This action might not be possible to undo. Are you sure you want to continue?
for ch 11-16 - IT Essentials (Version 4.0) Time Remaining: Showing 1 of 3 Next> Page: GO <Prev 1 A technician is servicing a laser printer. Which two printer parts should the technician avoid touching because they retain large amounts of voltage even when disconnected from a power source? fuser assembly toner cartridge corona wire printer head paper tray 2 Which two characteristics describe a software firewall? (Choose two.) It typically protects only the computer it is installed on. It is free-standing and uses dedicated hardware. Initial cost for hardware and software updates can be costly. It uses the CPU in the host computer. It requires a specialized motherboard. 3 A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? bus hierarchical mesh ring star 4 Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.) 23 25 107 110 143 212 5 The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem? Defragment the hard disk. Reload the operating system. Install additional RAM. Upgrade the existing CPU.
6 After the administrator manually configures the correct SSID on a new laptop, the computer is still unable to connect to the wireless LAN. Which additional action should the administrator take to resolve this problem? Modify the group account of the user to include all file permissions. Reboot the wireless access point. Rename the laptop and reset the user password on the network. Verify that the MAC address for the laptop is in the MAC address filter table. 7
Refer to the exhibit. Which utility has the IT department started on each computer? Chkdsk Computer Management Defragment Scandisk 8
Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive? 1 primary, 3 extended, 1 logical, 1 free space 1 logical, 3 primary, 1 free space, 1 extended 3 logical, 1 extended, 1 free space, 1 primary 3 free space, 1 logical, 1 primary, 1 extended 9 An organization has two buildings, each with a separate network that uses a different IP addressing scheme. Which device can be used to enable the flow of data between the two networks? bridge hub router switch 10 Which recommendation should be observed when replacing existing memory? The new memory should operate at the same speed as the hard drive. The new memory should exceed the capacity of the hard drive. The new memory should be as fast or faster as the cache found in the processor. The new memory should be as fast or faster than existing memory. 11 Which scanner process uses an IT8 target to complete its function? calibration driver test firmware upgrade quality test
12 Manufacturers often offer devices in two versions, one with all the necessary manuals and drivers and one without. Which two names are given to these versions? (Choose two.) OEM premium prime retail value wholesale 13 For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.) regional settings shared folders and mapped drives display settings network settings disk management 14 A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed? cache CMOS NVRAM RAM 15 A network technician has been asked to determine the best Internet connection for a branch office located in a new metropolitan office building. Which connection would provide the highest bandwidth and reliability at the lowest cost? DSL ISDN satellite wireless Showing 2 of 3 Next> Page: GO <Prev 16 After resolving an intermittent CD-ROM drive fault by firmly reconnecting a loose cable, the technician then decides to inspect all other cable connections to prevent other faults from occurring. Which two conditions will help to prevent future cable and connector faults? (Choose two.) There are no missing or bent connector pins. Cables are stretched tight between connectors. Cables are not bent sharply around adapter cards. Device data cables exceed manufacturer specifications. The connector retaining screws have been over tightened with a screwdriver. 17 Which three specifications should be considered when choosing a new motherboard? (Choose three.) physical size and shape of the motherboard and case size of monitor to be used CPU supported number and type of power supply connectors available
network topology to be used amount of free hard drive space 18 A technician has installed the driver for a scanner, attached the scanner to the computer, and performed an initial test scan. What should the technician do next to complete the testing phase of the scanner installation?' Scan the same image again and compare both scanned images to detect scanning deficiencies. Calibrate the scanner based on the image that has been scanned. Print the scanned image and contrast it with the scanned image. Visually compare the original image against the image on the screen. 19 When upgrading a CPU what must be applied between the new CPU and the heat sink/fan? lubricating grease thermal compound adhesive gel penetrating oil 20 A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choose two.) The monitor Power Scheme settings are incorrect. Relocation requires that the monitor resolution be re-adjusted. The monitor cable connector is loose or disconnected because the retaining screws are missing. The monitor is too far from the computer and the stretched monitor cable has unseated the serial interface card. The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter. 21 Which three components are found in laser printer maintenance kits? (Choose three.) fuser assembly primary corona pickup rollers transfer rollers secondary corona paper trays 22
Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The computer has the internal and external ports listed in the exhibit. Which solution would be the best if optimal performance is the deciding factor? Attach a hard drive to the external serial port. Attach a hard drive to an internal SATA port. Attach a hard drive to the external parallel port. Attach a hard drive to any of the external USB ports or the USB hub. Attach a hard drive to the second PATA connector that attaches to the PATA port.
23 Which type of printer configuration method overrides any other type of configuration? default global predefined per-document 24 Which two hazards are related to fiber optic installations? (Choose two.) light that can burn the eyes danger of electrocution if improperly installed glass splinters that can penetrate the skin risk of explosion when installed close to combustible substances electromagnetic interference when installed close to electric cable runs 25 Which would be a reason to update the BIOS of a computer? The computer unexpectedly boots into Safe Mode. The ROM chip is no longer able to store the BIOS instructions. When it starts, the operating system no longer recognizes the existing installed devices. A computer being prepared for an upgrade is found to lack support for newer hardware devices. 26 Which Startup type must be selected for a service that should run each time the computer is booted? automatic boot manual start startup 27 A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem? Uninstall the program and then use Add New Programs in the Add or Remove Programs utility to install the application. Use the Add or Remove Programs utility to set program access and defaults. Change the startup type for the utility to Automatic in Services. Set the application registry key value to one. 28 The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN? MD5 VPN WEP WPA 29 Which safety precaution should an installer take when installing cable in the ceiling of a building? Wear thick gloves to minimize damage to the cable. Wear a shirt with short sleeves to avoid getting stuck in the cable supports when installing.
Wear lightweight shoes when installing cable runs inside the ceiling. Wear safety glasses in case of encountering toxic materials during the installation. 30 Which action should be taken first if a card key is lost or stolen? Disable the card key system until the key can be recovered. Disable all card keys. Issue new card keys to employees who show picture identification. Issue the owner a new card key after a picture identification is shown. Disable the lost card key. Showing 3 of 3 Next> Page: GO <Prev 31 Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.) MD5 chap checksum SHA VPN SSL 32 What is the highest risk associated with improperly charged or mishandled batteries? The components can overheat. The laptop will be unable to hold enough charge. The battery can explode. The lifetime of the battery will be reduced. 33 A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired? Send an e-mail to all users telling them to stop sending any print jobs to the printer. Send a network message to all users telling them to stop sending any print jobs to the printer. Unplug the printer from the print server. Stop the print spooler. 34 Which feature is characteristic of the ntbackup command? It can be executed from a batch file. It can be used to restore files. It is used to create a copy of the registry. It is used create restore points. 35 A technician wishes to secure the network authentication for all remote users. Which security technology uses radio communication with a computer before accepting a username and password? biometrics key fobs smart digital cards security dongles Showing 3 of 3 Next> Page: GO <Prev