Pages

Selasa, 15 Januari 2013

Cisco IT Essentials Chapter 1-10 Answers 100%

  1. A computer user buys a low priced replacement monitor but finds that there is a lot of flicker. The flicker makes the monitor unusable. Which characteristic of a monitor needs to be considered to ensure flicker-free viewing?
  2. refresh rate
  3. A user cannot log in to the network with a computer that worked yesterday. Other computers on the same network are working fine. Which troubleshooting process would be most logical to try first?
  4. Look at the NIC lights.
  5. A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?
  6. BIOS
  7. A technician is asked to wire a network that supports CSMA/CD. Which architecture and physical topology should the technician use for supporting this access control method?
  8. Ethernet and Star
  9. A technician needs to free some hard disk space in a computer. Which management tool can help find files that can be safely deleted?
  10. disk cleanup

  1. Which Windows tool should be run before upgrading the operating system?
  2. Ntbackup
  3. Which two components normally require a laptop to be powered down and the battery removed before removing the components? (Choose two.)
  4. internal hard drive
    RAM
  5. A mobile training room uses a generator to power the PCs, servers, and printers. The company that runs the room upgraded the equipment but then found that when all the devices are powered up they become unreliable, with some PCs shutting down. What may cause this power problem?
  6. The printer is creating electrical noise when it is printing, which causes the computers to shut off.
    The power consumption of all devices is too much for the electrical circuit that is provided.
    The power consumption of all the computers and printers operating simultaneously is causing a power surge.
    The power requirements of the printer warm-up cycle cause a spike, which results in the computers shutting down.
  7. Which network device uses a MAC address table to segment the network?
  8. switch
  9. Where in Windows XP can the shutdown, hibernate, and standby modes be configured?
  10. Start > Control Panel > Power Options
  11. A small business has used a high quality configurable flatbed scanner to scan a number of photographs to print as large posters. However, the quality of the images printed as posters is poor. What should the user do?
  12. Increase the resolution of the scanner.
  13. A student enables file sharing on a laptop so that a friend can access music files. Which type of service is being configured?
  14. peer-to-peer
  15. Which Windows XP startup mode or utility would be used to repair the master boot record?
  16. Recovery Console
  17. What is the purpose of SCSI and RAID adapters?
  18. to connect storage devices such as hard disk drives to a PC
  19. What is the reason for disabling SSID broadcasting and changing the default SSID on a wireless access point?
  20. Wireless clients must then have the SSID manually configured to connect to the wireless network.
  21. A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file?
  22. CHKDSK
  23. Refer to the exhibit. What command was typed to produce the output that is shown?
  24. ipconfig /all
  25. What is a benefit of using the USB or FireWire ports to connect peripherals to a laptop?
  26. The peripherals can be plugged in and out without turning the laptop off.
  27. An administrator gets an e-mail message from what looks like the company bank. The e-mail asks for account information. The administrator determines the e-mail is not from the bank. What type of security threat has the administrator prevented?
  28. phishing
  29. A technician wants to create a new partition on a new additional hard drive. Which tool should be used?
  30. Disk Management
  31. Which two items are required to configure a laptop for 100 Mb/s full-duplex Ethernet communications? (Choose two.)
  32. twisted-pair cable
    IP address and subnet mask
  33. A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices?
  34. SSH
  35. To provide complete multimedia output via the use of a motherboard without multimedia capabilities, what additional adapter card would need to be installed if a video adapter and a TV tuner have already been installed?
  36. sound adapter
  37. Refer to the exhibit. Which two port types are shown in the graphic? (Choose two.)
  38. network
    USB
  39. When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumables. Which two consumables are associated with an inkjet printer? (Choose two.)
  40. ink cartridge
    paper
  41. The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?
  42. DHCP
  43. Which motherboard feature controls the amount of data that a CPU transfers at one time?
  44. front side bus
  45. Under what circumstance would the Windows System Restore utility most likely be necessary?
  46. A Windows update has failed.
  47. What is the purpose of an IRQ?
  48. Request information from the CPU.
  49. A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files are missing. What should the customer do next?
  50. Restore the data files that were backed up in preparation for the conversion.
  51. What deficiency is associated with RAID 0 compared with RAID 1?
  52. RAID 0 does not provide any protection for the data that is located on a hard drive.
  53. All default Windows XP tools and utilities are installed on a computer. The technician discovered that a few other Windows components are still needed. Which procedure can accomplish this task?
  54. Choose Start > Control Panel > Add Remove Programs > Add/Remove Windows Components
  55. A newly purchased scanner is not functioning as efficiently as expected. Which step should a technician take to improve performance?
  56. Download drivers and utilities from the manufacturer web site.
  57. A home computer owner has a PC system that runs Windows XP. For security reasons the owner has been using a limited local user account for a number of years. The owner wishes to install a new piece of software, but the user account does not have the necessary permissions. Which type of account does the owner need to use to install the new software?
  58. administrator
  59. A newly hired technician is attaching a computer to the network. Upon examining the network configuration, the technician recognizes that the computer is configured with a protocol stack that is used for Internet communication. What protocol stack is installed on the computer?
  60. TCP/IP
  61. Which type of network attack involves randomly opening many Telnet requests to a router and results in a valid network administrator not being able to access the device?
  62. SYN flooding
  63. Which two file systems are available for selection during installation of Windows XP? (Choose two.)
  64. FAT32
    NTFS
  65. A workstation is experiencing an error that is caused by suspected dirty RAM contacts. Which two materials should be used to clean the RAM module? (Choose two.)
  66. isopropyl alcohol
    lint-free swab
  67. What is the minimum CPU speed that is required to install Windows Vista according to the Microsoft recommendation?
  68. 1 GHz
  69. A help desk trainer is teaching a new help desk technician some basic rules about starting a conversation with a customer. Which statement describes the rules the trainer should be teaching?
  70. Learn the name of the customer and create a connection with the customer. Next ask questions that assess the knowledge level of the customer.
  71. A customer requests advice about the type of storage device to use for 20 new computers. For which two conditions should SSDs be recommended as replacements for magnetic hard drives? (Choose two.)
  72. locations that require low power usage
    workplaces with harsh workplace conditions where the computers are subject to dust and vibration
  73. Refer to the exhibit. A Cisco Networking Academy instructor is trying to print a flash graphic from the curriculum. The print job has gone into the print queue as shown. Based on the output, what should be the next step in solving this problem?
  74. Check the printer cabling and power.
  75. Which three tasks should a computer preventive maintenance plan contain? (Choose three.)
  76. the defragmentation of the hard drive
    an update of the operating system and applications
    an update of antivirus and other protective software
  77. A user has been writing data to a USB flash memory drive. What should the user do before removing the device?
  78. Click on the Safely Remove Hardware icon in the system tray then on the device.
  79. A user is reporting that a new external hard drive is defective. The laptop will allow access to the drive at times, and then will report that the drive cannot be found. Upon an initial examination of the laptop, it is discovered that the user has ten USB devices connected to the laptop.
    What is the best quick solution to this problem?
  80. Remove all the peripherals except the hard drive and observe the results.
  81. Employees in the financial department have reported that an unknown technician has been asking questions about the network. Which type of attack might the employees be observing?
  82. social engineering
  83. A technician is designing a hardware preventive maintenance plan for a company. Which strategy should be included in the plan?
  84. Schedule and document routine maintenance tasks.
  85. Refer to the exhibit. A technician is troubleshooting a problem where a teacher is unable to connect a laptop to a wireless network. The wireless NIC is enabled and the wireless network configuration settings are correct. Which key would be used in conjunction with the Fn key to enable the wireless connection?
  86. F7
  87. A call center technician has asked a customer to perform a simple operation to fix a problem on a computer. The customer seems unable to perform the task. What should the technician do?
  88. Determine whether the customer would prefer to receive the instructions in another form, such as e-mailed, illustrated written instructions.
  89. A customer wants to produce video recordings to sell to the public. Which two types of media should be used to accomplish this type of recording? (Choose two.)
  90. DVD+/-R
    BD-R

Tidak ada komentar:

Posting Komentar