Скачать презентацию The Final Revision IT Essentials PC Hardware Скачать презентацию The Final Revision IT Essentials PC Hardware

2e02348f0c89091807daf041c5f0b39f.ppt

  • Количество слайдов: 141

The Final Revision IT Essentials PC Hardware & Software The Final Revision IT Essentials PC Hardware & Software

1 - ABC Company wants to configure laptops to automatically power components off to 1 - ABC Company wants to configure laptops to automatically power components off to improve battery life. Which power management control can be used to accomplish this? • • • ACPI AMD UPS BIOS Pn. P BIOS

1 - ABC Company wants to configure laptops to automatically power components off to 1 - ABC Company wants to configure laptops to automatically power components off to improve battery life. Which power management control can be used to accomplish this? • • • ACPI AMD UPS BIOS Pn. P BIOS

2 - A technician is asked to configure the time the system must be 2 - A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windowsbased laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management? • • • Administrative Tools BIOS Command Prompt Safe mode System Registry

2 - A technician is asked to configure the time the system must be 2 - A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windowsbased laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management? • • • Administrative Tools BIOS Command Prompt Safe mode System Registry

3 - Refer to the exhibit. What is the correct order of steps to 3 - Refer to the exhibit. What is the correct order of steps to safely remove one of several hot-swappable devices using the least amount of steps? • • 2, 3, 5, 6 1, 4, 5, 6 2, 5, 6

3 - Refer to the exhibit. What is the correct order of steps to 3 - Refer to the exhibit. What is the correct order of steps to safely remove one of several hot-swappable devices using the least amount of steps? • • 2, 3, 5, 6 1, 4, 5, 6 2, 5, 6

4 - Which utility can be used to determine end-to-end connectivity between source and 4 - Which utility can be used to determine end-to-end connectivity between source and destination? • • Ipconfig Nbstat Netstat Ping

4 - Which utility can be used to determine end-to-end connectivity between source and 4 - Which utility can be used to determine end-to-end connectivity between source and destination? • • Ipconfig Nbstat Netstat Ping

5 - Which topology has only one central point of failure, is easy to 5 - Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks? • • bus mesh ring star

5 - Which topology has only one central point of failure, is easy to 5 - Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks? • • bus mesh ring star

6 - A user is reporting that a new external hard drive is defective. 6 - A user is reporting that a new external hard drive is defective. The laptop will allow access to the drive at times, and then will report that the drive cannot be found. Upon an initial examination of the laptop, it is discovered that the user has ten USB devices connected to the laptop. What is the best quick solution to this problem? • Remove all the peripherals except the hard drive and observe the results. • Move the laptop to another location and observe the results. • Replace the power adapter and observe the results. • Replace the USB hub and observe the results. • Flash the BIOS on the laptop and observe the results.

6 - A user is reporting that a new external hard drive is defective. 6 - A user is reporting that a new external hard drive is defective. The laptop will allow access to the drive at times, and then will report that the drive cannot be found. Upon an initial examination of the laptop, it is discovered that the user has ten USB devices connected to the laptop. What is the best quick solution to this problem? • Remove all the peripherals except the hard drive and observe the results. • Move the laptop to another location and observe the results. • Replace the power adapter and observe the results. • Replace the USB hub and observe the results. • Flash the BIOS on the laptop and observe the results.

7 - Which Windows XP command displays the route taken by packets crossing an 7 - Which Windows XP command displays the route taken by packets crossing an IP network? • • • iproute netview nslookup ping tracert

7 - Which Windows XP command displays the route taken by packets crossing an 7 - Which Windows XP command displays the route taken by packets crossing an IP network? • • • iproute netview nslookup ping tracert

8 - Which type of program causes banners and ads to appear on the 8 - Which type of program causes banners and ads to appear on the desktop without any user intervention? • • adware spyware stealth virus trojan horse

8 - Which type of program causes banners and ads to appear on the 8 - Which type of program causes banners and ads to appear on the desktop without any user intervention? • • adware spyware stealth virus trojan horse

9 - Why do mobile devices such as laptop computers use specifically designed CPUs? 9 - Why do mobile devices such as laptop computers use specifically designed CPUs? • • They consume less power. They are smaller. They are lighter. They require customized cooling mechanisms. • They need to fit proprietary motherboards.

9 - Why do mobile devices such as laptop computers use specifically designed CPUs? 9 - Why do mobile devices such as laptop computers use specifically designed CPUs? • • They consume less power. They are smaller. They are lighter. They require customized cooling mechanisms. • They need to fit proprietary motherboards.

10 - Where can a user change the idle time after which a laptop 10 - Where can a user change the idle time after which a laptop will switch to standby mode? • Right-click the desktop, then click Power Modes > Standby. • Right-click My Computer, then click Properties > Hardware > Device Manager > ACPI. • Left-click Start > Control Panel > Power Options, then click the Power Schemes tab. • Left-click Start > All Programs > Accessories > System Tools > Power Management.

10 - Where can a user change the idle time after which a laptop 10 - Where can a user change the idle time after which a laptop will switch to standby mode? • Right-click the desktop, then click Power Modes > Standby. • Right-click My Computer, then click Properties > Hardware > Device Manager > ACPI. • Left-click Start > Control Panel > Power Options, then click the Power Schemes tab. • Left-click Start > All Programs > Accessories > System Tools > Power Management.

11 - A technician thinks that the file system on a computer has a 11 - A technician thinks that the file system on a computer has a problem because Windows XP is reporting integrity data issues. Which Windows XP utility will check the file system for errors? • • Attrib Chkdsk Fdisk Format

11 - A technician thinks that the file system on a computer has a 11 - A technician thinks that the file system on a computer has a problem because Windows XP is reporting integrity data issues. Which Windows XP utility will check the file system for errors? • • Attrib Chkdsk Fdisk Format

12 - Which specification was developed to resolve the problem of hardware conflicts? • 12 - Which specification was developed to resolve the problem of hardware conflicts? • • • AGP HAL IRQ-and-DMA OSR 2 Pn. P

12 - Which specification was developed to resolve the problem of hardware conflicts? • 12 - Which specification was developed to resolve the problem of hardware conflicts? • • • AGP HAL IRQ-and-DMA OSR 2 Pn. P

13 - Which three rules increase the level of password strength? (Choose three. ) 13 - Which three rules increase the level of password strength? (Choose three. ) • Passwords should never expire. • Passwords should be a combination of letters and numbers. • Passwords should combine a user's special dates and initials so they can be alphanumeric. • Passwords should be changed by the user after specific periods of time. • Password expiration and lockout policies should be clearly defined. • Passwords should be short to reduce the chances of users forgetting them.

13 - Which three rules increase the level of password strength? (Choose three. ) 13 - Which three rules increase the level of password strength? (Choose three. ) • Passwords should never expire. • Passwords should be a combination of letters and numbers. • Passwords should combine a user's special dates and initials so they can be alphanumeric. • Passwords should be changed by the user after specific periods of time. • Password expiration and lockout policies should be clearly defined. • Passwords should be short to reduce the chances of users forgetting them.

14 - Which set of related files store all the settings of a Windows 14 - Which set of related files store all the settings of a Windows XP installation? • • Registry Control Panel. ini HWINFO. EXE

14 - Which set of related files store all the settings of a Windows 14 - Which set of related files store all the settings of a Windows XP installation? • • Registry Control Panel. ini HWINFO. EXE

15 - What characterizes a DDo. S attack? • • Many hosts participate in 15 - What characterizes a DDo. S attack? • • Many hosts participate in a coordinated attack. Infected computers are called Daemons. It is easy to identify the source of the attack. All hosts must be in the same geographic area.

15 - What characterizes a DDo. S attack? • • Many hosts participate in 15 - What characterizes a DDo. S attack? • • Many hosts participate in a coordinated attack. Infected computers are called Daemons. It is easy to identify the source of the attack. All hosts must be in the same geographic area.

16 - What characterizes spoofing? • Making data appear to come from a source 16 - What characterizes spoofing? • Making data appear to come from a source other than the actual source. • Sending abnormally large amounts of data to a remote server to prevent user access to the server services. • Intercepting or inserting false information in traffic between two hosts. • Sending bulk e-mail to individuals, lists, or domains intending to prevent users from accessing e-mail.

16 - What characterizes spoofing? • Making data appear to come from a source 16 - What characterizes spoofing? • Making data appear to come from a source other than the actual source. • Sending abnormally large amounts of data to a remote server to prevent user access to the server services. • Intercepting or inserting false information in traffic between two hosts. • Sending bulk e-mail to individuals, lists, or domains intending to prevent users from accessing e-mail.

17 - A technician has been asked to install memory that detects multiple bit 17 - A technician has been asked to install memory that detects multiple bit errors and corrects single bit errors in memory. Which type of memory should be installed if the motherboard supports these features? • • parity ECC non-parity CRC

17 - A technician has been asked to install memory that detects multiple bit 17 - A technician has been asked to install memory that detects multiple bit errors and corrects single bit errors in memory. Which type of memory should be installed if the motherboard supports these features? • • parity ECC non-parity CRC

18 - PATA data cables are available in two different types. The types are 18 - PATA data cables are available in two different types. The types are distinguished by the number of conductors. Which two types are available? (Choose two. ) • • • 6 40 68 80 120

18 - PATA data cables are available in two different types. The types are 18 - PATA data cables are available in two different types. The types are distinguished by the number of conductors. Which two types are available? (Choose two. ) • • • 6 40 68 80 120

19 - How many conductors are found in a SATA data cable? • • 19 - How many conductors are found in a SATA data cable? • • • 3 4 7 10 12

19 - How many conductors are found in a SATA data cable? • • 19 - How many conductors are found in a SATA data cable? • • • 3 4 7 10 12

20 - When installing a network adapter into a client computer, a technician notices 20 - When installing a network adapter into a client computer, a technician notices that the contacts on the adapter need to be cleaned. Which solution should the technician use to clean the contacts? • • • glass cleaner isopropyl alcohol mild detergent rubbing alcohol slightly abrasive cleanser

20 - When installing a network adapter into a client computer, a technician notices 20 - When installing a network adapter into a client computer, a technician notices that the contacts on the adapter need to be cleaned. Which solution should the technician use to clean the contacts? • • • glass cleaner isopropyl alcohol mild detergent rubbing alcohol slightly abrasive cleanser

21 - ABC Inc. decided to integrate redundancy by connecting multiple hard disks to 21 - ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy? • • • NIC Wireless NIC USB gateway RAID adapter multiple slave hard disk adapter

21 - ABC Inc. decided to integrate redundancy by connecting multiple hard disks to 21 - ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy? • • • NIC Wireless NIC USB gateway RAID adapter multiple slave hard disk adapter

22 - Which three system resources are commonly used for communication between the CPU 22 - Which three system resources are commonly used for communication between the CPU and other components in the computer? (Choose three. ) • • • IRQ DMA UDP I/O port address USB Pn. P

22 - Which three system resources are commonly used for communication between the CPU 22 - Which three system resources are commonly used for communication between the CPU and other components in the computer? (Choose three. ) • • • IRQ DMA UDP I/O port address USB Pn. P

23 - Which three computer components contain hazardous materials and require special handling for 23 - Which three computer components contain hazardous materials and require special handling for disposal? (Choose three. ) • • batteries floppy drives monitors optical drives parallel cables printer toner cartridges

23 - Which three computer components contain hazardous materials and require special handling for 23 - Which three computer components contain hazardous materials and require special handling for disposal? (Choose three. ) • • batteries floppy drives monitors optical drives parallel cables printer toner cartridges

24 - Which two tools can help protect against ESD? (Choose two. ) • 24 - Which two tools can help protect against ESD? (Choose two. ) • • • antistatic wrist strap compressed air antistatic mat safety glasses rubber-sole shoes

24 - Which two tools can help protect against ESD? (Choose two. ) • 24 - Which two tools can help protect against ESD? (Choose two. ) • • • antistatic wrist strap compressed air antistatic mat safety glasses rubber-sole shoes

25 - Which Windows tool should be run before upgrading the operating system? • 25 - Which Windows tool should be run before upgrading the operating system? • • Convert Fdisk Msconfig Ntbackup

25 - Which Windows tool should be run before upgrading the operating system? • 25 - Which Windows tool should be run before upgrading the operating system? • • Convert Fdisk Msconfig Ntbackup

26 - Which three tools will optimize computer performance after using the Internet? (Choose 26 - Which three tools will optimize computer performance after using the Internet? (Choose three. ) • • • Fdisk Spyware Remover Defrag Disk Cleanup BIOS updater Disk Management utility

26 - Which three tools will optimize computer performance after using the Internet? (Choose 26 - Which three tools will optimize computer performance after using the Internet? (Choose three. ) • • • Fdisk Spyware Remover Defrag Disk Cleanup BIOS updater Disk Management utility

27 - Which tool should be used if a user needs to optimize space 27 - Which tool should be used if a user needs to optimize space on a hard drive? • • Defrag Disk Management Fdisk Format

27 - Which tool should be used if a user needs to optimize space 27 - Which tool should be used if a user needs to optimize space on a hard drive? • • Defrag Disk Management Fdisk Format

28 - A technician is installing a new power supply in a computer. Which 28 - A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to a floppy drive? • Berg • Molex • 20 -pin ATX connector • SATA connector

28 - A technician is installing a new power supply in a computer. Which 28 - A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to a floppy drive? • Berg • Molex • 20 -pin ATX connector • SATA connector

29 - Logical addressing and routing function at which layer of the OSI model? 29 - Logical addressing and routing function at which layer of the OSI model? • • • Application Data Link Network Physical Transport

29 - Logical addressing and routing function at which layer of the OSI model? 29 - Logical addressing and routing function at which layer of the OSI model? • • • Application Data Link Network Physical Transport

30 - A computer can access devices on the same network but can not 30 - A computer can access devices on the same network but can not access devices on other networks. What is the probable cause of this problem? • • The cable is not connected properly to the NIC. The computer has an invalid IP address. The computer has an incorrect subnet mask. The computer has an invalid default gateway address.

30 - A computer can access devices on the same network but can not 30 - A computer can access devices on the same network but can not access devices on other networks. What is the probable cause of this problem? • • The cable is not connected properly to the NIC. The computer has an invalid IP address. The computer has an incorrect subnet mask. The computer has an invalid default gateway address.

31 - A technician is assembling a new computer. Which two components are often 31 - A technician is assembling a new computer. Which two components are often easier to install before mounting the motherboard in the case? (Choose two. ) • • • CPU memory NIC sound card video card

31 - A technician is assembling a new computer. Which two components are often 31 - A technician is assembling a new computer. Which two components are often easier to install before mounting the motherboard in the case? (Choose two. ) • • • CPU memory NIC sound card video card

32 - Which port is typically used for external wireless NICs? • • Parallel 32 - Which port is typically used for external wireless NICs? • • Parallel PS/2 SCSI USB

32 - Which port is typically used for external wireless NICs? • • Parallel 32 - Which port is typically used for external wireless NICs? • • Parallel PS/2 SCSI USB

33 -The ABC Company manager is calculating the TCO for an inkjet printer that 33 -The ABC Company manager is calculating the TCO for an inkjet printer that the company needs to purchase. Which three factors should be included in this calculation? (Choose three. ) • • • warranty software costs user training price per page purchase price environmental requirements

33 -The ABC Company manager is calculating the TCO for an inkjet printer that 33 -The ABC Company manager is calculating the TCO for an inkjet printer that the company needs to purchase. Which three factors should be included in this calculation? (Choose three. ) • • • warranty software costs user training price per page purchase price environmental requirements

34 - Refer to the exhibit. Which sequence of steps describes the printing process 34 - Refer to the exhibit. Which sequence of steps describes the printing process used by a laser printer? • • 1, 2, 3, 4, 5, 6 2, 5, 3, 4, 1, 6, 2, 5 4, 2, 6, 5, 3, 1

34 - Refer to the exhibit. Which sequence of steps describes the printing process 34 - Refer to the exhibit. Which sequence of steps describes the printing process used by a laser printer? • • 1, 2, 3, 4, 5, 6 2, 5, 3, 4, 1, 6, 2, 5 4, 2, 6, 5, 3, 1

35 - Which technology is used by laser printers? • • • digital drop 35 - Which technology is used by laser printers? • • • digital drop electro photographic electrostatic spray impact ink melting

35 - Which technology is used by laser printers? • • • digital drop 35 - Which technology is used by laser printers? • • • digital drop electro photographic electrostatic spray impact ink melting

36 -The technician has been asked to upgrade the printer driver for an old 36 -The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver? • • • manufacturer's website Microsoft Update website printer installation disk Windows Device Manager Windows hardware profiles

36 -The technician has been asked to upgrade the printer driver for an old 36 -The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver? • • • manufacturer's website Microsoft Update website printer installation disk Windows Device Manager Windows hardware profiles

37 - Which three factors are reasons to choose a client/server model for a 37 - Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three. ) • The network is small with less than eight users. • The company network requires secure access to confidential information. • The users need a central database to store inventory and sales information. • Each user understands how to safely share files across a network. • The data gathered by the employees is critical and should be backed up on a regular basis. • All employees passed a strict background check as part of the corporate hiring practices.

37 - Which three factors are reasons to choose a client/server model for a 37 - Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three. ) • The network is small with less than eight users. • The company network requires secure access to confidential information. • The users need a central database to store inventory and sales information. • Each user understands how to safely share files across a network. • The data gathered by the employees is critical and should be backed up on a regular basis. • All employees passed a strict background check as part of the corporate hiring practices.

38 - Which type of scanner generally has high costs but produces top-quality images? 38 - Which type of scanner generally has high costs but produces top-quality images? • • all-in-one drum handheld flatbed

38 - Which type of scanner generally has high costs but produces top-quality images? 38 - Which type of scanner generally has high costs but produces top-quality images? • • all-in-one drum handheld flatbed

39 - Which Windows XP command displays the route taken by packets crossing an 39 - Which Windows XP command displays the route taken by packets crossing an IP network? • • • iproute netview nslookup ping tracert

39 - Which Windows XP command displays the route taken by packets crossing an 39 - Which Windows XP command displays the route taken by packets crossing an IP network? • • • iproute netview nslookup ping tracert

40 - A technician is troubleshooting a computer that is experiencing hardware failure detected 40 - A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated? • The computer automatically boots into Safe Mode and displays a warning on the screen. • The screen flashes with a red background and displays a warning message. • The computer emits a pattern of beeps indicating the failing device. • The computer returns an error message indicating the I/O address of the failing device.

40 - A technician is troubleshooting a computer that is experiencing hardware failure detected 40 - A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated? • The computer automatically boots into Safe Mode and displays a warning on the screen. • The screen flashes with a red background and displays a warning message. • The computer emits a pattern of beeps indicating the failing device. • The computer returns an error message indicating the I/O address of the failing device.

41 - In the event of a catastrophic system or hardware failure, which Windows 41 - In the event of a catastrophic system or hardware failure, which Windows XP utility provides a framework for saving and recovering the operating system? • • • Emergency Repair Disk (ERD) Automated System Recovery (ASR) Windows Recovery Manager (WRM) Automated Windows Recovery (AWR) Windows System Recovery (WSR)

41 - In the event of a catastrophic system or hardware failure, which Windows 41 - In the event of a catastrophic system or hardware failure, which Windows XP utility provides a framework for saving and recovering the operating system? • • • Emergency Repair Disk (ERD) Automated System Recovery (ASR) Windows Recovery Manager (WRM) Automated Windows Recovery (AWR) Windows System Recovery (WSR)

42 - A technician receives a call from a customer dissatisfied with past service 42 - A technician receives a call from a customer dissatisfied with past service who continually complains about the service during the call. How should the technician handle this call? • Remind the customer that his company is probably better than the competition. • Advise the customer that they can always leave his company and do business with the competition. • Listen to the complaint and advise the customer that he will make every effort to avoid what they are complaining about. • Ask the customer to submit his complaint in writing.

42 - A technician receives a call from a customer dissatisfied with past service 42 - A technician receives a call from a customer dissatisfied with past service who continually complains about the service during the call. How should the technician handle this call? • Remind the customer that his company is probably better than the competition. • Advise the customer that they can always leave his company and do business with the competition. • Listen to the complaint and advise the customer that he will make every effort to avoid what they are complaining about. • Ask the customer to submit his complaint in writing.

43 - A customer is angry and calls to complain that the service scheduled 43 - A customer is angry and calls to complain that the service scheduled on his computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond? • Verify that the computer is working properly now. • Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer. • Explain that the repair technician sent to perform the repair is inexperienced. • Put the customer on hold until a supervisor is available.

43 - A customer is angry and calls to complain that the service scheduled 43 - A customer is angry and calls to complain that the service scheduled on his computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond? • Verify that the computer is working properly now. • Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer. • Explain that the repair technician sent to perform the repair is inexperienced. • Put the customer on hold until a supervisor is available.

44 - Which type of cable standard uses a 9 -pin connector and supports 44 - Which type of cable standard uses a 9 -pin connector and supports data rates in excess of 800 Mbps? • • • DB-9 DB-25 IEEE 1284 IEEE 1394 a IEEE 1394 b

44 - Which type of cable standard uses a 9 -pin connector and supports 44 - Which type of cable standard uses a 9 -pin connector and supports data rates in excess of 800 Mbps? • • • DB-9 DB-25 IEEE 1284 IEEE 1394 a IEEE 1394 b

45 - What is the purpose of an IRQ? • Perform input/output between the 45 - What is the purpose of an IRQ? • Perform input/output between the CPU and peripherals. • Establish peer-to-peer communication between devices and software. • Request information from the CPU. • Access the computer RAM for reading and writing.

45 - What is the purpose of an IRQ? • Perform input/output between the 45 - What is the purpose of an IRQ? • Perform input/output between the CPU and peripherals. • Establish peer-to-peer communication between devices and software. • Request information from the CPU. • Access the computer RAM for reading and writing.

46 - A technician is installing dual operating systems on a computer. Which disk 46 - A technician is installing dual operating systems on a computer. Which disk management tool should be used to create two partitions on the hard disk? • • • Chkdsk Defrag Fdisk Format Scandisk

46 - A technician is installing dual operating systems on a computer. Which disk 46 - A technician is installing dual operating systems on a computer. Which disk management tool should be used to create two partitions on the hard disk? • • • Chkdsk Defrag Fdisk Format Scandisk

47 - A customer calls to report a computer problem. Which two actions can 47 - A customer calls to report a computer problem. Which two actions can the technician use to establish a good rapport with the customer? (Choose two. ) • Personalize the call by periodically asking questions unrelated to the computer problem. • Allow the customer to speak without interruption. • Use technical terms to determine the level of knowledge the customer possesses. • Ask only closed-ended questions. • Refer to the customer by name whenever possible.

47 - A customer calls to report a computer problem. Which two actions can 47 - A customer calls to report a computer problem. Which two actions can the technician use to establish a good rapport with the customer? (Choose two. ) • Personalize the call by periodically asking questions unrelated to the computer problem. • Allow the customer to speak without interruption. • Use technical terms to determine the level of knowledge the customer possesses. • Ask only closed-ended questions. • Refer to the customer by name whenever possible.

48 - When a Windows XP computer has completed the POST for each adapter 48 - When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence? • BIOS reads the MBR. • NTDETECT. COM is used to detect any installed hardware. • NTDLR reads the registry files. • The WINLOGON. EXE program is started.

48 - When a Windows XP computer has completed the POST for each adapter 48 - When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence? • BIOS reads the MBR. • NTDETECT. COM is used to detect any installed hardware. • NTDLR reads the registry files. • The WINLOGON. EXE program is started.

49 - Which three benefits are gained by networking computers? (Choose three. ) • 49 - Which three benefits are gained by networking computers? (Choose three. ) • • • decreased need of personal training fewer peripherals needed decreased computer-to-user ratio lower cost licensing increased user specialization increased communication capabilities

49 - Which three benefits are gained by networking computers? (Choose three. ) • 49 - Which three benefits are gained by networking computers? (Choose three. ) • • • decreased need of personal training fewer peripherals needed decreased computer-to-user ratio lower cost licensing increased user specialization increased communication capabilities

50 - When analyzing a protocol used on the network, it is discovered that 50 - When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages? • • • A B C D E

50 - When analyzing a protocol used on the network, it is discovered that 50 - When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages? • • • A B C D E

51 - A fingerprint reader is an example of which security technology? • • 51 - A fingerprint reader is an example of which security technology? • • • authorization biometric key logging secure ware smartcard

51 - A fingerprint reader is an example of which security technology? • • 51 - A fingerprint reader is an example of which security technology? • • • authorization biometric key logging secure ware smartcard

52 - What is the default subnet mask for a Class A network? • 52 - What is the default subnet mask for a Class A network? • • • 0. 0. 0. 255. 0. 0. 0 255. 0

52 - What is the default subnet mask for a Class A network? • 52 - What is the default subnet mask for a Class A network? • • • 0. 0. 0. 255. 0. 0. 0 255. 0

53 - Which protocol adds security to remote connections? • • • FTP HTTP 53 - Which protocol adds security to remote connections? • • • FTP HTTP Net. BEUI POP SSH

53 - Which protocol adds security to remote connections? • • • FTP HTTP 53 - Which protocol adds security to remote connections? • • • FTP HTTP Net. BEUI POP SSH

54 - Which network device uses a MAC address table to segment the network? 54 - Which network device uses a MAC address table to segment the network? • • • concentrator hub PBX router switch

54 - Which network device uses a MAC address table to segment the network? 54 - Which network device uses a MAC address table to segment the network? • • • concentrator hub PBX router switch

55 - What is the logical topology used for the Ethernet architecture? • • 55 - What is the logical topology used for the Ethernet architecture? • • bus double ring extended star ring star

55 - What is the logical topology used for the Ethernet architecture? • • 55 - What is the logical topology used for the Ethernet architecture? • • bus double ring extended star ring star

56 - A network administrator is troubleshooting a server that keeps crashing. While monitoring 56 - A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack? • • • multi-ping attack phishing ping bomb ping of death spoofing zombie attack

56 - A network administrator is troubleshooting a server that keeps crashing. While monitoring 56 - A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack? • • • multi-ping attack phishing ping bomb ping of death spoofing zombie attack

57 - Which two types of connectors can be found on DVI cables? (Choose 57 - Which two types of connectors can be found on DVI cables? (Choose two. ) • • • 3 -pin 15 -pin 24 -pin 29 -pin 32 -pin

57 - Which two types of connectors can be found on DVI cables? (Choose 57 - Which two types of connectors can be found on DVI cables? (Choose two. ) • • • 3 -pin 15 -pin 24 -pin 29 -pin 32 -pin

58 - Which two quick solutions are commonly recommended when a technician is troubleshooting 58 - Which two quick solutions are commonly recommended when a technician is troubleshooting a laptop? (Choose two. ) • • • Reboot the laptop. Reinstall the operating system. Disconnect the peripherals. Have the customer verify the problem. Call a level-2 technician.

58 - Which two quick solutions are commonly recommended when a technician is troubleshooting 58 - Which two quick solutions are commonly recommended when a technician is troubleshooting a laptop? (Choose two. ) • • • Reboot the laptop. Reinstall the operating system. Disconnect the peripherals. Have the customer verify the problem. Call a level-2 technician.

59 - Which protocol dynamically assigns IP addresses to network devices? • • • 59 - Which protocol dynamically assigns IP addresses to network devices? • • • DHCP DNS ICMP RARP TCP

59 - Which protocol dynamically assigns IP addresses to network devices? • • • 59 - Which protocol dynamically assigns IP addresses to network devices? • • • DHCP DNS ICMP RARP TCP

60 - Which is an effective method to protect against data loss? • • 60 - Which is an effective method to protect against data loss? • • biometrics data backup encryption smartcards

60 - Which is an effective method to protect against data loss? • • 60 - Which is an effective method to protect against data loss? • • biometrics data backup encryption smartcards

61 - What are two examples of malware? (Choose two. ) • • • 61 - What are two examples of malware? (Choose two. ) • • • registry cleaner pop-up blocker spyware e-mail grayware

61 - What are two examples of malware? (Choose two. ) • • • 61 - What are two examples of malware? (Choose two. ) • • • registry cleaner pop-up blocker spyware e-mail grayware

62 - Which wireless security technology is a good choice when using Cisco equipment 62 - Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux? • • LEAP WEP WPA WTLS

62 - Which wireless security technology is a good choice when using Cisco equipment 62 - Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux? • • LEAP WEP WPA WTLS

63 - A technician needs to upgrade the file system on a Windows XP 63 - A technician needs to upgrade the file system on a Windows XP computer from FAT 32 to NTFS. Which course of action should be taken to upgrade the file system to NTFS? • Format all the existing files with the NTFS File tool. • Create a new NTFS partition and copy the files into the new partition. The existing partition can not be changed. • Run the Microsoft Convert utility. • Overwrite the FAT 32 file system with NTFS. Files will automatically be added to the new file system.

63 - A technician needs to upgrade the file system on a Windows XP 63 - A technician needs to upgrade the file system on a Windows XP computer from FAT 32 to NTFS. Which course of action should be taken to upgrade the file system to NTFS? • Format all the existing files with the NTFS File tool. • Create a new NTFS partition and copy the files into the new partition. The existing partition can not be changed. • Run the Microsoft Convert utility. • Overwrite the FAT 32 file system with NTFS. Files will automatically be added to the new file system.

64 - A technician has many new computers to set up. The technician completely 64 - A technician has many new computers to set up. The technician completely configures one master computer and makes an image of the hard drive. This image is then installed on the other computers. What is this process called? • • • disk array disk copying disk cloning disk mirroring disk multiplexing

64 - A technician has many new computers to set up. The technician completely 64 - A technician has many new computers to set up. The technician completely configures one master computer and makes an image of the hard drive. This image is then installed on the other computers. What is this process called? • • • disk array disk copying disk cloning disk mirroring disk multiplexing

65 - While performing preventive maintenance, a technician notices that the operating system is 65 - While performing preventive maintenance, a technician notices that the operating system is missing updates. How can the technician enable automatic updates? • Run the Sysedit utility from the command line. • Run the Autoupdate utility from the command line. • Run the Automatic Updates utility from the Control Panel. • Click the Update icon in the System Tray. • Right-click My Computer and then choose Advanced > Updates

65 - While performing preventive maintenance, a technician notices that the operating system is 65 - While performing preventive maintenance, a technician notices that the operating system is missing updates. How can the technician enable automatic updates? • Run the Sysedit utility from the command line. • Run the Autoupdate utility from the command line. • Run the Automatic Updates utility from the Control Panel. • Click the Update icon in the System Tray. • Right-click My Computer and then choose Advanced > Updates

66 - When booting the Windows XP operating system, which file will be read 66 - When booting the Windows XP operating system, which file will be read to find the path to the boot partition? • • AUTOEXEC. BAT BOOT. INI NTBOOTDD. SYS NTDETECT. COM

66 - When booting the Windows XP operating system, which file will be read 66 - When booting the Windows XP operating system, which file will be read to find the path to the boot partition? • • AUTOEXEC. BAT BOOT. INI NTBOOTDD. SYS NTDETECT. COM

67 - Which command adds a permanent IP-to-MAC address map? • • • mac 67 - Which command adds a permanent IP-to-MAC address map? • • • mac -s arp -s ipconfig -s ping -s rarp -s

67 - Which command adds a permanent IP-to-MAC address map? • • • mac 67 - Which command adds a permanent IP-to-MAC address map? • • • mac -s arp -s ipconfig -s ping -s rarp -s

68 - Which command provides a list of currently active TCP/IP connections on a 68 - Which command provides a list of currently active TCP/IP connections on a Windows NT/XP/2000 computer? • • • ping netstat nslookup tracert telnet ipconfig

68 - Which command provides a list of currently active TCP/IP connections on a 68 - Which command provides a list of currently active TCP/IP connections on a Windows NT/XP/2000 computer? • • • ping netstat nslookup tracert telnet ipconfig

69 -Which utility displays TCP/IP configuration information on a Windows 9 x computer? • 69 -Which utility displays TCP/IP configuration information on a Windows 9 x computer? • • • ifconfig netconfig winipcfg config ixconfig

69 -Which utility displays TCP/IP configuration information on a Windows 9 x computer? • 69 -Which utility displays TCP/IP configuration information on a Windows 9 x computer? • • • ifconfig netconfig winipcfg config ixconfig

70 -Which utility tests application layer connectivity between two devices? • • • ping 70 -Which utility tests application layer connectivity between two devices? • • • ping telnet netconfig arp tracert netstat

70 -Which utility tests application layer connectivity between two devices? • • • ping 70 -Which utility tests application layer connectivity between two devices? • • • ping telnet netconfig arp tracert netstat