Professional Documents
Culture Documents
Cisco Final Exam Chapter 1116
Cisco Final Exam Chapter 1116
0)
T
o
p 9277652
o Time Remaining:
f 02:34:38
F
o Bottom of Form
r
m
1 Top of Form
Which authentication technology uses a physical characteristic of the user in conjunction with a password?
key fob
biometrics
smart card
key card
Bottom of Form
2 Top of Form
Refer to the exhibit. Which type of technology is most suitable to bring Internet services to the facilities shown in the graphic?
Bluetooth
Infrared
WiFi
Satellite
Bottom of Form
3 Top of Form
The purchasing department at ABC Company has the choice of buying a retail version or an OEM version of a NIC. Which two things
must the purchasing department consider when deciding whether to choose the retail or OEM version? (Choose two.)
The installers may need to find the drivers for the OEM NICs on the Internet.
OEM NICs may be more expensive than the Cisco or Linksys NICs.
Disk management
Bottom of Form
5 Top of Form
Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip
required is attached to the purchase order so the correct item can be bought.
DDR2
DRAM
LT-RAM
SODIMM
SORAM
Bottom of Form
6 Top of Form
The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to
correct the problem?
Defragment the hard disk.
7 Top of Form
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical
topology requires that every node is attached to every other node on the network?
bus
hierarchical
mesh
ring
star
Bottom of Form
8 Top of Form
The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption
technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
MD5
VPN
WEP
WPA
Bottom of Form
9 Top of Form
Which Windows hard drive partition is referred to as the C: drive?
the first volume partition
10 Top of Form
A network administrator has been informed about a problem with the network printer. What is the best way to prevent print jobs from
being added to the queue while the printer is being repaired?
Send an e-mail to all users telling them to stop sending any print jobs to the printer.
Send a network message to all users telling them to stop sending any print jobs to the printer.
11 Top of Form
A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How
can a technician create the restore point?
From the CLI enter the command restore /cn.
Go to Start > Control Panel > Accessories > System Tools > System Restore > Create a restore point.
Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.
Right-click My Computer and then go to Properties > Restore > Create Restore Point.
Bottom of Form
12 Top of Form
Which Startup type must be selected for a service that should run each time the computer is booted?
automatic
boot
manual
start
startup
Bottom of Form
13 Top of Form
A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two
standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
USB 2.0 is twice as fast as USB 1.1.
14 Top of Form
A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling
without adding networking devices?
33 ft (10 m)
100 ft (31 m)
330 ft (100 m)
500 ft (154 m)
Bottom of Form
15 Top of Form
A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How
can the technician accomplish this desired configuration?
Use jumpers on the motherboard to configure the drive as slave.
16 Top of Form
A network technician has been asked to determine the best Internet connection for a branch office located in a new metropolitan office
building. Which connection would provide the highest bandwidth and reliability at the lowest cost?
DSL
ISDN
satellite
wireless
Bottom of Form
17 Top of Form
A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any
injury when transporting the heavy printer to the service area? (Choose two.)
Avoid lifting the equipment using the strength in your back.
Lift the equipment using the strength in your legs and knees.
18 Top of Form
What are two characteristics of the IEEE 1284 standard? (Choose two.)
These cables usually have 9 pins or 25 pins on both ends.
19 Top of Form
Which type of printer configuration method overrides any other type of configuration?
default
global
predefined
per-document
Bottom of Form
20 Top of Form
After scanning an image, what is the next step to conclude a scanner test?
Scan the same image again and compare both scanned images to detect scanning deficiencies.
Calibrate the scanner based on the image that has been scanned.
Print the scanned image and contrast it with the scanned image.
21 Top of Form
Which three laser printer components usually break? (Choose three.)
fuser assembly
primary corona
pickup rollers
transfer rollers
secondary corona
paper trays
Bottom of Form
22 Top of Form
After gathering information from a user regarding failure of a printer, which three actions should be performed? (Choose three.)
Change the communication cable.
23 Top of Form
Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)
MD5
chap checksum
SHA
VPN
SSL
Bottom of Form
24 Top of Form
Which technology allows a user to securely access a company LAN across a public network?
MD5
SHA
TCP
VPN
Bottom of Form
25 Top of Form
Which action should be taken first if a card key is lost or stolen?
Disable the card key system until the key can be recovered.
Disable all card keys. Issue new card keys to employees who show picture identification.
Issue the owner a new card key after a picture identification is shown.
26 Top of Form
The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-
range technologies can support these types of devices? (Choose two.)
Bluetooth
Cellular
Infrared
WiFi
Satellite
Bottom of Form
27 Top of Form
Which two characteristics describe a software firewall? (Choose two.)
It typically protects only the computer it is installed on.
28 Top of Form
A network administrator needs to restrict access to the network. Which type of firewall allows only those packets that are part of a known
connection?
stateful firewall
proxy firewall
packet filter
content engine
Bottom of Form
29 Top of Form
A technician wishes to secure the network authentication for all remote users. Which security technology uses radio communication with
a computer before accepting a username and password?
biometrics
key fobs
security dongles
Bottom of Form
30 Top of Form
Which recommendation should be observed when replacing existing memory?
The new memory should operate at the same speed as the hard drive.
The new memory should exceed the capacity of the hard drive.
The new memory should be as fast or faster as the cache found in the processor.
31 Top of Form
An organization has two buildings, each with a separate network that uses a different IP addressing scheme. Which device can be used
to enable the flow of data between the two networks?
bridge
hub
router
switch
Bottom of Form
32 Top of Form
Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)
23
25
107
110
143
212
Bottom of Form
33 Top of Form
What is the highest risk associated with improperly charged or mishandled batteries?
The components can overheat.
The laptop will be unable to hold enough charge.
34 Top of Form
Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking
recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to
solve the problem?
22
53
80
143
443
Bottom of Form
35 Top of Form
Which feature is characteristic of the ntbackup command?
It can be executed from a batch file.
It has overriding parameters that need to be set in the Windows backup utility.
Bottom of Form
36 Top of Form
After the administrator manually configures the correct SSID on a new laptop, the computer is still unable to connect to the wireless
LAN. Which additional action should the administrator take to resolve this problem?
Modify the group account of the user to include all file permissions.
Rename the laptop and reset the user password on the network.
Verify that the MAC address for the laptop is in the MAC address filter table.
Bottom of Form