Page

Labels

Sabtu, 27 April 2013

Kunci Jawaban Ujian CISCO chapter 1-10 IT Essentials : PC Hardware and Software (Version 4.1)



Chapter 1 Exam - IT Essentials: PC Hardware and Software (Version 4.1)



Answer
Question
63
How many FireWire devices can be supported 
by a single FireWire port?
Headphones 3- monitor 2- 1- printer
Which three devices are considered output
 devices? (Choose three.)
EEPROM
Which type of ROM can be reprogrammed with software
 while it is still physically installed in the computer?
It can supply power from the computer to devices
Which important feature is offered by the USB standard?
1394
 Which IEEE standard defines the FireWire technology
1- biometric authentication device
2- digital camera
Which two devices are considered input devices? (Choose two.)
BTX و  ATX
Which two form factors
are commonly used to build a new computer? (Choose two.)
4-pin ،  6-pin
What are the two connector types for 
the 1394a interface? (Choose two.)
IRQ 1-
2- DMA
3- I/O address
Which three system resources are commonly used
 for communication between the CPU or memory
and other components in the computer? (Choose three.)
RAID
Which technology would be best 
to use for drive redundancy and data protection?
LCD
A technician receives a complaint of poor image quality after the user
changes the native resolution. While investigating the complaint,
the technician discovers there is a mismatch between 
 native mode
and the native resolution of the peripheral. Which item
is configured incorrectly?
1280 x 800
Refer to the exhibit. Based on the advertisement that is shown,
what is the native resolution of this computer system?
DDR-400
Which memory module has a front side bus speed of 200 MHz?
IRQs
Which type of computer resources are direct lines to 
the processor and are used by computer components
 to request attention from the CPU?
PC hardware and software technician
A student has passed the CompTIA A+ certification exam.
Based on this passing score, 
for which job is the student now qualified?
It instructs the computer how to process information
What is a function of the operating system in a computer?
to move the heat away from the CPU
What is the function of a fan on top of a heat sink?
1- the number of external or internal drive locations
2- the size of the motherboard and the power supply
What are two factors that must be considered when 
choosing a computer case? (Choose two.)
I = P/V = 100W/9V = 11.11A
A technician creates a simple circuit that has a 9 V light bulb 
 attached to a 9 V battery.
The power output of the light bulb is 100 W.
Which equation should 
be used to calculate how much current in amps
 is required to achieve the full 100 W output from the 9 V bulb?
provides capability to share a keyboard, a mouse, USB devices, and speakers with multiple computers
What is a function of a KVM switch?
 
Chapter 2 Exam - IT Essentials: PC Hardware and Software (Version 4.1)
 
Answer
Question
1- compressed air
2- soft cloth
Which two tools are recommended for cleaning a PC? (Choose two.) 
Defrag
Which tool should be used if a user needs to optimize space on a hard drive? 
1- Antivirus software
2- Spyware Remover
Which two types of tools can help protect
 a computer from malicious attacks? (Choose two.) 
Disk Management
Which tool in Windows XP gives a technician access to initialize disks and create partitions?
Phillips-head screwdriver
Refer to the exhibit. Which type of tool is presented in the graphic?
touching an unpainted part of the computer case
How does a technician discharge static buildup?
System File Checker
Which Windows XP command-line utility scans the critical files of the operating system and replaces any files that have been corrupted?
1- Spyware Remover
2- Defrag
3- Disk Cleanup
The performance of a computer is reduced after it has been using the Internet. Which three tools could be run to try to improve the performance of the computer? (Choose three.)
digital multimeter
Refer to the exhibit. Which type of tool is shown in the graphic?
spike
Which condition refers to a sudden and dramatic
 increase in voltage, which is usually caused by lightning?
Turn off and remove the power source.
Which step should be performed first when servicing computer equipment?
1- antistatic wrist strap
2- antistatic mat
Which two tools can help protect against ESD? (Choose two.)
1- wireless phones
2- microwaves
Which two devices commonly affect wireless LANs? (Choose two.)
1- electrical storms
2- power lines
What are two significant sources of EMI? (Choose two.) 
to equalize the electrical charge between a person and the equipment
Why should an antistatic wrist strap be 
worn when working on electronic equipment? 
It provides reference material for similar problems when such problems are encountered in the future
Why is documentation of all services and repairs
an important organizational tool for a technician?
1- batteries
2- monitors
3- printer toner cartridges
Which three computer components contain hazardous materials and require special handling for disposal? (Choose three.) 
Avoid using magnetized tools.
Which precaution should be taken when working around electronic devices?
compressed air
A technician has a room of computers which are running very hot. The technician discovers that the heat sinks in the computers are very dusty.
What should the technician use to clean the heat sinks? 
CRT monitor
Which computer components must a technician
never try to work on when wearing an antistatic wrist strap?
Chapter 3 Exam - IT Essentials: PC Hardware and Software (Version 4.1)
 
Answer
Question
20-pin connector
          A technician is installing a
new power supply in a computer. Which type 
of power connector should be used to connect to an ATX motherboard?
Pin 1 on the CPU is aligned with Pin 1 on the ZIF socket.
When installing a CPU in a ZIF socket,
how should the technician align the pins to avoid damage?
1- hard drive
2- floppy drive
When building a computer, which 
two components are normally installed 
in 3.5-inch drive bays? (Choose two.)
1- PS/2
2- USB
Which two connectors are used to 
connect external peripherals? (Choose two.)
1- PCIe
2- PCI
A field technician has been asked to install a wireless 802.11g
NIC in a computer, but is unsure about the expansion slots available.
Which two types of wireless NICs should the technician have available?
(Choose two.)
during the POST
After a technician has assembled a new computer,
it is necessary to configure the BIOS. 
At which point must a key be pressed to start the BIOS setup program? 
It issues a number of short beeps.
A technician has just finished assembling a new computer. 
When the computer is powered up for the first time,
the POST discovers a problem. How does the POST indicate the error?
Use standoffs to keep the motherboard above the metal base.
Which action is recommended to prevent the motherboard from
contacting the metal base of the case? 
The floppy cable has a twist in the cable.
What is a convenient way that a technician can tell whether a ribbon
 cable is for an IDE hard drive or a floppy drive? 
optical drive
Which type of drive is installed in a 5.25-inch bay?
Check the motherboard manual or manufacturer's website.
What is the most reliable way for users to 
buy the correct RAM to upgrade a computer? 
performs a check on all internal components
What is a function of the BIOS?
Reattach the side panels to the case.
What should be the next installation step after all the internal components
of a PC have been installed and connected to 
Step 2
Refer to the exhibit. Which should be the last step when
connecting external cables to a computer?
provides an interface between a computer and a display monitor
What is a function of a video adapter card?
to provide functionality for external components to be connected to the computer
What is a function of the adapter cards that are installed in a computer?
1- a floppy data cable to connect the FDD to the motherboard
2- a cable from the power supply to the Berg power connector on the FDD
Which two connections should be provided to a floppy disk drive
 during installation? (Choose two.) 
in internal bays
Where should internal drives be installed in a computer? 
Steps 1, 4, 3
Refer to the exhibit. What is the order of steps that
should be followed for a power supply installation in a computer? 
Consult the website of the manufacturer
What is the first step that a technician should take
 before physically opening a computer case?
Chapter 5 Exam - IT Essentials: PC Hardware and Software (Version 4.1)
Answer
Question
the Windows XP Hardware Compatibility List
Once minimum hardware requirements are satisfied, where should a technician look to determine if the computer hardware has been tested with Windows XP?
Run the Microsoft Convert utility.
A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS. Which course of action should be taken to upgrade the file system to NTFS? 
API
Which set of guidelines is used to ensure that programmers develop applications that are compatible with an operating system? 
Use the Device Manager utility to ensure that all the devices are operational.
A technician has finished installing Windows XP. What should the technician do to verify that all hardware has been installed correctly?
Chkdsk
A technician thinks that the file system on a computer has a problem because Windows XP is reporting data integrity issues. Which Windows XP utility will check the file system for errors?
Recovery Console
A technician has a computer that is unable to boot Windows XP properly. The technician has decided that it is necessary to attempt a repair of XP. Which utility will be run if the technician selects Repair XP from the XP boot disk? 
Windows User State Migration Tool
A user decides to install a new version of Windows Vista but needs to retain the configurations and customizations of the current Windows XP operating system. Which software can be used to achieve this?
virtual real mode
Which operating mode is used by Windows XP to run a DOS application?
1- It organizes operating system snap-ins.
2- It can be used to create customized MMCs.
3- It requires administrative privileges to access.
What are three features of the Microsoft Management Console (MMC)? (Choose three.)
Safe Mode with Networking Support
A technician has installed new video drivers on a Windows XP computer and now the monitor shows distorted images. What startup mode can the technician use to access a new driver on the network?
Develop a preventive maintenance plan.
A company with 40 computers needs to reduce repair costs, decrease downtime, and improve reliability. Which task will 
Roll back the driver.
When troubleshooting a printer problem, a technician finds that the operating system was automatically updated with a corrupt device driver. Which solution would resolve this issue?
The operating system will fail to start.
What would be the result of having a corrupt Master Boot Record?
compatibility mode
Which mode allows applications that are not compatible with the current operating system to run in an environment that simulates an earlier operating system? 
C:\WINDOWS
Which directory contains Windows XP OS system files?
multitasking
What is the term for the ability of an operating system to run multiple applications at the same time? 
1- Windows XP Home
2- Windows XP Professional
Which two operating systems can function correctly on a system with 64 MB of RAM? (Choose two.)
128 GB or more
How much RAM can be addressed by a 64-bit operating system?
HKEY_LOCAL_MACHINE
Which registry file contains information about the hardware and software in the computer system?
1- Changes to disk partitions can be made
2- A clean copy of Windows Vista is installed.
                     3- The location of the Windows installation can be selected
When a computer boots from the Windows Vista disc, which three functions are performed if the Custom (advanced) option is selected? (Choose three.)
 
Chapter 6 Exam - IT Essentials: PC Hardware and Software (Version 4.1)
Answer
Question
1- Ethernet
2- modem
Which two laptop ports are used primarily for communication and network connectivity? (Choose two.)
Desktop motherboards typically have a standard form factor and are interchangeable while laptop motherboards are proprietary.
What is the major difference between desktop and laptop motherboards? 
1- mobility
2- size
Which two characteristics make laptops a better choice than desktop computers? (Choose two.)
PC ExpressCard
Which type of interface do current laptops use to achieve similar expansion capabilities as desktops?
third
Which generation of cell-phone standards was the first to deal with how to send and receive text, photographs, and video?
Select Power Options from within the Control Panel.
Where can a technician change the power schemes on a laptop running Windows XP?
Use a cleaning disc for optical drives.
What is the proper way to clean optical drives? 
1- Use a lint-free cotton cloth.
2- Wipe the disc from the center outward.
Which two actions should be performed to clean the surface of CDs and DVDs? (Choose two.)
LCD
Which display technology is most commonly found in modern laptop computers?
1- camera
2- printer
3- scanner
Which three components commonly connect to USB or FireWire ports? (Choose three.)
1- disk drive
2- monitor
Which two devices can be individually configured within Windows XP to power off after the laptop has been idle for a given period of time? (Choose two.)
1- 34mm wide
2- 54mm wide
Refer to the exhibit. Which two form factors are supported by the devices shown in the graphic? (Choose two.)
F8
Refer to the exhibit. A laptop has these graphics on specific keys on the keyboard. Which key would be used in conjunction with the Fn key to connect a laptop to an external monitor?
RAM
A technician is replacing a laptop SODIMM. With what component is the technician working?
Attach the AC adapter.
A technician has been called in to troubleshoot a laptop that fails to power on. The technician repeatedly pushes the power button without any results. What should the technician do next?
Reset the laptop to the native resolution.
A technician is responding to a helpdesk ticket for a laptop that has a distorted image of the Windows desktop. What is one possible solution?
Battery
Which component should be removed before cleaning a laptop?
1- What software has been installed?
2- How would you describe the problem you are experiencing?
Which two questions that a technician can ask during the troubleshooting process are considered open-ended? (Choose two.)
USB
Refer to the exhibit. Which laptop component port is circled?
Bluetooth
Refer to the exhibit. Which type of connection is indicated when a laptop LED is illuminated with the symbol that is shown? 
 
Chapter 7 Exam - IT Essentials: PC Hardware and Software (Version 4.1)
Answer  
Question  
electrophotographic
Which technology is used by laser printers?
drum
Which laser printer component is a metal cylinder that is coated with a light-sensitive insulating material? 
firmware
Which software, embedded in a printer, controls how the printer operates and can be upgraded?
Optical Character Recognition
Which software converts scanned pages into text?
website for scanner manufacturer
What is the best source for a Windows-compatible scanner driver? 
print example.txt
Which Windows XP command sends a file named example.txt to the default printer? 
inkjet
Which printer technology is used in low-cost, photo-quality printers? 
the use of Ethernet or wireless
What is typical of a network printer installation?
Send the print job again. If that fails to work, turn the printer off and back on, then resend the print job. If the problem still exists, reinstall or upgrade the print driver.
Instead of the document that was expected, a printer is printing unusual characters. What should be the next steps in solving this printer problem?
damage to the UPS
What problem might be encountered if a laser printer is plugged into a UPS?
1- Paper Type
2- Print Quality
Refer to the exhibit. Which two printer configuration settings should be modified when changing from standard paper to photo paper? (Choose two.)
1- USB
2- FireWire
Which two interface types can supply power to a scanner or printer? (Choose two.)
Remove power to the printer.
What is the recommended first step in performing printer maintenance? 
removing impurities collected on internal components
Which routine maintenance procedure can extend the life of a printer?
1- rebooting the computer
2- restarting the print spooler
Which two methods can restart a stopped print service? (Choose two.) 
Identify the symptoms.
What is the first step in troubleshooting a printing problem?
moving parts
What is a feature that causes printers to require higher levels of maintenance than other electrical devices require?
1- internal leaks
2- reduced life of the printer
What are two possible negative results from refilling ink cartridges on a printer? (Choose two.) 
1- wiping the glass with cloth
2- removing the glass during cleaning
What are two recommended procedures for proper scanner care and maintenance? (Choose two.)
drum
A museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-quality reproduction? 





Chapter 8 Exam - IT Essentials: PC Hardware and Software (Version 4.1)


Answer 
Question   
WAN
The Internet is an example of which type of network?
TCP/IP
Which suite of protocols is used to transmit data across the Internet?
subnet mask
Which dotted decimal number is used to distinguish the network portion of an IP address from the host portion?
ADSL
What is the most commonly used DSL technology?
1- The company network requires secure access to confidential information.
2- The users need a central database to store inventory and sales information.
3- The data gathered by the employees is critical and should be backed up on a regular basis
Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
1- The number of twists in the wires inside the cable
2- The number of wires inside the cable.
Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
tracert
Which Windows XP command displays the route taken by packets crossing an IP network? 
328 ft (100 m)
What is the maximum range a data signal can travel through a 1000BASE-T network segment?
1- supported by IEEE 802.3 standards
2- uses a bus logical topology
Which two characteristics describe Ethernet technology? (Choose two.) 
hub
Which device enables computers to be attached to a network without segmenting the network? 
a bad network cable
A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?
the available wireless networks within range
A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?
Attach a cable that has an RJ-45 connector.
Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?
VPN
Workers are required to access the company LAN when traveling. Which networking technology can provide secure and encrypted access to the LAN? 
1- Fewer peripherals are needed
2- Centralized administration capabilities are enhanced.
Which two statements are true of network computing in contrast to non-network computing? (Choose two.)
It developed standards to replace proprietary standards after U.S. telephone industry deregulation.
What is true about the TIA/EIA?
1- faulty NIC
2- faulty patch cord
A technician installs a new NIC in a PC and connects an Ethernet patch cord from the NIC to a wall jack. The technician then notes that the link lights are not active on the NIC. Which two problems could be indicated by this lack of activity? (Choose two.) 
to save troubleshooting time
Why should network cables always be labeled? 
Purchase equipment only through manufacturer-authorized partners.
Which method is recommended in order to avoid problems with counterfeit network equipment? 
DNS
Which networking protocol translates a network name such as www.cisco.com to a unique IP address?





Chapter 9 Exam - IT Essentials: PC Hardware and Software (Version 4.1)



Answer
Question
1- spyware
2- grayware
What are two examples of malware? (Choose two.) 
1- Enable WEP.
2- Enable MAC filtering
Which two actions improve security on a wireless network? (Choose two.)
Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.
Which best practice should be included in a password protection policy? 
1- What items need to be protected?
2- What is to be done in the case of a security breach?
3- What are the possible threats to the items?
Which three questions should be addressed by organizations developing a security policy? (Choose three.) 
Download the latest signature files on a regular basis
What must be done to ensure that the antivirus software on a computer is able to detect and eradicate the most recent viruses? 
Create a restore point
A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates? 
The update will be installed as soon as the computer is powered on
A computer that is configured for automatic updates is shut down during a scheduled update. However, the update is downloaded successfully without any file being corrupted in the process. What will happen to the update as a result of this shutdown? 
guiding visitors within the premises and escorting them personally when they leave
Which precaution helps protect against social engineering in the workplace?
spam
A large number of e-mail messages are appearing in the inbox of a home computer user. The messages relate to products for which the user has never requested information. Which name is given to this type of e-mail? 
replay
A company network was subjected to several security attacks after TCP/IP had been installed on the company computers. Analysis has shown that in most of the attacks, attackers used network sniffers to extract user names and passwords of critical accounts on the network. Which type of TCP/IP attack did these attackers deploy? 
by installing unwanted programs on a computer
How can web tools, such as Java or ActiveX, be used for a malicious attack?
a biometric sensor
Which security device stores user physical characteristics to provide a user level of facility access?
poor wireless device security
What condition can allow unauthorized access to a network for users who are not physically connected to the network?
because everyone can be affected by computer and network security problems
Why should everyone in an organization give high priority to computer and network security?
1- keep equipment functioning
2- provide access only to authorized users
What are two important outcomes of good computer and network security? (Choose two.)
a programming code pattern
What is a signature as the term is used in antivirus and antispyware software development? 
2.5.4.3.6.1
Refer to the exhibit. What is the correct order for the steps in the troubleshooting process?
1- What problems are you experiencing?
2- What websites have you visited recently?
Which two questions are examples of open-ended questions that could be used in the security troubleshooting process? (Choose two.)
Establish a plan of action for resolution.
For troubleshooting security problems, what should be done immediately after the exact cause of the problem is determined?
Identify the problem
At which step of the troubleshooting process will a computer technician ask the customer a series of open-ended and closed-ended questions?
Chapter 10 Exam - IT Essentials: PC Hardware and Software (Version 4.1)
Answer
Question
Listen to the complaint, apologize for the incident, and then offer to help the customer.
A customer calls to complain that another technician was rude to them. In the past, the technician has received many complaints about rudeness regarding this coworker. How should the technician handle this complaint?
1- Check grammar and spelling before sending e-mail
2- Use mixed case in e-mail instead of all upper case or all lower case
Which two actions are examples of good netiquette? (Choose two.) 
Step away from the computer and ask the user to close the document
While servicing a computer, a technician notices that a document labeled "confidential" is open on the computer. What should the technician do? 
resolving computer problems that require opening up the computer
Which task would be the responsibility of a level-two technician?
1- Use simple step-by-step instructions.
2- Speak in plain terms.
Which two techniques should be used when dealing with an inexperienced customer? (Choose two.)
1- Go for a quick walk.
2- Listen to soothing sounds.
3- Practice relaxed breathing.
Which three relaxing techniques can help relieve the stress caused from helping customers in a call center? (Choose three.) 
Ask and wait for permission before placing customers on hold
What is the recommended way to place customers on hold?
A customer wants two new computers added to the existing SLA without additional cost.
Which issue is an example of an exception to an SLA that should be escalated to a manager?
Wait until the customer has finished speaking, and then explain the possible solution
While a technician is listening to a lengthy explanation of a problem, the technician identifies the solution to the problem. How should the technician proceed? 
1- your name
2- ticket number
3- customer name
Which three pieces of information should be given to the next technician when transferring a customer? (Choose three.)
speaking directly with the customer
For a computer technician, what is the first step in resolving a customer problem?
Reducing stress helps customers provide more useful information
Which statement is true about the role of stress when troubleshooting customer computer problems? 
It helps technicians learn important details from the customer.
Why is good communication a critical part of successfully troubleshooting customer problems?
1- sending chain letters
2- sending anonymous e-mails
What are two examples of technician interactions with a customer that are considered to be either unethical or illegal? (Choose two.) 
SLA
Where would legal details be found that describe proper handling of information for a specific customer?
to gather pertinent customer information
What is the primary responsibility of a level-one helpdesk technician?
1- The computer case must be opened.
2- The problem cannot be resolved in less than ten minutes.
What are two examples of situations where a helpdesk call should be escalated to a level-two technician? (Choose two.)
1- customer e-mails
2- hard copies of files on the customer desk
A technician works on a customer computer at the customer site after answering a support call. Which two items should the technician regard as being the property of the customer? (Choose two.) 
remote diagnostics utility
Which common feature of helpdesk software allows a technician to control a customer computer from a call center desk? 
Follow up with the customer to verify that the problem has been resolved.
A computer technician wants to make sure that a customer, who had been experiencing a problem with a hard drive, is satisfied that the problem has been resolved. Which of these rules would help accomplish this desire?


0 komentar:

Posting Komentar