Saturday, June 4, 2011

Chapter 15 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1
Students on the college network need to be able to view folder names and data in files stored on the Windows-based file server, but should never be allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accessing the file server?

  • read

2
When planning the network in a new building, the technician notes that the company requires cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on networks?

  • Cat5e

3
Which two protocols are used to receive e-mail? (Choose two.)

  • IMAP
  • POP3
   
4
A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log in to the FTP server. What is the most likely cause of the problem?

  • The employee is using an incorrect username or password.

5
A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?

  • Ask the IT department to permit port 25 through the firewall.
   
6
Which statement is true about network maintenance?

  • If a network device is making an unusual sound, the device should be turned off immediately.
    
7
Which three ports are used by SMTP, POP, and IMAP? (Choose three.)

  • 25
  • 110
  • 143
   
8
Which action should a user take to ensure that personal information that is entered into a website form is not retained on the computer?

  • Delete the temporary Internet files.
   
9
A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?

  • Use jumpers on the motherboard to configure the drive as slave.

10
ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?

  • site survey
   
11
What are two ways to assign an IP address to a wireless NIC? (Choose two.)

  • Assign a static address.
  • Use DHCP.
   
12
A technician is working on a workstation that has an IP address of 169.254.25.35. The technician found that the computer cannot connect to the Internet and the network cable to the computer had been disconnected. Which command can a technician use to get a new IP address once the cable is reconnected?

  • ipconfig /renew
   
13
Which protocol provides secure transport of data from the company web server to remote users?

  • HTTPS
   
14
Which two hazards exist when working with fiber optic cabling? (Choose two.)

  • chemicals
  • glass splinters

15
The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.)

  • availability
  • reliability
  • speed

16
A company purchases several wireless NICs at a great price. After installing the NICs, they find that the user cannot connect to the 2.4 GHz wireless network. What is a likely cause of the problem?

  • The NICs are designed for the 802.11a standard.

17
A technician is troubleshooting a networked computer. The technician has gathered as much information as possible from the user and now needs to verify obvious issues. Which two actions should the technician perform? (Choose two.)

  • Verify the computer IP information.
  • Check activity on the routers.
   
18
A user is reporting intermittent loss of connectivity to the network. No other users have reported similar issues. What preventive maintenance task would likely identify the problem?

  • Check for a damaged network cable at the user workstation.
   
19
In Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the browser to prompt before downloading potentially unsafe content?

  • Security
   
20
A technician is concerned that a wireless router is missing current security features. What action could be taken to address this issue?

  • Check for an updated firmware version.

23 komentar:

mowaud said...

Percentage: 85.7%
thanks dude

Anonymous said...

For #5. Not sure the answer choices, but the answer is not correct as far as I know

The Book Says
a. Ask the sender to split the attatchment into smaller parts and resend them in individual emails.
b. Ask the sender to scan the attachment before sending it.

Anonymous said...

6. wrong
True statements include but not limited to:
a.If equipment is failing, damaged, or making unusual sounds. Inform the network administrator to prevent unnecessary network downtime.
b. Check condition of cables, network devices, servers, and computers to make sure they are kept clean and are in good working order.
c. You should develop a plan to perform scheduled maintenance and cleaning at regular intervals. This helps you prevent network Downtime and equipment failures
LIKELY ANSWERS:
a. inspect all cabling for breaks
b. make sure cables are labled correctly and labels are not comming off.
c. replace any worn or unreadable labels.
d. check that cable supports are properly installed and that no attachment points are coming loose.
e. cabling can become damaged and worn. You should keep cabling in good repair to maintain good network performance.
f. Cables at workstations & printers should be checked carefully. Cables are often moved or kicked when they are under desks, and they can be bent. These conditions can result in loss of bandwidth or connectivity.
g. Be proactive in education of network users.
h. demonstrate to network users how to properly connect and disconnect cables, as well as how to move them if necessary.

Anonymous said...

3. IMAP, POP
5.
a. Ask the sender to split the attatchment into smaller parts and resend them in individual emails.
b. Ask the sender to scan the attachment before sending it.

STMP- Port 25

Anonymous said...

5. is "Request that the person sending the e-mail attach only one picture per e-mail message"

Anonymous said...

6 is Educating users on IT policies and procedures is an example of proactivenetwork maintenance

Mizan said...

I got 81%

Anonymous said...

A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?
Correct answer is:
Request that the person sending the e-mail attach only one picture per e-mail message.

Anonymous said...

9. wrong
its set to drive not motherboard
I got 100%

Anonymous said...

Correct answers for:
#5-Check DNS settings on the computer used to receive the e-mail. (obviously!)

Hendra said...

Q9 - is D . I get 100.

ssss said...

dont lie! Q9 D i get 85

Anonymous said...

guys, I need the correct answer ...
because i have to got full mark ...
pleas any one help me ...

Anonymous said...

some corrected answers :

9)A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave.How can the technician accomplish this desired configuration?
#Use jumpers on the drive to configure the drive as slave

....((((we use the jumpers onnn the driiive not the motherboard)))....'am sure about this answer .
_____________________________________________

6) Which statement is true about network maintenance?
#Educating users on IT policies and procedures in an example of proactive network maintenance

....((( i got this answer from another site i hooope it's correct ))).... sorry if it doesn't .

Anonymous said...

For IT's you all have awful grammar.

Anonymous said...

FUCK GOT DAMN I EARNED ONLY 85%,THERE WAS NOT MISTAKE CORRECTED :( :( :( :(

Anonymous said...

mali mga sagot nyo!walang kwenta

Anonymous said...

Yep

Anonymous said...

SON OF A BIIIIIIIIIIIIIIIITCH

Anonymous said...

Got 100%... Thanks for the answers..

But There are mistakes in above answers.

Q5 : Port 25 is already opened! That's why you get emails. Blocking Port25 blocks ALL emails regardless of attachments. The remedy is sending one picture per email (though it is not the perfect answer). This is splitting as the note says "Ask the sender to split the attachment into smaller parts or ask the sender to scan the attachment before sending it".

Q6 : Educating users on IT is the correct one. It is not convenient to just shutdown something immediately !

Q9 : Jumpers in the desired drive should be changed not in the MB! General knowledge :D....

Thanks for other answers..They are correct!

Anonymous said...

ty will check corrected answers in test tomorrow

Anonymous said...

A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?

The answer is NOT

Ask the IT department to permit port 25 through the firewall.

-TCW

Guzzi sager said...

Very informative and worthy post. Thanks for the sharing such a precious updates with us.

Panasonic - 13.1" Toughbook Notebook - 4 GB Memory - 500 GB Hard Drive (CF-31SFLAX1M)

Panasonic - 14" Toughbook Notebook - 4 GB Memory - 500 GB Hard Drive (CF-53SALC8LM)

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | GreenGeeks Review