Vous êtes sur la page 1sur 6

Jawaban IT Essentials Chapter 16 (v

4.1)

Chapter 16 Exam - IT Essentials: PC Hardware and Software (Version


4.1)

1
A computer user cannot access the Internet. A technician, attempting
to resolve the problem, can ping the proxy server, but Internet access
is still denied. What is the problem?
#The computer browser proxy server settings are wrong.

2
What are two features of Windows Vista Backup? (Choose two.)
#The backup files can be saved to another connected computer or
server.
#The backup files have an extension of .bkf and a maximum
uncompressed file size of 200 MB.

3
On a computer in the lab, a student can access e-mail. However, from
a laptop that is owned by the student, the wireless connection to the e-
mail server fails. What is the problem?
#Windows Firewall is blocking the port that is used by the e-mail
application.

4
A network administrator has noticed that users without administrative
rights are installing unauthorized applications on the Windows Vista
computers. What could the administrator do to prevent the installation
of these applications?
#Enable the UAC function on the computers.

5
Windows XP should be updated on a regular basis. In which situation
should automatic updates be disabled?
#Users accessing the network using a dial-up connection need to
control when the updates are downloaded and installed.

6
Which encryption technology provides secure tunnels?
#VPN

7
A network technician has received several reports regarding missing
and corrupted information on a company file server. Which course of
action can the technician use to investigate any unauthorized network
access?
#Audit the event logs on the server to check for unauthorized
network access.

8
A business has a policy to automatically update and run the antivirus
software on all computers each day. When is the best time to perform
this security maintenance?
#awhen the computers are not being used

9
Refer to the exhibit. Which Firewall Settings tab would be used to allow
an FTP connection through a Vista-based computer?
#Advanced

10
Which simple wireless configuration technique can make the network
invisible to unauthorized users?
#Disable SSID broadcasting.

11
Which two file-level permissions allow a user to delete a file? (Choose
two.)
#modify
#full control

12
Which two characteristics of network traffic are being monitored if a
network technician configures the company firewall to operate as a
packet filter? (Choose two.)
#ports
#protocols

13
Port triggering has been configured on a wireless router. Port 25 has
been defined as the trigger port and port 113 as an open port. What
effect does this have on network traffic?
#All traffic that is sent out port 25 will open port 113 to allow
inbound traffic into the internal network through port 113.

14
Which Windows XP command initiates a backup from the command
line?
#ntbackup

15
Which two advantages are attributed to a hardware firewall when
compared to a software firewall? (Choose two.)
#It does not impact the processing performance of the equipment it
protects.
#It is designed to protect more than one computer.
16
What is the result of changing the default username and password on a
wireless access point?
#It reduces the chance of someone accessing the device and
changing settings.

17
A technician has been asked to format the drives of several Windows
XP computers with a file system that can use file-level permissions to
secure confidential information. Which file system should be used by
the technician?
#NTFS

18
After a technician collects information from the computer, which two
sources can provide the technician with possible solutions for various
types of network-related problems? (Choose two.)
#the manufacturer FAQ for network devices
#technical websites

19
What is the default setting for Windows XP operating system updates?
#automatic

20
On a Windows Vista computer, which CLI command is used to repair
the master boot record that has been damaged by a virus?
#bootrec.exe/fixmbr

21
A user reports that the antivirus software on a computer is always
turned off when the computer is restarted, despite being reactivated
each time the computer starts up. Further investigation by the
technician shows that the Internet browser also displays an incorrect
homepage. What is the probable cause of these problems?
#The computer has been infected with spyware.

22
Which three physical security measures are employed to prevent
security breaches and loss of data? (Choose three.)
#conduit
#card key
security guard

23
The ABC Company network designers are designing the new corporate
WiFi network. Which two precautions should be implemented because
of security concerns with wireless networks? (Choose two.)
#Disable broadcast of the SSID.
#Configure WPA on access points.

24
A student has a Windows XP laptop firewall set with the Don't Allow
Exceptions option enabled. What is the consequence of setting this
option?
#No applications on an outside network are allowed access to the
laptop.

25
Which method can a technician use to make sure that only specific
computers connect to a wireless router?
#MAC address filtering

26
A network administrator has moved encrypted files from one computer
to another computer on the network and now the files are not
encrypted. What does the administrator need to do to correct the
problem?
#Convert the destination computer partition to NTFS.

27
A network administrator is trying to allow everyone access to a data
folder while limiting access to individual subfolders to individuals. The
administrator is having problems with all users being able to view and
edit all files and folders. What should the administrator look at to solve
the problem?
#Check to see if the subfolders have inherited rights from the main
folder.

28
Which data security technology takes the form of an object which must
be close to a computer before the user can successfully submit a
username and password?
#security key fob

29
A network administrator is trying to change the account name of a user
but cannot make the changes. What could be a possible cause?
#The administrator does not have the correct permissions to make
the change.

Vous aimerez peut-être aussi