Final 11-16 1.

The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.) Bluetooth Cellular Infrared WiFi Satellite Option 1 and Option 3 are correct. Max Value = 2

2. Refer to the exhibit. Which type of technology is most suitable to bring Internet services to the facilities shown in the graphic? Bluetooth Infrared WiFi Satellite 2 points for Option 4 Max Value = 2

3. The purchasing department at ABC Company has the choice of buying a retail version or an OEM version of a NIC. Which two things must the purchasing department consider when deciding whether to choose the retail or OEM version? (Choose two.) The installers may need to find the drivers for the OEM NICs on the Internet. OEM NICs may be more expensive than the Cisco or Linksys NICs. The OEM NICs may not be compatible with the OS. OEM NICs may need to be installed by specialists. OEM NICs may lack proper documentation. Option 1 and Option 5 are correct. Max Value = 2

What is the highest risk associated with improperly charged or mishandled batteries? The components can overheat. 2 points for Option 3 Max Value = 2 5. The lifetime of the battery will be reduced. Install additional RAM. Refer to the exhibit.4. The production manager of a small company is experiencing slow performance in a laptop. Format the secondary partition. Upgrade the existing CPU. 2 points for Option 1 Max Value = 2 . A picture of the memory chip required is attached to the purchase order so the correct item can be bought. Which type of memory module is the IT department expecting to receive? DIMM DDR2 DRAM LT-RAM SODIMM SORAM 2 points for Option 5 Max Value = 2 6. The IT department requested a new set of memory chips to upgrade the old laptops. What should a technician try first in order to correct the problem? Defragment the hard disk. The laptop will be unable to hold enough charge. The battery can explode.

A network administrator has been informed about a problem with the network printer. What is the best way to prevent print jobs from being added to the queue while the printer is being repaired? Send an e-mail to all users telling them to stop sending any print jobs to the printer. Unplug the printer from the print server. A technician wishes to secure the network authentication for all remote users. Which security technology uses radio communication with a computer before accepting a username and password? biometrics key fobs smart digital cards security dongles 2 points for Option 2 Max Value = 2 8.7. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN? MD5 VPN WEP WPA 2 points for Option 2 Max Value = 2 9. Stop the print service. The corporate security policy states that all remote connections use only secure tunnels for transport of data. 2 points for Option 4 Max Value = 2 . Send a network message to all users telling them to stop sending any print jobs to the printer.

10. Which Windows hard drive partition is referred to as the C: drive? the first volume partition the first primary partition the first extended partition the first logical partition 2 points for Option 2 Max Value = 2 11.1 and USB 2. 2 points for Option 3 Max Value = 2 12. Right-click My Computer and then go to Properties > Restore > Create Restore Point. Go to Start > Control Panel > Accessories > System Tools > System Restore > Create a restore point. Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point. A company has a preventive maintenance policy that requires every computer have a new restore point created every six months.0 to a user in terms of . A technician is trying to explain USB 1. How can a technician create the restore point? From the CLI enter the command restore /cn. Which Startup type must be selected for a service that should run each time the computer is booted? automatic boot manual start startup 2 points for Option 1 Max Value = 2 13.

USB 2. Which port should be opened to solve the problem? 22 53 80 143 443 2 points for Option 5 Max Value = 2 16. the administrator learns that the firewall is blocking HTTPS. The technician will need to configure the drive as slave.0 is twenty times as fast as USB 1.0 is one hundred times as fast as USB 1. List the drive as slave in the CMOS. Which explanation can the technician use that will best describe the relationship? USB 2.1. USB 2. Connect the drive after the twist in the PATA cable.1. After checking recent updates to the company firewall. A network technician has been asked to determine the best Internet connection . Use jumpers on the drive to configure the drive as slave. USB 2.0 is twice as fast as USB 1.0 is forty times as fast as USB 1. How can the technician accomplish this desired configuration? Use jumpers on the motherboard to configure the drive as slave. 2 points for Option 3 Max Value = 2 14. Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. A technician has been asked to install a second optical drive in a computer.speed.1. 2 points for Option 4 Max Value = 2 15. The user is having problems comparing the two standards based on the values expressed in Mbps.1.

Option 1 and Option 2 are correct. A new technician has joined the IT team and is about to service a heavy printer. Option 4 and Option 5 are correct.) These cables usually have 9 pins or 25 pins on both ends. Which connection would provide the highest bandwidth and reliability at the lowest cost? DSL ISDN satellite wireless 2 points for Option 1 Max Value = 2 17. All ports used by this standard are also known as D-shell ports. Avoid bending your knees when lifting the printer. Avoid lifting the printer close to your body. Max Value = 2 19. What are two characteristics of the IEEE 1284 standard? (Choose two. Max Value = 2 18.for a branch office located in a new metropolitan office building. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two. Which type of printer configuration method overrides any other type of configuration? . Bend your back to pick the printer up. The maximum cable length is 50 ft (15 m). Lift the equipment using the strength in your legs and knees. Bi-directional communication is allowed.) Avoid lifting the equipment using the strength in your back. The two available operative modes are EPP and ECP.

Ensure all cables are connected correctly.) fuser assembly primary corona pickup rollers transfer rollers secondary corona paper trays Option 1. which three actions should be performed? (Choose three. 2 points for Option 4 Max Value = 2 21. After gathering information from a user regarding failure of a printer. Option 3. .) Change the communication cable. Calibrate the scanner based on the image that has been scanned. Which three laser printer components usually break? (Choose three. Visually compare the image against the image on the screen.default global predefined per-document 2 points for Option 4 Max Value = 2 20. and Option 4 are correct. After scanning an image. what is the next step to conclude a scanner test? Scan the same image again and compare both scanned images to detect scanning deficiencies. Print the scanned image and contrast it with the scanned image. Max Value = 3 22.

Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two. Max Value = 3 23. Clear any type of paper jams.Reinstall the print driver. Look for any type of upgrade on the web. Option 2. Verify any type of print job in the printer queue. Max Value = 2 24. Issue new card keys to employees who show picture identification.) MD5 chap checksum SHA VPN SSL Option 1 and Option 3 are correct. and Option 5 are correct. Which technology allows a user to securely access a company LAN across a public network? MD5 SHA TCP VPN 2 points for Option 4 Max Value = 2 25. Option 4. Disable all card keys. Which action should be taken first if a card key is lost or stolen? Disable the card key system until the key can be recovered. .

It is free-standing and uses dedicated hardware. Initial cost for hardware and software updates can be costly. A network administrator needs to restrict access to the network. It uses the CPU in the host computer. Which two characteristics describe a software firewall? (Choose two. 2 points for Option 4 Max Value = 2 26. Which type of firewall allows only those packets that are part of a known connection? stateful firewall proxy firewall packet filter content engine 2 points for Option 1 . Option 1 and Option 4 are correct. Which authentication technology uses a physical characteristic of the user in conjunction with a password? key fob biometrics smart card key card 2 points for Option 2 Max Value = 2 27. It requires a specialized motherboard.Issue the owner a new card key after a picture identification is shown. Disable the lost card key.) It typically protects only the computer it is installed on. Max Value = 2 28.

Max Value = 2 29. Which device can be used to enable the flow of data between the two networks? bridge hub router switch 2 points for Option 3 Max Value = 2 . A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. each with a separate network that uses a different IP addressing scheme. Which physical topology requires that every node is attached to every other node on the network? bus hierarchical mesh ring star 2 points for Option 3 Max Value = 2 30. A network technician is installing network service in a new office. An organization has two buildings. What is the distance limitation of a single data run for UTP cabling without adding networking devices? 33 ft (10 m) 100 ft (31 m) 330 ft (100 m) 500 ft (154 m) 2 points for Option 3 Max Value = 2 31.

2 points for Option 4 Max Value = 2 . When performing a default installation of Windows XP Professional. Option 4. The new memory should be as fast or faster than existing memory. which two screens are displayed to configure custom settings? (Choose two. Which recommendation should be observed when replacing existing memory? The new memory should operate at the same speed as the hard drive.32.) Regional settings Shared folders and mapped drives Administrator password and user accounts Customize network settings Disk management Option 1 and Option 4 are correct.) 23 25 107 110 143 212 Option 2. Which three ports should be left open to avoid filtering e-mail traffic? (Choose three. The new memory should exceed the capacity of the hard drive. Max Value = 2 34. The new memory should be as fast or faster as the cache found in the processor. and Option 5 are correct. Max Value = 3 33.

2 points for Option 4 Max Value = 2 .35. 2 points for Option 1 Max Value = 2 36. Which feature is characteristic of the ntbackup command? It can be executed from a batch file. Reboot the wireless access point. It has default parameters that appear as part of the command line. Which additional action should the administrator take to resolve this problem? Modify the group account of the user to include all file permissions. Verify that the MAC address for the laptop is in the MAC address filter table. It has overriding parameters that need to be set in the Windows backup utility. After the administrator manually configures the correct SSID on a new laptop. Rename the laptop and reset the user password on the network. the computer is still unable to connect to the wireless LAN. It can be used to restore files.

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master Your Semester with a Special Offer from Scribd & The New York Times

Cancel anytime.