7
Study Guide Key for Final 11-16 for IT Essentials 1, December 2008 11.3.4 Which recommendation should be observed when replacing existing memory? The new memory should be as fast or faster than existing memory. 11.3.7 USB 1 communicates at 12 Mbps, while USB 2 is about 40 times faster at 480 Mbps. 11.4.5 To connect an additional device onto a PATA/IDE cable, you must use jumpers on the drive to set one drive to master and one drive to slave. 11.6.1 While troubleshooting networking and printing problems, the next step after gathering information from the customer is to verify the cables are correctly connected. 12.2.1 When performing a default installation of Windows XP Professional, which two screens are displayed to configure custom settings? Regional settings and customized network settings 12.2.3 When Windows boots from a hard drive, it is using the active primary partition. 12.2.4 Windows services that start each time the system is booted are set to start automatically. Other services, such as print spoolers may be disabled during troubleshooting processes. 12.4.1 The Scheduled Tasks utility will execute a predefined program if a specified series of events occur.

Final 11-16 Study Guide Key

Embed Size (px)

Citation preview

Page 1: Final 11-16 Study Guide Key

Study Guide Key for Final 11-16 for IT Essentials 1, December 2008

11.3.4 Which recommendation should be observed when replacing existing memory?

The new memory should be as fast or faster than existing memory.

11.3.7 USB 1 communicates at 12 Mbps, while USB 2 is about 40 times faster at 480 Mbps.

11.4.5 To connect an additional device onto a PATA/IDE cable, you must use jumpers on the drive to set one drive to master and one drive to slave.

11.6.1 While troubleshooting networking and printing problems, the next step after gathering information from the customer is to verify the cables are correctly connected.

12.2.1 When performing a default installation of Windows XP Professional, which two screens are displayed to configure custom settings?

Regional settings and customized network settings

12.2.3 When Windows boots from a hard drive, it is using the active primary partition.

12.2.4 Windows services that start each time the system is booted are set to start automatically. Other services, such as print spoolers may be disabled during troubleshooting processes.

12.4.1 The Scheduled Tasks utility will execute a predefined program if a specified series of events occur.

12.4.1 The automatic updates management interface is accessed by first going to the Control Panel.

12.4.2 To open the System Restore utility, select Start > All Programs > Accessories > System Tools > System Restore.

13.1.1 PDAs, SmartPhones, and portable printers can communicate

13.1.2 wirelessly at short distances using Bluetooth and Infrared

technologies.

Page 2: Final 11-16 Study Guide Key

13.1.4 The large amount of traffic can cause wireless signals in the 2.4 GHz range to be interfered with by other 2.4 GHz wireless devices. For this reason, the 802.11a standard was designed to use the 5.0 GHz frequency band. As a result, 802.11a is not compatible with other 802.11x standards.

13.1.4 Wireless (WiFi) security is a big concern. What are four characteristics of security that should be taken into consideration with wireless?

Never send login or password information using clear, unencrypted text.

Use a VPN connection when possible. Enable security on home networks. Use Wi-Fi Protected Access (WPA) security.

13.1.5 For remote sites that would have difficult or impossible conventional WAN connections, satellite communications are necessary.

13.3 Manufacturers offer devices in two different versions; the retail version comes with all the necessary manuals and drivers. The OEM version does not.

13.3.1 Mishandled or improperly charged batteries can explode.

13.3.4 The type of memory most often use din modern laptop computers is SODIMM.

13.4.1 If a laptop computer is performing slower than it has in the past, a technician might try two processes within Windows to de-fragment the hard disk. They are disk cleanup and disk defragmenter.

14.1 When lifting heavy objects, you should always use the strength in your legs and knees so not to use your back.

14.x When dealing with a network printer, what is the best way to prevent print jobs from being added to the queue while the printer is being repaired?

Stop the print service.

14.2.1 The IEEE-1284 standard for parallel printer interfaces defines major features such as EPP/ECP and bi-directional printing.

14.2.3 Per-document settings will override global printer settings.

14.2.4 The last step in testing a scanner installation is to compare the scanned image with the original image.

Page 3: Final 11-16 Study Guide Key

14.5.1 The most common parts that must be replaced in laser printers are:

Fuser assembly Transfer rollers Separation pads Pickup rollers

14.5.3 A scanner has a fuzzy spot at the same location on each scanned image. The technician should clean the glass to solve this problem.

14.6.1 When troubleshooting a printer problem, after gathering data from the customer, a technician should try some quick solutions:

Restart the equipment by power cycling it Verify the type of job, then clear the print queue Restart the spooler service Verify cable connections Shake the toner cartridge Reinstall printer software Clear paper jams, then reinsert the paper. Remove tape from toner or inject cartridges.

15.2.1 Which physical topology requires that every node is attached to every other node on the network?

Mesh

15.2.2 There are several common port numbers that may be used for controlling access to devices or a network. Some of them are:

Telnet, SSH, Port 23/22 SMTP, Port 25 DNS, Port 53 HTTP, Port 80 HTTPS, Port 443 FTP, Port 20, 21

15.x If you have the choice of buying a retail version or an OEM version of a NIC, what things should you consider when deciding whether to choose the retail or OEM version?

You may need to find the drivers for the OEM NICs on the Internet. OEM NICs may lack proper documentation.

15.3.1 What is the distance limitation of a single data run for UTP cabling without adding networking devices?

Page 4: Final 11-16 Study Guide Key

330 ft. (100 m)

15.3.1 Wireless networking should be considered when architecture or historical significance prevents installation of wired networks.

15.3.2 DSL and cable connections provide the highest bandwidth and reliability at the lowest cost.

15.3.4 What device can be used to enable the flow of data between two networks?

Router

15.5.2 After an administrator manually configures the correct SSID on a new laptop, the computer is still unable to connect to the wireless LAN. What additional action could the administrator take to resolve this problem?

Verify that the MAC address for the laptop is in the MAC address filter table.

15.6 What three ports are used by e-mail?

25 110 143

16.2.1 The names of the most popular hashing algorithms are SHA and MD5.

16.2.1 Using VPN technology, remote users may securely access corporate networks because the data is encrypted within a ‘tunnel’.

16.2.2 A security key fob is a small radio transmitter that authenticates a user to a computer over short distances.

16.2.2 Which action should be taken first if a card key is lost or stolen?

Disable the lost card key.16.2.2 Which authentication technology uses a physical characteristic of the user in

conjunction with a password?

Biometrics

Page 5: Final 11-16 Study Guide Key

16.2.2 Hardware and software firewalls have several modes for filtering network data traffic:

Packet filter – A set of rules that allow or deny traffic based on criteria such as IP addresses, protocols, or ports used.

Proxy firewall – A firewall that inspects all traffic and allows or denies packets based on configured rules. A proxy acts as a gateway that protects computers inside the network.

Stateful packet inspection – A firewall that keeps track of the state of network connections traveling through the firewall. Packets that are not part of a known connection are not allowed back through the firewall.

16.2.3 Describe a software firewall.

It typically protects only the computer it is installed on, and it uses the CPU in the host computer.

16.2.4 Which feature is characteristic of the ntbackup command?

It can be executed from a batch file.