You are on page 1of 6

Assessment System

Skip to Time Left | Skip to Navigation | Skip to Assessment Items

Take Assessment - Practice Final Exam for ch 11-16 - IT Essentials (Version 4.0)

Time Remaining:

Showing 1 of 3 Next> Page: GO <Prev


1
A technician is servicing a laser printer. Which two printer parts should the technician avoid touching
because they retain large amounts of voltage even when disconnected from a power source?
fuser assembly
toner cartridge
corona wire
printer head
paper tray

2
Which two characteristics describe a software firewall? (Choose two.)
It typically protects only the computer it is installed on.
It is free-standing and uses dedicated hardware.
Initial cost for hardware and software updates can be costly.
It uses the CPU in the host computer.
It requires a specialized motherboard.

3
A technician has been asked to develop a physical topology for a network that provides a high level of
redundancy. Which physical topology requires that every node is attached to every other node on the
network?
bus
hierarchical
mesh
ring
star

4
Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)
23
25
107
110
143
212

5
The production manager of a small company is experiencing slow performance in a laptop. What should a
technician try first in order to correct the problem?
Defragment the hard disk.
Reload the operating system.
Install additional RAM.
Upgrade the existing CPU.
6
After the administrator manually configures the correct SSID on a new laptop, the computer is still unable
to connect to the wireless LAN. Which additional action should the administrator take to resolve this
problem?
Modify the group account of the user to include all file permissions.
Reboot the wireless access point.
Rename the laptop and reset the user password on the network.
Verify that the MAC address for the laptop is in the MAC address filter table.

Refer to the exhibit. Which utility has the IT department started on each computer?
Chkdsk
Computer Management
Defragment
Scandisk

Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard
drive?
1 primary, 3 extended, 1 logical, 1 free space
1 logical, 3 primary, 1 free space, 1 extended
3 logical, 1 extended, 1 free space, 1 primary
3 free space, 1 logical, 1 primary, 1 extended

9
An organization has two buildings, each with a separate network that uses a different IP addressing
scheme. Which device can be used to enable the flow of data between the two networks?
bridge
hub
router
switch

10
Which recommendation should be observed when replacing existing memory?
The new memory should operate at the same speed as the hard drive.
The new memory should exceed the capacity of the hard drive.
The new memory should be as fast or faster as the cache found in the processor.
The new memory should be as fast or faster than existing memory.

11
Which scanner process uses an IT8 target to complete its function?
calibration
driver test
firmware upgrade
quality test
12
Manufacturers often offer devices in two versions, one with all the necessary manuals and drivers and
one without. Which two names are given to these versions? (Choose two.)
OEM
premium
prime
retail
value
wholesale

13
For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.)
regional settings
shared folders and mapped drives
display settings
network settings
disk management

14
A call center technician receives a call from a customer who wishes to add more memory to a laptop to
increase graphics performance. Which type of memory should be installed?
cache
CMOS
NVRAM
RAM

15
A network technician has been asked to determine the best Internet connection for a branch office
located in a new metropolitan office building. Which connection would provide the highest bandwidth and
reliability at the lowest cost?
DSL
ISDN
satellite
wireless

Showing 2 of 3 Next> Page: GO <Prev


16
After resolving an intermittent CD-ROM drive fault by firmly reconnecting a loose cable, the technician
then decides to inspect all other cable connections to prevent other faults from occurring. Which two
conditions will help to prevent future cable and connector faults? (Choose two.)
There are no missing or bent connector pins.
Cables are stretched tight between connectors.
Cables are not bent sharply around adapter cards.
Device data cables exceed manufacturer specifications.
The connector retaining screws have been over tightened with a screwdriver.

17
Which three specifications should be considered when choosing a new motherboard? (Choose three.)
physical size and shape of the motherboard and case
size of monitor to be used
CPU supported
number and type of power supply connectors available
network topology to be used
amount of free hard drive space

18
A technician has installed the driver for a scanner, attached the scanner to the computer, and performed
an initial test scan. What should the technician do next to complete the testing phase of the scanner
installation?'
Scan the same image again and compare both scanned images to detect scanning deficiencies.
Calibrate the scanner based on the image that has been scanned.
Print the scanned image and contrast it with the scanned image.
Visually compare the original image against the image on the screen.

19
When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
lubricating grease
thermal compound
adhesive gel
penetrating oil

20
A computer has been relocated and all the cables reconnected. When the computer is powered on, the
correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor
fails to display anything. What are two possible causes of this problem? (Choose two.)
The monitor Power Scheme settings are incorrect.
Relocation requires that the monitor resolution be re-adjusted.
The monitor cable connector is loose or disconnected because the retaining screws are missing.
The monitor is too far from the computer and the stretched monitor cable has unseated the serial
interface card.
The monitor is connected to the integrated video adapter on the motherboard instead of the expansion
slot adapter.

21
Which three components are found in laser printer maintenance kits? (Choose three.)
fuser assembly
primary corona
pickup rollers
transfer rollers
secondary corona
paper trays

22

Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard
drive. The computer has the internal and external ports listed in the exhibit. Which solution would be the
best if optimal performance is the deciding factor?
Attach a hard drive to the external serial port.
Attach a hard drive to an internal SATA port.
Attach a hard drive to the external parallel port.
Attach a hard drive to any of the external USB ports or the USB hub.
Attach a hard drive to the second PATA connector that attaches to the PATA port.
23
Which type of printer configuration method overrides any other type of configuration?
default
global
predefined
per-document

24
Which two hazards are related to fiber optic installations? (Choose two.)
light that can burn the eyes
danger of electrocution if improperly installed
glass splinters that can penetrate the skin
risk of explosion when installed close to combustible substances
electromagnetic interference when installed close to electric cable runs

25
Which would be a reason to update the BIOS of a computer?
The computer unexpectedly boots into Safe Mode.
The ROM chip is no longer able to store the BIOS instructions.
When it starts, the operating system no longer recognizes the existing installed devices.
A computer being prepared for an upgrade is found to lack support for newer hardware devices.

26
Which Startup type must be selected for a service that should run each time the computer is booted?
automatic
boot
manual
start
startup

27
A technician has installed a third party utility that is used to manage a Windows XP computer. However,
the utility is unable to startup automatically whenever the computer is started. What can the technician
do to resolve this problem?
Uninstall the program and then use Add New Programs in the Add or Remove Programs utility to install
the application.
Use the Add or Remove Programs utility to set program access and defaults.
Change the startup type for the utility to Automatic in Services.
Set the application registry key value to one.

28
The corporate security policy states that all remote connections use only secure tunnels for transport of
data. Which encryption technique secures data traveling across the public Internet as if it were traveling
across the corporate LAN?
MD5
VPN
WEP
WPA

29
Which safety precaution should an installer take when installing cable in the ceiling of a building?
Wear thick gloves to minimize damage to the cable.
Wear a shirt with short sleeves to avoid getting stuck in the cable supports when installing.
Wear lightweight shoes when installing cable runs inside the ceiling.
Wear safety glasses in case of encountering toxic materials during the installation.

30
Which action should be taken first if a card key is lost or stolen?
Disable the card key system until the key can be recovered.
Disable all card keys. Issue new card keys to employees who show picture identification.
Issue the owner a new card key after a picture identification is shown.
Disable the lost card key.

Showing 3 of 3 Next> Page: GO <Prev


31
Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)
MD5
chap checksum
SHA
VPN
SSL

32
What is the highest risk associated with improperly charged or mishandled batteries?
The components can overheat.
The laptop will be unable to hold enough charge.
The battery can explode.
The lifetime of the battery will be reduced.

33
A network administrator has been informed about a problem with the network printer. What is the most
reliable way to prevent print jobs from being added to the queue while the printer is being repaired?
Send an e-mail to all users telling them to stop sending any print jobs to the printer.
Send a network message to all users telling them to stop sending any print jobs to the printer.
Unplug the printer from the print server.
Stop the print spooler.

34
Which feature is characteristic of the ntbackup command?
It can be executed from a batch file.
It can be used to restore files.
It is used to create a copy of the registry.
It is used create restore points.

35
A technician wishes to secure the network authentication for all remote users. Which security technology
uses radio communication with a computer before accepting a username and password?
biometrics
key fobs
smart digital cards
security dongles

Showing 3 of 3 Next> Page: GO <Prev

You might also like