Sponsor

Advertisment

It-essentials Final Exam v6.0 2016 2015-2016

Thursday, June 30, 2016

1. What is the purpose of RAID adapters?

to allow older PCI technology expansion slots to be used

to provide enhanced audio and graphic capabilities

to connect multiple storage devices for redundancy or speed*

to connect peripheral devices to a PC to improve performance

 

2. Which type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a high definition television?

DVI

HDMI*

PS/2

DB-15

 

3. Which type of input device can identify users based on their voice?

digitizer

KVM

switchbiometric identification device*

scanner

 

4. What type of external storage should be used by a technician to back up over 2 TB of music and video data files?

CompactFlash card

external flash drive

external hard drive*

Secure Digital card

 

5. What type of device provides power to a computer and allows it to be safely shut down in the event of a power loss?

surge suppressor

uninterruptible power supply*

standby power supply

power inverter

 

6. Which measure can help control RFI effects on wireless networks?

Ensure the humidity and temperature levels are set as low as possible.

Ensure the number of wireless NICs exceeds the number of wireless phones.

Ensure the wireless network is on a different frequency than the offending source.*

Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.

 

7. What is the purpose of a Safety Data Sheet?

to specify procedures for dealing with potentially hazardous materials*

to specify procedures in designing and building common computer systems

to specify procedures for the operation of sensitive components and prevention of electrostatic discharge

to specify procedures in the use of humidity control and prevention of moisture damage

 

8. What can be tested with a digital multimeter?

wireless signal strength and access point positioning

basic functionality of computer ports

copper cable location

quality of electricity in computer components*

 

9. When should a technician avoid wearing an antistatic wrist strap?

when installing RAM

when replacing a power supply unit*

when installing a hard drive

when opening a computer case

 

10. Which solution should be used to clean a CPU and a heat sink?

soap and water

rubbing alcohol

a diluted ammonia solution

isopropyl alcohol*

 

11. Which two types of expansion slots would be used by a wireless NIC in a computer today? (Choose two.)

PCIe*

AGP

PCI*

DIMM

ISA

 

12. When a PC is being assembled, what component is connected to the motherboard with a SATA cable?

the optical drive*

the network interface card

the video card

the power supply

 

13. A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?

The computer automatically boots into Safe Mode and displays a warning on the screen.

The screen flashes with a red background and displays a warning message.

The computer emits a pattern of beeps indicating the failing device.*

The computer returns an error message that indicates the I/O address of the failing device.

 

14. Which three features can be configured in the BIOS settings to secure a computer? (Choose three.)

MAC filtering

drive encryption*

TPM*

file encryption

TKIP key

passwords*

 

15. What is the most important reason for a company to ensure that computer preventive maintenance is done?

Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment.

Preventive maintenance helps to protect the computer equipment against future problems.*

Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.

Preventive maintenance enables the IT manager to check on the location and state of the computer assets.

 

16. A technician opens up a PC to work on it, and finds that it is very dusty inside. What should the technician do?

Ignore the dust, as it does not affect the computer.

Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.

Use a can of compressed air to remove excess dust.*

Use a moistened cotton swab to remove excess dust.

 

17. Which built-in tool is available on a Mac OS X machine to perform disk backups?

Disk Utility

Deja Dup

Finder

Time Machine*

 

18. A computer technician performed a number of actions to correct a problem. Some actions did not solve the problem, but eventually a solution was found. What should be documented?

everything that was done to try to solve the problem*

only the solution, because this solved the problem

only the failed attempts, so that future technicians will know what not to try

a description of the problem and solution

 

19. After a computer is powered on, Windows 7 fails to start. What initial procedure would a technician use to deal with this failure?

Create a System Repair Disc and restore the image.

Press the F12 key during the boot process and start the computer in Safe Mode.

Boot from a Windows 7 installation media and access the System Restore utility.*

Access the Control Panel and choose Restore Files from Backup from the System and Security menu.

 

20. What are two advantages of the NTFS file system compared with FAT32? (Choose two.)

NTFS allows faster access to external peripherals such as a USB drive.

NTFS supports larger files.*

NTFS provides more security features.*

NTFS allows faster formatting of drives.

NTFS is easier to configure.

NTFS allows the automatic detection of bad sectors.

 

21. What type of hard drive contains flash memory for caching frequently used data but stores the most of the data on a magnetic hard disk drive?

USB flash drive

solid-state drive*

embedded multimedia card

solid-state hybrid disk

 

22. What does %USERPROFILE% represent in the path C:\Users\%USERPROFILE%\AppData\Local\Temp?

the location of the Documents folder of a particular user

an environment variable that is set by the operating system*

a variable set by the administrator for each user of the system

a fixed value that represents the level of access of a user to system files

 

23. A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?

Task Manager*

Add or Remove Programs

Event Viewer

System Restore

 

24. A technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems?

Computer Management

Device Manager*

My Computer

System Tools

 

25. Which technology provides a solution for PC virtualization?

hypervisor*

server clustering

Terminal Services

RAID

 

26. What are two consequences of setting an incorrect boot order in the system BIOS? (Choose two.)

The computer locks up without any error messages.

The computer displays a “BOOTMGR is missing” error after POST.*

The computer displays an “Invalid Boot Disk” error after POST.*

The computer continually restarts without displaying the desktop.

The computer displays an ‘Inaccessible Boot Device’ error after POST.

 

27. A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)

The total cost of the new solution is considerably lower.

Data is more secure in the event of hardware failures.*

Individual users are in control of their own computers and network resources.

Data resources and access are centrally controlled.*

Personnel costs are lower because a dedicated network administrator is no longer necessary.

 

28. Which layer of the OSI model is responsible for physical addressing and the procedures used to access media?

application

data link*

network

transport

 

29. The current IP configuration of a medium size company with several subnets is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service or protocol would simplify the workstation IP configuration task?

APIPA

DHCP*

DNS

ICMP

 

30. Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?

22

53

80

143

443*

 

31. Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)

nslookup cisco.com*

net cisco.com

ping cisco.com*

nbtstat cisco.com

ipconfig /flushdns

 

32. Which wireless security mode supports government grade security and offers both personal and enterprise authentication?

WEP

WPA2*

WPA

LEAP

 

33. Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?

PaaS*

IaaS

SaaS

ITaaS

 

34. A network administrator occasionally asks a technician to make sure that dust does not accumulate on devices in the network equipment closets. What is the purpose of having the technician do this job?

Dust can cause network equipment to overheat and cause problems on the network.*

Dust increases electromagnetic interference in nearby connected cables.

Dust can encourage insects and other pests to live in the equipment closets.

Dust is considered a fire hazard that poses danger to personnel and equipment.

Dust diminishes the range of wireless services.

 

35. A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can receive responses from workstations on the same subnet but not from remote workstations. What could be causing the problem?

The NIC driver is out of date.

The operating system is not compatible with the remote sites.

The TCP/IP protocol stack is not loaded.

The default gateway is incorrect.*

 

36. What are three common input devices found on laptops? (Choose three.)

touchpad*

fingerprint reader*

web camera*

external monitor

PS/2 keyboard

AC power connector

 

37. A user calls the help desk to report that a mobile device exhibits very slow performance. What could cause this problem?

The touchscreen is not calibrated.

An app is not compatible with the device.*

The operating system has encountered an error.

A power-intensive app is running at the background.

 

38. A computer technician has decided that a problem with a laptop can be solved by repairing a hardware component. What should be done first before attempting to repair a hardware component on a laptop?

Consult the service manual for the laptop.*

Ask a fellow technician for advice.

Backup the BIOS settings.

Remove the keyboard.

 

39. Which closed-ended question would be appropriate for a technician to use to narrow down the possible problems on a laptop that will not power on?

Can the laptop operate using the AC adapter?*

Have you changed your password recently?

What software has been installed recently?

What were you doing when the problem occurred?

 

40. A technician is troubleshooting the appearance of flashing lines on a laptop screen. What are two possible causes of this distortion? (Choose two.)

Power to the pixels has been removed.

The display settings have been changed.

The GPU is not cooling correctly.*

The LCD cutoff switch is damaged.

The display is not correctly installed.*

 

41. What is an indication that the battery in a mobile device could become physically hazardous and should be immediately replaced?

if the battery only supports the system for a reduced period of time

if there are signs of swelling*

if the screen brightness begins to dim

if the device feels warm to the touch

 

42. Refer to the exhibit. What is true of this mobile device screen?

Tapping and holding the arrow at the bottom left will display the Home screen.

Text messages, news, photos and other content can be displayed in the different tiles.*

Icons and buttons are used to represent the different apps on the phone.

Unpinning an app from this view will uninstall the app from the phone.

Tile sizes depend on the size of the app.

 

43. What are two potential risks that could result from rooting or jailbreaking a mobile device? (Choose two.)

enabling app access to the root directory*

not properly creating or maintaining sandboxing features*

allowing the user interface to be extensively customized

improving device performance

enabling features that are disabled by a cellular carrier

 

44. What two tasks should be done regularly to preserve the security and integrity of data and applications on mobile devices. (Choose two.)

Execute a factory reset once a month to remove all unidentified malicious software.

Back up user data on a regular basis.*

Password protect iTunes or Google Play accounts.

Use airplane mode if you are accessing the Internet at an open Wi-Fi site.

Ensure that the operating system software and applications contain the latest updates.*

Unmount all unused disk partitions.

 

45. A tire store needs to use carbon copy paper to print customer invoices so that both the store and the customer have a copy. What is the best printer solution?

piezoelectric printer

inkjet printer

thermal printer

impact printer*

 

46. A user on a home network wants to share a printer from a Windows 7 computer. What must the user do in order for other Windows 7 computers in the house to obtain the proper driver?

The user must browse the Internet, then download and install the proper driver.

The person doing the sharing must use the Additional Drivers button in order to designate how many device drivers are allowed to be downloaded.

Nothing. Windows automatically provides the driver.*

The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers.

 

47. Which three components are typically found in laser printer maintenance kits? (Choose three.)

fuser assembly*

primary corona

pickup rollers*

transfer rollers*

secondary corona

paper trays

 

48. What characterizes a DDoS attack?

Many hosts participate in a coordinated attack.*

Infected computers are called daemons.

It is easy to identify the source of the attack.

All hosts must be in the same geographic area.

 

49. What guideline should be followed when establishing a password security policy?

Passwords should be physically stored in a convenient location.

Passwords should contain mainly numbers for better encryption.

The system administrator should assign passwords to the users.

Lockout policies should be avoided in order to increase user access.

An expiration period should be established so that passwords frequently change.*

 

50. What are three features provided by the TPM module? (Choose three.)

hashed encryption of the hard drive volume

security for user authentication information*

support for Windows backup

application license protection*

storage of digital certificates*

support for Windows Firewall

 

51. What is the next troubleshooting step after a theory of probable cause has been established?

Test the theory to determine cause.*

Identify the exact problem.

Establish a plan of action.

Document findings and outcomes.

 

52. Once a technician understands a customer complaint, it is common to ask closed-ended questions. Which question is a close-ended one?

What happened before the error occurred?

Is this the first time the error occurred?*

What happened after the error occurred?

What error messages were displayed when the error occurred?

 

53. What is a characteristic of the open source license of an application software?

It requires registration instead of purchasing.

It cannot be used for campus-wide deployment.

It allows users to modify and share the source code.*

It does not require purchase in order to use the software.

It requires acknowledged completion of a professional training course prior to use.

 

54. Chad, a level one call center technician, receives a customer phone call. The customer has an issue that Chad does not have the knowledge to answer. The customer is irritated that Chad cannot provide immediate assistance. Which two things should Chad do next? (Choose two.)

Document the reason the customer called and create a support ticket.*

Inform the customer of the need to call back later.

Escalate the customer to a level two technician.*

Ask the customer further questions to diagnose and attempt to fix the problem.

Place the customer on hold until the customer has time to cool down.

 

55. Users in an office complain that the network printer is printing vertical lines on all pages. What is a likely cause of this problem?

The printer does not have enough memory.

The printer has an incorrect IP address.*

The printer toner is low.

The printer drum is damaged.

 

56. A technician is troubleshooting a Windows 7 computer that displays an “Invalid Boot Disk” error message. What would be the most likely action the technician should perform to correct the issue?

Use the System Recovery Options to select the correct active partition.*

Scan for and remove any virus found.

Run chkdsk /F /R to fix the hard drive file entries.

Replace the hard drive on the computer.

 

57. When a user tries to run a program, a missing or corrupt DLL message is displayed. What are two possible solutions to this problem? (Choose two.)

Reinstall the correct drivers.

Use the msconfig command to adjust the startup settings for the program.

Run Windows Startup Repair.

Run sfc/scannow in Safe Mode.*

Reinstall the program that is associated with the corrupt DLL file.*

 

58. What can help control the effect of RFI on a wireless LAN?

Ensure the humidity and temperature levels are set as low as possible.

Ensure the number of wireless NICs exceeds the number of wireless phones.

Ensure the wireless network is on a different frequency than the offending source.*

Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.

 

59. A technician wants to allow users to backup and restore all the files on their computers, but does not want the users to be able to make changes to the system. How should the technician give users this functionality?

Grant the users read permissions on all files.

Give the users administrator rights on their computers.

Make the users members of a group called Backup Operators.*

Check the Folder is Ready for Archiving box in the properties of each folder.

 

60. Match the facility access control devices to the correct descriptions. (Not all options are used.)

 

61. Why do laptop computers use CPU throttling techniques?

to enhance the performance of the CPU

to reduce the heat that the CPU may generate*

to ensure the CPU is running at its peak speed

to conserve the battery life by reducing the bus speed between the CPU and RAM

62. What tool is included in the Mac OS X for backing up disks to image files and recovering disk images?

Disk Utility*

Deja Dup

Disk Error-Checking

System Restore

 

63. A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.)

Avoid lifting the equipment using the strength in your back.*

Lift the equipment using the strength in your legs and knees.*

Avoid bending your knees when lifting the printer.

Bend your back to pick the printer up.

Avoid lifting the printer close to your body.

 

64. Refer to the exhibit. As part of the process of building a computer, what is the proper order of the first three steps in the installation of a power supply?

Steps 1, 2, 4

Steps 1, 3, 2

Steps 1, 4, 3*

Steps 2, 3, 4

 

65. Which two operations can help prevent a mobile device from being tracked without permission? (Choose two.)

Turn off the GPS when not in use.*

Use a VPN connection whenever possible.

Set the device to not store credentials.

Set the device to connect only to known WiFi networks.

Disable or remove apps that allow connections to the GPS.*

 

66. What is a characteristic of a computer power connector?

A Molex power connector supplies power to a motherboard.

A Molex connector and a SATA connector can be used on the same drive at the same time.

A SATA power connector is used to connect to a hard disk drive or an optical drive.*

An ATX main power connector supplies power to a video adapter.

 

67. Which expansion card can assist in troubleshooting a computer problem when no video is available?

BIOS card

advanced graphics card

USB expansion card

POST card*

68. Which two PC settings can be configured using the BIOS setup utility? (Choose two.)

POST

virtualization support*

allocation of memory to applications

enabling device drivers

boot sequence*

 

69. What factor should be taken into consideration more with laptops than with desktops?

environmental control*

loose cables

short circuits

unseated adapter cards

70. What are three benefits of computer preventive maintenance? (Choose three.)

elimination of the need for repairs

improvement in data protection*

extension of the life of components*

reduction in the number of equipment failures*

time savings for technicians making repairs

improvement in RAM access time

 

71. Which step in the troubleshooting process is important to help avoid repeating repair processes that were performed previously?

identification of the problem

implementation of the solution

documentation of the problem and its solution*

preparation of a plan of action

 

72. A computer user complains of a computer that freezes up after about five minutes of use. The technician checks the computer BIOS to see if there might be a configuration problem that is causing the computer to behave consistently in this manner. While the technician is reviewing the information, the computer once again freezes. What is the probable cause of the computer problem?

The BIOS is corrupt.

The hard drive is failing.

The CPU fan is not functioning.*

The CMOS battery has failed.

 

73. Why is a full format more beneficial than a quick format when preparing for a clean OS installation?

A full format is the only method of installing Windows 8.1 on a PC that has an operating system currently installed.

A full format will delete files from the disk while analyzing the disk drive for errors.*

A full format will delete every partition on the hard drive.

A full format uses the faster FAT32 file system, whereas a quick format uses the slower NTFS file system.

 

74. What is the default file system used during a fresh installation of Windows 7?

NTFS*

HPFS

FAT16

FAT32

 

75. What is the first step an administrator should take when splitting a single partition into multiple partitions?

Format the partition.

Assign a drive letter to the partition.

Extend the partition.

Shrink the partition.*

 

76. A user notices that some of the programs that are installed before upgrading Windows to a new version no longer function properly after the upgrade. What can the user do to fix this problem?

Use the System Restore utility.

Update the driver for the graphics card.

Run the programs in Compatibility Mode.*

Use the recovery partition to reinstall Windows.

 

77. After a Windows operating system has been installed, which program would a technician use to select the programs that will run at startup?

Ntldr

Regedit

Msconfig*

Task Manager

 

78. Which type of network spans a single building or campus and provides services and applications to people within a common organizational structure?

PAN

WAN

LAN*

MAN

79. What are the four layers in the TCP/IP reference model?

application, presentation, internet, network access

application, transport, network, data link

application, transport, internet, network access*

application, presentation, session, transport

physical, data link, network, transport

80. A user wants to map a network drive on a PC that is named “WORK2” and runs Windows 7. The name of the shared resource the user wishes to map to is called “installs” and is located on a workstation called “WORK1”. What would be the correct path for mapping the network drive?

\\ username\WORK2\\installs

\\username\password/WORK1/installs

// WORK2/installs

\\work1\installs*

\\username\Work2\installs

\WORK2|installs

 

81. A customer who travels frequently wants to know which technology is the most suitable for being connected to the corporate network at all times at low cost. Which network technology would a network administrator recommend?

satellite

ISDN

cellular*

microwave

 

82. What is the difference between cloud computing and a data center?

A data center provides access to shared computing resources, wheras a cloud is a private on-premise facility that stores and processes local data.

Cloud computing solutions are network resources and services provided to the clients through the use of services from data centers.*

The data center makes use of more devices to process data.

Data centers require cloud computing but cloud computing does not require data centers.

 

83. A user complains about being unable to connect to the wireless network. Which two actions should be part of troubleshooting the wireless connection? (Choose two.)

Verify that the laptop is plugged into an electrical outlet.

Reconfigure TCP/IP settings on the laptop.

Reinsert the laptop battery.

Try moving the laptop to different places to see if a signal can be detected.*

Verify in the laptop software whether any wireless networks are detected.*

84. A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can only receive a response from local workstations. What could be causing the problem?

The NIC driver is out of date.

The operating system is not compatible with the remote sites.

The TCP/IP protocol stack is not loaded.

The default gateway is not set.*

 

85. An ISP help desk technician receives a call from a customer who reports that no one at their business can reach any websites or get their e-mail. After testing the communication line and finding everything fine, the technician instructs the customer to run nslookup from the command prompt. What does the technician suspect is causing the customer’s problem?

improper IP address configuration on the host

hardware failure of the ISR used to connect the customer to the ISP

bad cables or connections at the customer site

failure of DNS to resolve names to IP addresses*

 

86. A technician is asked to configure the time that the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?

Administrative Tools

BIOS*

Command Prompt

Safe mode

System Registry

 

87. A technician needs to configure a Bluetooth headset for a laptop user. Which two steps should the technician take before installing the headset? (Choose two.)

Remove the battery.

Disconnect AC power.

Enable Bluetooth in BIOS Setup.*

Ensure that the antistatic wrist strap is attached to a nonpainted portion of the laptop.

Ensure that the laptop Bluetooth switch is enabled.*

 

88. What laptop component converts DC power to AC so that the display can illuminate?

inverter*

backlight

CCFL

battery

motherboard

 

89. A user downloads a widget onto his Android phone but is puzzled to see that when the widget is touched an app is launched. What is a possible cause?

The user has downloaded a virus.

The widget is corrupt.

The security settings of the Android OS have been compromised.

The widget is associated with the app and this is the normal behavior.*

 

90. Which component uses the greatest amount of power on most mobile devices?

LCD screen*

camera

CPU

media player

 

91. What is the purpose of using the MIME email protocol on mobile devices?

to enable pictures and documents to be included in email messages*

to re-synchronize the email account with other devices

to remotely lock the email account if the device is stolen

to encrypt the email messages

 

92. What is an indication that the battery in a mobile device could become physically hazardous and should be immediately replaced?

if the battery only supports the system for a reduced period of time

if there are signs of swelling*

if the screen brightness begins to dim

if the device feels warm to the touch

 

93. A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)

Inkjet printers are less expensive as an initial purchase than laser printers.*

A laser printer is significantly slower than an inkjet printer.

Both laser and inkjet printers produce poor quality images.

The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.*

Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.

 

94. For cleaning a laser printer, what should be used to pick up excess particles of toner?

a HEPA-capable vacuum*

a lint-free cloth

isopropyl alcohol

a damp cloth

 

95. Which two password control policies should an organization implement to ensure strong passwords? (Choose two.)

Passwords should be set to expire every 60 days.*

Passwords should contain no more than eight characters.

Passwords must contain encrypted characters.

Passwords should contain letters and numbers.*

Passwords should contain only capital letters.

 

96. A computer technician has been asked to secure all Windows 7 computers by encrypting all the data on each computer. Which Windows feature should be used to provide this level of encryption?

BitLocker*

EFS

TPM

Windows Update

 

97. The activity of a previously unknown program triggers an alert by Windows firewall. What three options will the user have for dealing with this event? (Choose three.)

Keep blocking*

Unblock*

Ask me later*

Deny all

Turn off

Turn on

 

98. A technician suspects that a security issue is causing problems with a computer. What two actions could be performed to test theories of probable cause when troubleshooting the PC? (Choose two.)

Log in as a different user.*

Disconnect the computer from the network.*

Search helpdesk repair logs for more information.

Discuss solutions with the customer.

Ask the customer open-ended questions about the problem

 

99. A call center technician answers a call from a frequent customer who is known to be impatient and lacks experience with computers. The customer has an issue with an application that the call center supports. The customer informs the technician that the problem had been reported before but the original technician was rude, did not listen, and did not fix the problem. If the technician is confident that the problem can be resolved by increasing the amount of memory in the computer, what should the technician do?

Tell the customer to install 2 GB of DDR3 PC3-10600 RAM.

Explain that the original technician is no good and the supervisor will be told.

Suggest that the customer purchase a new computer.

Confirm the issues and give detailed instructions to solve the problem.*

 

100. What expectation is defined in the service level agreement between an organization and service vendor?

guaranteed service response time*

maximum number of service calls per day

chain of custody procedures

communication etiquette rules

 

101. In which circumstance should a level one technician initiate an escalated work order?

when a customer appears to be very knowledgeable

when a customer demands talking to a particular technician

when a problem requires expertise from another technician*

when the technician cannot understand the problem as explained by the customer

 

102. An application appears frozen and is not responding to a mouse or the keyboard. What Windows OS tool can be used to stop the application?

Event Viewer

Task Manager*

Device Manager

Disk Management

 

103. Which two issues are likely to cause BSOD errors? (Choose two.)

out-of-date browser

RAM failing*

device driver errors*

lack of antivirus software

power supply failure

 

104. A user has installed a new FTP client on a computer, but is unsuccessful in connecting to an FTP server. Which two key pieces of information should the user ensure are configured correctly on the FTP client? (Choose two.)

username

password

FTP client IP address

FTP server IP address*

FTP client port number

FTP server port number*

 

105. A technician who is working on an employee’s laptop finds that a number of files that were encrypted on a network server drive are present on the laptop drive in unencrypted form. What could cause this problem?

Encrypted files cannot be transferred across a network.

The new computer doesn’t have an NTFS partition.*

The network proxy decrypted the data to scan it for malware.

The sensitive data was transferred with the FTP protocol.



from http://www.ccna5.net/
Read more ...

It-essentials Practice Exam v6.0 2016 2015-2016

Thursday, June 30, 2016

1. What two motherboard components control the system boot operations? (Choose two.)

BIOS chip*

UEFI chip*

Northbridge chip

Southbridge chip

CPU

 

2. What motherboard chip controls high speed CPU communication to RAM and the video card?

 

Northbridge*

Southbridge

BIOS

UEFI

 

3. What is a possible use for virtual computing?

to run old applications that are not compatible with current operating systems*

to allow computer hardware to be tested

to allow computer hardware upgrades to be tested

to allow ROM firmware upgrades to be tested

 

4. True or False?

Thin clients require a network connection to remote servers to perform data processing.

true*

false

 

5. What is the correct disposal process of old computer batteries?

They should be burned because they do not decompose.

They can be refilled and reused.

They should be placed in an airtight container and then thrown away in the regular garbage.

They must be recycled because they are harmful to the environment.*

Because they will decompose harmlessly, they should be thrown away in the recycling bin.

 

6. Which two procedures can help protect against ESD when working on a computer system? (Choose two.)

the use of an antistatic wrist strap*

the use of magnetized tools

the use of an antistatic mat*

the use of safety glasses

the use of polyester clothing

 

7. Which software tool will protect against viruses and spyware on a Windows PC?

Windows 8 Action Center

Scandisk

Windows Defender*

System File Checker

 

8. Which cleaning material should be used to clean component contacts?

isopropyl alcohol*

compressed air

cotton swabs and cloths

dishwashing liquid and water

 

9. A technician is troubleshooting a problem where many websites return a “certificate not valid” error. The technician notices that the date and time are not current and resets these to the correct settings. The previously inaccessible websites are now accessible. However, when the computer is restarted the same problem reoccurs. What can the technician do to prevent the date and time from resetting?

Reinstall the OS.

Upgrade the BIOS.

Change the power settings in the BIOS.

Replace the CMOS battery.*

 

10. When a new motherboard is being installed, between which two components must thermal compound be applied? (Choose two.)

CPU*

RAM

chassis

heat sink*

chipset

motherboard

 

11. Which solid-state storage technology allows a computer BIOS to be upgraded by flashing?

SODIMM

ROM

SDRAM

EEPROM*

 

12. Which two existing components must be compatible with the installation of a new upgraded CPU? (Choose two.)

power supply*

motherboard*

hard drive

case

video card

 

13. What are three important considerations when installing a CPU on a motherboard that has just been upgraded? (Choose three.)

Antistatic precautions are taken.*

The CPU is correctly aligned and placed in the socket.*

The CPU contacts are first cleaned with isopropyl alcohol.

The CPU heat sink/fan assembly is correctly installed.*

The CMOS battery is removed prior to installing the CPU.

Maximum insertion force is applied to the load lever so that the CPU is locked in place.

 

14. A specific computer has an issue that could not be resolved by the help desk technician. The on-site technician finds that Windows updates have been disabled. The technician re-enables the update service, configures the computer for automatic updates, downloads and installs all missing updates, ensures the computer boots successfully, and verifies with the customer that the issue has been resolved. Which step, if any, is next?

Document the findings, actions, and outcomes.*

No further action is needed.

Establish a plan of action to resolve the problem and implement the solution.

Verify full system functionality and, if applicable, implement preventive measures.

Test the theory to determine the cause.

 

15. What should a technician do before beginning any troubleshooting steps on a customer computer?

Perform a data backup.*

Document the findings.

Identify the problem.

Establish a plan of action.

 

16. Which document can be signed by both a user and a computer repair shop to release the shop from backing up user data?

preventive maintenance plan

work order

liability release form*

warranty form

 

17. A technician is troubleshooting a 4-year-old computer that takes a long time to boot, and identifies that the BIOS rediscovers all the hardware at every boot. What action would fix this problem?

Replace the CMOS battery.*

Launch Device Manager to discover new hardware.

Reset the BIOS using the CMOS jumper.

Start the computer with the last known good configuration.

 

18. Which location on a hard disk is used by the BIOS to search for operating system instructions in order to boot a PC?

the logical drive

the active partition*

the Windows partition

the extended partition

 

19. A technician is asked to set up one hard drive that will support two operating systems and will store data files in three separate drive locations. Which partition settings will support these requirements?

1 primary, 3 active, 1 extended, 2 logical

2 logical, 2 active, 3 extended*

2 primary, 1 active, 1 extended, 3 logical

3 primary, 1 active, 2 extended

 

20. A user installs a new sound card driver in a computer that is working properly. After the installation of the drivers for the new sound card, the computer fails to boot. Which quick fix can the user implement to return to the previous working state?

Boot to Emergency Recovery State.

Boot to Last Known Good Configuration.*

Boot to Recovery Console.

Boot to Start Windows Normally.

 

21. A technician uses the shrink volume feature of the disk management utility and splits the partition. What must the technician do next in order to make use of the new space?

Partition the unallocated space.

Format the existing partition.*

Delete all partitions and reinitialize the disk.

Convert the unallocated space into a dynamic disk.

 

22. A technician is using the six troubleshooting steps in an attempt to repair a PC. After completing the steps needed to test a theory and determine the cause, the technician still has not solved the problem. Which two steps are likely to be taken next by the technician to establish a plan of action and resolve the problem? (Choose two.)

Perform an Internet search.*

Ask other users in the area.

Access helpdesk repair logs.*

Speak with the supervisor of the user.

Call the helpdesk to log the problem.

 

23. On a computer that will not boot, which two actions are recommended in the troubleshooting process after verifying the obvious issues such as power to the computer and display, non-bootable media, and the BIOS boot order options? (Choose two.)

Remove unnecessary peripherals.*

Reinstall the operating system.

Reset the BIOS settings to factory default.

Use the Last Known Good Configuration.*

Replace computer components one at a time until the problem is solved.

Reinstall the user applications.

 

24. What are the four layers in the TCP/IP reference model?

HTTP, TCP, IP, Ethernet

TCP, IP, Ethernet, IEEE

application, transport, internet, network access*

application, presentation, session, transport

physical, data link, network, transport

 

25. What is the distance limitation of a single data run for UTP cabling without adding networking devices?

33 ft (10 m)

100 ft (31 m)

330 ft (100 m)*

500 ft (154 m)

 

26. What is the default subnet mask for a Class A network?

0.0.0.255

0.0.255.255

0.255.255.255

255.0.0.0*

255.255.0.0

255.255.255.0

 

27. Which network protocol is used to automatically assign an IP address to a computer on a network?

FTP

DHCP*

ICMP

SMTP

APIPA

 

28. Which open standards-based wireless security mode supports the highest level of security?

WEP

WPA2*

WPA

LEAP

 

29. What are two network requirements necessary to establish a VPN connection between a remote computer and a private company LAN? (Choose two.)

low latency network connection

secure web server

Internet access*

PSTN access

VPN client*

 

30. The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?

MD5

VPN*

WEP

WPA

 

31. What type of WAN connection would use 3G or 4G?

DSL

satellite

cable

POTS

cellular*

 

32. True or False?

An intrusion detection system works inline and has the ability to drop malicious traffic.

true

false*

 

33. Where can a technician enable ACPI mode on a laptop?

BIOS

Task Manager

Device Manager*

Personalization

 

34. Which two actions must be performed before installing RAM into a laptop? (Choose two.)

Use thermal compound to attach the memory to the motherboard.

Before installing the RAM, update the saved CMOS settings to the newly configured amount of RAM.

Remove the battery.*

Disconnect the display from the bottom of the laptop.

Disconnect AC power.*

Remove the memory module retaining clips from the slots where the new RAM will insert.

 

35. Which two items would be part of a laptop preventive maintenance kit? (Choose two.)

compressed air*

plastic scribe

soft cloth*

antistatic wrist strap

flat-head screwdriver

 

36. What is the purpose of running mobile device apps in a sandbox?

to enable the phone to run multiple operating systems

to prevent malicious programs from infecting the device*

to enable separate app icons to be displayed on the home screen

to bypass phone carrier restrictions that prevent access to unauthorized apps

 

37. In what two situations is a virtual printer used? (Choose two.)

A user sends a printed document to a remote destination through the cloud.*

A remote user sends a document to a local user who prints the document using the company laser printer.

A corporate user prints to a centralized printer on the same floor, but on a different network.

A document is printed to a PDF or other file type.*

A document is sent to a printer that is connected to the USB port of a co-worker on the same network.

 

38. A user has installed a new printer. Which two pieces of information about the printer operation are provided by printing a test page from the computer? (Choose two.)

confirmation that the color calibration is optimized

verification of print spool settings

confirmation that duplex (double-sided) printing is working correctly

verification that driver software is working correctly*

confirmation that printer and computer are communicating*

 

39. A technician wants to add a new shared network printer to a computer. The printer is not shown in the list of available printers. What two actions can the technician take to add the printer? (Choose two.)

Enter the printer model.

Enter the printer IP address.*

Access a command prompt and use the net use command to locate the printer and printer path.

Browse for the printer on the network.*

Enter the name of the computer used to share the printer.

 

40. A technician is installing a new printer in a cool, damp environment. After the printer cabling is done, and the software and print driver are installed, the printer test page jams. What is the most likely cause of the print failure?

incorrect printer driver

too much humidity*

not enough printer memory

loose printer cables

 

41. What type of security attack is being launched when a hacker calls a company to obtain computer login information and pretends to be an employee?

spyware

phishing

adware

Trojan

social engineering*

 

42. Which two aspects of a computer can be protected by setting the BIOS password? (Choose two.)

network address assignment method

hard drive settings*

operating system login

operating system booting*

file system management

firewall settings

 

43. After logging into a computer, a user can view files but is unable to download the files. What action can the administrator take to allow the user to download the files while preventing deletion of the files?

Set the folder permissions to Read.

Set the file permissions to Modify.

Set the file permissions to Full Control

Set the file permissions to Read and Execute.*

 

44. The PC support person has heard of an instance where departmental secretaries go to lunch and leave their computers unlocked and remain logged into their account. Which Windows feature would the technician use to help in this situation?

AutoRun

BIOS/UEFI password

idle timeout and screen lock*

Windows firewall

 

45. After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?

Check for the latest OS patches and updates.*

Document the problem and the procedures performed to solve it.

Talk with the user to determine the cause of the problem.

Gather information from a number of sources to clearly identify the problem.

 

46. A customer is angry and calls to complain that the service scheduled on the computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?

Verify that the computer is working properly now.

Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer.*

Explain that the repair technician sent to perform the service is inexperienced.

Put the customer on hold until a supervisor is available.

 

47. Refer to the exhibit. During the troubleshooting of software that is installed on a computer system, a level one technician requires help from a level two technician. The file shown in the exhibit must be sent to the level two technician. How should the level one technician deliver this file?

This file should not be shared with the level two technician.

Replace all passwords in the file with <password omitted> before emailing the file and then supply the passwords by secure means, if required.*

Send the file as it is to the level two technician.

Deliver the file in printed format only.

 

48. What determines the level of support that a call center technician will provide to an individual customer?

Support is based on the SLA for that customer.*

All customers receive the same level of support by the call center.

A level one technician will provide a higher level of support than a level two technician.

An individual call center technician chooses the level of support based on the time available to assist the customer.

 

49. After resolving an intermittent CD-ROM drive fault by firmly reconnecting a loose cable, the technician then decides to inspect all other cable connections to prevent other faults from occurring. Which two conditions will help to prevent future cable and connector faults? (Choose two.)

There are no missing or bent connector pins.*

Cables are stretched tight between connectors.

Cables are not bent sharply around adapter cards.*

Device data cables exceed manufacturer specifications.

The connector retaining screws have been over tightened with a screwdriver.

 

50. A technician has been asked to reinstall the OS on a computer that has a corrupted operating system. The technician inserts the installation media in the optical drive. What would be the most likely action the technician should perform next?

Change the boot sequence in the BIOS.*

Change the BIOS password.

Flash the BIOS for a firmware upgrade.

Change clock speeds in the BIOS.

 

51. What are three common causes of operating systems problems? (Choose three.)

a corrupted registry*

incorrect IP addressing information

loose cable connections

failed service pack installation*

CMOS battery problem

virus infection*

 

52. What are three common solutions for a PC that displays an IP address starting with 169.254.x.x? (Choose three.)

Check the DNS server setting.

Turn on the device that is acting as a DHCP server.*

Enable the client machine to receive an IPv4 address automatically.

Use the ipconfig /release and ipconfig /renew commands to request a new IPv4 address.*

Reboot the client machine that is using the 169.254.x.x address.*

Reenter the IPv4 address on the DHCP server.

 

53. Which built-in BIOS diagnostic test would a technician run to check a computer boot problem?

memory test

POST test

start test*

battery test

 

54. What are three features of GPS on mobile devices? (Choose three.)

phone number lookup

navigation*

specialized search results*

device tracking*

remote wipe

gas mileage calculations

 

55. In Windows 7, which path will give access to parental control?

Start > Control Panel > Network and Internet > Internet Options > Security tab

Start > Control Panel > User Accounts and Family Safety > Parental Controls*

Start > Control Panel > User Accounts and Family Safety > User Accounts > Change User Account Control settings

Start > Control Panel > Network and Internet > Internet Options > Parental Control link

 

56. A user calls the help desk reporting that a laptop with Linux freezes on startup and displays kernel panic. What could cause this problem?

A driver has become corrupted.*

GRUB or LILO has been deleted.

GRUB or LILO has been corrupted.

An application is using a resource that has become unavailable.

 

57. A user notices that a mobile device is draining power faster than is normal. What are three causes of quick battery drain? (Choose three.)

The airplane mode is turned on.

An app is using too many resources.*

An app is not compatible with the device.

The device is roaming between call towers.*

The display is set to a high level of brightness.*

The device is connecting over a VPN.

 

58. Drag the statements on the left to the mobile OS that they describe on the right. (Not all targets are used.)

59. Drag the description to its matching cable type.

60. Match the computer problem with the area of the system affected by the problem.

 



from http://www.ccna5.net/
Read more ...

It-essentials Chapter 14 Exam v6.0 2016 2015-2016

Thursday, June 30, 2016

1. A technician discovers that RAID has stopped working. Which two situations could cause this issue? (Choose two.)

The external RAID controller loses power.*

The RAID controller fails.*

The cables connected to the hard drive are connected incorrectly.

One of the hard drives fails.

RAID has been configured incorrectly.

 

2. A technician is upgrading an older PC with a dual core CPU. When the PC restarts, it is slower than it was before the upgrade. The Performance tab from the Task Manager displays only one CPU graph. What is the most probable solution to this problem?

Update the BIOS firmware to support the dual core CPU.*

Increase the amount of RAM available.

Replace the HDD with a higher capacity hard drive.

Overclock the CPU.

 

3. What is a symptom of a printer fuser that needs to be replaced?

Toner is coming off printed pages.*

Paper is not feeding into the printer correctly.

Pages are printing with ghost images.

Vertical lines are printed on every page

 

4. What is a probable cause of a printer producing pages with ghost images?

a worn drum wiper*

a damaged pickup roller

not enough memory

an incorrect print driver

 

5. What corrective action should be taken on a printer that prints unknown characters?

Reinstall the driver.*

Increase the memory.

Replace the drum wiper.

Replace the fuser.

 

6. Users in an office complain that they are receiving “Document failed to print” messages when trying to print to a network printer. What is a likely problem?

The printer toner is low.

The printer drum is dirty.

The printer is configured with an incorrect IP address.*

The printer does not have enough memory.

 

7. A user has not updated an application for over two years and has just updated to the newest release on the workstation. The user notices, however, that the software with the newest release is operating very slowly. The other applications on the workstation are operating normally. What is a possible cause?

The BIOS needs to be updated.

The computer has a virus.

The computer does not have enough RAM.*

The workstation does not have a compatible driver installed.

 

8. A technician adds a new optical drive to a computer but the optical drive is not recognized by the computer. The technician thinks that the BIOS firmware needs to be updated and updates the CMOS. However, the computer fails to start. What is a possible solution?

Download a different set of drivers for the newly installed hardware.

Contact the motherboard manufacturer to obtain a new CMOS chip.*

Attach external power to the newly installed hardware.

Change the boot order in the BIOS to include the optical drive.

 

9. A computer repeatedly locks without any error message. Which two conditions may be the cause of the problem? (Choose two.)

The index service is not running.

The computer has a virus.*

An update has corrupted the operating system.*

The UAC has been turned off.

The user has breached the user security policy.

The CPU needs to be upgraded.

 

10. What usually causes the BSOD in the Windows OS?

CPU overheating

a fragmented hard drive

insufficient RAM

device driver compatibility errors*

 

11. A user reports that WiFi is not working on a laptop. A technician checks the laptop and notices that the wireless networking icon is missing from the notification area of the task bar. The technician tries to turn the wireless switch on the laptop on and off. However, the wireless NIC is still not displayed. What should be done next to troubleshoot this issue?

Replace the NIC with one that is known to work.

Configure wireless networking in the System Information tool.

Add the NIC to the system in the Devices and Printers control panel.

Activate the NIC in the BIOS or UEFI settings.*

 

12. What are two reasons that a workstation would begin to lock up frequently? (Choose two.)

failing RAM*

an overheating CPU*

an incorrect display setting

indexing service running too long

issues with the uninstallation of an application

 

13. A PC is not able to connect to a wired network. Pinging the loopback address is successful, but the gateway cannot be reached. On the network switch all the interface lights are on, except for the interface connected to the PC. The LED on the network card is off. What is the most likely cause of this problem?

The gateway needs to be fixed.

The network cable is faulty.*

The network switch is faulty.

The PC has an incorrect IP address for the DNS server.

 

14. Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)

There is interference from outside sources.*

The DHCP server is faulty.

The wireless signal is too weak.*

The antenna on the access point is too powerful.

The network passwords need to be reissued to the users.

 

15. A user can send email to other people in the office successful but is unable to receive any email. What is a possible cause of this issue?

The computer has incorrect POP3 or IMAP settings.*

The computer has incorrect SMTP settings.

The computer has a full outbox.

The computer has a wrong username or password configured to receive email.

 

16. A group of users is unable to connect to the network. When testing several of the PCs and issuing the command ipconfig, the technician notices that all of them have an IP address in the 169.254.x.x range. What is the most likely cause of this problem?

The Internet connection is down.

The DHCP server is not operational.*

The gateway address is incorrect.

The DNS server is not operational.

 

17. Which network server is malfunctioning if a user can ping the IP address of a web server but cannot ping the web server host name?

the DNS server*

the DHCP server

the FTP server

the HTTP server

 

18. What command can a technician use on a computer to see if DNS is functioning properly?

nslookup*

ipconfig

net share

net use

 

19. An administrator deploys wireless access points across the office to provide wireless network connectivity to users. Each workstation receives an IP address via DHCP. After a file server with a static IP is connected to the wired network, the administrator receives an IP address conflict message. What is a possible solution?

Restart the DHCP server.

Change the IP address of the file server with the ipconfig /release and ipconfig /renew commands.

Change the static IP configured on the file server.*

Connect the file server to the wireless network.

 

20. A computer displays this message when the computer boots: “MBR has been changed or modified.” What could cause this problem?

A boot sector virus has altered the master boot record.*

A virus has altered the Windows kernel.

The CMOS battery has failed.

A RAM module is not fully inserted into the memory slot.

 

21. A technician is troubleshooting a Windows 7 laptop infected with a virus that has damaged the master boot record. The technician has booted the laptop using the installation media and is attempting to repair the laptop from the command line interface. Which two commands can the technician use to repair the corrupt master boot record? (Choose two.)

bootrec /fixboot*

bootrec /fixmbr*

chkdsk

regedit

regedt32

22. A user reports that all of the software applications operate very slowly every day around 9:30 a.m. A couple of hours later, the computer operates normally for the rest of the day. What is the most likely cause?

The computer is infected with a virus or malware.

The computer network is experiencing congestion at those times.

The computer is being scanned by the antivirus software on a specified schedule.*

The computer is missing a required driver.



from http://www.ccna5.net/
Read more ...

It-essentials Chapter 13 Exam v6.0 2016 2015-2016

Thursday, June 30, 2016

1. What is the correct way to conduct a telephone call to troubleshoot a computer problem?

Always gather information from the customer and escalate the problem.

Maintain professional behavior at all times.*

Ask personal questions to get better acquainted with the customer.

Explain each step to help the customer understand the troubleshooting process.

 

2. What is a recommended technique for a technician who is both troubleshooting a problem and also trying to help a customer relax?

Establish a good rapport with the customer.*

Give the customer one minute to speak before taking over the conversation.

Put the customer on hold.

Spend time explaining the cause of the problem to the customer.

 

3. A customer is upset and wants to speak to a specific technician to resolve a problem immediately. The requested technician is away from the office for the next hour. What is the best way to handle this call?

Refer the angry customer to a supervisor.

Advise the customer that the requested technician is out of the office and insist on trying to resolve the problem.

Make an offer to help the customer immediately, and advise the customer that otherwise the requested technician will call the customer back within two hours.*

Ignore the request for the specific technician by walking through a step-by-step process with the customer in an attempt to refocus the customer and solve the problem.

 

4. What two actions should a call center technician avoid when dealing with an angry customer? (Choose two.)

spending time explaining what caused the problem*

putting the customer on hold or transferring the call*

apologizing for any inconvenience caused to the customer

sympathizing with the customer

letting the customer explain the problem without interruption

 

5. A call center technician is on a call with a customer when a colleague indicates that there is something to discuss. What should the technician do?

Interrupt the customer and ask whether the customer would mind going on hold for a few minutes.

Tell the customer that the call will be put on hold for a few minutes.

Signal to the colleague to wait.*

Mute the line to the customer while discussing the issue with the colleague.

 

6. A technician receives a call from a customer who is too talkative. How should the technician handle the call?

Talk over the customer and quickly gather the necessary information to be of help.

Allow the customer to speak for one minute and then try to refocus the conversation.*

Use open-ended questions and repeat all the information back to the customer to politely show that unnecessary information is being given.

Politely step in and gain control of the call by asking the customer social questions.

 

7. What are two examples of displaying professional communication skills while talking to a customer? (Choose two.)

the use of active listening, with occasional interjections such as “I see” or “I understand”*

clarifying what customers say after they have finished their explanations*

interrupting customers with a question to gather more information

asking customers to paraphrase their explanations

focusing on what you cannot do to give customers an idea of the magnitude of the problem

 

8. Which statement describes a best practice related to time management?

The technician should take the easier calls first, regardless of the urgency.

The technician should give better service to a customer for whom the technician feels more sympathy.

The technician can take the call of another technician, even without permission to do so.

The technician should make sure to call the customer back as close to the callback time as possible.*

 

9. Which two rules should be followed by call center employees to ensure customer satisfaction? (Choose two.)

Show favoritism to returning customers.

Sympathize with customers regarding their negative views of a previous technician.

Offer different repair or replacement options if possible.*

Communicate the repair status with explanations of any delays.*

Take a call assigned to another technician on the call board if the call is from a known customer.

 

10. Fill in the blank.
The SLA is a contract defining the agreed-on level of support between a customer and a service vendor.

 

11. During the process of troubleshooting, a technician gains access to customer private information. What is expected that the technician do with this information?

Document all information in a log file.

Keep it confidential.*

Send this information to the manager of the customer.

Send this information to the technician manager.

Back up the information just in case the customer needs it some day.

 

12. Which statement is characteristic of most personal software licenses?

Developers are allowed to modify and share the source code that runs the software.

A company is allowed to use the software campus wide.

A user is allowed to share the software with friends.

A user is allowed to install the software on only one computer.*

 

13. What is the definition of cyber law?

a single law defining criminal acts that are committed online

the collection of international, country, and local laws that affect computer security professionals*

a contract that defines expectations between an organization and IT service vendors for an agreed upon level of support

the process of collecting and analyzing data from computer systems, networks, wireless communications, and storage devices

 

14. Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer? (Choose two.)

Confront the customer immediately.

Remove and destroy the hard drive.

Contact a first responder.*

Shut down the computer until authorities arrive.

Document as much information as possible.*

 

15. When performing computer forensics, what can be prevented with a properly and carefully documented chain of custody?

evidence tampering*

copying of copyrighted materials

cyber crime

identity theft

 

16. When performing computer forensics what is required to prove a chain of custody?

proper documentation procedures*

an admission of guilt

collected evidence

expert testimony

 

17. A technician has found possible illegal content on the hard drive of a customer computer. When should a computer forensics expert be brought in?

immediately after the IT technician found the content

after a system administrator has viewed the content

after routine administrative tasks have been completed on the customer PC

after the content is classified as illegal*

 

18. A technician is analyzing a computer that may have been used for illegal activity. What are two examples of volatile data? (Choose two.)

network connections that are open*

data that is located on an optical drive

files available on an internal drive

users who are logged in to the computer*

a USB drive that is connected to the computer

 

19. What should a level two technician do immediately after receiving an escalated work order from a level one technician?

Call the level one technician and ask questions about the problem.

Call the customer back to ask any additional questions and resolve the problem.*

Document suggestions to solve the problem in the work order and return it to the level one technician.

Send the work order to a level three technician and ask for support.

 

20. What is a reason to escalate a problem from a level one technician to a level two technician?

when the equipment needs to be rebooted

when drivers, applications, or operating systems need to be installed*

when the screen resolution of a customer PC needs to be adjusted

when a peripheral device needs to be replaced

21. What are three pieces of information a level one technician should gather from a customer? (Choose three.)

contact information*

description of the problem*

details of any recent changes to the computer*

output from diagnostic software

output from a remote connection to the customer computer

current CMOS settings

 

22. Which situation would require that a support desk call be given the highest priority?

The company cannot operate because of a system failure.*

A couple of computers have operating system errors.

Some computers cannot log in to the network.

Two users are requesting an application enhancement.

A user is requesting a RAM memory upgrade.

 

23. When does a level one technician prepare an escalated work order?

when a problem requires that the technician ask questions and document responses

when a technician is able to answer the questions of the customer and solve the problem

when a problem cannot be resolved within a predetermined amount of time*

when a technician must enter information using support software

24. Which statement best describes a call center?

It is a busy, fast-paced work environment where agents contact customers to arrange preventive maintenance appointments.

It is a help desk used by customers to make an appointment to report their computer problems.

It is a place that exists within a company and provides computer support to both employees and customers of the company.*

It is a store-front environment where the customers go with their computers to have them fixed.



from http://www.ccna5.net/
Read more ...

It-essentials Chapter 12 Exam v6.0 2016 2015-2016

Thursday, June 30, 2016

1. Which two security precautions will help protect a workplace against social engineering? (Choose two.)

performing daily data backups

encrypting all sensitive data stored on the servers

registering and escorting all visitors to the premises*

ensuring that all operating system and antivirus software is up to date

ensuring that each use of an access card allows access to only one user at the time*

 

2. Which two characteristics describe a worm? (Choose two.)

executes when software is run on a computer

is self-replicating*

hides in a dormant state until needed by an attacker

infects computers by attaching to software code

travels to new computers without any intervention or knowledge of the user*

 

3. Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

adware

phishing*

stealth virus

worm

 

4. What is the primary goal of a DoS attack?

to facilitate access to external networks

to prevent the target server from being able to handle additional requests*

to obtain all addresses in the address book within the server

to scan the data on the target server

 

5. Which type of attack involves the misdirection of a user from a legitimate web site to a fake web site?

SYN flooding

DDoS

DNS poisoning*

spoofing

 

6. Which password is the strongest?

qwerty

Abc123

Im4ging!

Gd^7123e!*

pAssword

 

7. Which three questions should be addressed by organizations developing a security policy? (Choose three.)

What assets require protection?*

How should future expansion be done?

What is to be done in the case of a security breach?*

When do the assets need protecting?

What insurance coverage is required?

What are the possible threats to the assets of the organization?*

 

8. The XYZ company has decided to upgrade some of its older PCs. What precaution should the company take before the disposal of the remaining older computers?

Perform a high-level format of the hard drive.

Remove the RAM from the motherboard.

Data wipe the hard drive.*

Destroy the monitor.

Remove the CPU.

 

9. Which two file-level permissions allow a user to delete a file? (Choose two.)

Read

Modify*

Read and Execute

Write

Full Control*

List Contents

 

10. What is the name given to the programming-code patterns of viruses?

grayware

mirrors

signatures*

virus definition tables

 

11. What is the most effective way of securing wireless traffic?

WPA2*

SSID hiding

WEP

wireless MAC filtering

 

12. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?

Any traffic that comes into port 25 allows outgoing port 113 to be used.

All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.

Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.

All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.*

 

13. What are two physical security precautions that a business can take to protect its computers and systems? (Choose two.)

Perform daily data backups.

Implement biometric authentication.*

Lock doors to telecommunications rooms.*

Replace software firewalls with hardware firewalls.

Ensure that all operating system and antivirus software is up to date.

 

14. What is the minimum level of Windows security required to allow a local user to restore backed up files?

Write*

Read

Create

Full

 

15. What is the purpose of the user account idle timeout setting?

to log a user out of a computer after a specified amount of time*

to display a timeout message if a user has not typed a keystroke in a particular amount of time

to turn the computer off if the user has not typed anything after a specified amount of time

to create a log message of how long the computer was not used

 

16. Which two security procedures are best practices for managing user accounts? (Choose two.)

Disable authentication.

Limit the number of failed login attempts.*

Restrict the time of day that users can log into a computer.*

Enable AutoRun.

Enable port forwarding.

 

17. Which Windows Firewall option allows the user to manually allow access to the ports required for an application to be allowed to run?

Manage Security Settings*

Automatically

Turn off Windows firewall

Turn on Windows firewall

 

18. Which two Windows default groups are allowed to back up and restore all files, folders, and subfolders regardless of what permissions are assigned to those files and folders? (Choose two.)

Administrators*

Power Users

Backup Operators*

Access Control Assistants

Cryptographic Operators

 

19. A manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?

Limit the login times.*

Use Event View to document the times logged in and out of the computer.

Use Device Manager to limit access to the computer.

Enable power on passwords in the BIOS.

 

20. Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?

Is your security software up to date?

Have you scanned your computer recently for viruses?

Did you open any attachments from a suspicious email message?

What symptoms are you experiencing?*

 

21. Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?

Disconnect the host from the network.*

Log on to the host as a different user.

Disable ActiveX and Silverlight on the host.

Install rogue antivirus software on the host.

 

22. A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?

Check the computer for the latest OS patches and updates.

Verify the physical security of all offices.

Ensure the security policy is being enforced.*

Scan the computer with protection software.

 

23. It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)

Set virus protection software to scan removable media when data is accessed.*

Configure the Windows Firewall to block the ports that are used by viruses.

Disable the autorun feature in the operating system.*

Repair, delete, or quarantine the infected files.

Enable the TPM in the CMOS settings.

 

24. A virus has infected several computers in a small office. It is determined that the virus was spread by a USB drive that was shared by users. What can be done to prevent this problem?

Destroy the USB drive.

Activate Windows Firewall.

Change the passwords on the computers.

Set the antivirus software to scan removable media.*

 

25. A user is browsing the Internet when a rogue pop-up warning message appears indicating that malware has infected the machine. The warning message window is unfamiliar, and the user knows that the computer is already protected by antimalware software. What should the user do in this situation?

Allow the software to remove the threats.

Click the warning window to close it.

Update the current antimalware software.

Close the browser tab or window.*

 

26. In what situation will a file on a computer using Windows 8.1 keep its original access permissions?

when it is copied to the same volume

when it is moved to the same volume*

when it is copied to a different volume

when it is moved to a different volume

 

27. What security measure can be used to encrypt the entire volume of a removable drive?

EFS

TPM

BitLocker To Go*

NTFS permission

 

28. A user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?

The file system is corrupted.

The laptop is infected by a virus.*

The display driver is corrupted.

The file system has been encrypted.



from http://www.ccna5.net/
Read more ...