the final revision it essentials pc hardware & software

141
The Final Revision IT Essentials PC Hardware & Software

Upload: lawson-berkshire

Post on 29-Mar-2015

227 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: The Final Revision IT Essentials PC Hardware & Software

The Final Revision

IT Essentials PC Hardware & Software

Page 2: The Final Revision IT Essentials PC Hardware & Software

1- ABC Company wants to configure laptops to automatically power components off to improve battery life. Which power management control

can be used to accomplish this?

• ACPI

• AMD

• UPS

• BIOS

• PnP BIOS

Page 3: The Final Revision IT Essentials PC Hardware & Software

1- ABC Company wants to configure laptops to automatically power components off to improve battery life. Which power management control

can be used to accomplish this?

• ACPI

• AMD

• UPS

• BIOS

• PnP BIOS

Page 4: The Final Revision IT Essentials PC Hardware & Software

2- A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-

based laptops in the company. The technician configured the power options in Windows but it appears to have no effect.

Where should the technician look to enable power management?

• Administrative Tools • BIOS • Command Prompt • Safe mode • System Registry

Page 5: The Final Revision IT Essentials PC Hardware & Software

2- A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-

based laptops in the company. The technician configured the power options in Windows but it appears to have no effect.

Where should the technician look to enable power management?

• Administrative Tools • BIOS • Command Prompt • Safe mode • System Registry

Page 6: The Final Revision IT Essentials PC Hardware & Software

3- Refer to the exhibit. What is the correct order of steps to safely remove one of several hot-swappable

devices using the least amount of steps?

• 2, 3, 5, 6 • 1, 3, 5, 6 • 1, 4, 5, 6 • 2, 5, 6

Page 7: The Final Revision IT Essentials PC Hardware & Software

3- Refer to the exhibit. What is the correct order of steps to safely remove one of several hot-swappable

devices using the least amount of steps?

• 2, 3, 5, 6 • 1, 3, 5, 6 • 1, 4, 5, 6 • 2, 5, 6

Page 8: The Final Revision IT Essentials PC Hardware & Software

4- Which utility can be used to determine end-to-end connectivity between source and destination?

• Ipconfig

• Nbstat

• Netstat

• Ping

Page 9: The Final Revision IT Essentials PC Hardware & Software

4- Which utility can be used to determine end-to-end connectivity between source and destination?

• Ipconfig

• Nbstat

• Netstat

• Ping

Page 10: The Final Revision IT Essentials PC Hardware & Software

5- Which topology has only one central point of failure, is easy to troubleshoot, and is most

commonly implemented in newer networks?

• bus

• mesh

• ring

• star

Page 11: The Final Revision IT Essentials PC Hardware & Software

5- Which topology has only one central point of failure, is easy to troubleshoot, and is most

commonly implemented in newer networks?

• bus

• mesh

• ring

• star

Page 12: The Final Revision IT Essentials PC Hardware & Software

6- A user is reporting that a new external hard drive is defective. The laptop will allow access to the drive at

times, and then will report that the drive cannot be found. Upon an initial examination of the laptop, it is discovered

that the user has ten USB devices connected to the laptop.What is the best quick solution to this problem?

• Remove all the peripherals except the hard drive and observe the results.

• Move the laptop to another location and observe the results.

• Replace the power adapter and observe the results. • Replace the USB hub and observe the results. • Flash the BIOS on the laptop and observe the results.

Page 13: The Final Revision IT Essentials PC Hardware & Software

6- A user is reporting that a new external hard drive is defective. The laptop will allow access to the drive at

times, and then will report that the drive cannot be found. Upon an initial examination of the laptop, it is discovered

that the user has ten USB devices connected to the laptop.What is the best quick solution to this problem?

• Remove all the peripherals except the hard drive and observe the results.

• Move the laptop to another location and observe the results.

• Replace the power adapter and observe the results. • Replace the USB hub and observe the results. • Flash the BIOS on the laptop and observe the results.

Page 14: The Final Revision IT Essentials PC Hardware & Software

7- Which Windows XP command displays the route taken by packets

crossing an IP network?

• iproute

• netview

• nslookup

• ping

• tracert

Page 15: The Final Revision IT Essentials PC Hardware & Software

7- Which Windows XP command displays the route taken by packets

crossing an IP network?

• iproute

• netview

• nslookup

• ping

• tracert

Page 16: The Final Revision IT Essentials PC Hardware & Software

8- Which type of program causes banners and ads to appear on the desktop without

any user intervention?

• adware

• spyware

• stealth virus

• trojan horse

Page 17: The Final Revision IT Essentials PC Hardware & Software

8- Which type of program causes banners and ads to appear on the desktop without

any user intervention?

• adware

• spyware

• stealth virus

• trojan horse

Page 18: The Final Revision IT Essentials PC Hardware & Software

9- Why do mobile devices such as laptop computers use specifically designed CPUs?

• They consume less power.

• They are smaller.

• They are lighter.

• They require customized cooling mechanisms.

• They need to fit proprietary motherboards.

Page 19: The Final Revision IT Essentials PC Hardware & Software

9- Why do mobile devices such as laptop computers use specifically designed CPUs?

• They consume less power.

• They are smaller.

• They are lighter.

• They require customized cooling mechanisms.

• They need to fit proprietary motherboards.

Page 20: The Final Revision IT Essentials PC Hardware & Software

10- Where can a user change the idle time after which a laptop will switch to

standby mode?

• Right-click the desktop, then click Power Modes > Standby.

• Right-click My Computer, then click Properties > Hardware > Device Manager > ACPI.

• Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.

• Left-click Start > All Programs > Accessories > System Tools > Power Management.

Page 21: The Final Revision IT Essentials PC Hardware & Software

10- Where can a user change the idle time after which a laptop will switch to

standby mode?

• Right-click the desktop, then click Power Modes > Standby.

• Right-click My Computer, then click Properties > Hardware > Device Manager > ACPI.

• Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.

• Left-click Start > All Programs > Accessories > System Tools > Power Management.

Page 22: The Final Revision IT Essentials PC Hardware & Software

11- A technician thinks that the file system on a computer has a problem because Windows XP is reporting integrity data issues. Which Windows XP utility will check the file system for errors?

• Attrib

• Chkdsk

• Fdisk

• Format

Page 23: The Final Revision IT Essentials PC Hardware & Software

11- A technician thinks that the file system on a computer has a problem because Windows XP is

reporting integrity data issues. Which Windows XP utility will check the file system for errors?

• Attrib

• Chkdsk

• Fdisk

• Format

Page 24: The Final Revision IT Essentials PC Hardware & Software

12- Which specification was developed to resolve the problem of hardware conflicts?

• AGP

• HAL

• IRQ-and-DMA

• OSR2

• PnP

Page 25: The Final Revision IT Essentials PC Hardware & Software

12- Which specification was developed to resolve the problem of hardware conflicts?

• AGP

• HAL

• IRQ-and-DMA

• OSR2

• PnP

Page 26: The Final Revision IT Essentials PC Hardware & Software

13- Which three rules increase the level of password strength? (Choose three.) • Passwords should never expire. • Passwords should be a combination of letters

and numbers. • Passwords should combine a user's special

dates and initials so they can be alphanumeric.• Passwords should be changed by the user after

specific periods of time. • Password expiration and lockout policies should

be clearly defined. • Passwords should be short to reduce the

chances of users forgetting them.

Page 27: The Final Revision IT Essentials PC Hardware & Software

13- Which three rules increase the level of password strength? (Choose three.) • Passwords should never expire. • Passwords should be a combination of letters

and numbers. • Passwords should combine a user's special

dates and initials so they can be alphanumeric.• Passwords should be changed by the user after

specific periods of time. • Password expiration and lockout policies should

be clearly defined. • Passwords should be short to reduce the

chances of users forgetting them.

Page 28: The Final Revision IT Essentials PC Hardware & Software

14- Which set of related files store all the settings of a Windows XP installation?

• Registry

• Control Panel

• .ini

• HWINFO.EXE

Page 29: The Final Revision IT Essentials PC Hardware & Software

14- Which set of related files store all the settings of a Windows XP installation?

• Registry

• Control Panel

• .ini

• HWINFO.EXE

Page 30: The Final Revision IT Essentials PC Hardware & Software

15- What characterizes a DDoS attack?

• Many hosts participate in a coordinated attack.• Infected computers are called Daemons.• It is easy to identify the source of the attack. • All hosts must be in the same geographic area.

Page 31: The Final Revision IT Essentials PC Hardware & Software

15- What characterizes a DDoS attack?

• Many hosts participate in a coordinated attack.• Infected computers are called Daemons.• It is easy to identify the source of the attack. • All hosts must be in the same geographic area.

Page 32: The Final Revision IT Essentials PC Hardware & Software

16- What characterizes spoofing?

• Making data appear to come from a source other than the actual source.

• Sending abnormally large amounts of data to a remote server to prevent user access to the server services.

• Intercepting or inserting false information in traffic between two hosts.

• Sending bulk e-mail to individuals, lists, or domains intending to prevent users from accessing e-mail.

Page 33: The Final Revision IT Essentials PC Hardware & Software

16- What characterizes spoofing?

• Making data appear to come from a source other than the actual source.

• Sending abnormally large amounts of data to a remote server to prevent user access to the server services.

• Intercepting or inserting false information in traffic between two hosts.

• Sending bulk e-mail to individuals, lists, or domains intending to prevent users from accessing e-mail.

Page 34: The Final Revision IT Essentials PC Hardware & Software

17- A technician has been asked to install memory that detects multiple bit errors and corrects single bit errors in memory. Which type of memory should be

installed if the motherboard supports these features?

• parity

• ECC

• non-parity

• CRC

Page 35: The Final Revision IT Essentials PC Hardware & Software

17- A technician has been asked to install memory that detects multiple bit errors and corrects single bit errors in memory. Which type of memory should be

installed if the motherboard supports these features?

• parity

• ECC

• non-parity

• CRC

Page 36: The Final Revision IT Essentials PC Hardware & Software

18- PATA data cables are available in two different types. The types are distinguished

by the number of conductors. Which two types are available? (Choose two.)

• 6

• 40

• 68

• 80

• 120

Page 37: The Final Revision IT Essentials PC Hardware & Software

18- PATA data cables are available in two different types. The types are distinguished

by the number of conductors. Which two types are available? (Choose two.)

• 6

• 40

• 68

• 80

• 120

Page 38: The Final Revision IT Essentials PC Hardware & Software

19- How many conductors are found in a SATA data cable?

• 3

• 4

• 7

• 10

• 12

Page 39: The Final Revision IT Essentials PC Hardware & Software

19- How many conductors are found in a SATA data cable?

• 3

• 4

• 7

• 10

• 12

Page 40: The Final Revision IT Essentials PC Hardware & Software

20- When installing a network adapter into a client computer, a technician notices that the contacts on

the adapter need to be cleaned. Which solution should the technician use to clean the contacts?

• glass cleaner

• isopropyl alcohol

• mild detergent

• rubbing alcohol

• slightly abrasive cleanser

Page 41: The Final Revision IT Essentials PC Hardware & Software

20- When installing a network adapter into a client computer, a technician notices that the contacts on

the adapter need to be cleaned. Which solution should the technician use to clean the contacts?

• glass cleaner

• isopropyl alcohol

• mild detergent

• rubbing alcohol

• slightly abrasive cleanser

Page 42: The Final Revision IT Essentials PC Hardware & Software

21- ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the

information they store. Which type of adapter will need to be installed on the servers to accomplish

the desired redundancy?

• NIC

• Wireless NIC

• USB gateway

• RAID adapter

• multiple slave hard disk adapter

Page 43: The Final Revision IT Essentials PC Hardware & Software

21- ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the

information they store. Which type of adapter will need to be installed on the servers to accomplish

the desired redundancy?

• NIC

• Wireless NIC

• USB gateway

• RAID adapter

• multiple slave hard disk adapter

Page 44: The Final Revision IT Essentials PC Hardware & Software

22- Which three system resources are commonly used for communication between

the CPU and other components in the computer? (Choose three.)

• IRQ • DMA • UDP • I/O port address • USB • PnP

Page 45: The Final Revision IT Essentials PC Hardware & Software

22- Which three system resources are commonly used for communication between

the CPU and other components in the computer? (Choose three.)

• IRQ • DMA • UDP • I/O port address • USB • PnP

Page 46: The Final Revision IT Essentials PC Hardware & Software

23- Which three computer components contain hazardous materials and require special handling for disposal? (Choose three.)

• batteries

• floppy drives

• monitors

• optical drives

• parallel cables

• printer toner

• cartridges

Page 47: The Final Revision IT Essentials PC Hardware & Software

23- Which three computer components contain hazardous materials and require special handling for disposal? (Choose three.)

• batteries

• floppy drives

• monitors

• optical drives

• parallel cables

• printer toner

• cartridges

Page 48: The Final Revision IT Essentials PC Hardware & Software

24- Which two tools can help protect against ESD? (Choose two.)

• antistatic wrist strap

• compressed air

• antistatic mat

• safety glasses

• rubber-sole shoes

Page 49: The Final Revision IT Essentials PC Hardware & Software

24- Which two tools can help protect against ESD? (Choose two.)

• antistatic wrist strap

• compressed air

• antistatic mat

• safety glasses

• rubber-sole shoes

Page 50: The Final Revision IT Essentials PC Hardware & Software

25- Which Windows tool should be run before upgrading the operating system?

• Convert

• Fdisk

• Msconfig

• Ntbackup

Page 51: The Final Revision IT Essentials PC Hardware & Software

25- Which Windows tool should be run before upgrading the operating system?

• Convert

• Fdisk

• Msconfig

• Ntbackup

Page 52: The Final Revision IT Essentials PC Hardware & Software

26- Which three tools will optimize computer performance after using the

Internet? (Choose three.)

• Fdisk

• Spyware Remover

• Defrag

• Disk Cleanup

• BIOS updater

• Disk Management utility

Page 53: The Final Revision IT Essentials PC Hardware & Software

26- Which three tools will optimize computer performance after using the

Internet? (Choose three.)

• Fdisk

• Spyware Remover

• Defrag

• Disk Cleanup

• BIOS updater

• Disk Management utility

Page 54: The Final Revision IT Essentials PC Hardware & Software

27- Which tool should be used if a user needs to optimize space on a hard drive?

• Defrag

• Disk Management

• Fdisk

• Format

Page 55: The Final Revision IT Essentials PC Hardware & Software

27- Which tool should be used if a user needs to optimize space on a hard drive?

• Defrag

• Disk Management

• Fdisk

• Format

Page 56: The Final Revision IT Essentials PC Hardware & Software

28- A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to a

floppy drive?

• Berg

• Molex

• 20-pin ATX connector

• SATA connector

Page 57: The Final Revision IT Essentials PC Hardware & Software

28- A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to a

floppy drive?

• Berg

• Molex

• 20-pin ATX connector

• SATA connector

Page 58: The Final Revision IT Essentials PC Hardware & Software

29- Logical addressing and routing function at which layer of the OSI model?

• Application

• Data Link

• Network

• Physical

• Transport

Page 59: The Final Revision IT Essentials PC Hardware & Software

29- Logical addressing and routing function at which layer of the OSI model?

• Application

• Data Link

• Network

• Physical

• Transport

Page 60: The Final Revision IT Essentials PC Hardware & Software

30- A computer can access devices on the same network but can not access devices on other networks. What is the probable cause of this

problem?

• The cable is not connected properly to the NIC. • The computer has an invalid IP address.• The computer has an incorrect subnet mask. • The computer has an invalid default gateway

address.

Page 61: The Final Revision IT Essentials PC Hardware & Software

30- A computer can access devices on the same network but can not access devices on other networks. What is the probable cause of this

problem?

• The cable is not connected properly to the NIC. • The computer has an invalid IP address.• The computer has an incorrect subnet mask. • The computer has an invalid default gateway

address.

Page 62: The Final Revision IT Essentials PC Hardware & Software

31- A technician is assembling a new computer. Which two components are often easier to install before mounting the motherboard in the case?

(Choose two.)

• CPU

• memory

• NIC

• sound card

• video card

Page 63: The Final Revision IT Essentials PC Hardware & Software

31- A technician is assembling a new computer. Which two components are often easier to install before mounting the motherboard in the case?

(Choose two.)

• CPU

• memory

• NIC

• sound card

• video card

Page 64: The Final Revision IT Essentials PC Hardware & Software

32- Which port is typically used for external wireless NICs?

• Parallel

• PS/2

• SCSI

• USB

Page 65: The Final Revision IT Essentials PC Hardware & Software

32- Which port is typically used for external wireless NICs?

• Parallel

• PS/2

• SCSI

• USB

Page 66: The Final Revision IT Essentials PC Hardware & Software

33-The ABC Company manager is calculating the TCO for an inkjet printer that the company needs

to purchase. Which three factors should be included in this calculation? (Choose three.)

• warranty

• software costs

• user training

• price per page

• purchase price

• environmental requirements

Page 67: The Final Revision IT Essentials PC Hardware & Software

33-The ABC Company manager is calculating the TCO for an inkjet printer that the company needs

to purchase. Which three factors should be included in this calculation? (Choose three.)

• warranty

• software costs

• user training

• price per page

• purchase price

• environmental requirements

Page 68: The Final Revision IT Essentials PC Hardware & Software

34- Refer to the exhibit. Which sequence of steps describes the printing process used by a laser printer?

• 1,2,3,4,5,6

• 2,5,3,4,1,6

• 3,4,1,6,2,5

• 4,2,6,5,3,1

Page 69: The Final Revision IT Essentials PC Hardware & Software

34- Refer to the exhibit. Which sequence of steps describes the printing process used by a laser printer?

• 1,2,3,4,5,6

• 2,5,3,4,1,6

• 3,4,1,6,2,5

• 4,2,6,5,3,1

Page 70: The Final Revision IT Essentials PC Hardware & Software

35- Which technology is used by laser printers?

• digital drop

• electro photographic

• electrostatic spray

• impact

• ink melting

Page 71: The Final Revision IT Essentials PC Hardware & Software

35- Which technology is used by laser printers?

• digital drop

• electro photographic

• electrostatic spray

• impact

• ink melting

Page 72: The Final Revision IT Essentials PC Hardware & Software

36-The technician has been asked to upgrade the printer driver for an old printer. What is the

best source for a new driver?

• manufacturer's website

• Microsoft Update website

• printer installation disk

• Windows Device Manager

• Windows hardware profiles

Page 73: The Final Revision IT Essentials PC Hardware & Software

36-The technician has been asked to upgrade the printer driver for an old printer. What is the

best source for a new driver?

• manufacturer's website

• Microsoft Update website

• printer installation disk

• Windows Device Manager

• Windows hardware profiles

Page 74: The Final Revision IT Essentials PC Hardware & Software

37- Which three factors are reasons to choose a client/server model for a network instead of

peer-to-peer? (Choose three.)

• The network is small with less than eight users.• The company network requires secure access to

confidential information.• The users need a central database to store

inventory and sales information.• Each user understands how to safely share files

across a network.• The data gathered by the employees is critical

and should be backed up on a regular basis.• All employees passed a strict background check

as part of the corporate hiring practices.

Page 75: The Final Revision IT Essentials PC Hardware & Software

37- Which three factors are reasons to choose a client/server model for a network instead of

peer-to-peer? (Choose three.)

• The network is small with less than eight users.• The company network requires secure access to

confidential information.• The users need a central database to store

inventory and sales information.• Each user understands how to safely share files

across a network.• The data gathered by the employees is critical

and should be backed up on a regular basis.• All employees passed a strict background check

as part of the corporate hiring practices.

Page 76: The Final Revision IT Essentials PC Hardware & Software

38- Which type of scanner generally has high costs but produces top-quality images?

• all-in-one

• drum

• handheld

• flatbed

Page 77: The Final Revision IT Essentials PC Hardware & Software

38- Which type of scanner generally has high costs but produces top-quality images?

• all-in-one

• drum

• handheld

• flatbed

Page 78: The Final Revision IT Essentials PC Hardware & Software

39- Which Windows XP command displays the route taken by packets crossing an IP

network?

• iproute

• netview

• nslookup

• ping

• tracert

Page 79: The Final Revision IT Essentials PC Hardware & Software

39- Which Windows XP command displays the route taken by packets crossing an IP

network?

• iproute

• netview

• nslookup

• ping

• tracert

Page 80: The Final Revision IT Essentials PC Hardware & Software

40- A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?

• The computer automatically boots into Safe Mode and displays a warning on the screen.

• The screen flashes with a red background and displays a warning message.

• The computer emits a pattern of beeps indicating the failing device.

• The computer returns an error message indicating the I/O address of the failing device.

Page 81: The Final Revision IT Essentials PC Hardware & Software

40- A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?

• The computer automatically boots into Safe Mode and displays a warning on the screen.

• The screen flashes with a red background and displays a warning message.

• The computer emits a pattern of beeps indicating the failing device.

• The computer returns an error message indicating the I/O address of the failing device.

Page 82: The Final Revision IT Essentials PC Hardware & Software

41- In the event of a catastrophic system or hardware failure, which Windows XP utility

provides a framework for saving and recovering the operating system?

• Emergency Repair Disk (ERD)

• Automated System Recovery (ASR)

• Windows Recovery Manager (WRM)

• Automated Windows Recovery (AWR)

• Windows System Recovery (WSR)

Page 83: The Final Revision IT Essentials PC Hardware & Software

41- In the event of a catastrophic system or hardware failure, which Windows XP utility

provides a framework for saving and recovering the operating system?

• Emergency Repair Disk (ERD)

• Automated System Recovery (ASR)

• Windows Recovery Manager (WRM)

• Automated Windows Recovery (AWR)

• Windows System Recovery (WSR)

Page 84: The Final Revision IT Essentials PC Hardware & Software

42- A technician receives a call from a customer dissatisfied with past service who continually

complains about the service during the call. How should the technician handle this call?

• Remind the customer that his company is probably better than the competition.

• Advise the customer that they can always leave his company and do business with the competition.

• Listen to the complaint and advise the customer that he will make every effort to avoid what they are complaining about.

• Ask the customer to submit his complaint in writing.

Page 85: The Final Revision IT Essentials PC Hardware & Software

42- A technician receives a call from a customer dissatisfied with past service who continually

complains about the service during the call. How should the technician handle this call?

• Remind the customer that his company is probably better than the competition.

• Advise the customer that they can always leave his company and do business with the competition.

• Listen to the complaint and advise the customer that he will make every effort to avoid what they are complaining about.

• Ask the customer to submit his complaint in writing.

Page 86: The Final Revision IT Essentials PC Hardware & Software

43- A customer is angry and calls to complain that the service scheduled on his computer took longer than

expected. The technician reviews the work order and notices that the service was performed by a new employee. How

should the technician respond?

• Verify that the computer is working properly now. • Listen to the complaint and then apologize for

any inconvenience caused by the lengthy service on the computer.

• Explain that the repair technician sent to perform the repair is inexperienced.

• Put the customer on hold until a supervisor is available.

Page 87: The Final Revision IT Essentials PC Hardware & Software

43- A customer is angry and calls to complain that the service scheduled on his computer took longer than

expected. The technician reviews the work order and notices that the service was performed by a new employee.

How should the technician respond?

• Verify that the computer is working properly now. • Listen to the complaint and then apologize for

any inconvenience caused by the lengthy service on the computer.

• Explain that the repair technician sent to perform the repair is inexperienced.

• Put the customer on hold until a supervisor is available.

Page 88: The Final Revision IT Essentials PC Hardware & Software

44- Which type of cable standard uses a 9-pin connector and supports data rates

in excess of 800 Mbps?

• DB-9

• DB-25

• IEEE 1284

• IEEE 1394a

• IEEE 1394b

Page 89: The Final Revision IT Essentials PC Hardware & Software

44- Which type of cable standard uses a 9-pin connector and supports data rates

in excess of 800 Mbps?

• DB-9

• DB-25

• IEEE 1284

• IEEE 1394a

• IEEE 1394b

Page 90: The Final Revision IT Essentials PC Hardware & Software

45- What is the purpose of an IRQ?

• Perform input/output between the CPU and peripherals.

• Establish peer-to-peer communication between devices and software.

• Request information from the CPU.

• Access the computer RAM for reading and writing.

Page 91: The Final Revision IT Essentials PC Hardware & Software

45- What is the purpose of an IRQ?

• Perform input/output between the CPU and peripherals.

• Establish peer-to-peer communication between devices and software.

• Request information from the CPU.

• Access the computer RAM for reading and writing.

Page 92: The Final Revision IT Essentials PC Hardware & Software

46- A technician is installing dual operating systems on a computer. Which disk management tool should be used to create two partitions on the hard disk?

• Chkdsk

• Defrag

• Fdisk

• Format

• Scandisk

Page 93: The Final Revision IT Essentials PC Hardware & Software

46- A technician is installing dual operating systems on a computer. Which disk management tool should be used to create two partitions on the hard disk?

• Chkdsk

• Defrag

• Fdisk

• Format

• Scandisk

Page 94: The Final Revision IT Essentials PC Hardware & Software

47- A customer calls to report a computer problem. Which two actions can the technician use to establish a good rapport with the customer?

(Choose two.)

• Personalize the call by periodically asking questions unrelated to the computer problem.

• Allow the customer to speak without interruption.• Use technical terms to determine the level of

knowledge the customer possesses. • Ask only closed-ended questions. • Refer to the customer by name whenever

possible.

Page 95: The Final Revision IT Essentials PC Hardware & Software

47- A customer calls to report a computer problem. Which two actions can the technician use to establish a good rapport with the customer?

(Choose two.)

• Personalize the call by periodically asking questions unrelated to the computer problem.

• Allow the customer to speak without interruption.• Use technical terms to determine the level of

knowledge the customer possesses. • Ask only closed-ended questions. • Refer to the customer by name whenever

possible.

Page 96: The Final Revision IT Essentials PC Hardware & Software

48- When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?

• BIOS reads the MBR.

• NTDETECT.COM is used to detect any installed hardware.

• NTDLR reads the registry files.

• The WINLOGON.EXE program is started.

Page 97: The Final Revision IT Essentials PC Hardware & Software

48- When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?

• BIOS reads the MBR.

• NTDETECT.COM is used to detect any installed hardware.

• NTDLR reads the registry files.

• The WINLOGON.EXE program is started.

Page 98: The Final Revision IT Essentials PC Hardware & Software

49- Which three benefits are gained by networking computers? (Choose three.)

• decreased need of personal training

• fewer peripherals needed

• decreased computer-to-user ratio

• lower cost licensing

• increased user specialization

• increased communication capabilities

Page 99: The Final Revision IT Essentials PC Hardware & Software

49- Which three benefits are gained by networking computers? (Choose three.)

• decreased need of personal training

• fewer peripherals needed

• decreased computer-to-user ratio

• lower cost licensing

• increased user specialization

• increased communication capabilities

Page 100: The Final Revision IT Essentials PC Hardware & Software

50- When analyzing a protocol used on the network, it is discovered that multicast

messages are being sent to network devices. Which class of IP addressing is being used to

send these messages?

• A

• B

• C

• D

• E

Page 101: The Final Revision IT Essentials PC Hardware & Software

50- When analyzing a protocol used on the network, it is discovered that multicast

messages are being sent to network devices. Which class of IP addressing is being used to

send these messages?

• A

• B

• C

• D

• E

Page 102: The Final Revision IT Essentials PC Hardware & Software

51- A fingerprint reader is an example of which security technology?

• authorization

• biometric

• key logging

• secure ware

• smartcard

Page 103: The Final Revision IT Essentials PC Hardware & Software

51- A fingerprint reader is an example of which security technology?

• authorization

• biometric

• key logging

• secure ware

• smartcard

Page 104: The Final Revision IT Essentials PC Hardware & Software

52- What is the default subnet mask for a Class A network?

• 0.0.0.255

• 0.0.255.255

• 0.255.255.255

• 255.0.0.0

• 255.255.0.0

• 255.255.255.0

Page 105: The Final Revision IT Essentials PC Hardware & Software

52- What is the default subnet mask for a Class A network?

• 0.0.0.255

• 0.0.255.255

• 0.255.255.255

• 255.0.0.0

• 255.255.0.0

• 255.255.255.0

Page 106: The Final Revision IT Essentials PC Hardware & Software

53- Which protocol adds security to remote connections?

• FTP

• HTTP

• NetBEUI

• POP

• SSH

Page 107: The Final Revision IT Essentials PC Hardware & Software

53- Which protocol adds security to remote connections?

• FTP

• HTTP

• NetBEUI

• POP

• SSH

Page 108: The Final Revision IT Essentials PC Hardware & Software

54- Which network device uses a MAC address table to segment the network?

• concentrator

• hub

• PBX

• router

• switch

Page 109: The Final Revision IT Essentials PC Hardware & Software

54- Which network device uses a MAC address table to segment the network?

• concentrator

• hub

• PBX

• router

• switch

Page 110: The Final Revision IT Essentials PC Hardware & Software

55- What is the logical topology used for the Ethernet architecture?

• bus

• double ring

• extended star

• ring star

Page 111: The Final Revision IT Essentials PC Hardware & Software

55- What is the logical topology used for the Ethernet architecture?

• bus

• double ring

• extended star

• ring star

Page 112: The Final Revision IT Essentials PC Hardware & Software

56- A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the

administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack?

• multi-ping attack

• phishing

• ping bomb

• ping of death

• spoofing

• zombie attack

Page 113: The Final Revision IT Essentials PC Hardware & Software

56- A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the

administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack?

• multi-ping attack

• phishing

• ping bomb

• ping of death

• spoofing

• zombie attack

Page 114: The Final Revision IT Essentials PC Hardware & Software

57- Which two types of connectors can be found on DVI cables? (Choose two.)

• 3-pin

• 15-pin

• 24-pin

• 29-pin

• 32-pin

Page 115: The Final Revision IT Essentials PC Hardware & Software

57- Which two types of connectors can be found on DVI cables? (Choose two.)

• 3-pin

• 15-pin

• 24-pin

• 29-pin

• 32-pin

Page 116: The Final Revision IT Essentials PC Hardware & Software

58- Which two quick solutions are commonly recommended when a technician is

troubleshooting a laptop? (Choose two.)

• Reboot the laptop.

• Reinstall the operating system.

• Disconnect the peripherals.

• Have the customer verify the problem.

• Call a level-2 technician.

Page 117: The Final Revision IT Essentials PC Hardware & Software

58- Which two quick solutions are commonly recommended when a technician is

troubleshooting a laptop? (Choose two.)

• Reboot the laptop.

• Reinstall the operating system.

• Disconnect the peripherals.

• Have the customer verify the problem.

• Call a level-2 technician.

Page 118: The Final Revision IT Essentials PC Hardware & Software

59- Which protocol dynamically assigns IP addresses to network devices?

• DHCP

• DNS

• ICMP

• RARP

• TCP

Page 119: The Final Revision IT Essentials PC Hardware & Software

59- Which protocol dynamically assigns IP addresses to network devices?

• DHCP

• DNS

• ICMP

• RARP

• TCP

Page 120: The Final Revision IT Essentials PC Hardware & Software

60- Which is an effective method to protect against data loss?

• biometrics

• data backup

• encryption

• smartcards

Page 121: The Final Revision IT Essentials PC Hardware & Software

60- Which is an effective method to protect against data loss?

• biometrics

• data backup

• encryption

• smartcards

Page 122: The Final Revision IT Essentials PC Hardware & Software

61- What are two examples of malware? (Choose two.)

• registry cleaner

• pop-up blocker

• spyware

• e-mail

• grayware

Page 123: The Final Revision IT Essentials PC Hardware & Software

61- What are two examples of malware? (Choose two.)

• registry cleaner

• pop-up blocker

• spyware

• e-mail

• grayware

Page 124: The Final Revision IT Essentials PC Hardware & Software

62- Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as

Windows and Linux?

• LEAP

• WEP

• WPA

• WTLS

Page 125: The Final Revision IT Essentials PC Hardware & Software

62- Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as

Windows and Linux?

• LEAP

• WEP

• WPA

• WTLS

Page 126: The Final Revision IT Essentials PC Hardware & Software

63- A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS. Which course of action should be taken to upgrade

the file system to NTFS?

• Format all the existing files with the NTFS File tool. • Create a new NTFS partition and copy the files into

the new partition. The existing partition can not be changed.

• Run the Microsoft Convert utility. • Overwrite the FAT32 file system with NTFS. Files

will automatically be added to the new file system.

Page 127: The Final Revision IT Essentials PC Hardware & Software

63- A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS. Which course of action should be taken to upgrade

the file system to NTFS?

• Format all the existing files with the NTFS File tool. • Create a new NTFS partition and copy the files into

the new partition. The existing partition can not be changed.

• Run the Microsoft Convert utility. • Overwrite the FAT32 file system with NTFS. Files

will automatically be added to the new file system.

Page 128: The Final Revision IT Essentials PC Hardware & Software

64- A technician has many new computers to set up. The technician completely configures one

master computer and makes an image of the hard drive. This image is then installed on the other

computers. What is this process called?

• disk array

• disk copying

• disk cloning

• disk mirroring

• disk multiplexing

Page 129: The Final Revision IT Essentials PC Hardware & Software

64- A technician has many new computers to set up. The technician completely configures one

master computer and makes an image of the hard drive. This image is then installed on the other

computers. What is this process called?

• disk array

• disk copying

• disk cloning

• disk mirroring

• disk multiplexing

Page 130: The Final Revision IT Essentials PC Hardware & Software

65- While performing preventive maintenance, a technician notices that the operating system

is missing updates. How can the technician enable automatic updates?

• Run the Sysedit utility from the command line. • Run the Autoupdate utility from the command line. • Run the Automatic Updates utility from the

Control Panel. • Click the Update icon in the System Tray. • Right-click My Computer and then choose

Advanced > Updates

Page 131: The Final Revision IT Essentials PC Hardware & Software

65- While performing preventive maintenance, a technician notices that the operating system

is missing updates. How can the technician enable automatic updates?

• Run the Sysedit utility from the command line. • Run the Autoupdate utility from the command line. • Run the Automatic Updates utility from the

Control Panel. • Click the Update icon in the System Tray. • Right-click My Computer and then choose

Advanced > Updates

Page 132: The Final Revision IT Essentials PC Hardware & Software

66- When booting the Windows XP operating system, which file will be read to

find the path to the boot partition?

• AUTOEXEC.BAT

• BOOT.INI

• NTBOOTDD.SYS

• NTDETECT.COM

Page 133: The Final Revision IT Essentials PC Hardware & Software

66- When booting the Windows XP operating system, which file will be read to

find the path to the boot partition?

• AUTOEXEC.BAT

• BOOT.INI

• NTBOOTDD.SYS

• NTDETECT.COM

Page 134: The Final Revision IT Essentials PC Hardware & Software

67- Which command adds a permanent IP-to-MAC address map?

• mac -s

• arp -s

• ipconfig -s

• ping -s

• rarp -s

Page 135: The Final Revision IT Essentials PC Hardware & Software

67- Which command adds a permanent IP-to-MAC address map?

• mac -s

• arp -s

• ipconfig -s

• ping -s

• rarp -s

Page 136: The Final Revision IT Essentials PC Hardware & Software

68- Which command provides a list of currently active TCP/IP connections on a

Windows NT/XP/2000 computer?

• ping

• netstat

• nslookup

• tracert

• telnet

• ipconfig

Page 137: The Final Revision IT Essentials PC Hardware & Software

68- Which command provides a list of currently active TCP/IP connections on a

Windows NT/XP/2000 computer?

• ping

• netstat

• nslookup

• tracert

• telnet

• ipconfig

Page 138: The Final Revision IT Essentials PC Hardware & Software

69-Which utility displays TCP/IP configuration information on a Windows

9x computer?

• ifconfig

• netconfig

• winipcfg

• config

• ixconfig

Page 139: The Final Revision IT Essentials PC Hardware & Software

69-Which utility displays TCP/IP configuration information on a Windows

9x computer?

• ifconfig

• netconfig

• winipcfg

• config

• ixconfig

Page 140: The Final Revision IT Essentials PC Hardware & Software

70-Which utility tests application layer connectivity between two devices?

• ping

• telnet

• netconfig

• arp

• tracert

• netstat

Page 141: The Final Revision IT Essentials PC Hardware & Software

70-Which utility tests application layer connectivity between two devices?

• ping

• telnet

• netconfig

• arp

• tracert

• netstat