Está en la página 1de 6

Final 11-16

1. The ABC Company sales force has been provided with smart phones and portable
Printers as shown in the graphic. Which two short-range technologies can support
These types of devices? (Choose two.)

2. Refer to the exhibit. Which type of technology is most suitable to bring

Internet services to the facilities shown in the graphic?

3. The purchasing department at ABC Company has the choice of buying a retail
Version or an OEM version of a NIC. Which two things must the purchasing
Department consider when deciding whether to choose the retail or OEM version?
(Choose two.)
The installers may need to find the drivers for the OEM NICs on the Internet.
OEM NICs may be more expensive than the Cisco or Linksys NICs.
The OEM NICs may not be compatible with the OS.
OEM NICs may need to be installed by specialists.
OEM NICs may lack proper documentation.

4. What is the highest risk associated with improperly charged or mishandled

The components can overheat.
The laptop will be unable to hold enough charge.
The battery can explode.
The lifetime of the battery will be reduced.

5. Refer to the exhibit. The IT department requested a new set of memory chips to
Upgrade the old laptops. A picture of the memory chip required is attached to the
Purchase order so the correct item can be bought.
Which type of memory module is the IT department expecting to receive?

6. The production manager of a small company is experiencing slow performance in a

Laptop. What should a technician try first in order to correct the problem?
Defragment the hard disk.
Format the secondary partition.
Install additional RAM.
Upgrade the existing CPU.

7. A technician wishes to secure the network authentication for all remote users.
Which security technology uses radio communication with a computer before?
Accepting a username and password?
Key fobs
Smart digital cards
Security dongles
8. The corporate security policy states that all remote connections use only
Secure tunnels for transport of data. Which encryption technique secures data?
Travelling across the public Internet as if it were travelling across the corporate

9. A network administrator has been informed about a problem with the network
Printer. What is the best way to prevent print jobs from being added to the queue?
While the printer is being repaired?
Send an e-mail to all users telling them to stop sending any print jobs to the
Send a network message to all users telling them to stop sending any print jobs to
The printer.
Unplug the printer from the print server.
Stop the print service.

10. Which Windows hard drive partition is referred to as the C: drive?

The first volume partition
The first primary partition
The first extended partition
The first logical partition

11. A company has a preventive maintenance policy that requires every computer
Have a new restore point created every six months. How can a technician create the
Restore point?
From the CLI enter the command restore /cn.
Go to Start > Control Panel > Accessories > System Tools > System Restore > Create
A restore point.
Go to Start > All Programs > Accessories > System Tools > System Restore > Create
A restore point.
Right-click My Computer and then go to Properties > Restore > Create Restore

12. Which Start-up type must be selected for a service that should run each time?
The computer is booted?

13. A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of
Speed. The user is having problems comparing the two standards based on the values
Expressed in Mbps. Which explanation can the technician use that will best
Describe the relationship?
USB 2.0 is twice as fast as USB 1.1.
USB 2.0 is twenty times as fast as USB 1.1.
USB 2.0 is forty times as fast as USB 1.1.
USB 2.0 is one hundred times as fast as USB 1.1.

14. A technician has been asked to install a second optical drive in a computer.
The technician will need to configure the drive as slave. How can the technician
Accomplish this desired configuration?
Use jumpers on the motherboard to configure the drive as slave.
List the drive as slave in the CMOS.
Connect the drive after the twist in the PATA cable.
Use jumpers on the drive to configure the drive as slave.

15. Several messages sent to the network administrator are reporting that access
To a secure server using HTTPS is failing. After checking recent updates to the
Company firewall, the administrator learns that the firewall is blocking HTTPS.
Which port should be opened to solve the problem?

16. A network technician has been asked to determine the best Internet connection
For a branch office located in a new metropolitan office building. Which
Connection would provide the highest bandwidth and reliability at the lowest cost?

17. A new technician has joined the IT team and is about to service a heavy
Printer. Which two precautions should be taken to avoid any injury when
Transporting the heavy printer to the service area? (Choose two.)
Avoid lifting the equipment using the strength in your back.
Lift the equipment using the strength in your legs and knees.
Avoid bending your knees when lifting the printer.
Bend your back to pick the printer up.
Avoid lifting the printer close to your body.

18. What are two characteristics of the IEEE 1284 standard? (Choose two.)
These cables usually have 9 pins or 25 pins on both ends.
The maximum cable length is 50 ft (15 m).
All ports used by this standard are also known as D-shell ports.
The two available operative modes are EPP and ECP.
Bi-directional communication is allowed.

19. Which type of printer configuration method overrides any other type of configuration?

20. After scanning an image, what is the next step to conclude a scanner test?
Scan the same image again and compare both scanned images to detect scanning
Calibrate the scanner based on the image that has been scanned.
Print the scanned image and contrast it with the scanned image.
Visually compare the image against the image on the screen.

21. Which three laser printer components usually break? (Choose three.)
Fuser assembly
Primary corona
Pickup rollers
Transfer rollers
Secondary corona
Paper tray

22. After gathering information from a user regarding failure of a printer, which
Three actions should be performed? (Choose three.)
Change the communication cable.
Ensure all cables are connected correctly.
Reinstall the print driver.
Clear any type of paper jams.
Verify any type of print job in the printer queue.
Look for any type of upgrade on the web.

23. Which two algorithms are used for hash encoding to guarantee the integrity of?
Data? (Choose two.)
Chap checksum

24. Which technology allows a user to securely access a company LAN across a
Public network?

25. Which action should be taken first if a card key is lost or stolen?
Disable the card key system until the key can be recovered.
Disable all card keys. Issue new card keys to employees who show picture
Issue the owner a new card key after a picture identification is shown.
Disable the lost card key.

26. Which authentication technology uses a physical characteristic of the user in

conjunction with a password?
key fob
smart card
key card

27. Which two characteristics describe a software firewall? (Choose two.)

It typically protects only the computer it is installed on.
It is free-standing and uses dedicated hardware.
Initial cost for hardware and software updates can be costly.
It uses the CPU in the host computer.
It requires a specialized motherboard.

28. A network administrator needs to restrict access to the network. Which type of
firewall allows only those packets that are part of a known connection?
stateful firewall
proxy firewall
packet filter
content engine
29. A technician has been asked to develop a physical topology for a network that
provides a high level of redundancy. Which physical topology requires that every
node is attached to every other node on the network?

30. A network technician is installing network service in a new office. What is

the distance limitation of a single data run for UTP cabling without adding
networking devices?
33 ft (10 m)
100 ft (31 m)
330 ft (100 m)
500 ft (154 m)

31. An organization has two buildings, each with a separate network that uses a
different IP addressing scheme. Which device can be used to enable the flow of
data between the two networks?

32. Which three ports should be left open to avoid filtering e-mail traffic?
(Choose three.)

33. When performing a default installation of Windows XP Professional, which two

screens are displayed to configure custom settings? (Choose two.)
Regional settings
Shared folders and mapped drives
Administrator password and user accounts
Customize network settings
Disk management

34. Which recommendation should be observed when replacing existing memory?

The new memory should operate at the same speed as the hard drive.
The new memory should exceed the capacity of the hard drive.
The new memory should be as fast or faster as the cache found in the processor.
The new memory should be as fast or faster than existing memory.

35. Which feature is characteristic of the ntbackup command?

It can be executed from a batch file.
It can be used to restore files.
It has default parameters that appear as part of the command line.
It has overriding parameters that need to be set in the Windows backup utility.
36. After the administrator manually configures the correct SSID on a new laptop,
The computer is still unable to connect to the wireless LAN. Which additional
Action should the administrator take to resolve this problem?
Modify the group account of the user to include all file permissions.
Reboot the wireless access point.
Rename the laptop and reset the user password on the network.
Verify that the MAC address for the laptop is in the MAC address filter table.