+ All Categories
Home > Documents > IT Essentials lUKMA

IT Essentials lUKMA

Date post: 16-Oct-2014
Category:
Upload: lukman-smksa
View: 40 times
Download: 0 times
Share this document with a friend
26
http://yongki-saputra.blogspot.com/2011/10/kunci-jawaban-ujian-cisco-chapter-1-11.html KAMIS, 27 OKTOBER 2011 kunci jawaban ujian CISCO chapter 1-11 Chapter 1 Exam -: PC Hardware and Software (Version 4.1) ه اب لاج ا ال ؤ س ل ا63 How many FireWire devices can be supported by a single FireWire port ? Headphones 3- monitor 2- 1- printer Which three devices are considered output devices? (Choose three.) EEPROM Which type of ROM can be reprogrammed with software while it is still physically installed in the computer ? It can supply power from the computer to devices Which important feature is offered by the USB standard ? 1394 Which IEEE standard defines the FireWire technology 1 - biometric authentication device 2 - digital camera Which two devices are considered input devices? (Choose two.) BTX وATX Which two form factors are commonly used to build a new computer? (Choose two.) 4 - pin ، 6-pin What are the two connector types for the 1394a interface? (Choose two.) IRQ 1 - Which three system resources are commonly used for communication between the CPU or memory and other components in the computer? (Choose three.)
Transcript
Page 1: IT Essentials lUKMA

http://yongki-saputra.blogspot.com/2011/10/kunci-jawaban-ujian-cisco-chapter-1-11.html

KAMIS, 27 OKTOBER 2011

kunci jawaban ujian CISCO chapter 1-11Chapter 1 Exam -: PC Hardware and Software (Version 4.1)

السؤالاالجابه63How many FireWire devices can be supported by a single FireWire port?Headphones 3- monitor 2- 1- printer

Which three devices are considered output devices? (Choose three.)

EEPROMWhich type of ROM can be reprogrammed with software while it is still physically installed in the computer?

It can supply power from the computer to devices

Which important feature is offered by the USB standard?

1394 Which IEEE standard defines the FireWire technology1 -biometric authentication

device2 -digital camera

Which two devices are considered input devices? (Choose two.)

BTX و  ATXWhich two form factors are commonly used to build a new computer? (Choose two.)

4-pin ،  6-pinWhat are the two connector types for the 1394a interface? (Choose two.)IRQ 1-

2 -DMA3 -I/O address

Which three system resources are commonly used for communication between the CPU or memory and other components in the computer? (Choose three.)

RAIDWhich technology would be best to use for drive redundancy and data protection?LCDA technician receives a complaint of poor image quality after the user changes the

native resolution. While investigating the complaint, the technician discovers there is a mismatch between native mode and the native resolution of the peripheral.

Which item is configured incorrectly?1280 x 800Refer to the exhibit. Based on the advertisement that is shown, what is the native

resolution of this computer system?DDR-400Which memory module has a front side bus speed of 200 MHz?IRQsWhich type of computer resources are direct lines to the processor and are

used by computer components to request attention from the CPU?PC hardware and software technician

A student has passed the CompTIA A+ certification exam. Based on this passing score, for which job is the student now qualified?

Page 2: IT Essentials lUKMA

It instructs the computer how to process information

What is a function of the operating system in a computer?

to move the heat away from the CPU

What is the function of a fan on top of a heat sink?

1 -the number of external or internal drive locations

2 -the size of the motherboard and the power supply

What are two factors that must be considered when choosing a computer case? (Choose two.)

I = P/V = 100W/9V = 11.11AA technician creates a simple circuit that has a 9 V light bulb attached to a 9 V battery. The power output of the light bulb is 100 W. Which equation should be used to calculate how much current in amps is required to achieve the full 100 W

output from the 9 V bulb?

provides capability to share a keyboard, a mouse, USB devices, and speakers with multiple computers

What is a function of a KVM switch?

   

Chapter 2 Exam - IT Essentials: PC Hardware and Software (Version 4.1) 

السؤالاالجابه 1- compressed air

2- soft clothWhich two tools are recommended for cleaning a PC? (Choose two.) 

DefragWhich tool should be used if a user needs to optimize space on a hard drive? 1- Antivirus software2- SpywareRemover

Which two types of tools can help protect a computer from malicious attacks? (Choose two.) 

Disk ManagementWhich tool in Windows XP gives a technician access to initialize disks and create partitions?Phillips-head screwdriverRefer to the exhibit. Which type of tool is presented in the graphic?touching an unpainted part of the computer case

How does a technician discharge static buildup?

System File CheckerWhich Windows XP command-line utility scans the critical files of the operating system and replaces any files that have been corrupted?

1- SpywareRemover2- Defrag

3- Disk Cleanup

The performance of a computeris reduced after it has been using the Internet. Which three toolscould be run to try to improve the performance of the computer? (Choose three.)

digital multimeterRefer to the exhibit. Which type of tool is shown in the graphic?spikeWhich condition refers to a sudden and dramatic increase in voltage, which is usually causedby

lightning?

Page 3: IT Essentials lUKMA

Turn off and remove the power source.

Which step should be performedfirst when servicing computer equipment?

1- antistatic wrist strap2- antistatic mat

Which two tools can help protect against ESD? (Choose two.)

1- wireless phones2- microwaves

Which two devices commonly affect wireless LANs? (Choose two.)

1- electrical storms2- power lines

What are two significant sources of EMI? (Choose two.) 

to equalize the electrical charge between a person and the equipment

Why should an antistatic wrist strap be worn when working on electronic equipment? 

It provides reference material for similar problems when such problems are encountered in the future

Why is documentation of allservices and repairs an important organizational tool for a technician?

1- batteries2- monitors

3- printer toner cartridges

Which three computer components contain hazardous materials and require special handling for disposal? (Choose three.) 

Avoid using magnetized tools.Which precaution should be taken when working around electronic devices?compressed airA technician has a room ofcomputers which are running very hot. The technician discovers that

the heat sinks in the computers are very dusty. What should the technician use to clean the heat sinks? 

CRT monitorWhich computer components must a technician never try to work on when wearing an antistatic wrist strap?

    

Chapter 3 Exam - IT Essentials: PC Hardware and Software (Version 4.1) 

السؤالاالجابه 20-pin connector         A technician is installing a new power supply in a computer. Which type of power

connector should be used to connect to an ATX motherboard?Pin 1 on the CPU is aligned with Pin 1 on the ZIF socket.

When installing a CPU in a ZIF socket, how should the technician align the pins to avoid damage?

1- hard drive2- floppy drive

When building a computer, which two components are normally installed in 3.5-inch drive bays? (Choose two.)

1- PS/22- USB

Which two connectors are used to connect external peripherals? (Choose two.)

1- PCIeA field technician has been asked to install a wireless 802.11g NIC in a computer, but is

Page 4: IT Essentials lUKMA

2- PCIunsure about the expansion slots available. Which two types of wireless NICs should the technician have available? (Choose two.)

during the POSTAfter a technician has assembled a new computer, it is necessary to configure the BIOS. At which point must a key be pressed to start the BIOS setup program? 

It issues a number of short beeps.

A technician has just finished assembling a new computer. When the computer is powered up for the first time, the POST discovers a problem. How does the POST

indicate the error?Use standoffs to keep the motherboard above the metal base.

Which action is recommended to prevent the motherboard from contacting the metal base of the case? 

The floppy cable has a twist in the cable.

What is a convenient way that a technician can tell whether a ribbon cable is for an IDE hard drive or a floppy drive? 

optical driveWhich type of drive is installed in a 5.25-inch bay?Check the motherboard manual or manufacturer's website.

What is the most reliable way for users to buy the correct RAM to upgrade a computer? 

performs a check on all internal components

What is a function of the BIOS?

Reattach the side panels to the case.

What should be the next installation step after all the internal components of a PC have been installed and connected to 

Step 2Refer to the exhibit. Which should be the last step when connecting external cables to a computer? 

provides an interface between a computer and a display monitor

What is a function of a video adapter card?

to provide functionality for external components to be connected to the computer

What is a function of the adapter cards that are installed in a computer?

1- a floppy data cable to connect the FDD to the motherboard

2- a cable from the power supply to the Berg power connector on the FDD

Which two connections should be providedto a floppy disk drive during installation? (Choose two.) 

in internal baysWhere should internal drives be installed in a computer? Steps 1, 4, 3Refer to the exhibit. What is the order of steps that should be followed for a power

supply installation in a computer? Consult the website of the manufacturer

What is the first step that a technician should take before physically opening a computer case?

  

Page 5: IT Essentials lUKMA

  

Chapter 5 Exam - IT Essentials: PC Hardware and Software (Version 4.1)  

السؤالاالجابهthe Windows XP Hardware Compatibility List

Once minimum hardware requirements are satisfied, where should a technician look to determine if the computer hardware has been tested with Windows XP?

Run the Microsoft Convert utility.

A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS. Which course of action should be taken to upgrade the file system to NTFS? 

APIWhich set of guidelines is used to ensure that programmers develop applications that are compatible with an operating system? 

Use the Device Manager utility to ensure that all the devices are operational.

A technician has finished installing Windows XP. What should the technician do to verify that all hardware has been installed correctly?

ChkdskA technician thinks that the file system on a computer has a problem because Windows XP is reporting data integrity issues. Which Windows XP utility will check the file system

for errors?Recovery ConsoleA technician has a computer that is unable to boot Windows XP properly. The technician

has decided that it is necessary to attempt a repair of XP. Which utility will be run if the technician selects Repair XP from the XP boot disk? 

Windows User State Migration Tool

A user decides to install a new version of Windows Vista but needs to retain the configurations and customizations of the current Windows XP operating system. Which

software can be used to achieve this?virtual real modeWhich operating mode is used by Windows XP to run a DOS application?

1- It organizes operating system snap-ins.

2- It can be used to create customized MMCs.

3- It requires administrative privileges to access.

What are three features of the Microsoft Management Console (MMC)? (Choose three.)

Safe Mode with Networking Support

A technician has installed new video drivers on a Windows XP computer and now the monitor shows distorted images. What startup mode can the technician use to access a

new driver on the network?Develop a preventive maintenance plan.

A company with 40 computers needs to reduce repair costs, decrease downtime, and improve reliability. Which task will 

Roll back the driver.When troubleshooting a printer problem, a technician finds that the operating system was automatically updated with a corrupt device driver. Which solution would resolve this

issue?

Page 6: IT Essentials lUKMA

The operating system will fail to start.

What would be the result of having a corrupt Master Boot Record?

compatibility modeWhich mode allows applications that are not compatible with the current operating system to run in an environment that simulates an earlier operating system? 

C:\WINDOWSWhich directory contains Windows XP OS system files?multitaskingWhat is the term for the ability of an operating system to run multiple applications at the

same time? 1- Windows XP Home

2- Windows XP ProfessionalWhich two operating systems can function correctly on a system with 64 MB of RAM? (Choose two.)

128 GB or moreHow much RAM can be addressed by a 64-bit operating system?HKEY_LOCAL_MACHINEWhich registry file contains information about the hardware and software in the computer

system?1- Changes to disk partitions

can be made2- A clean copy of Windows

Vista is installed.                     3- The location of

the Windows installation can be selected

When a computer boots from the Windows Vista disc, which three functions are performed if the Custom (advanced) option is selected? (Choose three.)

    

Chapter 6 Exam - IT Essentials: PC Hardware and Software (Version 4.1)  

السؤالاالجابه1- Ethernet

2- modemWhich two laptop ports are used primarily for communication and network connectivity? (Choose two.)

Desktop motherboards typically have a standard form factor and are interchangeable while laptop motherboards are proprietary.

What is the major difference between desktop and laptop motherboards? 

1- mobility2- size

Which two characteristics make laptops a better choice than desktop computers? (Choose two.)

PC ExpressCardWhich type of interface do current laptops use to achieve similar expansion capabilities as desktops?

thirdWhich generation of cell-phone standards was the first to deal with how to send and receive text, photographs, and video?

Page 7: IT Essentials lUKMA

Select Power Options from within the Control Panel.

Where can a technician change the power schemes on a laptop running Windows XP?

Use a cleaning disc for optical drives.

What is the proper way to clean optical drives? 

1- Use a lint-free cotton cloth.2- Wipe the disc from the

center outward.

Which two actions should be performed to clean the surface of CDs and DVDs? (Choose two.)

LCDWhich display technology is most commonly found in modern laptop computers?1- camera

2- printer3- scanner

Which three components commonly connect to USB or FireWire ports? (Choose three.)

1- disk drive2- monitor

Which two devices can be individually configured within Windows XP to power off after the laptop has been idle for a givenperiod of time? (Choose two.)

1- 34mm wide2- 54mm wide

Refer to the exhibit. Which two form factors are supported by the devices shown in the graphic? (Choose two.)

F8Refer to the exhibit. A laptop has these graphics on specific keys on the keyboard. Which key would be used in conjunction with the Fn key to connect a laptop to an

external monitor?RAMA technician is replacing a laptop SODIMM. With what component is the technician

working?Attach the AC adapter.A technician has been called in to troubleshoot a laptop that fails to power on. The

technician repeatedly pushes the power button without any results. What should the technician do next?

Reset the laptop to the native resolution.

A technician is responding to a helpdesk ticket for a laptop that has a distorted image of the Windows desktop. What is one possible solution?

BatteryWhich component should be removed before cleaning a laptop?1- What software has been

installed?2- How would you describe the

problem you are experiencing?

Which two questions that a technician can ask during the troubleshooting process are considered open-ended? (Choose two.)

USBRefer to the exhibit. Which laptop component port is circled?BluetoothRefer to the exhibit. Which type of connection is indicated when a laptop LED is

illuminated with the symbol that is shown?  

   

Page 8: IT Essentials lUKMA

 Chapter 7 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

 

  السؤال االجابه  electrophotographicWhich technology is used by laser printers?drumWhich laser printer component is a metal cylinder that is coated with a light-sensitive

insulating material? firmwareWhich software, embedded in a printer, controls how the printer operates and can be

upgraded?Optical Character RecognitionWhich software converts scanned pages into text?website for scanner manufacturer

What is the best source for a Windows-compatible scanner driver? 

print example.txtWhich Windows XP command sends a file named example.txt to the default printer? inkjetWhich printer technology is used in low-cost, photo-quality printers? the use of Ethernet or wirelessWhat is typical of a network printer installation?Send the print job again. If that fails to work, turn the printer off and back on, then resend the print job. If the problem still exists, reinstall or upgrade the print driver.

Instead of the document that was expected, a printer is printing unusual characters. What should be the next steps in solving this printer problem?

damage to the UPSWhat problem might be encounteredif a laser printer is plugged into a UPS?1- Paper Type2- Print Quality

Refer to the exhibit. Which two printer configuration settings should be modified when changing from standard paper to photo paper? (Choose two.)

1- USB2- FireWire

Which two interface types can supply power to a scanner or printer? (Choose two.)

Remove power to the printer.What is the recommended first step in performing printer maintenance? removing impurities collected on internal components

Which routine maintenance procedure can extend the life of a printer?

1- rebooting the computer2- restarting the print spooler

Which two methods can restart a stopped print service? (Choose two.) 

Identify the symptoms.What is the first step in troubleshooting a printing problem?moving partsWhat is a feature that causes printers to require higher levels of maintenance than other

electrical devices require?1- internal leaks

2- reduced life of the printerWhat are two possible negative results from refilling ink cartridges on a printer? (Choose two.) 

Page 9: IT Essentials lUKMA

1- wiping the glass with cloth2- removing the glass during

cleaning

What are two recommended procedures for proper scanner care and maintenance? (Choose two.)

drumA museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-

quality reproduction? 

Chapter 8 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

   السؤال االجابه

WANThe Internet is an example of which type of network?

TCP/IPWhich suite of protocols is used to transmit data across the Internet?

subnet maskWhich dotted decimal numberis used to distinguish the network portion of an IP address from the host portion?

ADSLWhat is the most commonly used DSL technology?

1- The company network requires secure access to confidential information.

2- The users need a central database to store inventory and sales information.

3- The data gathered by the employees is critical and should be backed up on a regular basis

Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)

1- The number of twists in the wires inside the cable

2- The number of wires inside the cable.

Which two factors are usedto determine the different categories of UTP cabling? (Choose two.)

tracertWhich Windows XP command displays the route taken by packets crossing an IP network? 

328 ft (100 m)What is the maximum range a data signal can travel through a 1000BASE-T network segment?

1 -supported by IEEE 802.3 Which two characteristics describe Ethernet technology? (Choose two.) 

Page 10: IT Essentials lUKMA

standards2- uses a bus logical topology

hubWhich device enables computers to be attached to a network without segmenting the network? 

a bad network cableA student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computerhas been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?

the available wireless networks within range

A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?

Attach a cable that has an RJ-45 connector.

Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?

VPNWorkers are required to access the company LAN when traveling. Which networking technology can provide secure and encrypted access to the LAN? 

1- Fewer peripherals are needed

2- Centralized administration capabilities are enhanced.

Which two statements are true of network computing in contrast to non-network computing? (Choose two.)

It developed standards to replace proprietary standards after U.S. telephone industry deregulation.

What is true about the TIA/EIA?

1- faulty NIC2- faulty patch cord

A technician installs a new NIC in a PC and connects an Ethernet patch cord from the NIC to a wall jack. The technician then notes that the link lights are not active on the NIC. Which two problems could be indicated by this lack of activity? (Choose two.) 

to save troubleshooting timeWhy should network cables always be labeled? 

Purchase equipment only through manufacturer-authorized partners.

Which method is recommended in order to avoid problems with counterfeit network equipment? 

DNSWhich networking protocol translates a network name such as www.cisco.com to a unique IP address?

Page 11: IT Essentials lUKMA

Chapter 9 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

السؤالاالجابه1- spyware2- grayware

What are two examples of malware? (Choose two.) 

1- Enable WEP.2- Enable MAC filtering

Which two actions improve security on a wireless network? (Choose two.)

Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.

Which best practice should be included in a password protection policy? 

1- What items need to be protected?

2- What is to be done in the case of a security breach?

3- What are the possible threats to the items?

Which three questions should be addressed by organizations developing a security policy? (Choose three.) 

Download the latest signature files on a regular basis

What must be done to ensure that the antivirus software on a computer is able to detect and eradicate the most recent viruses? 

Create a restore pointA technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates? 

The update will be installed as soon as the computer is powered on

A computer that is configured for automatic updates is shut down during a scheduled update. However, the update is downloadedsuccessfully without any file being corrupted in the

process. What will happen to the update as a result of this shutdown? guiding visitors within the premises and escorting them personally when they leave

Which precaution helps protect against social engineering in the workplace?

spamA large number of e-mail messages are appearing in the inbox of a home computer user. The messages relate to products for which the user has never requested information. Which

name is given to this type of e-mail? replayA company network was subjected to several security attacks after TCP/IP had been

installed on the company computers. Analysis has shown that in most of the attacks, attackers used network sniffers to extract user names and passwords of critical accounts on

the network. Which type of TCP/IP attack did these attackers deploy? by installing unwanted programs on a computer

How can web tools, such as Java or ActiveX, be used for a malicious attack?

a biometric sensorWhich security device stores user physical characteristics to provide a user level of facility

Page 12: IT Essentials lUKMA

access?poor wireless device securityWhat condition can allow unauthorized access to a network for users who are not physically

connected to the network?because everyone can be affected by computer and network security problems

Why should everyone in an organization give high priority to computer and network security?

1- keep equipment functioning2- provide access only to

authorized users

What are two important outcomes of good computer and network security? (Choose two.)

a programming code patternWhat is a signature as the term is used in antivirus and antispywaresoftware development? 

2.5.4.3.6.1Refer to the exhibit. What is the correct order for the steps in the troubleshooting process?

1- What problems are you experiencing?

2- What websites have you visited recently?

Which two questions are examples of open-ended questions that could be used in the security troubleshooting process? (Choose two.)

Establish a plan of action for resolution.

For troubleshooting security problems, what should be doneimmediately after the exact cause of the problem is determined?

Identify the problemAt which step of the troubleshooting process will a computer technician ask the customer a series of open-ended and closed-ended questions?

    

Chapter 10 Exam - IT Essentials: PC Hardware and Software (Version 4.1)  

السؤالاالجابهListen to the complaint, apologize for the incident, and then offer to help the customer.

A customer calls to complain that another technician was rude to them. In the past, the technician has received many complaints about rudeness regarding this coworker. How should

the technician handle this complaint?1- Check grammar and spelling

before sending e-mail2- Use mixed case in e-mail

instead of all upper case or all lower case

Which two actions are examples of good netiquette? (Choose two.) 

Step away from the computer and ask the user to close the document

While servicing a computer, a technician notices that a document labeled "confidential" is open on the computer. What should the technician do? 

resolving computer problems Which task would be the responsibility of a level-two technician?

Page 13: IT Essentials lUKMA

that require opening up the computer

1- Use simplestep-by-stepinstructions.

2- Speak in plain terms.

Which two techniques should be usedwhen dealing with an inexperienced customer? (Choose two.)

1- Go for a quick walk.2- Listen to soothing sounds.3- Practice relaxed breathing.

Which three relaxing techniques can help relieve the stress caused from helping customers in a call center? (Choose three.) 

Ask and wait for permission before placing customers on hold

What is the recommended way to place customers on hold?

A customer wants two new computers added to the existing SLA without additional cost.

Which issue is an example of an exception to an SLA that should be escalated to a manager?

Wait until the customer has finished speaking, and then explain the possible solution

While a technician is listening to a lengthy explanation of a problem, the technician identifies the solution to the problem. How should the technician proceed? 

1- your name2- ticket number

3- customer name

Which three pieces of informationshould be given to the next technician when transferring a customer? (Choose three.)

speaking directly with the customer

For a computer technician, what is the first step in resolving a customer problem?

Reducing stress helps customers provide more useful information

Which statement is true about the role of stress when troubleshooting customer computer problems? 

It helps technicians learn important details from the customer.

Why is good communication a critical part of successfully troubleshooting customer problems?

1- sending chain letters2- sending anonymous e-mails

What are two examples of technician interactions with a customer that are considered to be either unethical or illegal? (Choose two.) 

SLAWhere would legal details be found that describe proper handling of information for a specific customer?

to gather pertinent customer information

What is the primary responsibility of a level-one helpdesk technician?

1- The computer case must be opened.

2- The problem cannot be resolved in less than ten

What are two examples of situations where a helpdesk call should be escalated to a level-two technician? (Choose two.)

Page 14: IT Essentials lUKMA

minutes.1- customer e-mails

2- hard copies of files on the customer desk

A technician works on a customer computer at the customer site after answering a support call. Which two items should the technician regard as being the property of the customer? (Choose two.) 

remote diagnostics utilityWhich common feature of helpdesk software allows a technician to control a customer computer from a call center desk? 

Follow up with the customer to verify that the problem has been resolved.

A computer technician wants to make sure that a customer, who had been experiencing a problem with a hard drive, is satisfied that the problem has been resolved. Which of these rules

would help accomplish this desire?

Diposkan oleh Yongki's Blog di 22:54Kirimkan Ini lewat EmailBlogThis!Berbagi ke TwitterBerbagi ke FacebookLabel: kunci jawaban CISCO chapter 1-11


Recommended