrator has been informed about a problem with the network

printer. What is the most reliable way to prevent print jobs from being added to

the queue while the printer is being repaired?

– Stop the print spooler.

2

For a default installation of Windows XP Professional, which two settings are

customizable? (Choose two.)

– regional settings

– network settings

3

Several messages sent to the network administrator are reporting that access to

a secure server using HTTPS is failing. After checking recent updates to the

company firewall, the administrator learns that the firewall is blocking HTTPS.

Which port should be opened to solve the problem?

– 443

4

A computer has been relocated and all the cables reconnected. When the

computer is powered on, the correct POST audio signals are heard and the hard

drive LED shows disk activity. However, the monitor fails to display anything.

What are two possible causes of this problem? (Choose two.)

– The monitor cable connector is loose or disconnected because the retaining

screws are missing.

– The monitor is connected to the integrated video adapter on the motherboard

instead of the expansion slot adapter.

5

Which Windows hard drive partition is referred to as the C: drive?

– the first primary partition

6

A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of

speed. The user is having problems comparing the two standards based on the

values expressed in Mbps. Which explanation can the technician use that will

Page 24: Final cap 11-16

best describe the relationship?

– USB 2.0 is one hundred times as fast as USB 1.1.

7

Which feature is characteristic of the ntbackup command?

– It is used create restore points.

8

Which safety precaution should an installer take when installing cable in the

ceiling of a building?

– Wear safety glasses in case of encountering toxic materials during the

installation.

9

Engineers are designing a security scheme to allow only authorized persons to

access the facilities of a national bank. Which security control measure provides

the most secure solution for employee identification?

– biometric devices

10

Which Startup type must be selected for a service that should run each time the

computer is booted?

– automatic

11

What are two problems that are caused by setting an incorrect boot order in the

system BIOS? (Choose two.)

– The computer displays an “Invalid Boot Disk” error after POST.

– The computer displays an “Inaccessible Boot Device” error after POST

12

Refer to the exhibit. The IT department requested a new set of memory chips to

upgrade the old laptops. A picture of the memory chip required is attached to the

purchase order so the correct item can be bought.

Which type of memory module is the IT department expecting to receive?

– SODIMM

13

Which recommendation should be observed when replacing existing memory?

– The new memory should be as fast or faster than existing memory.

14

Refer to the exhibit. Which utility has the IT department started on each

Page 25: Final cap 11-16

computer?

– Defragment

15

A Windows Vista computer does not display the thumbnail views of two windows

that are currently minimized in the taskbar when the mouse pointer is placed over

the appropriate tile on the taskbar. What is a possible solution to this problem?

– Start the Vista Aero enhanced display features by launching services.msc.

16

The corporate security policy states that all remote connections use only secure

tunnels for transport of data. Which encryption technique secures data traveling

across the public Internet as if it were traveling across the corporate LAN?

– VPN

17

When upgrading a CPU what must be applied between the new CPU and the

heat sink/fan?

– thermal compound

18

Which three ports should be left open to avoid filtering e-mail traffic? (Choose

three.)

– 25

– 110

– 143

19

A company has a preventive maintenance policy that requires every computer

have a new restore point created every six months. How can a technician create

the restore point?

– Go to Start > All Programs > Accessories > System Tools > System Restore >

Create a restore point.

20

Which two hazards are related to fiber optic installations? (Choose two.)

– light that can burn the eyes

– glass splinters that can penetrate the skin

21

A technician has been asked to connect a new scanner to a computer. Which

interface provides the fastest transfer of data?

– SCSI (Ultra-320)

Page 26: Final cap 11-16

22

A technician has been asked to develop a physical topology for a network that

provides a high level of redundancy. Which physical topology requires that every

node is attached to every other node on the network?

– mesh

23

What is the highest risk associated with improperly charged or mishandled

batteries?

– The battery can explode.

24

Refer to the exhibit. What type of partition arrangement does this Windows XP

computer have on its hard drive?

– 3 logical, 1 extended, 1 free space, 1 primary

25

Which two characteristics describe a software firewall? (Choose two.)

– It typically protects only the computer it is installed on.

– It uses the CPU in the host computer.

26

What are two characteristics of the IEEE 1284 parallel interface standard?

(Choose two.)

– These cables usually have 9 pins or 25 pins on both ends.

– The two available operative modes are EPP and ECP.

27

Which action should be taken first if a card key is lost or stolen?

– Disable the lost card key.

28

A technician has installed a third party utility that is used to manage a Windows

XP computer. However, the utility is unable to startup automatically whenever the

computer is started. What can the technician do to resolve this problem?

– Change the startup type for the utility to Automatic in Services.

29

The network manager decides to implement a simple security solution to the

company WLANs. Which wireless security technique should the manager take to

hide the WLAN id from any access point?

– Disable the broadcast of the SSID on the access point.

Page 27: Final cap 11-16

30

The production manager of a small company is experiencing slow performance in

a laptop. What should a technician try first in order to correct the problem?

– Defragment the hard disk.

31

A technician is working on a laptop with a touchpad that fails to work. Which two

actions can the technician take to try to repair the problem? (Choose two.)

– Clean the surface of the touchpad.

– Ensure that the operating system has the correct driver for the touchpad.

32

Refer to the exhibit. Based on the information shown, which statement is true?

– The only PC allowed on the wireless network is the one with the MAC address

00:05:4E:49:64:87.

33

Refer to the exhibit and consider the advertisement that is shown. Based on the

advertisement, which statement is accurate regarding this motherboard?

– The Intel Core i7 processor supports a maximum bus speed of 1600MHz.

34

Which interface can transfer data at a maximum speed of 480 Mbps?

– USB 2.0

35

A call center technician receives a call from a customer who wishes to add more

memory to a laptop to increase graphics performance. Which type of memory

should be installed?

– RAM

What is one advantage of a solid state drive?

– less prone to failure than a traditional drive

2

A customer has spilled some liquid into the laptop keyboard. The laptop appears

to function properly except for the keys. After cleaning the keyboard, the

technician tests the keyboard and it still has failing keys. What are two possible

actions the technician could take? (Choose two.)

Page 28: Final cap 11-16

– Replace the keyboard.

– Use an external keyboard until the laptop keyboard is replaced

3

A user mentions that the Photoshop application has been recently installed on a

laptop and that the laptop runs slowly when Photoshop is running. The computer

technician checks on the laptop and notices that while the laptop responds

normally when it is being used to surf the web, the hard disk light is constantly on

when Photoshop is running. What is the most likely cause of the excessive hard

disk activity?

– disk fragmentation

4

Which authentication technology uses a physical characteristic of the user in

conjunction with a password?

– biometrics

5

A junior technician finds preventive maintenance very boring and would prefer to

fix real problems. However, what is the most important reason for the company

that the preventive maintenance be done?

– Preventive maintenance helps to protect the computer equipment against

future problems.

6

A new technician has joined the IT team and is about to service a heavy printer.

Which two precautions should be taken to avoid any injury when transporting the

heavy printer to the service area? (Choose two.)

– Avoid lifting the equipment using the strength in your back

– Lift the equipment using the strength in your legs and knees

7

Which two-factor identification method requires a user to use a small radio

transmitting device and then enter a password in order for the authentication to

be accepted?

– smart key

8

The ABC Company sales force has been provided with smartphones and

portable printers as shown in the graphic. Which two short-range technologies

can support these types of devices? (Choose two.)

Page 29: Final cap 11-16

– Bluetooth

– Infrared

9

Which two wireless configuration features make it harder for a hacker to see and

attach to a wireless network? (Choose two.)

– Disabling SSID broadcasts.

– Configuring MAC address filtering.

10

What is the issue if the status of a hard disk drive shows as “Unreadable” in the

Disk Management utility?

– The drive has input/output errors, has a hardware failure, or is corrupt.

11

A technician needs to stop the print spooler on a Windows XP computer because

the printer has failed. Which set of commands should the technician follow?

– Choose Start > Control Panel > Administrative Tools >Computer Management.

Choose Services.

12

After checking that a new ink jet printer has new ink cartridges, that dry paper

has been installed as recommended by manufacturer, and that the latest printer

driver has been installed, a technician notes that the printer still fails to produce

any output. Which three actions could possibly resolve this problem? (Choose

three.)

– Check and secure the cables.

– Set the printer to Resume Printing.

– Ensure that the printer is powered on.

13

A technician has installed new RAM in a laptop. When restarted the laptop

emitted a long beep. What are two possible causes and solutions for this

problem? (Choose two.)

– The laptop BIOS should be upgraded when installing the RAM.

– The new RAM is defective and must be replaced.

14

A technician has received several reports from employees about receiving e-mail

from websites that request private bank information. Which type of security

should be implemented to block employees from accessing these suspicious

Page 30: Final cap 11-16

websites?

– phishing protection

15

A user is experiencing problems with a new removable external drive. What two

checks should a technician perform to ensure that a removable external drive will

be recognized by a computer? (Choose two.)

– Ensure that the correct drivers are installed.

– Check that the external ports are enabled in the BIOS settings.

16

A temporary user is trying to log in to a computer that the same user used last

month, but now is unable to complete the login process. What are two possible

causes of the failed login? (Choose two.)

The user does not have the rights to log in.

– The user account has been disabled.

– The user is using an incorrect username or password.

17

A network technician is installing network service in a new office. What is the

distance limitation of a single data run for UTP cabling without adding networking

devices?

– 330 ft (100 m)

18

What could be the possible solution to the Windows Vista search feature taking

longer than expected to find results?

– Change the settings of the Index service in the Advanced Options panel.

19

What is the purpose of the setupmgr.exe file?

– It helps prepare an answer file to automate the installation of Windows XP.

20

A computer had updates installed and was rebooted. Nothing is displaying on the

monitor that is connected to the computer. What could the technician do to reset

the monitor settings?

– Use the F8 key.

21

A laptop less than six months old shuts down after about 30 minutes of

operation. When the AC power adapter is connected, the laptop continues to

shutdown after a short period of operation each time the laptop is restarted. What

Page 31: Final cap 11-16

should be recommended as a solution?

– The laptop power scheme is set to an unsuitable environment. Have the

customer adjust the power scheme through the control panel.

22

Which external connection technology would a technician choose for a customer

who wants to connect a device capable of a data transfer rate of 700 Mb/s to a

computer?

– IEEE 1394b (Firewire)

23

A Windows XP computer that once had three operating systems installed now

has only one operating system. However, when the computer boots up, the user

is still presented with a choice between the old systems and XP. Which path

allows the user to make changes to the BOOT.INI file?

– Click Start. Right click My Computer. Choose Properties. Choose the

Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.

24

A technician has been performing routine preventive maintenance on a PC. After

maintenance is performed and the PC and monitor are turned on, the monitor

displays a black screen. The technician does a visual inspection and determines

that there are two video ports at the back of the PC. What possible problem

should the technician investigate first?

– The monitor was damaged during cleaning.

25

What is different about the default location for user files in Windows Vista

compared to Windows XP?

– The default location for user files in Windows Vista is within a user-specific

subfolder in the Users folder.

26

In a networking class, the instructor tells the students to ping the other computers

from the command prompt. Why do all pings in the class fail?

-The Windows firewall is blocking the ping.

27

Refer to the exhibit. A customer purchased a computer three years ago and

needs to add a second hard drive. The computer has the internal and external

ports listed in the exhibit. Which solution would be the best if optimal

Page 32: Final cap 11-16

performance is the deciding factor?

-Attach a hard drive to an internal SATA port.

28

Why does a technician wear an antistatic wrist strap?

-to prevent damage to electronic components inside the computer

29

A technician uses an application to capture packets on the network. One such

capture reveals the password that is used by a person in the classroom to initiate

a Telnet session with a school network device. What recommendation could the

technician make to the person who is using Telnet?

-If possible, enable the network device to use SSH instead of Telnet.

30

Which Windows protocol enables a technician at company headquarters to view

the screen and control the mouse and keyboard of a computer in a branch

office?

-Remote Desktop Protocol

31

A technician is compiling a company computer support training manual. One of

the utilities that is described in the manual is Sysprep. What is the purpose of this

utility?

-It prepares a computer for imaging.

32

A user wants to upgrade the video adapter in a computer. What is the first issue

the user should consider when selecting a newer video adapter?

-Is there an available compatible expansion slot on the motherboard?

33

A customer requires a computer storage system that uses no more than two

drives to provide drive redundancy and the highest possible performance. Which

type of RAID should the technician install?

-RAID level 0 – data striping

34

Which would be a reason to update the BIOS of a computer?

-A computer being prepared for an upgrade is found to lack support for newer

hardware devices

35

Which statement best describes how telephone calls are carried over data

Page 33: Final cap 11-16

networks and the Internet?

-Analog voice signals are converted into digital information that is transported in

IP packets

36

Using RIS, a technician is having difficulties performing a remote installation.

Which two problems would cause the remote installations to fail? (Choose two.)

-The unattend.txt file is corrupted

-The network shared folder that holds the OS files is not accessible.

37

A user on the network needs to be able to add and remove files in a shared

folder on an NTFS-formatted server. Users should never be allowed to assume

ownership of the shared folder. Which permission should the administrator

assign to the user?

-modify

38

A technician is working on a networked computer that has an IP address of

169.254.25.66 and no Internet access. What could the technician do to remedy

the problem?

-Reload TCP/IP on the computer.