final exam 11-16
TRANSCRIPT
Close Window
Assessment System
Exam Viewer - Final Exam for Ch 11-16 - IT Essentials (Version 4.0)
Below you will find the assessment items as presented on the exam as well as the scoring rules associated with the item.
Cisco Networking Academy content is copyrighted and the unauthorized posting, distribution or sharing of this exam content is prohibited.
1
The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.)
Bluetooth
Cellular
Infrared
WiFi
Satellite
Observable DescriptionMax
Value
1correctness of response
Option 1 and Option 3 are correct.1 point for each correct option.0 points if more options are selected than required.
2
2
Refer to the exhibit. Which type of technology is most suitable to bring Internet services to the facilities that are shown in the graphic?
ADSL
Infrared
WiFi
Satellite
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
3
Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought.
Which type of memory module is the IT department expecting to receive? DIMM
DDR2
DRAM
LT-RAM
SODIMM
SORAM
Observable Description Max Value
1correctness of response
2 points for Option 50 points for any other option
2
4 What is one thing a technician can determine about a system when using the command ipconfig?
user e-mail address
operating system configuration
system network configuration
system password
Observable Description Max Value
1correctness of response
2 points for Option 30 points for any other option
2
5 A junior technician finds preventive maintenance very boring and would prefer to fix real problems. However, what is the most important reason for the company that the preventive maintenance be done?
It is important to train the junior technicians to become good technicians by giving them the preventive maintenance duties. Preventive maintenance helps to protect the computer equipment against future problems. Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed. Preventive maintenance enables the IT manager to check on the location and state of the computer assets.
Observable Description Max Value
1correctness of response
2 points for Option 20 points for any other option
2
6 Which Windows hard drive partition is referred to as the C: drive? the first volume partition
the first primary partition
the first extended partition
the first logical partition
Observable Description Max Value
1correctness of response
2 points for Option 20 points for any other option
2
7 A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?
From the CLI enter the command restore /cn. Go to Start > Control Panel > Accessories > System Tools > System Restore > Create a restore point. Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point. Right-click My Computer and then go to Properties > Restore > Create Restore Point.
Observable Description Max Value
1 correctness of response
2 points for Option 30 points for any other
2
option
8 A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
USB 2.0 is twice as fast as USB 1.1.
USB 2.0 is twenty times as fast as USB 1.1.
USB 2.0 is forty times as fast as USB 1.1.
USB 2.0 is one hundred times as fast as USB 1.1.
Observable Description Max Value
1correctness of response
2 points for Option 30 points for any other option
2
9 A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?
Use jumpers on the motherboard to configure the drive as slave.
List the drive as slave in the CMOS.
Connect the drive after the twist in the PATA cable.
Use jumpers on the drive to configure the drive as slave.
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
10 Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
22
53
80
143
443
Observable Description Max Value
1correctness of response
2 points for Option 50 points for any other option
2
11 A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?
modify
execute
read
write
Observable Description Max Value
1 correctness of response
2 points for Option 10 points for any other
2
option
12 A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.)
Avoid lifting the equipment using the strength in your back.
Lift the equipment using the strength in your legs and knees.
Avoid bending your knees when lifting the printer.
Bend your back to pick the printer up.
Avoid lifting the printer close to your body.
Observable DescriptionMax
Value
1correctness of response
Option 1 and Option 2 are correct.1 point for each correct option.0 points if more options are selected than required.
2
13 A technician is trying to allow user access to a printer on a small network. Which solution is the lowest in cost?
wired print server
dedicated PC print server
computer-shared printer
wireless print server
on-demand PC print server
Observable Description Max Value
1correctness of response
2 points for Option 30 points for any other option
2
14 Which technology allows a user to securely access a company LAN across a public network? MD5
SHA
TCP
VPN
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
15 A network administrator needs to restrict access to the network. Which type of firewall allows only those packets that are part of a known connection?
stateful firewall
proxy firewall
packet filter
content engine
Observable Description Max Value
1correctness of response
2 points for Option 10 points for any other option
2
16 A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without adding networking devices?
33 ft (10 m)
100 ft (31 m)
330 ft (100 m)
500 ft (154 m)
Observable Description Max Value
1correctness of response
2 points for Option 30 points for any other option
2
17 A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?
USB 2.0
SCSI (Ultra-320)
Parallel (IEEE 1284)
Serial (RS-232)
Observable Description Max Value
1correctness of response
2 points for Option 20 points for any other option
2
18 A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC and monitor are turned on, the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC. What possible problem should the technician investigate first?
The monitor was damaged during cleaning.
The video connector has been disabled.
The computer requires two monitors for video.
The video drivers need to be updated.
Observable Description Max Value
1correctness of response
2 points for Option 20 points for any other option
2
19 Which security technology will control access to a data storage facility? enforcing network logins
fitting equipment with security screws
using cable locks
using card keys
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
20 What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.)
These cables usually have 9 pins or 25 pins on both ends.
The maximum cable length is 50 ft (15 m).
All ports that are used by this standard are also known as D-shell ports.
The two available operative modes are EPP and ECP.
Bi-directional communication is allowed.
Observable DescriptionMax
Value
1correctness of response
Option 4 and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required.
2
21 After information has been gathered from a user about the failure of a printer, which two actions should be performed? (Choose two.)
Change the communication cable.
Ensure all cables are connected correctly.
Reinstall the print driver.
Clear any type of paper jams.
Clear the printer queue.
Look for any type of upgrade on the web.
Observable DescriptionMax
Value
1correctness of response
Option 2 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required.
2
22 What two dangers exist when working on laser printers? mercury poisoning
electrical shock
hexavalent chromium ingestion
burns
lead poisoning
Observable DescriptionMax
Value
1correctness of response
Option 2 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required.
2
23 Which interface can transfer data at a maximum speed of 480 Mbps? parallel
serial
SCSI
USB 2.0
IEEE 1394
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
24 A technician is helping a customer select additional RAM for a computer. Which two items should be considered when updating RAM? (Choose two.)
The new memory must run at least as fast as the existing memory.
The total amount of memory must not exceed the size of the swap file.
The new memory must be compatible with the motherboard.
The new memory must run at speeds as fast as the cache of the CPU.
The new memory must be compatible with the video card.
Observable DescriptionMax
Value
1correctness of response
Option 1 and Option 3 are correct.1 point for each correct option.0 points if more options are selected than required.
2
25 Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)
The unattend.txt file is corrupted.
The computer does not have a PXE-capable NIC installed.
The third party drive imaging utility is faulty.
The setupmgr.exe was not used to connect to the remote computer.
The network shared folder that holds the OS files is not accessible.
Observable DescriptionMax
Value1 correctness of
responseOption 2 and Option 5 are correct.1 point for each correct option.
2
0 points if more options are selected than required.
26 A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?
Use the BIOS.
Use the Windows installation CD.
Use internal DOS commands.
Use the F8 key.
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
27 A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?
Click Start > Control Panel > System. Click the Advanced tab. Click Performance Options Right click My Computer. Choose Manage. Click System Tools. Double-click Disk Management. Right click Start > Control Panel > Administrative Tools > Computer Management. Double-click Storage. Double-click Disk Management. Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
28 A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?
Choose Start > Control Panel > System. Choose Hardware tab. Choose Services.
Choose Start > All Programs > Accessories > System Tools. Choose Services. Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services. Choose Start > Control Panel > Printers and Faxes. Right click the icon for the printer. Choose Properties. Choose the Advanced tab. Choose Services.
Observable Description Max Value
1correctness of response
2 points for Option 30 points for any other option
2
29 A home laptop owner was warned that the brand new laptop just purchased has batteries that should be fully discharged on a regular basis and then recharged. Which three types of battery should be treated this way? (Choose three.)
alkaline
HgO
Li-ion
NiCd
NiMH
Observable DescriptionMax
Value
1correctness of response
Option 3, Option 4, and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required.
3
30 Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?
card keys
security guards
security key fobs
biometric devices
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
31 The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point?
Configure WEP only on the access point.
Install WAP on the wireless clients.
Configure MAC address filtering on the access point.
Disable the broadcast of the SSID on the access point.
Decrease the antenna spectrum on each wireless client.
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
32 A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites?
virus protection
spyware protection
adware protection
phishing protection
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
33 What precaution should a technician take when checking a dot matrix printer that suddenly stops functioning?
Avoid the fuser unit, which can become hot.
Avoid the corona wire, which can retain a high voltage.
Avoid the print head, which can become hot.
Avoid the platen, which can retain a high voltage.
Observable Description Max Value
1correctness of response
2 points for Option 30 points for any other option
2
34 A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a newer video adapter?
Is there an available compatible expansion slot on the motherboard?
Does the price of the video adapter include a comprehensive warranty?
Are video adapter drivers available for the operating system that is in use?
Does the video manufacturer have a reputation for reliable and high quality products?
Observable Description Max Value
1correctness of response
2 points for Option 10 points for any other option
2
35 Which external connection technology would a technician choose for a customer who wants to connect a device capable of a data transfer rate of 700 Mb/s to a computer?
USB 2.0
802.11 (Wi-Fi)
Serial (RS-232)
IEEE 1394b (Firewire)
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
Showing 1 of 1 Prev Page: Next
Close Window
All contents copyright ©2001-2009 Cisco Systems, Inc. All rights reserved. Privacy Statement and Trademarks.
1
knet-af_23212:en
page
12622662438901
knet-lcms_ite1_en
en
knet-as_13226
12622662438901