1.41k likes | 1.54k Views
The Final Revision. IT Essentials PC Hardware & Software. 1- ABC Company wants to configure laptops to automatically power components off to improve battery life. Which power management control can be used to accomplish this? . ACPI AMD UPS BIOS PnP BIOS .
E N D
The Final Revision IT Essentials PC Hardware & Software
1- ABC Company wants to configure laptops to automatically power components off to improve battery life. Which power management control can be used to accomplish this? • ACPI • AMD • UPS • BIOS • PnP BIOS
1- ABC Company wants to configure laptops to automatically power components off to improve battery life. Which power management control can be used to accomplish this? • ACPI • AMD • UPS • BIOS • PnP BIOS
2- A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management? • Administrative Tools • BIOS • Command Prompt • Safe mode • System Registry
2- A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management? • Administrative Tools • BIOS • Command Prompt • Safe mode • System Registry
3- Refer to the exhibit. What is the correct order of steps to safely remove one of several hot-swappable devices using the least amount of steps? • 2, 3, 5, 6 • 1, 3, 5, 6 • 1, 4, 5, 6 • 2, 5, 6
3- Refer to the exhibit. What is the correct order of steps to safely remove one of several hot-swappable devices using the least amount of steps? • 2, 3, 5, 6 • 1, 3, 5, 6 • 1, 4, 5, 6 • 2, 5, 6
4- Which utility can be used to determine end-to-end connectivity between source and destination? • Ipconfig • Nbstat • Netstat • Ping
4- Which utility can be used to determine end-to-end connectivity between source and destination? • Ipconfig • Nbstat • Netstat • Ping
5- Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks? • bus • mesh • ring • star
5- Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks? • bus • mesh • ring • star
6- A user is reporting that a new external hard drive is defective. The laptop will allow access to the drive at times, and then will report that the drive cannot be found. Upon an initial examination of the laptop, it is discovered that the user has ten USB devices connected to the laptop.What is the best quick solution to this problem? • Remove all the peripherals except the hard drive and observe the results. • Move the laptop to another location and observe the results. • Replace the power adapter and observe the results. • Replace the USB hub and observe the results. • Flash the BIOS on the laptop and observe the results.
6- A user is reporting that a new external hard drive is defective. The laptop will allow access to the drive at times, and then will report that the drive cannot be found. Upon an initial examination of the laptop, it is discovered that the user has ten USB devices connected to the laptop.What is the best quick solution to this problem? • Remove all the peripherals except the hard drive and observe the results. • Move the laptop to another location and observe the results. • Replace the power adapter and observe the results. • Replace the USB hub and observe the results. • Flash the BIOS on the laptop and observe the results.
7- Which Windows XP command displays the route taken by packets crossing an IP network? • iproute • netview • nslookup • ping • tracert
7- Which Windows XP command displays the route taken by packets crossing an IP network? • iproute • netview • nslookup • ping • tracert
8- Which type of program causes banners and ads to appear on the desktop without any user intervention? • adware • spyware • stealth virus • trojan horse
8- Which type of program causes banners and ads to appear on the desktop without any user intervention? • adware • spyware • stealth virus • trojan horse
9- Why do mobile devices such as laptop computers use specifically designed CPUs? • They consume less power. • They are smaller. • They are lighter. • They require customized cooling mechanisms. • They need to fit proprietary motherboards.
9- Why do mobile devices such as laptop computers use specifically designed CPUs? • They consume less power. • They are smaller. • They are lighter. • They require customized cooling mechanisms. • They need to fit proprietary motherboards.
10- Where can a user change the idle time after which a laptop will switch to standby mode? • Right-click the desktop, then click Power Modes > Standby. • Right-click My Computer, then click Properties > Hardware > Device Manager > ACPI. • Left-click Start > Control Panel > Power Options, then click the Power Schemes tab. • Left-click Start > All Programs > Accessories > System Tools > Power Management.
10- Where can a user change the idle time after which a laptop will switch to standby mode? • Right-click the desktop, then click Power Modes > Standby. • Right-click My Computer, then click Properties > Hardware > Device Manager > ACPI. • Left-click Start > Control Panel > Power Options, then click the Power Schemes tab. • Left-click Start > All Programs > Accessories > System Tools > Power Management.
11- A technician thinks that the file system on a computer has a problem because Windows XP is reporting integrity data issues. Which Windows XP utility will check the file system for errors? • Attrib • Chkdsk • Fdisk • Format
11- A technician thinks that the file system on a computer has a problem because Windows XP is reporting integrity data issues. Which Windows XP utility will check the file system for errors? • Attrib • Chkdsk • Fdisk • Format
12- Which specification was developed to resolve the problem of hardware conflicts? • AGP • HAL • IRQ-and-DMA • OSR2 • PnP
12- Which specification was developed to resolve the problem of hardware conflicts? • AGP • HAL • IRQ-and-DMA • OSR2 • PnP
13- Which three rules increase the level of password strength? (Choose three.) • Passwords should never expire. • Passwords should be a combination of letters and numbers. • Passwords should combine a user's special dates and initials so they can be alphanumeric. • Passwords should be changed by the user after specific periods of time. • Password expiration and lockout policies should be clearly defined. • Passwords should be short to reduce the chances of users forgetting them.
13- Which three rules increase the level of password strength? (Choose three.) • Passwords should never expire. • Passwords should be a combination of letters and numbers. • Passwords should combine a user's special dates and initials so they can be alphanumeric. • Passwords should be changed by the user after specific periods of time. • Password expiration and lockout policies should be clearly defined. • Passwords should be short to reduce the chances of users forgetting them.
14- Which set of related files store all the settings of a Windows XP installation? • Registry • Control Panel • .ini • HWINFO.EXE
14- Which set of related files store all the settings of a Windows XP installation? • Registry • Control Panel • .ini • HWINFO.EXE
15- What characterizes a DDoS attack? • Many hosts participate in a coordinated attack. • Infected computers are called Daemons. • It is easy to identify the source of the attack. • All hosts must be in the same geographic area.
15- What characterizes a DDoS attack? • Many hosts participate in a coordinated attack. • Infected computers are called Daemons. • It is easy to identify the source of the attack. • All hosts must be in the same geographic area.
16- What characterizes spoofing? • Making data appear to come from a source other than the actual source. • Sending abnormally large amounts of data to a remote server to prevent user access to the server services. • Intercepting or inserting false information in traffic between two hosts. • Sending bulk e-mail to individuals, lists, or domains intending to prevent users from accessing e-mail.
16- What characterizes spoofing? • Making data appear to come from a source other than the actual source. • Sending abnormally large amounts of data to a remote server to prevent user access to the server services. • Intercepting or inserting false information in traffic between two hosts. • Sending bulk e-mail to individuals, lists, or domains intending to prevent users from accessing e-mail.
17- A technician has been asked to install memory that detects multiple bit errors and corrects single bit errors in memory. Which type of memory should be installed if the motherboard supports these features? • parity • ECC • non-parity • CRC
17- A technician has been asked to install memory that detects multiple bit errors and corrects single bit errors in memory. Which type of memory should be installed if the motherboard supports these features? • parity • ECC • non-parity • CRC
18- PATA data cables are available in two different types. The types are distinguished by the number of conductors. Which two types are available? (Choose two.) • 6 • 40 • 68 • 80 • 120
18- PATA data cables are available in two different types. The types are distinguished by the number of conductors. Which two types are available? (Choose two.) • 6 • 40 • 68 • 80 • 120
19- How many conductors are found in a SATA data cable? • 3 • 4 • 7 • 10 • 12
19- How many conductors are found in a SATA data cable? • 3 • 4 • 7 • 10 • 12
20- When installing a network adapter into a client computer, a technician notices that the contacts on the adapter need to be cleaned. Which solution should the technician use to clean the contacts? • glass cleaner • isopropyl alcohol • mild detergent • rubbing alcohol • slightly abrasive cleanser
20- When installing a network adapter into a client computer, a technician notices that the contacts on the adapter need to be cleaned. Which solution should the technician use to clean the contacts? • glass cleaner • isopropyl alcohol • mild detergent • rubbing alcohol • slightly abrasive cleanser
21- ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy? • NIC • Wireless NIC • USB gateway • RAID adapter • multiple slave hard disk adapter
21- ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy? • NIC • Wireless NIC • USB gateway • RAID adapter • multiple slave hard disk adapter
22- Which three system resources are commonly used for communication between the CPU and other components in the computer? (Choose three.) • IRQ • DMA • UDP • I/O port address • USB • PnP
22- Which three system resources are commonly used for communication between the CPU and other components in the computer? (Choose three.) • IRQ • DMA • UDP • I/O port address • USB • PnP
23- Which three computer components contain hazardous materials and require special handling for disposal? (Choose three.) • batteries • floppy drives • monitors • optical drives • parallel cables • printer toner • cartridges
23- Which three computer components contain hazardous materials and require special handling for disposal? (Choose three.) • batteries • floppy drives • monitors • optical drives • parallel cables • printer toner • cartridges
24- Which two tools can help protect against ESD? (Choose two.) • antistatic wrist strap • compressed air • antistatic mat • safety glasses • rubber-sole shoes
24- Which two tools can help protect against ESD? (Choose two.) • antistatic wrist strap • compressed air • antistatic mat • safety glasses • rubber-sole shoes
25- Which Windows tool should be run before upgrading the operating system? • Convert • Fdisk • Msconfig • Ntbackup