You are on page 1of 2

1. Which authentication technology uses a physical characteristic of the user in conjunction with a password?

-Biometrics

2. Refer to the exhibit. Which type of technology is most suitable to bring Internet services to the facilities shown in the graphic?
-Satellite

3. The purchasing department at ABC Company has the choice of buying a retail version or an OEM version of a NIC. Which two
things must the purchasing department consider when deciding whether to choose the retail or OEM version? (Choose two.)
-The installers may need to find the drivers for the OEM NICs on the Internet.
-OEM NICs may lack proper documentation.
4. When performing a default installation of Windows XP Professional, which two screens are displayed to configure custom
settings?
(Choose two.)
-Regional settings
-Administrator password and user accounts

5. Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory
chip required is attached to the purchase order so the correct item can be bought. Which type of memory module is the IT
department expecting to receive?
-SODIMM

6. The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in
order to correct the problem?
-Defragment the hard disk.

7. A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which
physical topology requires that every node is attached to every other node on the network?
-Mesh

8. The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption
technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
-VPN

9. Which Windows hard drive partition is referred to as the C: drive?


-The first primary partition

10. A network administrator has been informed about a problem with the network printer. What is the best way to prevent print jobs
from being added to the queue while the printer is being repaired?
-Stop the print service.
11. A company has a preventive maintenance policy that requires every computer have a new restore point created every six
months. How can a technician create the restore point?
-Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.

12. Which Startup type must be selected for a service that should run each time the computer is booted?
-Automatic

13. A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two
standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the
relationship?
-USB 2.0 is forty times as fast as USB 1.1.

14. A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP
cabling without adding networking devices?
-330 ft (100 m)

15. A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as
slave. How can the technician accomplish this desired configuration?
-Use jumpers on the drive to configure the drive as slave.
16. A network technician has been asked to determine the best Internet connection for a branch office located in a new metropolitan
office building. Which connection would provide the highest bandwidth and reliability at the lowest cost?
-DSL

17. A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid
any injury when transporting the heavy printer to the service area? (Choose two.)
-Avoid lifting the equipment using the strength in your back.
-Lift the equipment using the strength in your legs and knees.

18. What are two characteristics of the IEEE 1284 standard? (Choose two.)
-The two available operative modes are EPP and ECP.
-Bi-directional communication is allowed.
19. Which type of printer configuration method overrides any other type of configuration?
-Default

20. After scanning an image, what is the next step to conclude a scanner test?
-Print the scanned image and contrast it with the scanned image.
21. Which three laser printer components usually break? (Choose three.)
-Fuser assembly
-Pickup rollers
-Transfer rollers

22. After gathering information from a user regarding failure of a printer, which three actions should be performed? (Choose three.)
-Ensure all cables are connected correctly.
-Clear any type of paper jams.
-Verify any type of print job in the printer queue.

23. Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)
-MD5
-SHA

24. Which technology allows a user to securely access a company LAN across a public network?
-VPN

25. Which action should be taken first if a card key is lost or stolen?
-Disable the lost card key.

26. The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range
technologies can support these types of devices? (Choose two.)
-Bluetooth
-Infrared

27. Which two characteristics describe a software firewall? (Choose two.)


-It typically protects only the computer it is installed on.
-It uses the CPU in the host computer.

28. A network administrator needs to restrict access to the network. Which type of firewall allows only those packets that are part of a known
connection?
-Stateful firewall

29. A technician wishes to secure the network authentication for all remote users. Which security technology uses radio communication with a
computer before accepting a username and password?
-Key fobs

30. Which recommendation should be observed when replacing existing memory?


-The new memory should be as fast or faster than existing memory.

31. An organization has two buildings, each with a separate network that uses a different IP addressing scheme. Which device can be used to enable
the flow of data between the two networks?
-Router

32. Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)
-25
-110
-143

33. What is the highest risk associated with improperly charged or mishandled batteries?
-The battery can explode.

34. Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent
updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
-443

35. Which feature is characteristic of the ntbackup command?


-It can be executed from a batch file.

36. After the administrator manually configures the correct SSID on a new laptop, the computer is still unable to connect to the wireless LAN.
Which additional action should the administrator take to resolve this problem?
-Verify that the MAC address for the laptop is in the MAC address filter table.

You might also like