skip to main
|
skip to sidebar
Pages
Beranda
Gallery
About me
Muses Ongisnade
Vicotoria Concordia Crescit
Hacking Nokia
Hacking Nokia S60v3
Chord
Angkasa
Avenged Sevenfold
Avril Lavigne
Endank Soekamti
Gigi
Green Day
Hacking Nokia S60v3
J Rocks
Lyla
Muse
My Chemical Romance
Peterpan
Seurieus
Superman Is Dead
Tipe X
Ungu
bondan prakoso
nidji
Facebook
Osd Muses
2012-02-08
IT Essentials: PC Hardware and Software (Version 4.1) Final Exam 11-16
1
After logging into a computer, a user can view files but is unable to download the files. What action can the administrator take to allow the user to download the files while preventing deletion of the files?
Set the folder permissions to Read.
Set the file permissions to Modify.
Set the file permissions to Full Control
Set the file permissions to Read and Execute.
2
A student laptop is running slowly, and the student suspects rogue computers are accessing the laptop. Which control panel feature is used in Windows Vista to verify the firewall setting?
Network and Sharing Center
Programs
Security Center
System and Maintenance
3
A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?
Click
Start
>
Control Panel
>
System
. Click the
Advanced
tab. Click
Performance Options
Right click
My Computer
. Choose
Manage
. Click
System Tools
. Double-click
Disk Management
.
Right click
Start
>
Control Panel
>
Administrative Tools
>
Computer Management
. Double-click
Storage
. Double-click
Disk Management
.
Click
Start
. Right click
My Computer
. Choose
Properties
. Choose the
Advanced
tab. Click
Settings
in the Startup and Recovery area. Click
Edit
.
4
A business is concerned that computers are susceptible to malware infection. Which two actions will help solve this problem? (Choose two.)
Configure a hard drive password.
Encrypt the hard drive contents.
Enable real-time virus and spyware scanning.
Enable automatic antivirus and antispyware software updates.
Configure antimalware software to run whenever the computer is experiencing heavy usage.
5
A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?
Use the BIOS.
Use the Windows installation CD.
Use internal DOS commands.
Use the F8 key.
6
What are two reasons why static IP addressing would be configured instead of DHCP when setting up a wireless network? (Choose two.)
The network has relatively few wireless devices.
DHCP is not reliable when used with wireless networks.
DHCP limits the number of IP addresses that can be assigned.
Specific security polices can be applied to static IP addresses.
Static IP addresses enable large networks to be managed easily.
7
Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for the authentication to be accepted?
smart key
biometric reader
electronic key card
key fob
8
What is the purpose of the setupmgr.exe file?
It configures the computer for a duplicate drive image.
It customizes the Welcome screen for ease of end-user Windows deployment.
It helps prepare an answer file to automate the installation of Windows XP.
It is used to configure the computer for System Restore parameters, such as when a System Restore Point is created.
9
What is the general term that is used to describe components of a laptop that should be replaced by a service center?
WPAs
FRUs
CRUs
LCDs
10
A technician is helping a customer select additional RAM for a computer. Which two items should be considered when updating RAM? (Choose two.)
The new memory must run at least as fast as the existing memory.
The total amount of memory must not exceed the size of the swap file.
The new memory must be compatible with the motherboard.
The new memory must run at speeds as fast as the cache of the CPU.
The new memory must be compatible with the video card.
11
Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)
The unattend.txt file is corrupted.
The computer does not have a PXE-capable NIC installed.
The third party drive imaging utility is faulty.
The setupmgr.exe was not used to connect to the remote computer.
The network shared folder that holds the OS files is not accessible.
12
What is the issue if the status of a hard disk drive shows as "Unreadable" in the Disk Management utility?
The drive does not contain a valid signature.
The drive has been moved from another computer.
The basic disk has not been converted to a dynamic disk yet.
The drive has input/output errors, has a hardware failure, or is corrupt.
13
What is different about the default location for user files in Windows Vista compared to Windows XP?
The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.
The first time a user logs into any version of Windows Vista, the user must select the default folder for user files.
During the installation process, the installer selects the folder from which subfolders are created for every user to store user-specific documents.
The default location is in the Documents and Settings folder. From there a subfolder with the user name is created when a user account is made. Then another subfolder called My Documents is created.
14
Which type of firewall serves as a relay between users and servers on the Internet and inspects all traffic and allows or denies traffic based on a set of rules?
packet filtering firewall
stateful packet firewall
proxy firewall
operating system firewall
15
What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?
Start UAC services using the command
services.msc
.
Change the settings of the Index service in the Advanced Options panel.
Register the file msxml3.dll by entering
regsvr32 msxml3.dll
at the command prompt.
Upgrade the RAM and video card to meet the minimum Microsoft requirements for indexing.
16
Refer to the exhibit. Which type of technology is most suitable to bring Internet services to the facilities that are shown in the graphic?
ADSL
Infrared
WiFi
Satellite
17
A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?
Use jumpers on the motherboard to configure the drive as slave.
List the drive as slave in the CMOS.
Connect the drive after the twist in the PATA cable.
Use jumpers on the drive to configure the drive as slave.
18
A network administrator has a user that is changing the rights to files in a folder for other users. What rights does the administrator need to remove from the user?
Read and Write
Modify
Full Control
Read and Execute
19
A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?
modify
execute
read
write
20
Why does a technician wear an antistatic wrist strap?
to ground the technician using the computer
to keep sensitive computer components static-free before installation
to use the power supply of the computer to store static electricity
to prevent damage to electronic components inside the computer
21
Which technology allows a user to securely access a company LAN across a public network?
MD5
SHA
TCP
VPN
22
Which location on a hard disk is used by the BIOS to search for operating system instructions in order to boot a PC?
logical drive
active partition
Windows partition
extended partition
23
A computer shows the optical drive under My Computer but fails to read a DVD disc. Which three problems could exist? (Choose three.)
The optical drive is faulty.
The optical drive is configured as a slave.
The optical drive is connected to the secondary IDE controller.
The DVD disc is inserted upside down.
The optical drive is connected to the floppy disk drive port.
The DVD disc is formatted incorrectly.
24
A computer that worked fine yesterday now locks after two hours of use. What is the problem?
CPU overheating
extended hard drive partition
incorrect BIOS settings
faulty RAID
faulty video adapter
25
What two dangers exist when working on laser printers?
mercury poisoning
electrical shock
hexavalent chromium ingestion
burns
lead poisoning
26
Refer to the exhibit. A customer has upgraded to a new laptop with the specifications as shown in the exhibit. The customer reports that an older cellular WAN card fails to fit in the new laptop. What is the problem?
The new laptop fails to support the older cellular WAN technology.
The new laptop has an ExpressCard slot, which is incompatible with the older card.
The wireless-N card with Bluetooth must be disabled in order for the cellular WAN card to work.
The new laptop must have the integrated 10/100BASE-T Ethernet LAN port disabled in order for the cellular WAN card to work.
27
A student is trying to upload class files to an FTP server on the school network. The connection fails from school but works fine from the home computer of the student. What is the likely problem?
The school has port 21 blocked on the firewall.
The student is using the wrong username or password.
The student has an incorrect IP address configured on the FTP client NIC.
The home network Internet connection has higher bandwidth than the school network has because of the amount of traffic that is transmitted on the school network.
28
A technician has installed new RAM in a laptop. When the laptop is rebooted, it makes a long beeping noise and fails to start. What are three probable causes? (Choose three.)
The RAM settings are incorrect.
The RAM module edge contacts were damaged.
A SODIMM instead of a DIMM was installed.
The RAM module was incompatible with the laptop motherboard
The clips that hold the SODIMM in the slot were not locked.
The screw that holds the RAM cover on the bottom of the laptop was not replaced correctly.
29
What precaution should a technician take when checking a dot matrix printer that suddenly stops functioning?
Avoid the fuser unit, which can become hot.
Avoid the corona wire, which can retain a high voltage.
Avoid the print head, which can become hot.
Avoid the platen, which can retain a high voltage.
30
A technician is trying to allow user access to a printer on a small network. Which solution is the lowest in cost?
wired print server
dedicated PC print server
computer-shared printer
wireless print server
on-demand PC print server
31
After information has been gathered from a user about the failure of a printer, which two actions should be performed? (Choose two.)
Change the communication cable.
Ensure all cables are connected correctly.
Reinstall the print driver.
Clear any type of paper jams.
Clear the printer queue.
Look for any type of upgrade on the web.
32
A technician is helping a customer that constantly has to reset the time on a laptop. What is the probable cause of this problem?
The AC adapter is failing and needs to be replaced.
The power supply is failing and needs to be replaced.
The battery on the motherboard needs to be replaced.
The time zone is not set or needs to be reset through a control panel.
The laptop power battery is losing its charge and needs to be replaced.
33
Which scanner process uses an IT8 target to complete its function?
calibration
driver test
firmware upgrade
quality test
34
What is one thing a technician can determine about a system when using the command
ipconfig
?
user e-mail address
operating system configuration
system network configuration
system password
35
Which situation is affected by an invalid SSL certificate?
a connection to a web site that uses HTTPS
a connection to a WEP-enabled access point
a login to a Windows XP 64-bit edition computer
a secure Telnet session to a network device on the same network
36
A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility?
It prepares a computer for imaging.
It helps prepare an answer file to automate the preinstallation of Windows XP.
It helps prepare an answer file to automate the preinstallation of Windows Vista.
It is used to configure the computer for System Restore parameters such as when a System Restore Point is created.
37
Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office?
System Desktop Protocol
System Tools Protocol
Remote Desktop Protocol
Services Protocol
38
A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?
Choose
Start > Control Panel > System
. Choose
Hardware
tab. Choose
Services
.
Choose
Start > All Programs > Accessories > System Tools
. Choose
Services
.
Choose
Start > Control Panel > Administrative Tools >Computer Management
. Choose
Services
.
Choose
Start > Control Panel > Printers and Faxes
. Right click the icon for the printer. Choose
Properties
. Choose the
Advanced
tab. Choose
Services
.
Postingan Lebih Baru
Postingan Lama
Beranda
Tweet
IT Essentials
Final Exam for ch 1-10 - IT Essentials
IT Essentials Chapter 1
IT Essentials Chapter 10
IT Essentials Chapter 2
IT Essentials Chapter 3
IT Essentials Chapter 5
IT Essentials Chapter 6
IT Essentials Chapter 7
IT Essentials Chapter 8
IT Essentials Chapter 9
Skills Review Exam
Blog Archive
▼
2012
(18)
▼
Maret
(4)
►
Februari
(3)
►
Januari
(11)
►
2011
(61)
►
November
(6)
►
Agustus
(25)
►
Juli
(12)
►
Mei
(5)
►
April
(13)
Anda Yang Ke :
Followers
Follow me
Diberdayakan oleh
Blogger
.
twitter