http://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.html1A network administrator has been informe...
attached to the purchase order so the correct item can be bought.Which type of memory module is the IT department expectin...
25Which two characteristics describe a software firewall? (Choose two.)– It typically protects only the computer it is ins...
1A network administrator has been informed about a problem with the network printer. What is the most reliable way to prev...
14Refer to the exhibit. Which utility has the IT department started on each computer?– Defragment15A Windows Vista compute...
27Which action should be taken first if a card key is lost or stolen?– Disable the lost card key.28A technician has instal...
4Which authentication technology uses a physical characteristic of the user in conjunction with a password?– biometrics5A ...
external drive will be recognized by a computer? (Choose two.)– Ensure that the correct drivers are installed.– Check that...
28Why does a technician wear an antistatic wrist strap?-to prevent damage to electronic components inside the computer29A ...
Upcoming SlideShare
Loading in...5
×

Template 3

136

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
136
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Template 3

  1. 1. http://dn-share.blogspot.com/2011/06/cisco-it-essential-v41-final-exam-11-16.html1A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from beingadded to the queue while the printer is being repaired?– Stop the print spooler.2For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.)– regional settings– network settings3Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recentupdates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?– 4434A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard andthe hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choosetwo.)– The monitor cable connector is loose or disconnected because the retaining screws are missing.– The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter.5Which Windows hard drive partition is referred to as the C: drive?– the first primary partition6A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standardsbased on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?– USB 2.0 is one hundred times as fast as USB 1.1.7Which feature is characteristic of the ntbackup command?– It is used create restore points.8Which safety precaution should an installer take when installing cable in the ceiling of a building?– Wear safety glasses in case of encountering toxic materials during the installation.9Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security controlmeasure provides the most secure solution for employee identification?– biometric devices10Which Startup type must be selected for a service that should run each time the computer is booted?– automatic11What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.)– The computer displays an “Invalid Boot Disk” error after POST.– The computer displays an “Inaccessible Boot Device” error after POST12Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is
  2. 2. attached to the purchase order so the correct item can be bought.Which type of memory module is the IT department expecting to receive?– SODIMM13Which recommendation should be observed when replacing existing memory?– The new memory should be as fast or faster than existing memory.14Refer to the exhibit. Which utility has the IT department started on each computer?– Defragment15A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mousepointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem?– Start the Vista Aero enhanced display features by launching services.msc.16The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique securesdata traveling across the public Internet as if it were traveling across the corporate LAN?– VPN17When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?– thermal compound18Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)– 25– 110– 14319A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can atechnician create the restore point?– Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.20Which two hazards are related to fiber optic installations? (Choose two.)– light that can burn the eyes– glass splinters that can penetrate the skin21A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?– SCSI (Ultra-320)22A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topologyrequires that every node is attached to every other node on the network?– mesh23What is the highest risk associated with improperly charged or mishandled batteries?– The battery can explode.24Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive?– 3 logical, 1 extended, 1 free space, 1 primary
  3. 3. 25Which two characteristics describe a software firewall? (Choose two.)– It typically protects only the computer it is installed on.– It uses the CPU in the host computer.26What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.)– These cables usually have 9 pins or 25 pins on both ends.– The two available operative modes are EPP and ECP.27Which action should be taken first if a card key is lost or stolen?– Disable the lost card key.28A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automaticallywhenever the computer is started. What can the technician do to resolve this problem?– Change the startup type for the utility to Automatic in Services.29The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should themanager take to hide the WLAN id from any access point?– Disable the broadcast of the SSID on the access point.30The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct theproblem?– Defragment the hard disk.31A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem?(Choose two.)– Clean the surface of the touchpad.– Ensure that the operating system has the correct driver for the touchpad.32Refer to the exhibit. Based on the information shown, which statement is true?– The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87.33Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding thismotherboard?– The Intel Core i7 processor supports a maximum bus speed of 1600MHz.34Which interface can transfer data at a maximum speed of 480 Mbps?– USB 2.035A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which typeof memory should be installed?– RAM
  4. 4. 1A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from beingadded to the queue while the printer is being repaired?– Stop the print spooler.2For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.)– regional settings– network settings3Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recentupdates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?– 4434A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard andthe hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choosetwo.)– The monitor cable connector is loose or disconnected because the retaining screws are missing.– The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter.5Which Windows hard drive partition is referred to as the C: drive?– the first primary partition6A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standardsbased on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?– USB 2.0 is one hundred times as fast as USB 1.1.7Which feature is characteristic of the ntbackup command?– It is used create restore points.8Which safety precaution should an installer take when installing cable in the ceiling of a building?– Wear safety glasses in case of encountering toxic materials during the installation.9Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security controlmeasure provides the most secure solution for employee identification?– biometric devices10Which Startup type must be selected for a service that should run each time the computer is booted?– automatic11What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.)– The computer displays an “Invalid Boot Disk” error after POST.– The computer displays an “Inaccessible Boot Device” error after POST12Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required isattached to the purchase order so the correct item can be bought.Which type of memory module is the IT department expecting to receive?– SODIMM13Which recommendation should be observed when replacing existing memory?– The new memory should be as fast or faster than existing memory.
  5. 5. 14Refer to the exhibit. Which utility has the IT department started on each computer?– Defragment15A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mousepointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem?– Start the Vista Aero enhanced display features by launching services.msc.16The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique securesdata traveling across the public Internet as if it were traveling across the corporate LAN?– VPN17When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?– thermal compound18Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)– 25– 110– 14319A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can atechnician create the restore point?– Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.20Which two hazards are related to fiber optic installations? (Choose two.)– light that can burn the eyes– glass splinters that can penetrate the skin21A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?– SCSI (Ultra-320)22A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topologyrequires that every node is attached to every other node on the network?– mesh23What is the highest risk associated with improperly charged or mishandled batteries?– The battery can explode.24Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive?– 3 logical, 1 extended, 1 free space, 1 primary25Which two characteristics describe a software firewall? (Choose two.)– It typically protects only the computer it is installed on.– It uses the CPU in the host computer.26What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.)– These cables usually have 9 pins or 25 pins on both ends.– The two available operative modes are EPP and ECP.
  6. 6. 27Which action should be taken first if a card key is lost or stolen?– Disable the lost card key.28A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automaticallywhenever the computer is started. What can the technician do to resolve this problem?– Change the startup type for the utility to Automatic in Services.29The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should themanager take to hide the WLAN id from any access point?– Disable the broadcast of the SSID on the access point.30The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct theproblem?– Defragment the hard disk.31A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem?(Choose two.)– Clean the surface of the touchpad.– Ensure that the operating system has the correct driver for the touchpad.32Refer to the exhibit. Based on the information shown, which statement is true?– The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87.33Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding thismotherboard?– The Intel Core i7 processor supports a maximum bus speed of 1600MHz.34Which interface can transfer data at a maximum speed of 480 Mbps?– USB 2.035A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which typeof memory should be installed?– RAMWhat is one advantage of a solid state drive?– less prone to failure than a traditional drive2A customer has spilled some liquid into the laptop keyboard. The laptop appears to function properly except for the keys. After cleaning thekeyboard, the technician tests the keyboard and it still has failing keys. What are two possible actions the technician could take? (Choose two.)– Replace the keyboard.– Use an external keyboard until the laptop keyboard is replaced3A user mentions that the Photoshop application has been recently installed on a laptop and that the laptop runs slowly when Photoshop is running.The computer technician checks on the laptop and notices that while the laptop responds normally when it is being used to surf the web, the harddisk light is constantly on when Photoshop is running. What is the most likely cause of the excessive hard disk activity?– disk fragmentation
  7. 7. 4Which authentication technology uses a physical characteristic of the user in conjunction with a password?– biometrics5A junior technician finds preventive maintenance very boring and would prefer to fix real problems. However, what is the most important reason forthe company that the preventive maintenance be done?– Preventive maintenance helps to protect the computer equipment against future problems.6A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury whentransporting the heavy printer to the service area? (Choose two.)– Avoid lifting the equipment using the strength in your back– Lift the equipment using the strength in your legs and knees7Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for theauthentication to be accepted?– smart key8The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-rangetechnologies can support these types of devices? (Choose two.)– Bluetooth– Infrared9Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.)– Disabling SSID broadcasts.– Configuring MAC address filtering.10What is the issue if the status of a hard disk drive shows as “Unreadable” in the Disk Management utility?– The drive has input/output errors, has a hardware failure, or is corrupt.11A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should thetechnician follow?– Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.12After checking that a new ink jet printer has new ink cartridges, that dry paper has been installed as recommended by manufacturer, and that thelatest printer driver has been installed, a technician notes that the printer still fails to produce any output. Which three actions could possiblyresolve this problem? (Choose three.)– Check and secure the cables.– Set the printer to Resume Printing.– Ensure that the printer is powered on.13A technician has installed new RAM in a laptop. When restarted the laptop emitted a long beep. What are two possible causes and solutions forthis problem? (Choose two.)– The laptop BIOS should be upgraded when installing the RAM.– The new RAM is defective and must be replaced.14A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which typeof security should be implemented to block employees from accessing these suspicious websites?– phishing protection15A user is experiencing problems with a new removable external drive. What two checks should a technician perform to ensure that a removable
  8. 8. external drive will be recognized by a computer? (Choose two.)– Ensure that the correct drivers are installed.– Check that the external ports are enabled in the BIOS settings.16A temporary user is trying to log in to a computer that the same user used last month, but now is unable to complete the login process. What aretwo possible causes of the failed login? (Choose two.)The user does not have the rights to log in.– The user account has been disabled.– The user is using an incorrect username or password.17A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without addingnetworking devices?– 330 ft (100 m)18What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?– Change the settings of the Index service in the Advanced Options panel.19What is the purpose of the setupmgr.exe file?– It helps prepare an answer file to automate the installation of Windows XP.20A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could thetechnician do to reset the monitor settings?– Use the F8 key.21A laptop less than six months old shuts down after about 30 minutes of operation. When the AC power adapter is connected, the laptop continuesto shutdown after a short period of operation each time the laptop is restarted. What should be recommended as a solution?– The laptop power scheme is set to an unsuitable environment. Have the customer adjust the power scheme through the control panel.22Which external connection technology would a technician choose for a customer who wants to connect a device capable of a data transfer rate of700 Mb/s to a computer?– IEEE 1394b (Firewire)23A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer bootsup, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?– Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.24A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC and monitor are turned on,the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC.What possible problem should the technician investigate first?– The monitor was damaged during cleaning.25What is different about the default location for user files in Windows Vista compared to Windows XP?– The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.26In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all pings in the class fail?-The Windows firewall is blocking the ping.27Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The computer has the internal andexternal ports listed in the exhibit. Which solution would be the best if optimal performance is the deciding factor?-Attach a hard drive to an internal SATA port.
  9. 9. 28Why does a technician wear an antistatic wrist strap?-to prevent damage to electronic components inside the computer29A technician uses an application to capture packets on the network. One such capture reveals the password that is used by a person in theclassroom to initiate a Telnet session with a school network device. What recommendation could the technician make to the person who is usingTelnet?-If possible, enable the network device to use SSH instead of Telnet.30Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer ina branch office?-Remote Desktop Protocol31A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is thepurpose of this utility?-It prepares a computer for imaging.32A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a newer video adapter?-Is there an available compatible expansion slot on the motherboard?33A customer requires a computer storage system that uses no more than two drives to provide drive redundancy and the highest possibleperformance. Which type of RAID should the technician install?-RAID level 0 – data striping34Which would be a reason to update the BIOS of a computer?-A computer being prepared for an upgrade is found to lack support for newer hardware devices35Which statement best describes how telephone calls are carried over data networks and the Internet?-Analog voice signals are converted into digital information that is transported in IP packets36Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail?(Choose two.)-The unattend.txt file is corrupted-The network shared folder that holds the OS files is not accessible.37A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed toassume ownership of the shared folder. Which permission should the administrator assign to the user?-modify38A technician is working on a networked computer that has an IP address of 169.254.25.66 and no Internet access. What could the technician do toremedy the problem?-Reload TCP/IP on the computer.

×