IT Essentials Final Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A new technician has joined the IT team and is about to service a heavy printer. Which 2 precautions should be taken to avoid any injury when transporting the heavy printer to the service area?

-Avoid lifting the equipment using the strength in your back. -Lift the equipment using the strength in your legs and knees.

What 2 tasks should be done regularly to preserve the security and integrity of data and applications on mobile devices?

-Back up user data on a regular basis -Ensure that the operating system software and applications contain the latest updates.

A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are 2 advantages of the new configuration?

-Data is more secure in the event of hardware failures. -Data resources and access are centrally controlled.

Chad, a level one call center technician, receives a customer phone call, the customer has an issue that Chad does not have the knowledge to answer. The customer is irritated that Chad cannot provide immediate assistance. Which 2 things should Chad do next?

-Document the reason the customer called and created a support ticket. -Escalate the customer to a level 2 technician.

Which 3 features can be configured in the BIOS settings to secure a computer?

-Drive encryption -TPM -Passwords

A technician needs to configure a Bluetooth headset for a laptop user. Which two steps should the technician take before installing the headset?

-Enable Bluetooth in BIOS Setup. -Ensure that the laptop Bluetooth switch is enabled.

What are 2 potential risks that could result from rooting or jail breaking a mobile device?

-Enabling app access to the root directory. -Not properly creating or maintaining sandboxing features.

Which 3 components are typically found in laser printer maintenance kits?

-Fuser assembly -Pickup rollers -Transfer rollers.

What are 3 benefits of computer preventive maintenance?

-Improvement in data protection. - Extension of the life of components -Reduction of the number of equipment failures.

A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make?

-Inkjet printers are less expensive as an initial purchase than laser printers. The laser printer output is dry after printing, but an inkjet printer may sill have wet ink on the paper after printing.

The activity of a previously unknown program triggers an alert by Windows firewall. What three options will the user have for dealing with this event?

-Keep blocking -Unblock -Ask me later.

A technician suspects that a security issue is causing problems with a computer. What two actions could be preformed to test theories of probable cause when troubleshooting the PC?

-Log in as a different user. -Disconnect the computer from the network.

What are 2 advantages of the NTES file system compared with FAT32?

-NTFS supports larger files -NTFS provides more security features

Which 2 types of expansion slots would be used by a wireless NIC in a computer today?

-PCLc -PCI

Which two password control policies should an organization implement to ensure strong passwords?

-Passwords should be set to expire every 60 days. -Passwords should contain letters and numbers.

What a user tries to run a program, a missing or corrupt DLL message is displayed. What are 2 possible solutions to this problem?

-Run sfc/scannow in safe mode. -Reinstall the program that is associated with corrupt DLL file.

What are 3 features provided by the TPM module?

-Security for user authentication info. -Application license protection. -Storage of original certificates.

A technician is troubleshooting the appearance of flashing lines on a laptop screen. What are 2 possible causes of this distortion?

-The GPU is not cooling correctly. -The display is not correctly installed.

What are 2 consequences of setting an incorrect boot order in the system BIOS?

-The computer displays a "BOOTMGR is missing" error after POST -The computer displays an "Invalid Boot Disk" error after POST

What are 3 common input devices found on laptops?

-Touch pad. -Fingerprint reader. -Wed Camera.

A user complains about being unable to connect to wireless connection?

-Try coming the laptop to different places to see if a signal can be detected. -Verify in the laptop software whether any wireless networks are detected.

Which 2 operations can help prevent a mobile device from being tracked with out permission?

-Turn off the GPS when not in use. -Disable or remove apps that allow connections to the GPS.

Which 2 PC settings can be configured using the BIOS setup utility?

-Virtualization support -Boot sequence

Which 2 commands could be used to check if DNS name resolution is working properly on a Windows PC?

-nslookup cisco.com -ping cisco.com

Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company fire wall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?

443

What is a characteristic of a computer power connector?

A SATA power connector is used to connect to a hard disk drive or an optical drive.

Describe the facility access control device, card keys

A device to store user info and level of access.

Way is a full format more beneficial than a quick format when preparing for a clean OS installation?

A full format will delete files from the disk while analyzing the disk drive for errors.

A user calls the help desk to report that a mobile device exhibits very slow performance. What could cause this problem?

An app is not compatible with the device.

What does %USERPROFILE% represent in the path C:Users%USERPROFILE%AppDataLocalTemp?

An environment variable that is set by the operating system.

What guideline should be followed when establishing a password security policy?

An expiration period should be established so that passwords frequently change.

What are the 4 layers in the TCP/IP reference model?

Application, transport, internet, network access.

A technician is asked to configure the time that the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?

BIOS

A computer technician has been asked to secure all Windows 7 computers by encrypting all the data on each computer. Which Windows feature should be used to provide this level of encryption?

BitLocker.

A computer is powered on, Windows 7 fails to start. What initial procedure would a technician use to deal with this failure?

Boot from a Windows 7 installation media and access the system restore utility.

Which closed-ended question would be appropriate for a technician to use to narrow down the possible problems on a laptop that will not power on?

Can the laptop operate using the AC adapter?

What is the difference between cloud computing and data center?

Cloud computing solutions are network resources providing to the clients through the use of services from data center.

A call center technician answers a call from a frequent customer who is known to be impatient and lacks experience with computers. The customer has an issue with an application that the call center supports. The customer informs the technician that the problem had been reported before but the original technician was rude, did not listen, and did not fix the problem. If the technician is confident that the problem can be resolved by increasing the amount of memory in the computer, what should the technician do?

Confirm the issue and give detailed instructions to solve the problem.

A computer technician has decided that a problem with a laptop can be solved by representing a hardware component. What should be done first before attempting to repair a hardware component on a laptop?

Consult the service manual for the laptop.

The current IP configuration of a medium size company with several subnets is done manually and is time-consuming because of increased network growth,. A technician needs a simpler way for IP configuration of workstations. Which service or protocol would simplify the workstation IP configuration task?

DHCP`

Which layer of the OSI model is responsible for physical addressing and the procedures used to access media?

Data link

A technician has installed a new sound card in a PC but is not operating correctly. Where should the technician look to investigate driver problems?

Device manager

Describe the facility accress control device, Biometric sencors

Devices to identify physical characteristics of the user.

What tool is included in the MAC OS x for backing up disks to image files and recovering disk images?

Disk utility

Describe the facility access control device, identification badges with photographs

Displays image of the user.

Which step in the troubleshooting process is important to the help avoid repeating repair processes that were preformed previously?

Documentation of the problem and its solution.

A network administrator occasionally asks a technician to make sure that dust does not accumulate on devices in the network equipment closets. What is the purpose of having the technician do this job?

Dust can cause network equipment to overheat and cause problems on the network.

What can help control the effect of RFI on a wireless LAN?

Ensure the wireless network is on a difference frequency than the offending source.

Which measure can help control RIF effects on wireless networks?

Ensure the wireless network is on a different frequency than the offending source.

What factor should be taken into consideration more with laptops than with desktops?

Environmental control.

Which type of external storage should be used by a technician to back up over 2 TB of music and video data files?

External hard drive.

An ISP help desk technician receives a call from a customer who reports that no one at their business can reach any websites or get their e-mail. After testing the communication line and finding everything fine, the technician instructs the customer to run nslookup form the command prompt. What does the technician suspect is causing the customer's problem?

Failure of DNS to resolve names to IP addresses.

What expectation is defined in the service level agreement between an organization and service vendor?

Guaranteed service response time.

Which type of interface should a customer choose is connecting a single cable from a Microsoft Windows computer to output both audio and video to a high definition television?

HDMI

Which technology provides a solution for PC virtualization?

Hypervisor

What is an indication that the battery in a mobile device could become physically hazardous and should be immediately replaced?

If there are signs of swelling

A tire store needs to use carbon copy paper to print customer invoices so that both the store and the customer have a copy. What is the best printer solution?

Impact printer

What laptop component converts DC power to Ac so that the display can illuminate?

Inverter

Once a technician understands a customer complaint, it is common to ask closed-ended questions. Which question is a close-ended one?

Is this the first time the error occurred?

Which solution should be used to clean a CPU and a heat sink?

Isopropyl alcohol

What is a characteristic of the open source license of an application software?

It allows users to modify and share the source code.

Which type of network spans a signal building or campus and provides services and applications to people with in a common organizational structure?

LAN

Which component uses the greatest amount of power on most mobile devices?

LCD screen

A technician wants to allow users to backup and restore all the files on their computers, but does not want the users to be able to make changes to the system. How should the technician give users the functionality?

Make the users members of a group called back up operators.

What characterizes a DDOS attack?

Many hosts participate in a coordinated attack.

A user notices that some of the programs that are installed before upgrading Windows to a new version no longer function properly that will run at starup?

Msconfig

What is the default file system used during a fresh installation of Windows 7?

NTFS

A user on a home network wants to share a printer from a Windows 7 computer. What must the user do in order for other Windows 7 computers in the house to obtain the proper driver?

Nothing. Windows automatically provides the driver.

Which cloud computing service would be the best for an organization that needs to collaboratively create applications and deliver them over the web?

PaaS

Which expansion card can assist in troubleshooting a computer problem when no video is available?

Post Card

What is the most important reason for a company to ensure that computer preventive maintenance is done?

Preventive maintenance helps to protect the computer equipment against future problems.

What can be tested with a digital multimeter?

Quality of electricity in computer components.

Describe the facility access control device, RFID Badges

Sencors to monitor location and access

What is the first step an administrator should take when splitting a single partition into multiple partitions?

Shrink the partition.

What type of hard drive contents flash memory for caching frequently used data but stores the most of the data on the magnetic hard disk drive?

Solid-state drive.

Refer to the exhibit as part of the process of building a computer. What is the proper order of the first 3 steps in the installation of a power supply?

Steps 1,4,3 (Power supply in case, align holes, secure using screws)

An application appears frozen and is not responding to a mouse or the keyboard. What Windows OS tool can be used to stop the application?

Task Manager

A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?

Task manager.

What is the next troubleshooting step after a theory of probable cause has been established?

Test the theory to determine cause.

A computer user complains of a computer that freezes up after about 5 minutes of use. The technician checks the computer BIOS to see if there might be a config problem that is causing the computer to behave consistently in this manner. While the technician is reviewing the information, the computer freezes again,. What is the probable cause of the computer problem?

The CPU fan is not functioning.

A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way that failure is indicated?

The computer emits a pattern of beeps indicating the failure device.

A technician installed a network adapter in a computer and wants to test network connectivity, the ping command can receive responses from workstations on the same subnet but not from remote workstations. What could be causing the problem?

The default gateway is incorrect.

A tech installed a network adapter in a computer and wants to test network connectivity. The Ping command can only receive a response from local workstations. What could be causing the problem?

The default gateway is not set.

When a PC is being assembled, what component is connected to the motherboard with a SATA cable?

The optical drive.

Users in an office complain that the network printer is printing vertical lines on all pages. What is a likely cause of this problem?

The printer has an incorrect IP address.

A user downloads a widget onto his Android phone but is puzzled to see that when the widget is touched an app is launched. What is a possible cause?

The widget is associated with the app and this is the normal behavior.

Which build-in tool is available on a MAC OS X machine to preform disk back ups?

Time machine

What is the purpose of RAID adapters?

To connect multiple storage devices for redundancy or speed.

What is the purpose of using the MIME email protocol on mobile devices?

To enable pictures and documents to be included in email messages.

Why do laptop computers use CPU throttling techniques?

To reduce the heat that the CPU may generate.

What is the purpose of a safety data sheet?

To specify procedures for dealing with potentially hazardous materials.

What type of device provides power to a computer and allows it to be stately shut down in the event of a power loss?

Uninterruptible power supply.

A technician opens up a PC to work on it, and finds that it is very dusty inside. What should the technician do?

Use a can of compressed air to remove excess dust.

A technician is troubleshooting a Windows 7 computer that displays an "Invalid Boot Disk" error message. What would be the most likely action the technician should preform t correct the issue?

Use the system recovery options to select the correct active partition.

Which wireless security mode supports government grade security and offers both personal and enterprise authentication

WPA2

In which circumstance should a level one technician initiate an escalated work order?

When a problem requires expertise from another technician.

When should a technician avoid wearing an anti static wrist strap?

When replacing a power supply unit.

A user wants to map a network driver on a PC that is named "Work2" and runs Windows 7. The name of the shared resource the user wishes to map to is called "Installs"and is located on a workstation called "Work1" what would be the correct path for mapping the network drive?

\work1installs

For cleaning a laser printer, what should be used to pick up excess particles of toner?

a HEPA-capable vacuum.

Which type of input device can identify users based on their voice?

switchbiometric identification device


संबंधित स्टडी सेट्स

Elements, mixtures and compounds

View Set

Chapter 5: Competitive Advantage, Firm Performance, and Business Models

View Set

Quiz Chapter 11 Process Design and Analysis

View Set

quant methods in business ch. 1-4 study guide

View Set

CH 28 - Care of Patients Requiring Oxygen Therapy or Tracheostomy

View Set

GIS Level 1 Capstone Practice Exam

View Set

IHI: introduction to health care improvement

View Set