The Final Revision - PowerPoint PPT Presentation

the final revision n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
The Final Revision PowerPoint Presentation
Download Presentation
The Final Revision

play fullscreen
1 / 141
The Final Revision
90 Views
Download Presentation
kare
Download Presentation

The Final Revision

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. The Final Revision IT Essentials PC Hardware & Software

  2. 1- ABC Company wants to configure laptops to automatically power components off to improve battery life. Which power management control can be used to accomplish this? • ACPI • AMD • UPS • BIOS • PnP BIOS

  3. 1- ABC Company wants to configure laptops to automatically power components off to improve battery life. Which power management control can be used to accomplish this? • ACPI • AMD • UPS • BIOS • PnP BIOS

  4. 2- A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management? • Administrative Tools • BIOS • Command Prompt • Safe mode • System Registry

  5. 2- A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management? • Administrative Tools • BIOS • Command Prompt • Safe mode • System Registry

  6. 3- Refer to the exhibit. What is the correct order of steps to safely remove one of several hot-swappable devices using the least amount of steps? • 2, 3, 5, 6 • 1, 3, 5, 6 • 1, 4, 5, 6 • 2, 5, 6

  7. 3- Refer to the exhibit. What is the correct order of steps to safely remove one of several hot-swappable devices using the least amount of steps? • 2, 3, 5, 6 • 1, 3, 5, 6 • 1, 4, 5, 6 • 2, 5, 6

  8. 4- Which utility can be used to determine end-to-end connectivity between source and destination? • Ipconfig • Nbstat • Netstat • Ping

  9. 4- Which utility can be used to determine end-to-end connectivity between source and destination? • Ipconfig • Nbstat • Netstat • Ping

  10. 5- Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks? • bus • mesh • ring • star

  11. 5- Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks? • bus • mesh • ring • star

  12. 6- A user is reporting that a new external hard drive is defective. The laptop will allow access to the drive at times, and then will report that the drive cannot be found. Upon an initial examination of the laptop, it is discovered that the user has ten USB devices connected to the laptop.What is the best quick solution to this problem? • Remove all the peripherals except the hard drive and observe the results. • Move the laptop to another location and observe the results. • Replace the power adapter and observe the results. • Replace the USB hub and observe the results. • Flash the BIOS on the laptop and observe the results.

  13. 6- A user is reporting that a new external hard drive is defective. The laptop will allow access to the drive at times, and then will report that the drive cannot be found. Upon an initial examination of the laptop, it is discovered that the user has ten USB devices connected to the laptop.What is the best quick solution to this problem? • Remove all the peripherals except the hard drive and observe the results. • Move the laptop to another location and observe the results. • Replace the power adapter and observe the results. • Replace the USB hub and observe the results. • Flash the BIOS on the laptop and observe the results.

  14. 7- Which Windows XP command displays the route taken by packets crossing an IP network? • iproute • netview • nslookup • ping • tracert

  15. 7- Which Windows XP command displays the route taken by packets crossing an IP network? • iproute • netview • nslookup • ping • tracert

  16. 8- Which type of program causes banners and ads to appear on the desktop without any user intervention? • adware • spyware • stealth virus • trojan horse

  17. 8- Which type of program causes banners and ads to appear on the desktop without any user intervention? • adware • spyware • stealth virus • trojan horse

  18. 9- Why do mobile devices such as laptop computers use specifically designed CPUs? • They consume less power. • They are smaller. • They are lighter. • They require customized cooling mechanisms. • They need to fit proprietary motherboards.

  19. 9- Why do mobile devices such as laptop computers use specifically designed CPUs? • They consume less power. • They are smaller. • They are lighter. • They require customized cooling mechanisms. • They need to fit proprietary motherboards.

  20. 10- Where can a user change the idle time after which a laptop will switch to standby mode? • Right-click the desktop, then click Power Modes > Standby. • Right-click My Computer, then click Properties > Hardware > Device Manager > ACPI. • Left-click Start > Control Panel > Power Options, then click the Power Schemes tab. • Left-click Start > All Programs > Accessories > System Tools > Power Management.

  21. 10- Where can a user change the idle time after which a laptop will switch to standby mode? • Right-click the desktop, then click Power Modes > Standby. • Right-click My Computer, then click Properties > Hardware > Device Manager > ACPI. • Left-click Start > Control Panel > Power Options, then click the Power Schemes tab. • Left-click Start > All Programs > Accessories > System Tools > Power Management.

  22. 11- A technician thinks that the file system on a computer has a problem because Windows XP is reporting integrity data issues. Which Windows XP utility will check the file system for errors? • Attrib • Chkdsk • Fdisk • Format

  23. 11- A technician thinks that the file system on a computer has a problem because Windows XP is reporting integrity data issues. Which Windows XP utility will check the file system for errors? • Attrib • Chkdsk • Fdisk • Format

  24. 12- Which specification was developed to resolve the problem of hardware conflicts? • AGP • HAL • IRQ-and-DMA • OSR2 • PnP

  25. 12- Which specification was developed to resolve the problem of hardware conflicts? • AGP • HAL • IRQ-and-DMA • OSR2 • PnP

  26. 13- Which three rules increase the level of password strength? (Choose three.) • Passwords should never expire. • Passwords should be a combination of letters and numbers. • Passwords should combine a user's special dates and initials so they can be alphanumeric. • Passwords should be changed by the user after specific periods of time. • Password expiration and lockout policies should be clearly defined. • Passwords should be short to reduce the chances of users forgetting them.

  27. 13- Which three rules increase the level of password strength? (Choose three.) • Passwords should never expire. • Passwords should be a combination of letters and numbers. • Passwords should combine a user's special dates and initials so they can be alphanumeric. • Passwords should be changed by the user after specific periods of time. • Password expiration and lockout policies should be clearly defined. • Passwords should be short to reduce the chances of users forgetting them.

  28. 14- Which set of related files store all the settings of a Windows XP installation? • Registry • Control Panel • .ini • HWINFO.EXE

  29. 14- Which set of related files store all the settings of a Windows XP installation? • Registry • Control Panel • .ini • HWINFO.EXE

  30. 15- What characterizes a DDoS attack? • Many hosts participate in a coordinated attack. • Infected computers are called Daemons. • It is easy to identify the source of the attack. • All hosts must be in the same geographic area.

  31. 15- What characterizes a DDoS attack? • Many hosts participate in a coordinated attack. • Infected computers are called Daemons. • It is easy to identify the source of the attack. • All hosts must be in the same geographic area.

  32. 16- What characterizes spoofing? • Making data appear to come from a source other than the actual source. • Sending abnormally large amounts of data to a remote server to prevent user access to the server services. • Intercepting or inserting false information in traffic between two hosts. • Sending bulk e-mail to individuals, lists, or domains intending to prevent users from accessing e-mail.

  33. 16- What characterizes spoofing? • Making data appear to come from a source other than the actual source. • Sending abnormally large amounts of data to a remote server to prevent user access to the server services. • Intercepting or inserting false information in traffic between two hosts. • Sending bulk e-mail to individuals, lists, or domains intending to prevent users from accessing e-mail.

  34. 17- A technician has been asked to install memory that detects multiple bit errors and corrects single bit errors in memory. Which type of memory should be installed if the motherboard supports these features? • parity • ECC • non-parity • CRC

  35. 17- A technician has been asked to install memory that detects multiple bit errors and corrects single bit errors in memory. Which type of memory should be installed if the motherboard supports these features? • parity • ECC • non-parity • CRC

  36. 18- PATA data cables are available in two different types. The types are distinguished by the number of conductors. Which two types are available? (Choose two.) • 6 • 40 • 68 • 80 • 120

  37. 18- PATA data cables are available in two different types. The types are distinguished by the number of conductors. Which two types are available? (Choose two.) • 6 • 40 • 68 • 80 • 120

  38. 19- How many conductors are found in a SATA data cable? • 3 • 4 • 7 • 10 • 12

  39. 19- How many conductors are found in a SATA data cable? • 3 • 4 • 7 • 10 • 12

  40. 20- When installing a network adapter into a client computer, a technician notices that the contacts on the adapter need to be cleaned. Which solution should the technician use to clean the contacts? • glass cleaner • isopropyl alcohol • mild detergent • rubbing alcohol • slightly abrasive cleanser

  41. 20- When installing a network adapter into a client computer, a technician notices that the contacts on the adapter need to be cleaned. Which solution should the technician use to clean the contacts? • glass cleaner • isopropyl alcohol • mild detergent • rubbing alcohol • slightly abrasive cleanser

  42. 21- ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy? • NIC • Wireless NIC • USB gateway • RAID adapter • multiple slave hard disk adapter

  43. 21- ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy? • NIC • Wireless NIC • USB gateway • RAID adapter • multiple slave hard disk adapter

  44. 22- Which three system resources are commonly used for communication between the CPU and other components in the computer? (Choose three.) • IRQ • DMA • UDP • I/O port address • USB • PnP

  45. 22- Which three system resources are commonly used for communication between the CPU and other components in the computer? (Choose three.) • IRQ • DMA • UDP • I/O port address • USB • PnP

  46. 23- Which three computer components contain hazardous materials and require special handling for disposal? (Choose three.) • batteries • floppy drives • monitors • optical drives • parallel cables • printer toner • cartridges

  47. 23- Which three computer components contain hazardous materials and require special handling for disposal? (Choose three.) • batteries • floppy drives • monitors • optical drives • parallel cables • printer toner • cartridges

  48. 24- Which two tools can help protect against ESD? (Choose two.) • antistatic wrist strap • compressed air • antistatic mat • safety glasses • rubber-sole shoes

  49. 24- Which two tools can help protect against ESD? (Choose two.) • antistatic wrist strap • compressed air • antistatic mat • safety glasses • rubber-sole shoes

  50. 25- Which Windows tool should be run before upgrading the operating system? • Convert • Fdisk • Msconfig • Ntbackup