Selamat Datang di Bendrat Forum !!
Selamat Datang di Bendrat Forum Tips & Trick.
Daftar/Log in Untuk Melihat Isi Forum.

Selamat Datang di Bendrat Forum !!

Daftar / Log In Untuk Melihat Isi Forum
Login otomatis: 
:: Lupa password?
Latest topics
» Poker Online, Poker Facebook, Judi Online, Nagapoker
Tue Apr 22, 2014 10:04 pm by batikseo

» Poker Online, Poker Facebook, Judi Online, Nagapoker
Tue Apr 22, 2014 10:04 pm by batikseo

» Poker Online, Poker Facebook, Judi Online, Nagapoker
Tue Apr 22, 2014 10:03 pm by batikseo

Sat Aug 31, 2013 8:26 pm by andre1234

» minta link seal offline
Sun Apr 15, 2012 3:56 pm by Admin

» Margot Mariano
Thu Oct 20, 2011 5:23 pm by Admin

» BANTUIN DONK....!!!!!!!!!!!!
Wed Sep 07, 2011 11:10 pm by rendy

» Smack Down Vs RAW PS2 ( Mediafire )
Mon Aug 22, 2011 3:20 am by Admin

» Akses Internet Cepat Menggunakan DNS Alternatif
Sat Jun 18, 2011 7:48 am by Admin

Chat Box Online
SMS Online Free
Facebook Bendrat Forum

Share | 

 Chapter 15 V4.1 - IT Essentials: PC Hardware and Software

Go down 

Jumlah posting : 32
Reputasi : 0
Join date : 14.01.11
Age : 23
Lokasi : Salatiga,Jawa Tengah,Indonesia

PostSubyek: Chapter 15 V4.1 - IT Essentials: PC Hardware and Software   Thu Jun 16, 2011 2:50 pm

Which two hazards exist when working with fiber optic cabling? (Choose two.)
#glass splinters

Which safety precaution should be used when working with any type of cable?
#Wear safety glasses when working any type of cable.

ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?
#site survey

Which protocol provides secure transport of data from the company web server to remote users?

When planning the network in a new building, the technician notes that the company requires cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on networks?

The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.)

Students on the college network need to be able to view folder names and data in files stored on the Windows-based file server, but should never be allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accessing the file server?

While using nslookup, a student sees the following message: "Can’t find server name for address timed out." What is one possible problem?
#The computer does not have at least one entry for a DNS server configured.

The network administrator has physically installed wireless NICs in three new computers. Which two additional steps will complete the installation process? (Choose two.)
#Configure the device drivers.
#Configure the NICs with addressing information.

After booting a computer running Windows 2000, the following message displays: "The IP address already exists on another computer". Which two steps will quickly obtain a new IP address from the DHCP server? (Choose two.)
#run ipconfig /release
#run ipconfig /renew

Which two ipconfig parameters are used within Windows XP to remove and assign the IP address previously provided by a DHCP server? (Choose two.)

Which three ports are used by SMTP, POP, and IMAP? (Choose three.)

What is the purpose of an analog telephone adapter in the application of VoIP services?
#to connect a standard analog telephone to the IP network

Refer to the exhibit. The tracert command was used on the local computer to verify connectivity with a remote site. Which type of address is shown in the highlighted line of the tracert command output displayed in the exhibit?
#default gateway for the local computer

What are two ways to assign an IP address to a wireless NIC? (Choose two.)
#Assign a static address.
#Use DHCP.

In Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the browser to prompt before downloading potentially unsafe content?

What would be a disadvantage of configuring a wireless router or access point to operate only in accordance with the 802.11n protocol standard?
#Older, legacy wireless devices may be unable to connect to the wireless network.

Which two methods can be used to connect IP phones to a network? (Choose two.)
#Connect the IP phone to the Ethernet LAN using an RJ-45 connector.
#Establish an Internet connection then use an Analog Telephone Adapter.

A company adds a few refurbished computers to a network. The company finds, however, that the refurbished computers perform significantly worse than the original networked computers performed with applications that require the transfer of data over the network. What should the company technicians do?
#Check if the network interface cards in the computers are limited to 10 Mb/s.

A textbook author needs to upload a chapter from a home computer to the FTP server of the publisher. The author uses the correct username and password, but the transfer fails. What is the most likely cause of the problem?
#The chapter document must be compressed before transmitting to an FTP server.

The network technician has been asked to share a new printer on the network using the Add Printer wizard for Windows XP. Which path should the technician use to run the Add Printer wizard?
#Start > Control Panel > Printers and Faxes > File > Add Printer

While troubleshooting a computer, the technician releases and renews the IP address. A message appears: "No operation can be performed on the adapter while its media is disconnected." What is a probable cause of the message?
#The network cable is unplugged.

A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log in to the FTP server. What is the most likely cause of the problem?
#The employee is using an incorrect username or password.

A technician is configuring a network device for remote access. Which protocol is commonly used as a secure alternative to Telnet?

A computer user cannot access a bank using HTTPS. What is one recommended solution?
#Enable SSL through the web browser application.

Which action should a user take to ensure that personal information that is entered into a website form is not retained on the computer?
#Delete the temporary Internet files.

A technician is troubleshooting a network and finds hosts with duplicate static IP addresses. Which protocol could be used to resolve this issue?

A technician is working on a host computer that fails to obtain an IP address. Which three actions could the technician perform to determine the cause of the problem? (Choose three.)
#Check the DNS server to ensure that it is operating correctly.
#Check that the DCHP server is operational.
#Check the PC firewall settings to make sure that DHCP is allowed.

A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?
#Ask the IT department to permit port 25 through the firewall.

What are two possible causes of e-mail attachments not being received with e-mail messages? (Choose two.)
#The firewall could be blocking port 21, with the result that attachments cannot get through.
#The e-mail server could not be receiving e-mail messages that are using POP.
Kembali Ke Atas Go down

Jumlah posting : 32
Reputasi : 0
Join date : 14.01.11
Age : 23
Lokasi : Salatiga,Jawa Tengah,Indonesia

PostSubyek: Re: Chapter 15 V4.1 - IT Essentials: PC Hardware and Software   Thu Jun 16, 2011 10:03 pm


A technician is troubleshooting a networked computer. The technician has gathered as much information as possible from the user and now needs to verify obvious issues. Which two actions should the technician perform? (Choose two.)
– Verify the computer IP information
– Check activity on the routers.

Which statement is true about network maintenance?
– If a network device is making an unusual sound, the device should be turned off immediately.

A technician is concerned that a wireless router is missing current security features. What action could be taken to address this issue?
– Check for an updated firmware version.

A company purchases several wireless NICs at a great price. After installing the NICs, they find that the user cannot connect to the 2.4 GHz wireless network. What is a likely cause of the problem?
– The NICs are designed for the 802.11a standard.

A technician is working on a workstation that has an IP address of The technician found that the computer cannot connect to the Internet and the network cable to the computer had been disconnected. Which command can a technician use to get a new IP address once the cable is reconnected?
– ipconfig /renew

Which two protocols are used to receive e-mail? (Choose two.)
– imap
– pop3

A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?
– Use jumpers on the drive to configure the drive as slave.

A user is reporting intermittent loss of connectivity to the network. No other users have reported similar issues. What preventive maintenance task would likely identify the problem?
– Check for a damaged network cable at the user workstation
Kembali Ke Atas Go down
Chapter 15 V4.1 - IT Essentials: PC Hardware and Software
Kembali Ke Atas 
Halaman 1 dari 1

Permissions in this forum:Anda tidak dapat menjawab topik
Selamat Datang di Bendrat Forum !! :: Others :: Cisco-