Sie sind auf Seite 1von 6

SABTU, 28 AGUSTUS 2010

Chapter 15 Exam - IT Essentials: PC Hardware and Software


(Version 4.1)
ADDED JAN 6, 2010, UNDER: CISCO , IT ESSENTIAL , SANG ADMIN BERKATA

1
Which two hazards exist when working with fiber optic cabling? (Choose two.)
#chemicals
#glass splinters

2
Which safety precaution should be used when working with any type of cable?
#Wear safety glasses when working any type of cable.

3
ABC Computer Company is in the process of planning a network for a new client. A network
technician has been asked to perform a physical inspection of the facilities to determine the flow of
data and protocols required by the client. What is this inspection called?
#site survey

4
Which protocol provides secure transport of data from the company web server to remote users?
#HTTPS

5
When planning the network in a new building, the technician notes that the company requires
cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price.
Which cable type will the technician pick if he chooses the most common type of cabling used on
networks?
#Cat5e

6
The network technician is researching the best way to connect the branch offices to the main office.
What are three main considerations that the technician should remember when choosing an
Internet connection? (Choose three.)
#availability
#reliability
#speed

7
Students on the college network need to be able to view folder names and data in files stored on
the Windows-based file server, but should never be allowed to add or save information on the
server. Occasionally, the students also need to run media programs to watch videos stored on the
server. Which permission should the network technician assign to the students accessing the file
server?
#read

8
While using nslookup, a student sees the following message: "Can’t find server name for address
127.0.0.0: timed out." What is one possible problem?
#The computer does not have at least one entry for a DNS server configured.

9
The network administrator has physically installed wireless NICs in three new computers. Which
two additional steps will complete the installation process? (Choose two.)
#Configure the device drivers.
#Configure the NICs with addressing information.

10
After booting a computer running Windows 2000, the following message displays: "The IP address
already exists on another computer". Which two steps will quickly obtain a new IP address from the
DHCP server? (Choose two.)
#run ipconfig /release
#run ipconfig /renew

11
Which two ipconfig parameters are used within Windows XP to remove and assign the IP address
previously provided by a DHCP server? (Choose two.)
#release
#renew

12
Which three ports are used by SMTP, POP, and IMAP? (Choose three.)
#25
#110
#143

13
What is the purpose of an analog telephone adapter in the application of VoIP services?
#to connect a standard analog telephone to the IP network

14
Refer to the exhibit. The tracert command was used on the local computer to verify connectivity
with a remote site. Which type of address is shown in the highlighted line of the tracert command
output displayed in the exhibit?
#default gateway for the local computer

15
What are two ways to assign an IP address to a wireless NIC? (Choose two.)
#Assign a static address.
#Use DHCP.
16
In Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select
to set the browser to prompt before downloading potentially unsafe content?
#Security

17
What would be a disadvantage of configuring a wireless router or access point to operate only in
accordance with the 802.11n protocol standard?
#Older, legacy wireless devices may be unable to connect to the wireless network.

18
Which two methods can be used to connect IP phones to a network? (Choose two.)
#Connect the IP phone to the Ethernet LAN using an RJ-45 connector.
#Establish an Internet connection then use an Analog Telephone Adapter.

19
A company adds a few refurbished computers to a network. The company finds, however, that the
refurbished computers perform significantly worse than the original networked computers
performed with applications that require the transfer of data over the network. What should the
company technicians do?
#Check if the network interface cards in the computers are limited to 10 Mb/s.

20
A textbook author needs to upload a chapter from a home computer to the FTP server of the
publisher. The author uses the correct username and password, but the transfer fails. What is the
most likely cause of the problem?
#The chapter document must be compressed before transmitting to an FTP server.

21
The network technician has been asked to share a new printer on the network using the Add Printer
wizard for Windows XP. Which path should the technician use to run the Add Printer wizard?
#Start > Control Panel > Printers and Faxes > File > Add Printer

22
While troubleshooting a computer, the technician releases and renews the IP address. A message
appears: "No operation can be performed on the adapter while its media is disconnected." What is
a probable cause of the message?
#The network cable is unplugged.

23
A new employee needs to transfer files to the corporate FTP server. However, the employee is
unable to log in to the FTP server. What is the most likely cause of the problem?
#The employee is using an incorrect username or password.

24
A technician is configuring a network device for remote access. Which protocol is commonly used
as a secure alternative to Telnet?
#SSH

25
A computer user cannot access a bank using HTTPS. What is one recommended solution?
#Enable SSL through the web browser application.

26
Which action should a user take to ensure that personal information that is entered into a website
form is not retained on the computer?
#Delete the temporary Internet files.

27
A technician is troubleshooting a network and finds hosts with duplicate static IP addresses. Which
protocol could be used to resolve this issue?
#DHCP

28
A technician is working on a host computer that fails to obtain an IP address. Which three actions
could the technician perform to determine the cause of the problem? (Choose three.)
#Check the DNS server to ensure that it is operating correctly.
#Check that the DCHP server is operational.
#Check the PC firewall settings to make sure that DHCP is allowed.

29
A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the
e-mail from this same person contains an attachment. What is one solution?
#Ask the IT department to permit port 25 through the firewall.

30
What are two possible causes of e-mail attachments not being received with e-mail messages?
(Choose two.)
#The firewall could be blocking port 21, with the result that attachments cannot get through.
#The e-mail server could not be receiving e-mail messages that are using POP.
By CATATAN ANAK RONGGOLAWE with 6 comments





POSTING LEBIH BARU POSTING LAMA BERANDA

6 KOMENTAR:

NEWBIE THE NEXT GENERATION OF TUBAN says:


13 Oktober 2010 21:28 Reply

thank dpt 95

NEWBIE THE NEXT GENERATION OF TUBAN says:


17 November 2010 01:01 Reply

thank a million bux..... u r a life saver..

NEWBIE THE NEXT GENERATION OF TUBAN says:


13 Desember 2010 06:51 Reply

I got 87.3% they are not all correct

NEWBIE THE NEXT GENERATION OF TUBAN says:


14 Desember 2010 14:14 Reply

Number 30 is blatantly wrong.


The answer is "The Email attachments could be too large" and "The e-mail server could not be
receiving e-mail messages that are using POP"

NEWBIE THE NEXT GENERATION OF TUBAN says:


14 Desember 2010 14:17 Reply

Number 20 is wrong too.

Port 21 is the FTP port, and there is no need to compress files when uploading. the answer is:
"Port 21 should be enabled on the home firewall."

Олег says:
23 Januari 2011 16:07 Reply

#18
Use a wireless network connection.
Connect the IP phone to the Ethernet LAN using an RJ-45 connector.

#28
Check that the DCHP server is operational.
Check that the network cable is connected.
Check the PC firewall settings to make sure that DHCP is allowed.

#29
Request that the person sending the e-mail attach only one picture per e-mail message.

#30
The e-mail attachments could be too large.
The attachments could contain a virus.

POSKAN KOMENTAR
ADVERTISEMENT

Das könnte Ihnen auch gefallen