I.T. CHAPTER 16
1.A network technician has received several reports regarding missing and corrupted
information on a company file server. Which course of action can the technician use to
investigate any unauthorized network access?
A. Audit all user activity by using telnet to access each computer during the day.
B. Enable event logging on each user computer to check for unauthorized network access.
C. Enable event logging on all network devices to audit any suspicious user activity.
D. Audit the event logs on the server to check for unauthorized network access.
2.Which two advantages are attributed to a hardware firewall when compared to a
software firewall? (Choose two.)
A. It costs less because it is more efficient.
B. It does not impact the processing performance of the equipment it protects.
C. It always protects both the computer it is installed on as well as the rest of the network.
D. It is designed to protect more than one computer.
E. It is a free Windows operating system component.
3.A company wants to configure a firewall to monitor all channels of communication and
allow only traffic that is part of a known connection. Which firewall configuration should
be deployed?
A. packet filtering
B. proxy
C. stateful packet inspection
D. stateless packet inspection
4.A technician has been asked to format the drives of several Windows XP computers
with a file system that can use file-level permissions to secure confidential information.
Which file system should be used by the technician?
A. EXT
B. FAT
C. FAT32
D. NTFS
5.A technician needs to configure wireless networking on several new laptop computers.Which encryption method should the technician choose to achieve the best
authentication and payload security?
A. MD5
B. PGP
C. WEP
D. WPA
6.Which simple wireless configuration technique can make the network invisible to
unauthorized users?
A. Change the default password on the WAP.
B. Disable inactive wireless connections.
C. Filter all network access using MAC addresses.
D. Disable SSID broadcasting.
7.Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
A. Computers on a corporate network perform well without automatic updates because they are protected by a firewall.
B. Home users should avoid automatic updates because they are protected by Windows Internet Connection Firewall.
C. Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.
D. Guest user accounts with limited access are unlikely to ever need updates because they are temporary users.
8.As part of the new security policy, a company decides to protect company data by
performing backups on a regular basis. Which backup type takes the greatest amount of
time and is commonly used in conjunction with another backup method?
A. differential
B. full
C. historical
D. incremental
9.Which quick solution should be tried first if a user is unable to login?
A. Verify that the CAPS and NUM lock keys are not on.
B. Reset the password for the user.
C. Assign the user a new username and password.
D. Add the user to a different group on the network.
10.Which three items should be included in a local security policy? (Choose three.)
A. list of approved ISPs
B. steps to take in the event of a security breach
C. contact list in the event of an emergency
D. details defining employment eligibility
E. complete schedule of lunch and break times for all employees
F. process for employees to gain access to equipment and data
11.Which two hashing algorithms are used to ensure that messages are unaltered during transmission? (Choose two.)
A. ARP
B. DLC
C. MD5
D. NTP
E. SHA
F. TCP
12.Which encryption technology provides secure tunnels?
A. asymmetric encryption
B. hash encoding
C. symmetric encryption
D. VPN
13.Which three physical security measures are employed to prevent security breaches and loss of data? (Choose three.)
A. antivirus program
B. software firewall
C. conduit
D. card key
E. strong password
F. security guard
14.Which data security technology takes the form of an object which must be close to a
computer before the user can successfully submit a username and password?
A. biometric device
B. security key fob
C. smart card
D. thumb drive
15.Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges?
A. smart card
B. security key fob
C. storage area network
D. biometric device
16.Which two file-level permissions allow a user to delete a file? (Choose two.)
A. read
B. modify
C. read and execute
D. write
E. full control
F. list contents
17.What is the default setting for Windows XP operating system updates?
A. automatic
B. only download updates
C. notify me
D. manual
18.Which Windows XP command initiates a backup from the command line?
A. archive
B. backup
C. compress
D. ntbackup
E. zip
19.After a technician collects information from the computer, which two sources can
provide the technician with possible solutions for various types of network-related
problems? (Choose two.)
A. paperwork that is provided to customers
B. the manufacturer FAQ for network devices
C. firewall logs
D. network device logs
E. technical websites
20.A customer contacts a call center with problems updating anti-virus software. What two types of question should the technician consider when gathering information from the caller? (Choose two.)
A. closed-ended
B. direct
C. indirect
D. open-ended
E. system-specific
F. vendor-specific
21.Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
A. applications
B. physical addresses
C. packet size
D. ports
E. protocols
22.A technician is asked whether the new procedures for backup use a backup rotation.
Which procedure describes a backup rotation?
A. Reuse backup media and choose its storage location according to organizational guidelines. This ensures efficient and safe use of the backupmedia.
B. Have different members of the network staff perform the backups so that everyone has experience backing up data.
C. Back up the data at different times on different days so that a diverse amount of data is backed up.
D. Select the partitions to be archived at each backup according to a predefined plan to ensure everything is backed up over a given period.
23.The ABC Company network designers are designing the new corporate WiFi network.Which two precautions should be implemented because of security concerns with wireless networks? (Choose two.)
A. Shield the access point with a Faraday cage.
B. Send only essential passwords in clear text.
C. Disable broadcast of the SSID.
D. Configure WPA on access points.
E. Use the 2.4 GHz frequency band.
F. Use the 5.0 GHz frequency band.
Selasa, 19 Juli 2011
I.T. CHAPTER 1
Which two characteristics are determined by the chip set on a motherboard? (Choose
two.)maximum amount of memory that can be installed operating system compatibility
type of connectors that will be on the motherboard
keyboard layout Which two activities are normally controlled by the Northbridge part of the chip set?
(Choose two.)
communication between the CPU and the I/O ports
access to the RAM
communication between the CPU and the hard drive
access to the video card
communication between the CPU and the sound card
1.Which CPU architecture uses a small set of instructions that are designed to be
executed rapidly?
• a.CISC
• b.RAID
• c.RISC
• d.RISK
• e.SCSI
2.Which type of memory is unable to have the contents modified?
• DRAM
• RAM
• ROM
• SRAM
3.Which type of memory is primarily used as cache memory?
• a.DRAM
• b.RAM
• c.ROM
• d.SRAM
4.Which three devices are considered output devices? (Choose three.)
• fingerprint scanner
• headphones
• keyboard
• monitor
• mouse
• Printer
5.Which type of ROM can be reprogrammed with software while it is still physically
installed in the computer?
• EEPROM
• EPROM
• PROM
• ROM
6.Refer to the exhibit. Which type of cable is shown in the graphic?
• FireWire
• Parallel
• Serial
• USB
7.Which important feature is offered by the USB standard?
• A single USB connection to a computer can support up to 255 separate devices.
• It offers rates of around 580 Mb/sec in low-speed mode.
• It allows up to 920 Mb/sec in the 2.0 version.
• It can supply power from the computer to devices.
8.What are the two connector types for the 1394a interface? (Choose two.)
• 2-pin
• 4-pin
• 6-pin
• 8-pin
• 9-pin
• 15-pin
9.Refer to the exhibit. What is the maximum length of the cable presented in the
• graphic, which is commonly used for connecting a computer to a printer?
• 15 ft (4.5 m)
• 20 ft (6 m)
• 27 ft (8 m)
• 30 ft (9 m)
10.Which type of computer resources are direct lines to the processor used by computer
• components to request information from the CPU?
• DMAs
• I/O addresses
• IRQs
• memory addresses
11.Which two devices are considered input devices? (Choose two.)
• biometric authentication device
• printer
• digital camera
• projector
• speakers
12.A technician needs to back up 4 GB of data using a single storage medium. Which
• medium can hold the entire 4 GB on a single disc?
• floppy disc
• CD-RW
• CD-R
• DVD+/-R
13.A technician is helping a customer compare two hard drives. Which unit of
• measurement is used for the hard drive speed?
• revolutions per minute
• gigabytes
• pages per minute
• clusters per minute
14.A technician has been asked to install memory that detects multiple bit errors and
• corrects single bit errors in memory. Which type of memory should be installed if the
• motherboard supports these features?
• parity
• ECC
• fault tolerant
• CRC
15.Which two form factors are commonly used to build a new computer? (Choose two.)
• BTX
• NLQ
• ATX
• CLV
• ECC
16.Which two characteristics of a motherboard can be determined by the form factor?
• (Choose two.)
• type of processor supported
• color
• size
• maximum memory supported
• shape
17.PATA data cables are available in two different types. The types are distinguished by the number of conductors. Which two types are available? (Choose two.)
• 6
• 40
• 68
• 80
• 120
18.How many conductors are found in a SATA data cable?
• 3
• 4
• 7
• 10
• 12
19.Which three system resources are commonly used for communication between the CPU or memory and other components in the computer? (Choose three.)
• IRQ
• DMA
• UDP
• I/O address
• USB
• PnP
20.Which two categories are used to classify CPU architecture? (Choose two.)
• ATX
• BTX
• CISC
• PnP
• RISC
• ZIF
Which two characteristics are determined by the chip set on a motherboard? (Choose
two.)maximum amount of memory that can be installed operating system compatibility
type of connectors that will be on the motherboard
keyboard layout Which two activities are normally controlled by the Northbridge part of the chip set?
(Choose two.)
communication between the CPU and the I/O ports
access to the RAM
communication between the CPU and the hard drive
access to the video card
communication between the CPU and the sound card
1.Which CPU architecture uses a small set of instructions that are designed to be
executed rapidly?
• a.CISC
• b.RAID
• c.RISC
• d.RISK
• e.SCSI
2.Which type of memory is unable to have the contents modified?
• DRAM
• RAM
• ROM
• SRAM
3.Which type of memory is primarily used as cache memory?
• a.DRAM
• b.RAM
• c.ROM
• d.SRAM
4.Which three devices are considered output devices? (Choose three.)
• fingerprint scanner
• headphones
• keyboard
• monitor
• mouse
• Printer
5.Which type of ROM can be reprogrammed with software while it is still physically
installed in the computer?
• EEPROM
• EPROM
• PROM
• ROM
6.Refer to the exhibit. Which type of cable is shown in the graphic?
• FireWire
• Parallel
• Serial
• USB
7.Which important feature is offered by the USB standard?
• A single USB connection to a computer can support up to 255 separate devices.
• It offers rates of around 580 Mb/sec in low-speed mode.
• It allows up to 920 Mb/sec in the 2.0 version.
• It can supply power from the computer to devices.
8.What are the two connector types for the 1394a interface? (Choose two.)
• 2-pin
• 4-pin
• 6-pin
• 8-pin
• 9-pin
• 15-pin
9.Refer to the exhibit. What is the maximum length of the cable presented in the
• graphic, which is commonly used for connecting a computer to a printer?
• 15 ft (4.5 m)
• 20 ft (6 m)
• 27 ft (8 m)
• 30 ft (9 m)
10.Which type of computer resources are direct lines to the processor used by computer
• components to request information from the CPU?
• DMAs
• I/O addresses
• IRQs
• memory addresses
11.Which two devices are considered input devices? (Choose two.)
• biometric authentication device
• printer
• digital camera
• projector
• speakers
12.A technician needs to back up 4 GB of data using a single storage medium. Which
• medium can hold the entire 4 GB on a single disc?
• floppy disc
• CD-RW
• CD-R
• DVD+/-R
13.A technician is helping a customer compare two hard drives. Which unit of
• measurement is used for the hard drive speed?
• revolutions per minute
• gigabytes
• pages per minute
• clusters per minute
14.A technician has been asked to install memory that detects multiple bit errors and
• corrects single bit errors in memory. Which type of memory should be installed if the
• motherboard supports these features?
• parity
• ECC
• fault tolerant
• CRC
15.Which two form factors are commonly used to build a new computer? (Choose two.)
• BTX
• NLQ
• ATX
• CLV
• ECC
16.Which two characteristics of a motherboard can be determined by the form factor?
• (Choose two.)
• type of processor supported
• color
• size
• maximum memory supported
• shape
17.PATA data cables are available in two different types. The types are distinguished by the number of conductors. Which two types are available? (Choose two.)
• 6
• 40
• 68
• 80
• 120
18.How many conductors are found in a SATA data cable?
• 3
• 4
• 7
• 10
• 12
19.Which three system resources are commonly used for communication between the CPU or memory and other components in the computer? (Choose three.)
• IRQ
• DMA
• UDP
• I/O address
• USB
• PnP
20.Which two categories are used to classify CPU architecture? (Choose two.)
• ATX
• BTX
• CISC
• PnP
• RISC
• ZIF
Langganan:
Postingan (Atom)