Sponsor

Advertisment

It-essentials Checkpoint Ch1-Ch8 Exam v6.0 2016 2015-2016

Thursday, June 30, 2016

1. What three voltages are commonly provided by the power supply to the various components inside the computer? (Choose three.)

3.3 volts*

5 volts*

9 volts

12 volts*

24 volts

48 volts

 

2. Hard drives in a grocery warehouse keep failing because of the adverse warehouse environment. What would be a possible solution for this high failure rate?

Install an SSD drive in each computer.*

Install a more powerful power supply in each computer.

Install an antistatic mat under each computer.

Install each computer in a specialized high airflow case.

 

3. A server administrator needs to set up a new server with disk fault tolerance technology. The administrator decides to deploy RAID 0+1 technology. What is the minimum number of disks needed to deploy the disk array setting?

2

3

4*

5

6

 

4. Which type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a high definition television?

DVI

HDMI*

PS/2

DB-15

 

5. Refer to the exhibit. To what input device would the cables attach?

keyboard/mouse combo device

KVM switch*

video distribution center

sound system

 

6. A desktop user has requested the ability to easily transfer photos from a camera SD card to a computer. Which device can be installed on the desktop computer to fulfill this request?

capture card

storage controller

media reader*

graphics card

 

7. Which is the correct procedure to put out a fire with a fire extinguisher after the pin is pulled?

Aim just above the flame, squeeze the lever, and sweep from side to side.

Aim at the base of the flame, squeeze the lever, and sweep from side to side.*

Aim directly at the center of the flame, squeeze the lever, and sweep from side to side.

Aim at the base of the flame, squeeze the lever, and sweep from the base to the top of the flame.

Aim just above the flame, squeeze the lever, and sweep from the top to the base of the flame.

 

8. Which measure can help control RFI effects on wireless networks?

Ensure the humidity and temperature levels are set as low as possible.

Ensure the number of wireless NICs exceeds the number of wireless phones.

Ensure the wireless network is on a different frequency than the offending source.*

Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.

 

9. What can be tested with a digital multimeter?

wireless signal strength and access point positioning

basic functionality of computer ports

copper cable location

quality of electricity in computer components*

 

10. Which disk management tool scans the critical files of an operating system and replaces the corrupt files?

Scandisk

Chkdsk

Disk Cleanup

Optimize Drives

System File Checker*

 

11. Which action can reduce the risk of ESD damage when computer equipment is being worked on?

working on a grounded antistatic mat*

lowering the humidity level in the work area

moving cordless phones away from the work area

keeping the computer plugged into a surge protector

 

12. When a used CPU is being installed, what two items should be used to clean the top of the CPU and the base of the heat sink before applying thermal compound? (Choose two.)

tap water

denatured water

isopropyl alcohol*

cotton swab

lint-free cloth*

 

13. A technician is troubleshooting a problem where many websites return a “certificate not valid” error. The technician notices that the date and time are not current and resets these to the correct settings. The previously inaccessible websites are now accessible. However, when the computer is restarted the same problem reoccurs. What can the technician do to prevent the date and time from resetting?

Reinstall the OS.

Upgrade the BIOS.

Change the power settings in the BIOS.

Replace the CMOS battery.*

 

14. Which two hardware features would a technician monitor within the BIOS if a computer was suspected of overheating? (Choose two.)

CPU clock speed*

CPU fan speed*

motherboard voltage

hard drive speed

Trusted Platform Module

 

15. What component can be replaced and upgraded on a PC to increase the data processing speed?

CPU*

RAM

hard drive

BIOS

 

16. What are two effects of not having a preventive maintenance plan for users and organizations? (Choose two.)

increased repair costs*

increased number of regular updates

increased downtime*

increased management tasks

increased documentation needs

 

17. Which three actions should be part of a regular computer preventive maintenance plan? (Choose three.)

removing dust from fan intakes, the power supply, and peripherals*

installing appropriate security updates*

removing unused or unwanted programs*

changing browser settings

deleting old email

installing more RAM in the machine

 

18. If a technician is unable to create a backup of data on a customer computer, what three pieces of information should the technician include on the liability release form signed by the customer before beginning work? (Choose three.)

a description of the problem

the steps required to resolve the problem

permission to work on the computer without a current backup available*

a release from liability if data is lost or corrupted*

the components used in the repair

a description of the work to be performed*

 

19. What is the first step in the troubleshooting process?

Implement a quick procedure to solve the problem.

Ask the user direct questions about the issue.*

Create a plan of action to propose to the user.

Establish a theory for the cause of the problem.

 

20. After performing a preventive maintenance on a PC, the technician powers on the PC only to find that nothing happens. What is the most likely problem?

The computer is not plugged into the AC outlet.*

The power supply voltage switch is set to the incorrect voltage.

The technician forgot to reset the BIOS settings.

The CPU has not been reinserted properly.

 

21. Which statement describes a characteristic of a network operating system?

A network operating system shares files and folders on a small network with limited security.

It runs multiuser applications.*

It typically is used in SOHO environments.

It supports a limited number of users.

 

22. What technology was created to replace the BIOS program on modern personal computer motherboards?

UEFI*

RAM

CMOS

MBR

 

23. On which two occasions is it most likely that a technician will have to perform a clean operating system installation if a backup has not been performed? (Choose two.)

A user requires access to a new printer.

The existing operating system is corrupted.*

The existing security software requires upgrading.

The computer is being moved to a different network.

A new replacement hard drive is installed in a computer.*

 

24. Which key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration?

F1

F8*

F12

Alt-Z

Windows key

 

25. In which folder are application files for 32-bit programs typically located on a computer that is running a 64-bit edition of Windows 7?

C:\Users

C:\Program Files

C:\Application Data

C:\Program Files (x86)*

 

26. A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?

Task Manager*

Add or Remove Programs

Event Viewer

System Restore

 

27. What does virtual memory provide to an operating system?

an increase in data storage

an increase in the speed of accessing RAM

a temporary storage of data until enough RAM is available to process it*

the creation of virtual partitions on the hard drive

 

28. A PC technician is having trouble with a Windows-based system and wants to perform a system restore from the command prompt. What command would start this process?

tasklist

robocopy

sfc

gpupdate

rstrui*

 

29. A technician is attempting to create virtual machines on a PC but wants to ensure that the physical system resources used by the virtual machines are directly managed by them and not by the host operating system. How can the technician accomplish this?

Set up the virtual machines using a native hypervisor.*

Set up the virtual machines using a hosted hypervisor.

Set up the virtual machines as Windows Virtual PCs

Limit the amount of paged RAM.

Disable hyperthreading in the BIOS.

 

30. A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. For computers using the Windows 7 operating system, how can a technician create the restore point?

From the CLI enter the command restore /cn.

Choose Start > Control Panel > Accessories > System Tools > System Restore > Create a restore point.

Choose Start > All Programs > Accessories > System Tools > System Restore > Next.*

Right-click My Computer and then choose Properties > Restore > Create Restore Point.

 

31. A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly. What can the user do to fix this problem?

Change the file system to FAT16.

Update the driver for the graphics card.

Reinstall the programs in Compatibility Mode.*

Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control.

 

32. A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)

The total cost of the new solution is considerably lower.

Data is more secure in the event of hardware failures.*

Individual users are in control of their own computers and network resources.

Data resources and access are centrally controlled.*

Personnel costs are lower because a dedicated network administrator is no longer necessary.

 

33. At which TCP/IP model layer would a MAC address be found?

application

transport

internet

network access*

 

34. A technician needs to add a new wireless device to a small WLAN. The WLAN is a mixture of old and newer 802.11b and 802.11g devices. What choice for the new device would provide the most interoperability for present and future growth?

Add a new 802.11a device.

Add a new 802.11b device.

Add a new 802.11g device.

Add a new 802.11n device.*

 

35. A customer who wants to enhance home network security is shopping for devices. The sales representative recommends a device that has a hardware firewall. Which device can provide this service?

bridge

switch

integrated router*

wireless access point

 

36. Copper network cables consist of pairs of wires that are twisted together. Which type of signal interference is reduced or prevented by this?

RFI

EMI

crosstalk*

white noise

 

37. A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?

It cannot communicate outside its own network.*

It can communicate on the local network as well as on the Internet.

It can communicate with networks inside a particular company with subnets.

It has a public IP address that has been translated to a private IP address.

 

38. A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?

Disable SSID broadcast.*

Enable WPA encryption.

Configure DMZ settings.

Configure a DNS server.

 

39. A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation?

WLAN LED

power LED

Internet LED*

1-4 Ethernet LEDs

 

40. Why would an administrator use Windows Remote Desktop and Windows Remote Assistant?

to provide secure remote access to resources on another network

to connect to an enterprise network across an unsecured connection and act as a local client of that network

to enable sharing of files and presentations with a group of users over the Internet

to connect to a remote computer over the network to control its applications and data*

 

41. A corporation has expanded to include multiple remote offices around the globe. Which technology should be used to allow the remote offices to communicate and share network resources privately?

VPN*

Remote Desktop

administrative share

Remote Assistance

 

42. What physical layer medium is used by DSL to provide high-speed data communications?

telephone lines*

television cable

Satellite dish

4G wireless radio

 

43. The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?

APIPA

DHCP*

DIPS

ICMP

 

44. What is the function of the DNS server?

It assigns IP addresses to clients.

It accepts HTTP requests from clients.

It maps a hostname to a corresponding IP address.*

It manages the domain that clients are assigned to.

 

45. A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?

The cable is not connected properly to the NIC.

The computer has an invalid IP address.

The computer has an incorrect subnet mask.

The computer has an invalid default gateway address.*



from http://www.ccna5.net/

No comments:

Post a Comment