Study Guide Key for Final 11-16 for IT Essentials 1, December 200
11!"!# Which recommendation should be observed when replacing existing
memory? T$e ne% memory s$ould be as fast or faster t$an e&istin' memory! 11!"!( USB 1 communicates at 12 Mbps, while USB 2 is about 40 times faster at #0 Mbps 11!#!) !o connect an additional de*ice onto a "#!#$%&' cable, you must use (umpers on the drive to set one drive to master and one drive to sla*e 11!6!1 While troubleshooting networ)ing and printing problems, the next step a*ter gathering in*ormation *rom the customer is to *erify t$e cables are correctly connected 12!2!1 When per*orming a de*ault installation o* Windows +" "ro*essional, which two screens are displayed to con*igure custom settings? +e'ional settin's and customi,ed net%or- settin's 12!2!" When Windows boots *rom a hard drive, it is using the acti*e .rimary partition 12!2!# Windows services that start each time the system is booted are set to start automatically ,ther services, such as print spoolers may be disabled during troubleshooting processes 12!#!1 !he Sc$eduled Tas-s utility will execute a prede*ined program i* a speci*ied series o* events occur 12!#!1 !he automatic updates management inter*ace is accessed by *irst going to the /ontrol 0anel 12!#!2 !o open the System -estore utility, select Start 1 2ll 0ro'rams 1 2ccessories 1 System Tools 1 System +estore 1"!1!1 "&#s, Smart"hones, and portable printers can communicate 1"!1!2 wirelessly at short distances using 3luetoot$ and Infrared technologies 1"!1!# !he large amount o* tra**ic can cause wireless signals in the 2. /01 range to be inter*ered with by other 2. /01 wireless devices 2or this reason, the 34211a standard was designed to use the )!0 /01 *re5uency band #s a result, 34211a is not compatible with other 34211x standards 1"!1!# Wireless 6Wi2i7 security is a big concern What are *our characteristics o* security that should be ta)en into consideration with wireless? 4e*er send lo'in or .ass%ord information usin' clear, unencry.ted te&t! 5se a 604 connection %$en .ossible Enable security on $ome net%or-s! 5se 7i-Fi 0rotected 2ccess 87029 security
1"!1!) 2or remote sites that would have di**icult or impossible conventional W#8 connections, satellite communications are necessary 1"!" Manu*acturers o**er devices in two di**erent versions9 the retail version comes with all the necessary manuals and drivers !he :E; version does not 1"!"!1 Mishandled or improperly charged batteries can e&.lode 1"!"!# !he type o* memory most o*ten use din modern laptop computers is S:DI;; 1"!#!1 %* a laptop computer is per*orming slower than it has in the past, a technician might try two processes within Windows to de:*ragment the hard dis) !hey are dis- cleanu. and dis- defra'menter 1#!1 When li*ting heavy ob(ects, you should always use the strength in your le's and -nees so not to use your bac) 1#!& When dealing with a networ) printer, what is the best way to prevent print (obs *rom being added to the 5ueue while the printer is being repaired? Sto. t$e .rint ser*ice! 1#!2!1 !he IEEE:12# standard *or parallel printer inter*aces de*ines ma(or *eatures such as E00<E/0 and bi-directional printing 1#!2!" "er:document settings will override 'lobal printer settings 1#!2!# !he last step in testing a scanner installation is to com.are the scanned image with the original image 1#!)!1 !he most common parts that must be replaced in laser printers are; Fuser assembly Transfer rollers Se.aration .ads 0ic-u. rollers 1#!)!" # scanner has a *u11y spot at the same location on each scanned image !he technician should clean t$e 'lass to solve this problem 1#!6!1 When troubleshooting a printer problem, a*ter gathering data *rom the customer, a technician should try some 5uic) solutions; +estart t$e e=ui.ment by .o%er cyclin' it 6erify t$e ty.e of >ob, t$en clear t$e .rint =ueue +estart t$e s.ooler ser*ice 6erify cable connections S$a-e t$e toner cartrid'e +einstall .rinter soft%are /lear .a.er >ams, t$en reinsert t$e .a.er! +emo*e ta.e from toner or in>ect cartrid'es! 1)!2!1 Which physical topology re5uires that every node is attached to every other node on the networ)? ;es$ 1)!2!2 !here are several common port numbers that may be used *or controlling access to devices or a networ) Some o* them are; Telnet, SS?, 0ort 2"<22 S;T0, 0ort 2) D4S, 0ort )" ?TT0, 0ort 0 ?TT0S, 0ort ##" FT0, 0ort 20, 21 1)!& %* you have the choice o* buying a retail version or an ,'M version o* a 8%<, what things should you consider when deciding whether to choose the retail or ,'M version? @ou may need to find t$e dri*ers for t$e :E; 4I/s on t$e Internet! :E; 4I/s may lac- .ro.er documentation! 1)!"!1 What is the distance limitation o* a single data run *or U!" cabling without adding networ)ing devices? ""0 ft! 8100 m9 1)!"!1 7ireless networ)ing should be considered when architecture or historical signi*icance prevents installation o* %ired networ)s 1)!"!2 DSA and cable connections provide the highest bandwidth and reliability at the lowest cost 1)!"!# What device can be used to enable the *low o* data between two networ)s? +outer 1)!)!2 #*ter an administrator manually con*igures the correct SS%& on a new laptop, the computer is still unable to connect to the wireless =#8 What additional action could the administrator ta)e to resolve this problem? 6erify t$at t$e ;2/ address for t$e la.to. is in t$e ;2/ address filter table! 1)!6 What three ports are used by e:mail? 2) 110 1#" 16!2!1 !he names o* the most popular hashing algorithms are S?2 and ;D) 16!2!1 Using 604 tec$nolo'y, remote users may securely access corporate networ)s because the data is encrypted within a >tunnel? 16!2!2 # security -ey fob is a small radio transmitter that authenticates a user to a computer over short distances 16!2!2 Which action should be ta)en *irst i* a card )ey is lost or stolen? Disable t$e lost card -ey! 16!2!2 Which authentication technology uses a physical characteristic o* the user in con(unction with a password? 3iometrics 16!2!2 0ardware and so*tware *irewalls have several modes *or *iltering networ) data tra**ic; 0ac-et filter B 2 set of rules t$at allo% or deny traffic based on criteria suc$ as I0 addresses, .rotocols, or .orts used! 0ro&y fire%all B 2 fire%all t$at ins.ects all traffic and allo%s or denies .ac-ets based on confi'ured rules! 2 .ro&y acts as a 'ate%ay t$at .rotects com.uters inside t$e net%or-! Stateful .ac-et ins.ection B 2 fire%all t$at -ee.s trac- of t$e state of net%or- connections tra*elin' t$rou'$ t$e fire%all! 0ac-ets t$at are not .art of a -no%n connection are not allo%ed bac- t$rou'$ t$e fire%all! 16!2!" &escribe a software *irewall It ty.ically .rotects only t$e com.uter it is installed on, and it uses t$e /05 in t$e $ost com.uter! 16!2!# Which *eature is characteristic o* the ntbac)up command? It can be e&ecuted from a batc$ file!