Professional Documents
Culture Documents
You
cannot pick up the screw with your hand because the area is too small.
Multimeter
Extension magnet
Torx wrench
Multi-driver
2-Which ntbackup switch allows you to designate whether a backup type is normal,
/V:
/J
/M
/D
3-What is IMAP?
An e-mail protocol that allows users to send but not receive messages.
4-You are looking for ways to prevent users from removing data from their
computer systems. You have disabled all floppy disk drives, and the computers
5-You are building a desktop personal computer (PC) that will support a sound
For which type of motherboard and case will you need to install a riser card?
6-A user has installed an internal modem in her computer, but it is not detected
Use the System utility to create a hardware profile that contains the modem.
9-You are building a personal computer (PC) that has two 32-bit slots for RIMM
A C-RIMM module
startup. You want all other applications to start as they normally would. You
the future.
edit
md
dir
msconfig
11-For which of the following should you implement QoS in a small office/home
VoIP
SSID
Instant messaging
12-You need to ensure that Active Directory domain user Alice does not have read
access to the folder named Graphics. The Graphics folder is shared to the
network from the server named FS0. The disk partition on which Graphics is
Explicitly deny read access to the folder to Alice through local access
security.
Remove Alice from any domain group that has access to the Graphics folder.
Explicitly deny read access to the folder to Alice through shared access
security.
Deny read access to the Graphics folder to any group to which Alice belongs.
13You are shopping for a hard disk drive for a personal computer (PC) that you
are building.
For which reason would you purchase a disk drive that uses the SATA 3.0 (SATA
ping -t
ping -l
nslookup
ipconfig
15-You are setting up a home office and need broadband Internet access. You need
ISDN
T1 line
T3 line
Cable modem
16-The process of logging onto a network with a user name and password is an
Authentication
Authorization
Impersonation
Identification
17-You are building a personal computer (PC) with a motherboard that supports
the Scalable Link Interface (SLI) by NVIDIA. You plan to install two SLI
graphics cards with a hardware bridge, and you want to optimize performance for
graphics processing.
18-You want to repair disk errors and recover data from bad sectors on a user's
laptop.
Which chkdsk switches allow you to repair and extract data from the bad sectors?
(Choose two.)
/x
/?
/r
/f
/v
19-You have recently implemented a WLAN and want to maximize security. You only
Use BitLocker.
Disable WEP.
20-You need to secure access to network file servers. Your first task is to
and BIOS are five years old. You are concerned that the BIOS may not properly
support some of the components you want to install.
Which component might require updating Flash ROM contents before the
80 GB hard drive
Power supply
56K modem
DVD-ROM drive
22-What version of Windows uses the Sync Center to manage synchronizing offline
files?
Windows Vista
Windows XP Home
Windows XP Professional
23-You are implementing a wireless network. You want to provide the best
Implement WEP.
because it is in use.
Boot into Safe Mode and run the virus scan again.
You insert the DIMM at a 35-degree angle and raise it into place.
DIMMs have a cut-away portion on one end to help you line them up properly.
26-Your network has a file server running Microsoft Windows XP Professional with
a 2.2 GHz Pentium 4 processor, 1 GB of RAM, and one IDE hard disk. The computer
Performance has gradually degraded on the file server. The number of users
accessing the file server has not changed significantly over time. You need to
27-You are installing a wireless network. Which actions would improve security
for the WLAN and help to prevent unauthorized access? (Choose two.)
Implementing WPA
computers. The program is collecting address and computer name information from
Worm
Rootkit
Spam
Spyware
29-How can you designate an EIDE hard drive as a slave? (Choose two.)
30-You have recently set up Microsoft Windows Vista Business on five computers
in a remote office and you want to be able to use Remote Desktop from the main
office to manage these computers. You do not want users in other remote offices
You need to allow Remote Desktop access to these remote computers only from the
Configure the Windows Firewall rules in Control Panel to allow the Remote
Ensure that only users in the main office are included in a Remote Assistance
invitation e-mail message.
Assistance.