Hardware Support Exam CH 16, 17, 18

Descripción

Michael Haines' Hardware Support Exam CH 16, 17, 18
Anthony Schulmeister
Test por Anthony Schulmeister, actualizado hace más de 1 año
Anthony Schulmeister
Creado por Anthony Schulmeister hace más de 8 años
121
1

Resumen del Recurso

Pregunta 1

Pregunta
A WLAN covers a large geographical area and is made up of many smaller networks.
Respuesta
  • True
  • False

Pregunta 2

Pregunta
A half duplex connection allows a device to send and receive, but not at the same time.
Respuesta
  • True
  • False

Pregunta 3

Pregunta
Phone cords are a type of twisted-pair cable and use an RJ-45 connector.
Respuesta
  • True
  • False

Pregunta 4

Pregunta
10Base5 cabling runs at speeds up to 1 Gbps and distances to 500 meters.
Respuesta
  • True
  • False

Pregunta 5

Pregunta
A punchdown tool is used to wire twisted-pair cabling to a keystone jack.
Respuesta
  • True
  • False

Pregunta 6

Pregunta
Which of the following network types covers a large campus or city?
Respuesta
  • PAN
  • WLAN
  • MAN
  • WAN

Pregunta 7

Pregunta
Which physical topology uses a centralized device to manage traffic on the network?
Respuesta
  • mesh
  • ring
  • bus
  • star

Pregunta 8

Pregunta
What type of network can you set up to share files if you have two laptops with wireless NICs but there is no Wi-Fi hotspot available?
Respuesta
  • ring network
  • infrastructure network
  • ad hoc network
  • hybrid network

Pregunta 9

Pregunta
Which network technology that is used to connect to the Internet has a maximum speed of 44 Mbps, uses dedicated lines, and is used by large companies?
Respuesta
  • SDSL
  • T3
  • Fast Ethernet
  • OC-3

Pregunta 10

Pregunta
Which of the following is true about cable Internet?
Respuesta
  • you share the cable infrastructure with your neighbors
  • you need filters on every phone jack
  • fiber optic cabling is required
  • provides up to 2.3 Mbps of bandwidth

Pregunta 11

Pregunta
What does a NIC use to connect to wired network media?
Respuesta
  • HDMI port
  • RJ-45 port
  • 10BaseT port
  • Half duplex port

Pregunta 12

Pregunta
What should you choose in the properties of a network connection so that Windows will use the best possible speed and duplex mode?
Respuesta
  • Optimal Configuration
  • Automatic Configuration
  • Auto Negotiation
  • Default Settings

Pregunta 13

Pregunta
Which feature should you configure on a network adapter to control which applications have priority on the network?
Respuesta
  • PoE
  • WoL
  • QoS
  • PoTS

Pregunta 14

Pregunta
What is the unit of information called when a network adapter adds the source and destination MAC address to the segment of data before it is transmitted on the network?
Respuesta
  • frame
  • packet
  • bit
  • segment

Pregunta 15

Pregunta
Which type of network device keeps a table of the MAC addresses of the devices connected to it?
Respuesta
  • hub
  • router
  • NIC
  • switch

Pregunta 16

Pregunta
What type of device do you need if you want to connect two network segments together such as a wireless network and a wired network?
Respuesta
  • hub
  • NAS
  • repeater
  • bridge

Pregunta 17

Pregunta
What device should you consider if you want to have access to hard drives via an Ethernet connection?
Respuesta
  • NAS
  • VoIP
  • AP
  • RAID

Pregunta 18

Pregunta
Which of the following cabling systems uses fiber-optic cable?
Respuesta
  • 10GBaseT
  • 1000BaseFX
  • 10Base2
  • 10Base5

Pregunta 19

Pregunta
Which type of cabling should you use for Gigabit Ethernet?
Respuesta
  • coaxial
  • thinnet
  • Cat-6
  • RG-59

Pregunta 20

Pregunta
Which of the following is true about 10-Gigabit Ethernet?
Respuesta
  • you can use Cat-5e or Cat-6 cabling
  • it is a good choice for backbone networks
  • it is sometimes called Fast Ethernet
  • coaxial is a good choice for cabling

Pregunta 21

Pregunta
Under what circumstance might you use a loopback plug?
Respuesta
  • to test a USB port
  • to capture network packets
  • to test a network cable
  • to find the max speed of a connection

Pregunta 22

Pregunta
Which of the following provides multiple network ports for cables that converge in an electrical closet?
Respuesta
  • patch panel
  • RJ-45 jack
  • terminal adapter
  • loopback port

Pregunta 23

Pregunta
Which of the following is true about a crossover cable?
Respuesta
  • it’s normally used to connect a computer to a hub or switch
  • you use the T568B wiring standard on both ends
  • it is required to connect two Gigabit Ethernet switches together
  • it can be used to connect two PCs together

Pregunta 24

Pregunta
Which of the following is a reason that there are twists in the wires used for network cabling?
Respuesta
  • the twists increase the cable strength
  • the twists reduce crosstalk
  • the twists make it easier to punchdown the cable
  • the twists reduce the amount of copper needed

Pregunta 25

Pregunta
What’s the first thing you should do to troubleshoot a network problem related to hardware?
Respuesta
  • test with a network cable
  • use a different cable
  • use a loopback plug
  • check the indicator lights

Pregunta 26

Pregunta
On the IE General tab you can block cookies.
Respuesta
  • True
  • False

Pregunta 27

Pregunta
The default value of the security level in IE is Medium-high.
Respuesta
  • True
  • False

Pregunta 28

Pregunta
To use Remote Desktop, the computer you access remotely can be running Windows 7 Home Premium or Windows 7 Professional.
Respuesta
  • True
  • False

Pregunta 29

Pregunta
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.
Respuesta
  • True
  • False

Pregunta 30

Pregunta
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.
Respuesta
  • True
  • False

Pregunta 31

Pregunta
Which of the following is a task you CAN’T do from the IE General tab?
Respuesta
  • change the home page
  • disable file downloads
  • delete browsing history
  • manage the IE cache

Pregunta 32

Pregunta
Which of the following is described as a computer that intercepts requests that a browser makes of a server and can cache received content.
Respuesta
  • DNS server
  • VPN server
  • proxy server
  • Web server

Pregunta 33

Pregunta
Which of the following is NOT true about Remote Desktop?
Respuesta
  • the client can be running any version of Windows 7
  • by default all users can access Remote Desktop
  • Windows firewall can block Remote Desktop connections
  • you can start the remote desktop client using the mstsc command

Pregunta 34

Pregunta
If you want to be able to power up a computer remotely, what feature should you use?
Respuesta
  • QoS
  • RDP
  • RemoteApp
  • WoL

Pregunta 35

Pregunta
Which of the following is NOT true about Group Policy?
Respuesta
  • policies can be applied to a computer
  • all policies are applied before the logon screen appears
  • Group Policy is available in Windows Professional edition
  • you can set the QoS level for an application using Group Policy

Pregunta 36

Pregunta
Which statements is true about controlling access to folders and files?
Respuesta
  • permissions refer to the tasks an account is allowed to do in the system
  • account configuration should keep in mind the principle of highest privilege
  • rights are assigned to accounts
  • in Windows, accounts have no rights assignments until you configure them

Pregunta 37

Pregunta
Which of the following is NOT true about user accounts and groups?
Respuesta
  • a user account can belong to only one group at a time
  • by default, standard users accounts belong to the Users group
  • Guest group has limited rights on the system
  • Backup Operators group can restore any files regardless of the group’s permissions to those files

Pregunta 38

Pregunta
Which built-in group might Windows automatically assign a user account to when determining its permissions?
Respuesta
  • Administrators
  • Guests
  • Backup Operators
  • Anonymous users

Pregunta 39

Pregunta
To which group does Windows give access to folders that you create which are not part of your user profile?
Respuesta
  • Power Users
  • Guests
  • Authenticated Users
  • Anonymous Users

Pregunta 40

Pregunta
When all users on a network require the same access to all resources, what type of network model should you use?
Respuesta
  • Domain
  • Homegroup
  • Workgroup
  • Guestgroup

Pregunta 41

Pregunta
Which of the following is true about which folders to use to hold shared data when working with a workgroup?
Respuesta
  • private data for each user should be kept in their C:\Users folder
  • all users have access to the folders in the C:\Users folder
  • C:\Users\Public should only be used by the Guest account
  • Only Administrators and Guest have access to C:\Users\Public

Pregunta 42

Pregunta
Which type of permission should you set to control access to files and folders by local and network users?
Respuesta
  • Sharing on FAT32 volumes only
  • NTFS on NTFS volumes only
  • NTFS on exFAT or NTFS volumes
  • Sharing on NTFS or exFAT volumes

Pregunta 43

Pregunta
Which is NOT true about using share and NTFS permissions?
Respuesta
  • if both permissions are used, the least restrictive permission between the two applies
  • if NTFS permissions conflict between a user and group the least restrictive permission applies
  • when you copy a file, the file takes on the permissions of the destination folder
  • inherited permissions pass from parent folder to child file or folder

Pregunta 44

Pregunta
Which NTFS permission(s) should you assign if the user should be able to create folders and files and open files to read data, but not delete files.
Respuesta
  • Full control
  • Read & execute
  • Full control, Modify
  • Write, Read

Pregunta 45

Pregunta
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?
Respuesta
  • \\sharedfolder\server
  • \server\sharedfolder
  • \\server\sharedfolder
  • /sharedfolder/server

Pregunta 46

Pregunta
When troubleshooting a live network cable, what should you use
Respuesta
  • a cable tester
  • a DVM
  • a loopback plug
  • an LED indicator

Pregunta 47

Pregunta
On a peer-to-peer network, authentication is the responsibility of the domain.
Respuesta
  • True
  • False

Pregunta 48

Pregunta
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
Respuesta
  • True
  • False

Pregunta 49

Pregunta
After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
Respuesta
  • True
  • False

Pregunta 50

Pregunta
Using Group Policy, you can set security policies to help secure a workstation.
Respuesta
  • True
  • False

Pregunta 51

Pregunta
It’s usually a good idea to run several anti-malware programs at the same time on your computer.
Respuesta
  • True
  • False

Pregunta 52

Pregunta
What keystroke should you press to get a logon window if you don’t use the welcome screen?
Respuesta
  • Alt+F1
  • Ctrl+Ins+Home
  • Alt+F5+End
  • Ctrl+Alt+Delete

Pregunta 53

Pregunta
Which of the following is true about the Guest account in Windows 7?
Respuesta
  • it is disabled by default
  • it automatically has a complex password
  • you cannot rename it
  • it has administrative access

Pregunta 54

Pregunta
Which of the following is true about passwords.
Respuesta
  • it’s best to write your password down so you don’t get locked out of your computer
  • passwords cannot be longer than 14 characters
  • by default, accounts with a blank password cannot logon remotely
  • letters and numbers are allowed, but no symbols such as ‘@’ or ‘!’

Pregunta 55

Pregunta
Which of the following is true about the Windows Encrypted File System?
Respuesta
  • files can be marked for encryption, but not folders
  • an encrypted file moved to an unencrypted folder remains encrypted
  • EFS only works on NTFS and FAT32
  • you need to download special software to use EFS

Pregunta 56

Pregunta
Which of the following is NOT true about using Group Policy on business and professional editions of Windows?
Respuesta
  • you can rename default user accounts
  • you can require user accounts to have non-blank passwords
  • you can use gpedit.msc to see if any policies conflict
  • you can disable logon scripts

Pregunta 57

Pregunta
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?
Respuesta
  • a USB port
  • an authentication key on the hard drive
  • a TPM chip on the motherboard
  • a PIN on the BIOS

Pregunta 58

Pregunta
If you don’t want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?
Respuesta
  • Windows POP technology
  • the BIOS
  • a feature available on some DVD drives
  • your USB keyboard

Pregunta 59

Pregunta
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
Respuesta
  • retinal scanner
  • LoJack token
  • smart card
  • TPM

Pregunta 60

Pregunta
An RFID badge is related to which type of authentication method?
Respuesta
  • smart card
  • biometric scanner
  • digital certificate
  • privacy filter

Pregunta 61

Pregunta
A privacy filter is used for what aspect of security?
Respuesta
  • theft of a laptop
  • computer authentication
  • data encryption
  • screen viewing

Pregunta 62

Pregunta
Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
Respuesta
  • ATA Secure Erase
  • low-level format
  • degausser
  • magnetic data filter

Pregunta 63

Pregunta
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
Respuesta
  • shoulder surfing
  • tailgating
  • social engineering
  • session hijacking

Pregunta 64

Pregunta
Which type of malware hides in the MBR program of a hard drive?
Respuesta
  • boot sector virus
  • Trojan horse
  • keylogger
  • spyware

Pregunta 65

Pregunta
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
Respuesta
  • Trojan horse
  • rootkit
  • adware
  • worm

Pregunta 66

Pregunta
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?
Respuesta
  • fixmbr
  • bootrec /fixmbr
  • fixboot
  • bootrec /fixboot

Pregunta 67

Pregunta
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?
Respuesta
  • Task Manager
  • SearchIndexer
  • Process Explorer
  • Windows Defender
Mostrar resumen completo Ocultar resumen completo

Similar

Fiches 17, 18, 19
sminiboileau
Hardware Support Exam Ch 19, 20, 21
Anthony Schulmeister
Imagen digital
Jessica Pardo
Unit 7.1- Coordinated Body Systems
Zubayr Rashid
18 months
Futaim Alsuwaidi
chương 1:tống quan về kế toán tài chính
Trương Thùy Linh
Chapter 18 & 19 Vocabulary, Economics
mcbyrd
27 admenments
ldlabraguerrero
Chapters 18 & 19 Vocab
Mahogany Alajiah
Ο ελληνισμός το 18ο και 19ο αιώνα
Chara Sotiropoulou
Chapter 18: principles of endocrinology- the central endocrine glands
Lea Calitz