Thursday, June 23, 2011

KONFIGURASI DNS SERVER pada DEBIAN-5

  1. Buka terminal dan masuk sebagai root atau super user dengan cara ketik su pada terminal dan masukkan password super user atau root.
  2. Masukkan DVD Debian 5 kemudian tentukan resource penginstalan dengan perintah : apt-cdrom add.
  3. Install paket bind9 dengan mengetikkan perintah : apt-get install bind9, seperti gambar 1.
  4. Gambar 1
  5. Backup file named.conf pada direktori /etc/bind/ menjadi file named.conf.bak pada direktori yang sama dengan perintah : cp /etc/bind/named.conf /etc/bind/named.conf.bak.
  6. Salin file db.local untuk konfigurasi foward nama domain kita dan db.127 untuk konfigurasi reverse nama domain kita yang berada pada direktori /etc/bind/ dengan perintah :
    cp /etc/bind/db.local /etc/bind/db.anas dan
    cp /etc/bind/db.127 /etc/bind/db.anasreverse
    .Disini penulis menggunakan nama domain anas.com .
  7. Kemudian konfigurasi file db.anas dengan perintah : nano /etc/bind/db.anas Pada kotak dialog ini tambahkan subdomain untuk nama domain anas.com yaitu www, mail dan 8 seperti gambar 2, untuk keluar dari editor nano tekan ctrl+x kemudian tekan y untuk keluar dan simpan perubahan atau n untuk keluar tanpa menyimpan kemudian tekan enter.
    Gambar 2
  8. Kemudian konfigurasi file db.anasreverse dengan perintah : nano /etc/bind/db.anasreverse seperti gambar3.
    Gambar 3
  9.  Konfigurasi file named.conf dengan perintah : nano /etc/bind/named.conf, tambahkan perintah seperti gambar 4.
    Gambar 4
  10. Konfigurasi file resolv.conf pada direktori /etc/ dengan perintah : nano /etc/resolv.conf 
    setting domain sesuai dengan nama domain kita, search sesuai nama domain kita dan nameserver sesuai dengan IP yang kita gunakan sebagai IP server seperti gambar 5.
    Gambar 5
  11. Kemudian restart bind9 agar bisa membaca file yang baru saja kita konfigurasi tadi dengan perintah : /etc/init.d/bind9 restart.
  12. Kemudian kita cek keberhasilan konfigurasi DNS server yang baru kita buat dengan perintah : dig anas.com seperti gambar 6.
    Gambar 6
  13. Kemudian cek konektivitas terhadap DNS yang baru saja kita buat dengan mengetikkan perintah pada terminal : ping anas.com seperti gambar 7.
    Gambar 7
    Cek juga konektivitas terhadap subdomain yang telah kita buat tadi yaitu: www, mail dan 8.
    ping www.anas.com seperti gambar 8.
    Gambar 8
    ping mail.anas.com seperti gambar 9.
    Gambar 9
    ping 8.anas.com seperti gambar 10.
    Gambar 10
    Alhamdulillah, sekarang kita telah sukses mengkonfigurasi DNS Server.

KONFIGURASI WEB SERVER dan VIRTUAL HOST pada DEBIAN 5

Untuk proses penggunaan Web Server penulis menggunakan Apache Web Server. Apache adalah Web Server yang dapat dijalankan di banyak Operating System (UNIX, Linux, Windows) yang berguna untuk melayani dan memfungsikan situs web. Protokol yang digunakan untuk melayani fasilitas ini adalah HTTP.
Langkah - langkah konfigurasi Web Server :
  1. Buka terminal dan masuk sebagai root atau super user dengan cara ketik su pada terminal dan masukkan password super user atau root.
  2. Masukkan DVD Debian 5 kemudian tentukan resource penginstalan dengan perintah : apt-cdrom add.
  3. Install paket apache2 dengan mengetikkan perintah : apt-get install apache2, seperti gambar 1.
    Gambar 1


  4. Kemudian tekan "Y" dan tekan enter untuk meneruskan instalasi Apache2 seperti gambar 2.
    Gambar 2

  5. Apache2 telah berhasil kita install untuk mengujinya kita dapat membuka Web Browser dan ketikkan localhost atau nama domain yang telah kita buat pada address bar browser. Apabila instalasi Apache2 berhasil maka akan terlihat hasilnya seperti gambar 3.
    Gambar 3

  6. Untuk mendukung web page yang berekstensi PHP dan kernel agar dapat membaca maupun compile file yang nantinya akan berekstensi PHP maka kita harus menginstall paket php5. Install php5 dengan perintah : apt-get install php5 libapache2-mod-php5 php5-cli php5-common php5-cgi seperti gambar 4.
    Gambar 4

  7. Setelah selesai proses instalasi php5, restart apache2 dengan perintah : /etc/init.d/apache2 restart.
  8. Buat halaman index pada DocumentRoot yang berada pada direktori /var/www/ dengan perintah : nano /var/www/index.php, kemudian masukkan kode php pada kotak dialog seperti gambar 5.
    Disini penulis ingin menampilkan halaman phpinfo() pada domain anas.com.
    Gambar 5

  9. Cek pada browser apakah nama domain yang kita buat tadi sudah dapat menampilkan halaman phpinfo() yang telah kita buat pada file index.php seperti gambar 6.
    Gambar 6

  10. Untuk membuat VirtualHost yang harus kita lakukan adalah membuat direktori dimana nantinya akan ditempatkan file - file yang dibuat untuk membuat tampilan suatu halaman subdomain yang berbeda dari halaman domain kita.
    Misal kita ingin membuat direktori 8 pada direktori /home/alan/ perintah yang digunakan : mkdir /home/alan/8.
  11. Buat file php di dalam direktori tersebut misal index.php dengan perintah : nano /home/alan/delapan/index.php
  12. Tambahkan konfigurasi VirtualHost pada file default yang berada pada direktori /etc/apache2/sites-available/ dengan perintah : nano /etc/apache2/sites-available/default. Tambahkan kode berikut pada akhir dokumen seperti gambar 7 :

    ServerAdmin admin@anas.com
    ServerName 8.anas.com
    DocumentRoot /home/alan/delapan
    Gambar 7

  13. Kemudian kita restart apache2 dengan perintah : /etc/init.d/apache2 restart.
  14. Setelah itu kita cek pada browser halaman subdomain kita apakah sudah sesuai dengan yang kita konfigurasi pada VirtualHost yang baru kita tambahkan seperti gambar 8.
    Disini penulis menggunakan subdomain 8.anas.com.
    Gambar 8
    Alhamdulillah, sekarang kita telah sukses mengkonfigurasi Web Server dan VirtualHost.

KONFIGURASI IP pada DEBIAN 5


Pertama kali yang harus kita lakukan untuk mengkonfigurasi IP adalah :
Buka terminal dan masuk sebagai root atau super user dengan cara ketik su pada terminal dan masukkan password super user atau root.
Kemudian edit file interfaces yang berada di direktori /etc/network/.
Apabila kita menggunakan editor nano ketikkan pada terminal : nano /etc/network/interfaces, seperti gambar 1.
Gambar 1


Setelah itu akan muncul kotak dialog dan ketikkan konfigurasi IP pada kotak dialog tersebut, tambahkan teks untuk pengalamatan IP pada interface eth0 seperti gambar 2.
Disini penulis menggunakan IP 192.168.1.1 dan Netmask  255.255.255.0
Gambar 2

Untuk keluar dari editor nano tekan ctrl+x kemudian tekan y untuk keluar dan simpan perubahan atau n untuk keluar tanpa menyimpan perubahan kemudian tekan enter.
Setelah itu restart network dengan mengetik : /etc/init.d/networking restart.
Lihat hasilnya dengan perintah ifconfig seperti pada gambar 3.
Gambar 3
Pada gambar diatas interface eth0 dengan alamat IP 192.168.1.1 dan Netmask 255.255.255.0 telah terassign.
Alhamdulillah, sekarang kita telah sukses mengkonfigurasi IP pada Linux Debian 5.

Wednesday, June 22, 2011

CISCO IT Essential v4.1 Final Exam 11-16

1
A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired?
– Stop the print spooler.


2
For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.)
– regional settings
– network settings


3
Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
– 443


4
A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choose two.)
– The monitor cable connector is loose or disconnected because the retaining screws are missing.
– The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter.


5
Which Windows hard drive partition is referred to as the C: drive?
– the first primary partition


6
A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
– USB 2.0 is one hundred times as fast as USB 1.1.


7
Which feature is characteristic of the ntbackup command?
– It is used create restore points.


8
Which safety precaution should an installer take when installing cable in the ceiling of a building?
– Wear safety glasses in case of encountering toxic materials during the installation.


9
Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?
– biometric devices


10
Which Startup type must be selected for a service that should run each time the computer is booted?
– automatic


11
What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.)
– The computer displays an “Invalid Boot Disk” error after POST.
– The computer displays an “Inaccessible Boot Device” error after POST


12
Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought.


Which type of memory module is the IT department expecting to receive?
– SODIMM


13
Which recommendation should be observed when replacing existing memory?
– The new memory should be as fast or faster than existing memory.


14
Refer to the exhibit. Which utility has the IT department started on each computer?
– Defragment


15
A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem?
– Start the Vista Aero enhanced display features by launching services.msc.


16
The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
– VPN


17
When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
– thermal compound


18
Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)
– 25
– 110
– 143


19
A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?
– Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.


20
Which two hazards are related to fiber optic installations? (Choose two.)
– light that can burn the eyes
– glass splinters that can penetrate the skin


21
A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?
– SCSI (Ultra-320)


22
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?
– mesh


23
What is the highest risk associated with improperly charged or mishandled batteries?
– The battery can explode.


24
Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive?
– 3 logical, 1 extended, 1 free space, 1 primary


25
Which two characteristics describe a software firewall? (Choose two.)
– It typically protects only the computer it is installed on.
– It uses the CPU in the host computer.


26
What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.)
– These cables usually have 9 pins or 25 pins on both ends.
– The two available operative modes are EPP and ECP.


27
Which action should be taken first if a card key is lost or stolen?
– Disable the lost card key.


28
A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem?
– Change the startup type for the utility to Automatic in Services.


29
The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point?
– Disable the broadcast of the SSID on the access point.


30
The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem?
– Defragment the hard disk.


31
A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem? (Choose two.)
– Clean the surface of the touchpad.
– Ensure that the operating system has the correct driver for the touchpad.


32
Refer to the exhibit. Based on the information shown, which statement is true?
– The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87.


33
Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this motherboard?
– The Intel Core i7 processor supports a maximum bus speed of 1600MHz.


34
Which interface can transfer data at a maximum speed of 480 Mbps?
– USB 2.0


35
A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed?
– RAM






1
A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired?
– Stop the print spooler.
2
For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.)
– regional settings
– network settings
3
Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
– 443
4
A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choose two.)
– The monitor cable connector is loose or disconnected because the retaining screws are missing.
– The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter.
5
Which Windows hard drive partition is referred to as the C: drive?
– the first primary partition
6
A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
– USB 2.0 is one hundred times as fast as USB 1.1.
7
Which feature is characteristic of the ntbackup command?
– It is used create restore points.
8
Which safety precaution should an installer take when installing cable in the ceiling of a building?
– Wear safety glasses in case of encountering toxic materials during the installation.
9
Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?
– biometric devices
10
Which Startup type must be selected for a service that should run each time the computer is booted?
– automatic
11
What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.)
– The computer displays an “Invalid Boot Disk” error after POST.
– The computer displays an “Inaccessible Boot Device” error after POST
12
Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought.
Which type of memory module is the IT department expecting to receive?
– SODIMM
13
Which recommendation should be observed when replacing existing memory?
– The new memory should be as fast or faster than existing memory.
14
Refer to the exhibit. Which utility has the IT department started on each computer?
– Defragment
15
A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem?
– Start the Vista Aero enhanced display features by launching services.msc.
16
The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
– VPN
17
When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
– thermal compound
18
Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)
– 25
– 110
– 143
19
A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?
– Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.
20
Which two hazards are related to fiber optic installations? (Choose two.)
– light that can burn the eyes
– glass splinters that can penetrate the skin
21
A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?
– SCSI (Ultra-320)
22
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?
– mesh
23
What is the highest risk associated with improperly charged or mishandled batteries?
– The battery can explode.
24
Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive?
– 3 logical, 1 extended, 1 free space, 1 primary
25
Which two characteristics describe a software firewall? (Choose two.)
– It typically protects only the computer it is installed on.
– It uses the CPU in the host computer.
26
What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.)
– These cables usually have 9 pins or 25 pins on both ends.
– The two available operative modes are EPP and ECP.
27
Which action should be taken first if a card key is lost or stolen?
– Disable the lost card key.
28
A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem?
– Change the startup type for the utility to Automatic in Services.
29
The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point?
– Disable the broadcast of the SSID on the access point.
30
The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem?
– Defragment the hard disk.
31
A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem? (Choose two.)
– Clean the surface of the touchpad.
– Ensure that the operating system has the correct driver for the touchpad.
32
Refer to the exhibit. Based on the information shown, which statement is true?
– The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87.
33
Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this motherboard?
– The Intel Core i7 processor supports a maximum bus speed of 1600MHz.
34
Which interface can transfer data at a maximum speed of 480 Mbps?
– USB 2.0
35
A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed?
– RAM



What is one advantage of a solid state drive?
– less prone to failure than a traditional drive
2
A customer has spilled some liquid into the laptop keyboard. The laptop appears to function properly except for the keys. After cleaning the keyboard, the technician tests the keyboard and it still has failing keys. What are two possible actions the technician could take? (Choose two.)
– Replace the keyboard.
– Use an external keyboard until the laptop keyboard is replaced
3
A user mentions that the Photoshop application has been recently installed on a laptop and that the laptop runs slowly when Photoshop is running. The computer technician checks on the laptop and notices that while the laptop responds normally when it is being used to surf the web, the hard disk light is constantly on when Photoshop is running. What is the most likely cause of the excessive hard disk activity?
– disk fragmentation
4
Which authentication technology uses a physical characteristic of the user in conjunction with a password?
– biometrics
5
A junior technician finds preventive maintenance very boring and would prefer to fix real problems. However, what is the most important reason for the company that the preventive maintenance be done?
– Preventive maintenance helps to protect the computer equipment against future problems.
6
A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.)
– Avoid lifting the equipment using the strength in your back
– Lift the equipment using the strength in your legs and knees
7
Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for the authentication to be accepted?
– smart key
8
The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.)
– Bluetooth
– Infrared
9
Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.)
– Disabling SSID broadcasts.
– Configuring MAC address filtering.
10
What is the issue if the status of a hard disk drive shows as “Unreadable” in the Disk Management utility?
– The drive has input/output errors, has a hardware failure, or is corrupt.
11
A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?
– Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.
12
After checking that a new ink jet printer has new ink cartridges, that dry paper has been installed as recommended by manufacturer, and that the latest printer driver has been installed, a technician notes that the printer still fails to produce any output. Which three actions could possibly resolve this problem? (Choose three.)
– Check and secure the cables.
– Set the printer to Resume Printing.
– Ensure that the printer is powered on.
13
A technician has installed new RAM in a laptop. When restarted the laptop emitted a long beep. What are two possible causes and solutions for this problem? (Choose two.)
– The laptop BIOS should be upgraded when installing the RAM.
– The new RAM is defective and must be replaced.
14
A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites?
– phishing protection
15
A user is experiencing problems with a new removable external drive. What two checks should a technician perform to ensure that a removable external drive will be recognized by a computer? (Choose two.)
– Ensure that the correct drivers are installed.
– Check that the external ports are enabled in the BIOS settings.
16
A temporary user is trying to log in to a computer that the same user used last month, but now is unable to complete the login process. What are two possible causes of the failed login? (Choose two.)
The user does not have the rights to log in.
– The user account has been disabled.
– The user is using an incorrect username or password.
17
A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without adding networking devices?
– 330 ft (100 m)
18
What could be the possible solution to the Windows Vista search feature taking longer than expected to find results?
– Change the settings of the Index service in the Advanced Options panel.
19
What is the purpose of the setupmgr.exe file?
– It helps prepare an answer file to automate the installation of Windows XP.
20
A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?
– Use the F8 key.
21
A laptop less than six months old shuts down after about 30 minutes of operation. When the AC power adapter is connected, the laptop continues to shutdown after a short period of operation each time the laptop is restarted. What should be recommended as a solution?
– The laptop power scheme is set to an unsuitable environment. Have the customer adjust the power scheme through the control panel.
22
Which external connection technology would a technician choose for a customer who wants to connect a device capable of a data transfer rate of 700 Mb/s to a computer?
– IEEE 1394b (Firewire)
23
A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?
– Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.
24
A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC and monitor are turned on, the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC. What possible problem should the technician investigate first?
– The monitor was damaged during cleaning.
25
What is different about the default location for user files in Windows Vista compared to Windows XP?
– The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder.
26
In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all pings in the class fail?
-The Windows firewall is blocking the ping.
27
Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The computer has the internal and external ports listed in the exhibit. Which solution would be the best if optimal performance is the deciding factor?
-Attach a hard drive to an internal SATA port.
28
Why does a technician wear an antistatic wrist strap?
-to prevent damage to electronic components inside the computer
29
A technician uses an application to capture packets on the network. One such capture reveals the password that is used by a person in the classroom to initiate a Telnet session with a school network device. What recommendation could the technician make to the person who is using Telnet?
-If possible, enable the network device to use SSH instead of Telnet.
30
Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office?
-Remote Desktop Protocol
31
A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility?
-It prepares a computer for imaging.
32
A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a newer video adapter?
-Is there an available compatible expansion slot on the motherboard?
33
A customer requires a computer storage system that uses no more than two drives to provide drive redundancy and the highest possible performance. Which type of RAID should the technician install?
-RAID level 0 – data striping
34
Which would be a reason to update the BIOS of a computer?
-A computer being prepared for an upgrade is found to lack support for newer hardware devices
35
Which statement best describes how telephone calls are carried over data networks and the Internet?
-Analog voice signals are converted into digital information that is transported in IP packets
36
Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)
-The unattend.txt file is corrupted
-The network shared folder that holds the OS files is not accessible.
37
A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?
-modify
38
A technician is working on a networked computer that has an IP address of 169.254.25.66 and no Internet access. What could the technician do to remedy the problem?
-Reload TCP/IP on the computer.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | GreenGeeks Review