F pt.1

What is the purpose of RAID adapters?
To allow orlder PCI technology expansion slots to be used
To provide enhanced audio and graphic capabilities
To connect multiple storage devices for redundancy or speed
To connect peripheral devices to a PC to improve performance
Which type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a High definition television?
DVI
HDMI
PS/2
DB-15
Which type of input device can identify users based on their voice?
Digitizer
KVM
Switchbiometric identification device
Scanner
What type of external storage should be used by a technician to back up over 2 TB of music and video data files?
COmpactFlash card
External flash drive
External hard drive
Secure Digital card
What type of device provides power to a computer and allows it to be safely shut down in the event of a power loss?
Surge suppressor
Uninterruptible power supply
Standby power supply
Power inverter
Which measure can help control RFI effects on wireless networks?
Ensure the humidity and temperature levels are set as low as possible
Ensure the number of wireless NICs exceeds the number of wireless phones
Ensure the wireless network is on a different frequency than the offending source
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs
What is the purpose of a Safety Data Sheet?
To specify procedures for dealing with potentially hazardous materials
To specify procedures in designing and building common computer systems
To specify procedures for the operation of sensitive components and prevention of electrostatic discharge
To specify procedures in the use of humidity control and prevention of moisture damage
What can be tested with a digital multimeter?
Wireless signal strength and access point positioning
Basic funcionality of computer ports
Coper cable location
Quality of electricity in computer components
When should a technician avoid wearing an antistatic wrist strap?
When installing RAM
When replacing a power supply unit
When installing a hard drive
When opening a computer case
Which solution should be used to clean a CPU and heat sink?
Soap and water
Rubbing alcohol
A diluted ammonia solution
Isopropyl alcohol
Which two types of expansion slots would be used by a wireless NIC in a computer today?
PCIe
AGP
PCI
DIMM
ISA
When a PC is being assembled, what component is connected to the motherboard with a SATA cable?
The optical drive
The NIC
The video card
The power supply
A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?
The computer automatically boots into Safe Mode and displays a warning on the screen
The screen flashes with a red background and displays a warning message
The computer emits a pattern of beeps indicating the failing device
The computer returns an error message that indicates the I/O address of the failing device
Which three features can be configured in the BIOS settings to secure a computer? (Choose three)
MAC flitering
Drive encryption
TMP
File encryption
Passwords
TKIP key
What is the most important reason for a company to ensure that computer preventive maintenance is done?
Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment
Preventive maintenance helps to protect the computer equipment against future problems
Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed
Preventive maintenance enables the IT manager to check on the location and state of the computer assets
A technician opens up a PC to work on it, and finds that it is very dusty inside. What should the technician do?
Ignore the dust, as it does not affect the computer
Use a lint-free cloth sprayed with a cleaning solution to remove excess dust
Use a can of compressed air to remove excess dust
Use a moistened cotton swab to remove excess dust
Which built-in tool is avaiable on a Mac OS X machine to perform disk backups?
Disk Utility
Deja Dup
Finder
Time Machine
A computer technician performed a number of actions to correct a problem. Some actions did not solve the problem, but eventually a solution was found. What should be documented?
Everything that was done to try to solve the problem
Only the solution, because this solved the problem
Only the failed attemps, so that future technicians will know what not to try
A description of the problem and the solution
After a computer is powered on, Windows 7 fails to start. What initial procedure would a technician use to deal with this failure?
Create a System Repair Disc and restore the image
Press the F12 key during the boot process and start the computer in Safe Mode
Boot from a Windows 7 installation media and access the System Restore utility
Access the Control Panel and choose Restore Files from Backup from the System and Secyurity menu
What are two advantages of the NTFS file system compared with FAT32? (Choose two.)
NTFS allows faster access to external peripheral such as a USB drive.
NTFS supports larger files
NTFS provides more security features
NTFS allows faster formatting of drives
NTFS is easier to configure
NTFS allows the automatic detection of bad sectors
What type of hard drive contains flash memory for catching frequently used data but stores the most of the data on a magnetic hard disk drive?
USB flash drive
Solid-state drive
Embedded multimedia card
Solid-state hybrid disk
What does %USERPROFILE% represent in the path C:\Users\%USERPROFILE%\AppData\Local\Temp ?
The location of the Documents folder of a particular user
An environment variable that is set by the operating system
A variable set by the administrator for each user of the system
A fixed value that represents the level of access of a user to system files
A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unrespondive applicaiton?
Task Manager
Add or Remove Programs
Event Viewer
System Restore
A technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems?
Computer Management
Device Manager
My Computer
System Tools
Which technology provides a solution for PC virtualization?
Hypervisor
Server clustering
Terminal Services
RAID
What are two consequences of setting an incorrect boot order in the system BIOS? (Choose two.)
The computer locks up without any error messages
The computer displays a "BOOTMGR is missing" error after POST
The computer displays an "Invalid Boot Disk" error after POST
The computer continually restarts without displaying the desktop
The computer displays an 'Inaccessible Boot Device' error after POST
A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)
The total cost of the new solution is considerably lower
Data is more secure in the event of hardware failures
Individual users are in control of their own computers and network resources
Data resources and access are centrally controlled
Personnel costs are lower because a dedicated network administrator is no longer necessary
Which layer of the OSI model is responsible for physical addressing and the procedures used to access media?
Application
Data link
Network
Transport
The current IP configuration of a medium size company with several subnets is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service or protocol would simplify the workstation IP configuration task?
APIPA
DHCP
DNS
ICMP
Several messagges sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
22
53
80
143
443
Which two commands could be used to chek if DNS name resolution is working properly on a WIndows PC? (Choose two.)
Nslookup cisco.com
Net cisco.com
Ping cisco.com
Nbstat cisco.com
Ipconfig /flushdns
Which wireless security mode supports government grade security and offers both personal and enterprise authentication?
WEP
WPA2
WPA
LEAP
Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?
PaaS
LaaS
SaaS
ITaaS
A network administrator occasionally asks a technician to make sure that dust does not accumulate on devices in the network equipment closets. What is the purpose of having the technician do this job?
Dust can cause network equipment to overheat and cause problems on the network
Dust increases electromagnetic interference in nearby connected cables
Dust can encourace insects and other pests to live in the equipment closets
Dust is considerated a fire hazard that poses danger to personnel and equipment
Dust diminishes the range of wireless services
A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can receive responses from workstations on the same subnet but not from remote workstations. What could be causing the problem?
The NIC driver is out of date
The operating system is not compatible with the remote sites
The TCP/IP protocol stack is not loaded
The defaul gateway is incorrect
What are three common input devices found on laptops? (Choose three.)
Touchpad
Fingerprint reader
Web camera
External monitor
PS/2 keyboard
AC power connector
A user calls the help desk to report that a mobile device exhibits very slow performance. What could cause this problem?
The touchscreen is not calibrated
An app is not compatible with the device
The operating system has encountered an error
A power-intensive app is running at the background
A computer technician has decided that a problem with a laptop can be solved by repairing a hardware component. What should be done first before attempting to repair a hardware component on a laptop?
Consult the service manual for the laptop
Ask a fellow technician for advice
Backup the BIOS settings
Remove the keyboard
Which closed-ended question would be appropriate for a technician to use to narrow down the possible problems on a laptop that will not power on?
Can the laptop operate using the AC adapter?
Have you changed your password recently?
What software has been installed recently?
What were you doing when the problem occurred?
A technician is troubleshooting the appearance of flashing lines on a laptop screen. What are two possible causes of this distortion? (Choose two.)
Power to the poxels has been removed
The display settings have been changed
The GPU is not cooling correctly
The LCD custoff switch is damaged
The display is not correctly installed
What is an indication that the battery in a mobile device could become physically hazardous and should be immediately replaces?
If the battery only supports the system for a reduced period of time
If there are signs of swelling
If the screen brightness begins to dim
If the device feels warm to the touch
Refer to the exhibit. What is true of this mobile device screen?
Tapping and holding the arrow at the bottom left will display the Home screen
Text messagges, news, photos and other content can be displayed in the different tiles
Icons and buttons are used to represent the different apps on the phone
Unpinning an app from this view will uninstall the app from the phone
Tile sizes depend on the size of the app
What are two potential risks that could result from rooting or jailbreaking a mobile device? (Choose two.)
Enabling app access to the root directory
Not properly creating or maintaining sandboxing features
Allowing the user inteface to be extensively customized
Improving device performance
Enabling features that are disabled by a cellular carrier
What two tasks should be done regurarly to preserve the security and integrity of data and applications on mobile devices? (Choose two.)
Execute a factory reset once a month to remove all unidentified malicious software
Back up user data on a regular basis
Password protect iTunes or Google Play accounts
Use airplane mode if you are accessing the Internet at an open WI-FI site
Ensure that the operating system software and applications contain the latest updates
Unmount all unused disk partitions
A tire store needs to use carbon copy paper to print customer invoices so that both the store and the customer have a copy. What is the best printer solution?
Piezoelectric printer
Inkjet printer
Thermal printer
Impact printer
A user on a home network wants to share a printer from a Windows 7 computer. What must the user do in order for other Windows 7 computers in the houde to obtain the proper driver?
The user must browse the Internet, then download an install the proper driver
The person doing the sharing must use the Additional Drivers button in order to designate how many devices drivers are allowed to be downloaded
Nothing. Windows automatically provides the driver
The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers
Which three components are typically found in laser printer maintenance kits? (Choose three.)
Fuser assembly
Primary corona
Pickup rollers
Transfer rollers
Secondary corona
Paper trays
What characterizes a DDoS attack?
Many hosts participate in a coordinated attack
Infected computers are called daemond
It is easy to identify the source of the attack
All hosts must be in the same geographic area
What guideline should be followed when establishing a password security policy?
Password should be physically stored in a convenient location
Passwords should contain mainly numbers for better encryption
The system administrator shoul assign passwords to the access
An expiration period should be established so that passwords frequently change
What are three fratures provided by the TPM module? (Choose three.)
Hashed encryption of the hard drive volume
Security for user authentication information
Support for Windows backup
Application license protection
Storage of digital certificates
Support for Windows Firewall
{"name":"F pt.1", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What is the purpose of RAID adapters?, Which type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a High definition television?, Which type of input device can identify users based on their voice?","img":"https://cdn.poll-maker.com/5-318640/i276621v1n1-windows-phone-8-startscreen.png?sz=1200-000016100053"}
Powered by: Quiz Maker