comptia

12
You lose a screw at the bottom of the printer that you are working on. You cannot pick up the screw with your hand because the area is too small. What tool can you use to retrieve it? Multi-driver Extension magnet Torx wrench Multimeter Which ntbackup switch allows you to designate whether a backup type is normal, copy, differential, incremental, or daily? / V: /D /M /J What is IMAP? A protocol that authenticates users who are sending e-mail. An e-mail protocol that allows users to send but not receive messages. An e-mail protocol that allows users to selectively download messages. A protocol that allows real-time messaging. You are looking for ways to prevent users from removing data from their computer systems. You have disabled all floppy disk drives, 1 jwa 1

Upload: pok-usu-aha

Post on 28-Mar-2015

2.131 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CompTIA

You lose a screw at the bottom of the printer that you are working on. You cannot pick up the screw with your hand because the area is too small.

What tool can you use to retrieve it?

Multi-driver

Extension magnet

Torx wrench

Multimeter

Which ntbackup switch allows you to designate whether a backup type is normal, copy, differential, incremental, or daily?

/V:

/D

/M

/J

What is IMAP?

A protocol that authenticates users who are sending e-mail.

An e-mail protocol that allows users to send but not receive messages.

An e-mail protocol that allows users to selectively download messages.

A protocol that allows real-time messaging.

You are looking for ways to prevent users from removing data from their computer systems. You have disabled all floppy disk drives, and the computers are configured with read-only CD/DVD players.

What else should you do? (Choose two.)

Disable hard disk discovery in the system BIOS.

Flash the system BIOS.

1 jw a 1

Page 2: CompTIA

Password protect the system BIOS.

Disable all USB ports in the system BIOS.

Disable onboard disk controllers in the system BIOS.

You are building a desktop personal computer (PC) that will support a sound card and a media reader.

For which type of motherboard and case will you need to install a riser card?

Micro Advanced Technology Extended (Micro ATX)

Advanced Technology Extended (ATX)

New Low-Profile Extended (NLX)

Balanced Technology Extended (BTX)

A user has installed an internal modem in her computer, but it is not detected by Windows XP. She has a CD-ROM containing drivers.

What should she do?

Use the System utility to create a hardware profile that contains the modem.

Use Device Manager to enable the modem.

Use Network Connections to configure a dial-up connection.

Use the Add Hardware wizard to install the modem.

Your wireless network is secured using WEP. You need to improve data encryption to minimize the chance that data transmissions might be compromised.

What should you do?

Change the WEP shared key each week.

Disable SSID broadcast on all access points.

Implement MAC address filtering.

Reconfigure the network to use WPA.

jw a 2

Page 3: CompTIA

A user installs an application on a computer running Windows. After installing the application, the computer begins receiving a series of pop-up ads.

What is most likely wrong?

The application contains a logic bomb.

The application installed a worm.

The application installed adware on the computer.

The application is a Trojan horse.

You are building a personal computer (PC) that has two 32-bit slots for RIMM memory. You install a 32-bit RIMM module in one of the slots.

What must you install in the vacant slot?

A C-RIMM module or a CT-RIMM module

A 32-bit RIMM module

A C-RIMM module

A 32-bit RIMM module or a CT-RIMM module

You want to prevent Windows Vista from loading specific applications during startup. You want all other applications to start as they normally would. You also want the ability to re-enable the applications to automatically start up in the future.

What command allows you to disable the startup applications?

edit

dir

md

msconfig

For which of the following should you implement QoS in a small office/home office (SOHO) environment?

VoIP

Instant messaging

Page 4: CompTIA

SSID

E-mail

You need to ensure that Active Directory domain user Alice does not have read access to the folder named Graphics. The Graphics folder is shared to the network from the server named FS0. The disk partition on which Graphics is located is formatted as NTFS.

Your solution should not impact other users.

What should you do?

Remove Alice from any domain group that has access to the Graphics folder.

Deny read access to the Graphics folder to any group to which Alice belongs.

Explicitly deny read access to the folder to Alice through local access security.

Explicitly deny read access to the folder to Alice through shared access security.

You are shopping for a hard disk drive for a personal computer (PC) that you are building.

For which reason would you purchase a disk drive that uses the SATA 3.0 (SATA V2) standard instead of the original SATA standard?

You need to support hot swapping of the disk drive.

You want a drive that does not use jumpers.

You plan to install an external disk drive.

You need to optimize performance for audio and video applications.

You have intermittent connectivity to www.measureup.com and want to check connectivity to the server over several hours.

Which command should you use?

ipconfig

ping -t

nslookup

ping -l

Page 5: CompTIA

You are setting up a home office and need broadband Internet access. You need to keep the costs and additional equipment required to a minimum.

What WAN technology should you use?

Cable modem

ISDN

T3 line

T1 line

The process of logging onto a network with a user name and password is an example of which of the following?

Impersonation

Authentication

Authorization

Identification

You are building a personal computer (PC) with a motherboard that supports the Scalable Link Interface (SLI) by NVIDIA. You plan to install two SLI graphics cards with a hardware bridge, and you want to optimize performance for graphics processing.

Which expansion slots should you use?

One PCI slot and one PCIe slot

One AGP slot and one CNR slot.

Two AGP slots

Two PCIe slots

You want to repair disk errors and recover data from bad sectors on a user's laptop.

Which chkdsk switches allow you to repair and extract data from the bad sectors? (Choose two.)

/v

/r

/?

Page 6: CompTIA

/f

/x

You have recently implemented a WLAN and want to maximize security. You only want specific wireless clients to be able to access the WLAN.

What should you do?

Implement MAC filtering.

Enable SSID broadcasting.

Use BitLocker.

Disable WEP.

You need to secure access to network file servers. Your first task is to determine current access permissions.

What should you do?

Review local access permissions.

Review network access permissions.

Review effective access permissions.

Review group access permissions.

You are upgrading components in a computer to refurbish it. The motherboard and BIOS are five years old. You are concerned that the BIOS may not properly support some of the components you want to install.

Which component might require updating Flash ROM contents before the installation will work properly?

128MB of physical SDRAM

80 GB hard drive

56K modem

Power supply

DVD-ROM drive

100Base-TX network adapter

Page 7: CompTIA

Graphics card for 1600 x 1200 display

What version of Windows uses the Sync Center to manage synchronizing offline files?

Windows 7

Windows XP Professional

Windows 2000 Professional

Windows XP Home

You are implementing a wireless network. You want to provide the best security during data transmission.

What should you do?

Enable content filtering.

Disable SSID broadcasting.

Implement WEP.

Implement WPA2.

Your antivirus program identifies an infected file but cannot remove it because it is in use.

You need to remove the infected file.

What should you do?

Run the fixmbr command.

Boot into Safe Mode and run the virus scan again.

Get a different antivirus program.

Update the virus signatures.

Which statement about installing DIMMs is true?

DIMMs have a cut-away portion on one end to help you line them up properly.

You must install DIMMs in matching pairs.

You push the DIMM straight down into the socket.

Page 8: CompTIA

You insert the DIMM at a 35-degree angle and raise it into place.

Your network has a file server running Microsoft Windows XP Professional with a 2.2 GHz Pentium 4 processor, 1 GB of RAM, and one IDE hard disk. The computer has 20 GB of free hard disk space.

Performance has gradually degraded on the file server. The number of users accessing the file server has not changed significantly over time. You need to improve the computer's performance.

What should you do first?

Use Disk Manager to determine the amount of fragmentation on the hard disk.

Use System Manager to monitor processor user time.

Use System Monitor to determine memory usage.

Use Network Monitor to determine the network traffic levels.

You are installing a wireless network. Which actions would improve security for the WLAN and help to prevent unauthorized access? (Choose two.)

Implementing WPA

Installing additional access points

Implementing MAC filtering

Setting a BIOS password

Broadcasting the SSID

You discover a program running in the background on several network computers. The program is collecting address and computer name information from your network and sending it to an address on the Internet.

This is an example of what kind of threat?

Worm

Rootkit

Spyware

Spam

Page 9: CompTIA

How can you designate an EIDE hard drive as a slave? (Choose two.)

Designate it as Slave in the BIOS Setup.

Connect the hard drive to the Slave port on the motherboard.

Set the jumper to Slave.

Connect the hard drive to the motherboard using the Slave connector portion of a Cable Select cable.

You have recently set up Microsoft Windows Vista Business on five computers in a remote office and you want to be able to use Remote Desktop from the main office to manage these computers. You do not want users in other remote offices to be able to run Remote Desktop sessions on these computers.

You need to allow Remote Desktop access to these remote computers only from the main office subnet.

What should you do?

Configure the Windows Firewall rules in Control Panel to allow Remote Assistance.

Configure the Windows Firewall rules in Control Panel to allow the Remote Desktop Protocol (RDP).

Ensure that only users in the main office are included in a Remote Assistance invitation e-mail message.

Configure a custom inbound rule allowing a Remote Desktop connection using Windows Firewall with Advanced Security on each computer.