1
What is the default method of authentication used by Telnet in a Windows 2000 environment?
plain text
> NTLM
kerberos
ND5
.net passport
2
Which two of the following statements about passwords are correct? (Choose two.)
No two users should have the same password.
> Passwords should be at least five characters long.
> Passwords should contain at least one non-alphabetic character.
Passwords should be easy to remember such as a favorite sports team.
3
Which two of the following tasks are performed before the Setup wizard stage of a Windows 2000 installation? (Choose two.)
> reconfigure hard disk partitions if necessary
enter the product registration key
> format the disk
configure networking
4
An administrator needs an account that can be used to manage all the computers in a domain. What is the name of the group that Windows 2000 provides to allow the administrator to perform this function?
Root
Admin
> Domain Admins
Enterprise Admins
Administrator
5
What is the purpose of the user's full name in the New User account box?
> It is informational only.
It authenticates the username.
It allows the user to logon.
It matches the user to permissions.
6
A network administrator is setting up a web presence for a small company. The company plans to use the address www.thecompany.com but has not created a DNS entry for the server yet. The administrator has set up a new web server on a networked machine with the IP address 111.111.111.111. What should the administrator initially do to determine if the web server is functioning?
> Run a web browser on the server machine and enter the address http://127.0.0.1.
Run a web browser on a host connected to the same network and enter the address http://111.111.111.111.
Ask someone outside the organization to try to access the website using the address http://111.111.111.111.
Ask someone outside the organization to try to access the website using the address http://www.thecompany.com.
Run a web browser on a host connected to the same network and enter the address http://www.thecompany.com.
7
An administrator has written a script in VBScript and saved the file. What must the administrator do to ensure that WSH is aware that this is a VBScript file?
The first line of the script file must be VBS.
The WSH configuration file needs to be updated with the name of the new script file.
> The file must have the extension .vbs.
WSH must be informed that it is a VBScript file when it is loaded.
8
An administrator has just finished setting up a Windows 2000 PC. What should the administrator do first to ensure that the NIC has been correctly configured?
run the ifconfig -a command
> run the ipconfig /all command
ping the local host
ping the default gateway
9
Which component of Windows 2000 accommodates many types of scripting languages?
VBScript
JScript
> WSH
ShellScript
10
In Windows 2000, what is the name of the HTTP web service located in the Administrative Tools menu?
Default FTP Site
> Default Web Site
Default Web Service
Default Internet Information Service
11
Which two statements about computer names in Windows 2000 are correct? (Choose two.)
A computer name is optional.
> The maximum length for a computer name is 15 characters.
The maximum length for a computer name is 255 characters.
> There is a default computer name based on the organization name.
Computer names on a network do not need to be unique if they have unique IP addresses.
12
Which command can be used in Windows 2000 to capture the output from a printer port and redirect it to a network printer?
> net use
capture
lpt1 > net
netprint
13
Which method should an administrator use to provide for securely sharing files on a larger network?
arrange for each host on the network to share files with the other hosts on the network to distribute the load
only allow clients used by trusted users to share files with others on the network
> require users to map to a network drive on a network file server on the LAN
set up an area on a web server that can then be accessed from anywhere through web browsers
14
When installing Windows 2000 Professional on a new machine, what must you do to boot from the CD?
Nothing, it will automatically boot from the CD.
Select the correct install device option from the menu.
> Enter the CMOS setup and set the boot sequence to boot from the CD-ROM drive first.
Insert the Windows 2000 CD in the CD-ROM drive and press Enter.
15
Which Windows tool allows an administrator to easily view or navigate a file system?
Internet Explorer
> Windows Explorer
WinNT Explorer
File Explorer
16
Which three of the following groups can be created in Windows 2000? (Choose three.)
> local groups
> global groups
> domain local groups
domain global groups
audit groups
17
In Windows 2000, which of the following is a required field when creating a new user account?
the full name
the password
> the user name
the description
18
In the Windows 2000 NOS, which tools must be loaded to run FTP services?
FTP Services
Network Services
> Internet Information Services
Site Services
19
What are three desirable characteristics of a print server? (Choose three.)
good graphics
> fast processor
> adequate RAM
> adequate disk space
adequate tape backup
20
What is the main reason that NTFS is the preferred file system for a Windows 2000 partition?
It is the only file system that is available to a Windows 2000 administrator.
It cannot be accessed by Linux systems.
It supports a bigger file system than any of the alternatives.
> It offers better security than any of the alternatives.
Most Windows 2000 administrators are trained to use NTFS.
21
In Windows 2000, what is the best way to restore a deleted user account?
Select undelete from the popup menu.
Create a new account with the same user name.
Select undo from the Edit menu.
> Delete cannot be undone.
22
What must a Windows 2000 client do in order to assign a logical drive letter to a shared folder on a network file server?
> map to the network drive
link to the file server
share the network folder
create a path to the file server
***nilai : 100%***
who u are ?
Death_Note

(^_^;)
Favourite Link
Blog Archive
1
What must be done when setting up a RAID array in Linux?
All the disks must be partitioned as primary partitions.
All the partitions need an extended partition.
> The disks must be mounted using LVM.
The disks must be formatted using NFS.
2
ext3 introduced journaling capabilities to Linux file systems. What is an advantage of a journaling file system?
> It reduces the time spent recovering a file system after a crash.
It allows administrators to determine the owners of files created on the system.
It keeps file clusters attached to the files to which they are allocated.
It enables Linux systems to interoperate with Windows systems.
3
Most NOSs will only run on certain hardware configurations. For which four items are minimum requirements specified? (Choose four.)
> CPU speed
> CPU type
> RAM
CD-ROM drive
> hard disk space
NIC
4
Linux systems typically dedicate an entire partition to virtual memory. What is this partition called?
the RAM partition
> the swap partition
the pagefile partition
the page partition
the memory partition
5
What are two valid file systems for a Linux partition? (Choose two.)
ext1
> ext2
> ext3
HFS
boot
FAT
6
Which Windows file performs the same function as the Linux LILO files?
HAL
> NTLDR
NTDETECT
NTOSKRNL
7
When setting up a hard disk, what are the three possible types of partitions?
primary, secondary, and logical
> primary, logical, and extended
C, D, and E
boot, program, and data
8
A technician is trying to configure a PC to dual boot with Windows XP and Linux. XP has already been installed and configured in one partition. Linux has been installed in another partition. The technician wishes to replace the LILO loader with grub but is having problems. What is the most likely cause of the problem?
> The technician did not remove the LILO files first.
Grub will not work with XP.
Linux should have been loaded first.
The technician did not run /sbin/grub-install.
9
How is the root partition identified in Linux?
?
Root
/root
> /
10
The figure shows a section of the display from Device Manager. What does it show about the laser printer?
The network cable is unplugged.
> Windows recognized the device but could not locate a suitable driver.
Windows does not know the proper name of the device.
Windows could not locate the device in the expected location.
11
What is the first step every computer will perform when it is turned on, regardless of the operating system?
boot
RAM
> POST
SCSI
12
Which Windows utility can be used to perform a hardware inventory?
Administrative Tools
ScanDisk
Windows Explorer
> Device Manager
13
What is the best source of hardware compatibility information?
> the World Wide Web
a hardware manual
a software manual
the CD-ROM readme document
14
How many partitions can an MS-DOS-type partition table describe?
one
two
> four
eight
15
Which of the following Windows file systems is the most appropriate for a network file server?
FAT16
FAT32
> NTFS
HFS
16
The ping command is used to test network connectivity. What is the best IP address to ping for this test?
the DNS address
the loopback address
the local NIC address
> the default gateway address
17
Which task should be performed before installing a NOS?
Change the system hardware and peripherals before beginning.
> Verify that the NOS supports all application software that will run on the server.
Run the evaluator software prior to loading to establish hardware settings.
Be familiar with the NOS so configuration questions can be ignored.
18
Which four items of information are required for TCP/IP network configuration? (Choose four.)
> IP address of host
> subnet mask
MAC address
> IP address of default gateway
> IP address of DNS server
host name
***nilai : 95.0%***
1
Which one of the following office tools is available for both Linux and Windows?
ClarisWorks
ApplixWare
Lyx
> StarOffice
2
Which of the following criteria must software meet in order to display the Open Source Initiative trademark?
It must be easily altered and adapted to all major operating systems and source code must be limited.
It must be compatible with third party add-ons and use standard source code.
It must be provided in multiple languages and cost must be minimal.
> It must be freely distributed without restriction and the source code must be available.
3
What are two important features provided by security on a NOS?
> authentication and encryption
reliable performance and account management
virus protection and prevention from spamming
processor balance and sustained work load
4
Which of the following is a better choice than Telnet for Remote Login Servers on a Linux system?
SSL
> SSH
Kerberos
Remote Access
5
A user account on a server enables the server to do which of the following?
automatically download appropriate applications and print queues to that user
> authenticate that user and allocate those resources the user is allowed to access
assign a specific IP and MAC address to the user's workstation
assign the user to a specific domain and user group
6
Why might the administrator of a small company choose Windows 2000 Server instead of Windows 2000 Professional?
The operating system is to run on a dual-processor system.
> The system is to act as a DNS server.
The company needs an intranet based on a small web server.
The server will be accessed by up to ten simultaneous users.
7
Which client/server file system is used by most varieties of Linux file servers?
FAT32
> NFS
NT
SMB
8
How many Primary Domain Controllers (PDCs) are allowed in a Windows NT environment?
> 1
2
4
9
9
Which of the following is open source?
all versions of UNIX
Windows 2000
all versions of NetWare
> Linux
10
Which program, running on a Linux server, allows Windows-based clients to see the Linux file system without installing client software?
NFS
Apache
> Samba
KDE
11
Which type of authentication security does Windows 2000 Professional support?
Secure Socket Layer
> Kerberos
Samba
Apache
12
Which statement accurately describes the Slackware Linux distribution?
It is designed for Linux novices.
It has a range of user interfaces and uses RPM.
> It is designed for advanced users and uses text-based configuration tools.
It is intended solely for non-profit organizations and uses the Debian package manager.
13
What are two popular Desktop Environments that run on Linux?
> GNOME and KDE
Apache and Samba
Xfree86 and GNOME
Apache and KDE
14
What are two benefits of having more than one processor in a system?
support for remote locations and automatic job queuing
> faster speeds and increased work capacity
reduced need for IP addresses and decreased boot time
reduced need for IP addresses and increased manageability
15
How is redundancy built into a server system?
> by including additional hardware components that can take over if other components fail
by including a tape back-up system to preserve data
by adding redundancy software to the system
by keeping duplicates of all data
16
Which Linux distribution was built solely for nonprofit uses?
> Debian GNU/Linux
Caldera eDesktop and eServer
SuSE Linux
LinuxPPC
17
What are three important considerations when selecting a Linux distribution? (Choose three.)
> whether the computer will be used as a client or a server
whether or not the computer will be connected to a network
whether or not a GUI interface is required
> whether or not a command line user interface is required
> the experience level of the user
18
In a Windows NT environment, what is the meaning of the term domain?
a dedicated server containing the database of all IP and MAC addresses on the network
a group of computers located in a specific physical or geographic region
the OU that contains all user accounts
> groups of computers, users, and resources that form an administrative boundary
19
Windows 2000 Professional supports plug-and-play technology. What is one of the major advantages of this technology?
An administrator can add devices from any manufacturer to the system and they will work.
Devices no longer need software drivers to interact with the system.
Components will interact with the system if plugged in prior to system boot.
> An administrator or user can easily add components to the system without manual configuration.
***nilai : 97,4%***
1
Which syntax is invalid for opening an FTP connection?
> ftp connect hostname
ftp
ftp 192.127.34.219
ftp computer.company.com
2
Which protocol was designed for file sharing on the Internet?
HTTP
> FTP
SMTP
TCP
3
Which version of Directory Service does Linux use?
NDS
> NIS
NFS
NDAP
4
Which statement correctly describes an NIS slave?
An NIS slave is another name for an NIS client.
An NIS slave is where the NIS database is maintained.
An NIS slave is where the NIS database is created.
> An NIS slave contains a copy of the NIS database.
An NIS slave contains the portions of the NIS database needed by the clients it serves.
5
Which of the following is a list of popular scripting languages?
X Window script, vi script, Gnome script
XML script, Sequel, Gnomepad
UNIX shell script, pico script, EmacsScript
> VBScript, Linux shell script, JavaScript
6
What are three characteristics of an intranet? (Choose three.)
communication with outside business partners
> firewalls
> multiple networks across the company
public access
local area network only
> web servers
7
Which TCP/IP protocol is responsible for file sharing?
DNS
> NFS
UDP
IPX
8
Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)
ASP
FTP
HTML
> HTTP
> HTTPS
IP
9
What is the purpose of a directory service?
It increases the need for redundant logins.
> It provides administrators with centralized control of users and resources across the network.
It impairs network security and must therefore be used with a firewall.
It keeps track of the home addresses and phone numbers of all users.
10
What is the default order in which print jobs are processed when using a FIFO queue?
The last job placed in the queue is the first to be printed.
> The oldest job in the queue is printed first.
Smaller jobs are printed before larger jobs.
Larger jobs are printed before smaller jobs.
The network administrator determines which jobs are printed first.
11
What are two common uses of scripting languages? (Choose two.)
automate administrative tasks, such as cycling log files
> provide user interaction with a compiled program
> run scheduled tasks at user login
deliver files to remote users on request
download required drivers to printers
12
Which of the following is a list of common FTP commands?
> get, put, cd, bye
download, upload, dir, chdir, exit
send, receive, dir, cd, exit
transfer [from | to], list, dir, exit
13
Which popular web server software is only available for Windows operating systems?
Apache
Firefox
Internet Explorer
> Internet Information Server
Netscape Server
Opera
14
A network administrator is operating in the GNOME desktop environment. Which application would the administrator start in order to establish a command line session with a remote server?
gFTP
Mozilla
Star Office
> xterm
15
Where do print jobs wait to be printed?
print list
> print queue
wait list
print job roster
16
Which protocol controls web page transmission?
FTP
> HTTP
SMTP
DNS
17
Which scripting language can be used on a Linux server to notify users that a print job is complete?
batch script
JavaScript
JScript
> shell script
VBScript
***nilai : 97,1%***
1
Which IP address range, as indicated by the first octet, is reserved for testing, and includes the loopback address?
> 127.x.x.x
168.x.x.x
255.x.x.x
192.x.x.x
2
Which service is used to enable individual computers to automatically obtain an IP address?
WINS
DNS
ARP
> DHCP
3
How many octets are contained in an IP address?
1
2
> 4
8
4
Which address class contains the IP address 168.12.0.0?
A
> B
C
D
5
Which Linux command is used to temporarily change the default gateway of a host?
arp
ifconfig
netstat
> route
ping
6
What is the range of numbers that can be used in the first octet of a Class A network?
> 1-126
128-191
192-223
1-255
7
Which of the following rely on ICMP?
> sending an Echo Request
logging in to a remote host
mapping an IP address to a MAC address
resolving a host name
8
In which layer of the TCP/IP model does ICMP operate?
Application
Transport
> Internet
Network Access
9
Which classes of IP addresses are used by commercial organizations for host addressing?
A,C,D
B,C,D
C,D,E
> A,B,C
10
The performance of a network has dropped. Which command should an administrator use in a Linux system to determine which routers are causing the problem?
ping
> traceroute
tracert
route
ifconfig
11
What is the primary function of NAT?
convert a MAC address to a domain name
> translate between a local IP address and a global IP address
allocate IP addresses to commercial organizations
determine the best route through a network
12
Which utility is used in Windows and Linux to view network connections and protocol statistics?
arp
> netstat
nbstat
ipconfig
13
What is the range of numbers in the first octet of a Class C address?
1-127
> 192-223
128-191
224-255
14
Which service does ARP provide?
It resolves a physical address to a TCP port number.
It resolves a broadcast address to an IP address.
> It resolves an IP address to a MAC address.
It resolves a URL to a MAC address.
15
Which protocol is used to translate a domain name into an IP address?
ARP
> DNS
UDP
NetBIOS
16
What is subnetting?
> dividing large networks into smaller ones using the same network number
allowing several small networks to communicate over the common carrier infrastructure
combining several networks into a single larger network
allowing separate companies to share an IP address by taking turns using it
17
A technician needs to log into a remote Linux PC to perform some maintenance. Which application layer protocol could be used?
> Telnet
FTP
HTTP
SNMP
18
What must a computer have when connected to a network?
one unique name per function
one unique address per service
> one unique address per connection point
one unique network
19
How would a technician permanently change the IP address of an Ethernet card on a Red Hat Linux PC to 192.168.34.4?
use the command ifconfig eth0 192.168.34.4
use the command route add default IP 192.168.34.4 dev eth0
use the command ping 192.168.34.4
> edit the IPADDRESS line in the file /etc/sysconfig/network-scripts/ifcfg-eth0
20
What is a unique characteristic of the IP addressing scheme?
flat addressing
> hierarchical addressing
internetwork addressing
single-octet addressing
***nilai : 100%***
1
How many bits are in an IP address?
16
64
> 32
48
2
Which of the following devices is used to segment a network into different broadcast domains?
switch
active hub
bridge
> router
3
Which three of the following items can a DHCP server provide to a host computer? (Choose three.)
> subnet mask
MAC address
> default gateway
> IP address
DHCP server address
4
Which list contains important considerations when selecting a NIC to use on a network?
type of network, type of RAM, type of system bus
type of media, type of system bus, type of RAM
> type of network, type of media, type of system bus
type of system bus, processor speed, type of media
5
What is the most commonly used architecture in Ethernet LANs?
bus
> star
mesh
ring
6
Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.
> DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host computers.
DNS servers are used to translate from private addresses to public addresses.
7
Which of the following options correctly describes APIPA?
APIPA allows a privately addressed host to assign itself a public IP address in order to access a remote network.
> APIPA enables a computer to assign itself an IP address if it cannot contact a DHCP server.
APIPA is fault-tolerant feature that allows a server to mirror another server on a local network.
APIPA enables a computer to translate domain names into IP addresses if it cannot contact a DNS server.
8
What are the two most common wireless networking technologies? (Choose two.)
> radio frequency
microwave
laser
> infrared
satellite wavelength
9
Which term refers to the path that signals take from one point on a network to another?
address resolution
> logical topology
dynamic host configuration
physical topology
10
What is a major disadvantage of the bus topology?
It is expensive.
It requires a lot of cabling.
> A break in any one part of the cable brings down the entire network.
All computers must be placed in a straight line.
11
What is the purpose of the twists in Category 5/5e UTP cable?
to prevent the cable from breaking
to make the cable easier to install and terminate properly
to make the cable cheaper to produce
> to limit signal degradation caused by cross talk
12
Which two of the following statements accurately describe a default gateway? (Choose two.)
A default gateway is used when a host transfers data to another host on the same network segment.
> A default gateway is the IP address assigned to the near-side router interface.
> A default gateway is the IP address assigned to the near-side switch interface.
A default gateway is used when a host transfers data to a host on another network segment.
13
What are three options for assigning logical addresses to hosts? (Choose three.)
> static
> dynamic
negotiation
> automatic
holistic
14
Which list indicates advantages associated with fiber-optic cable?
capable of running long distances, inexpensive to install, not susceptible to electromagnetic interference
not susceptible to electromagnetic interference, expensive to install, lower data rates
> not susceptible to electromagnetic interference, higher data rates, capable of running long distances
lower data rates, inexpensive to install, capable of running long distances
15
What is the function of a DHCP server?
It stores websites that are used frequently.
> It dynamically assigns IP addresses to hosts.
It determines the subnet mask of a network.
It serves as a "first line of defense" firewall.
16
Which data link layer device can segment a network into different collision domains?
a router
> a switch
a gateway
a transceiver
17
What are three important considerations when selecting a NIC? (Choose three.)
> network type
operating system
> system bus
> network media
number of network users
18
Which two devices are at the core of wireless communications? (Choose two.)
satellites
light emitting diodes
> transmitters
> receivers
modulators
19
What is the main function of the DNS?
to scan the network for viruses
> to translate computer names to their corresponding IP addresses
to assign IP addresses to nodes on the network
to provide names to all the nodes on a network
20
What are two advantages of using dynamic address assignment instead of manual address assignment? (Choose two.)
> On a large network, manually assigning addresses can be very time consuming.
Manual address assignment requires network administrators to understand physical addressing.
Dynamic address assignment can help segment a large network.
> Manual address assignment requires network administrators to understand logical addressing.
***nilai : 100%***
1
What does the term media access control describe?
> the rules for coordinating the use of the medium
a list of users allowed to use the network
the system administrator's role in controlling access to the network
how to determine which media type is best for a network
2
Peer-to-peer and client/server networks share many characteristics. What is unique to the client/server environment?
Passwords may be required to access shared resources.
Local data files and devices can be shared by several users.
Computers typically communicate using request/response protocols.
> Security and resource management scales easily as the network grows.
3
What do transport layer protocols use to identify the application needed to process data?
> ports
MAC addresses
IP addresses
DNS
flags
4
What is one disadvantage of a client/server network?
> It can have a single point of failure.
It does not scale well to large networks.
It requires each user to be trained to perform administrative tasks.
It is less secure than a peer-to-peer network.
5
Which statement best describes a serial link?
> Bits of information are transmitted across the link one after another.
Bits of information are randomly transmitted across the link.
Bits of information are sent across a dedicated link in one direction only.
Bits of information are only sent using dial-up or ISDN lines.
6
Which network layer protocol enables routers to discover the best path between networks using hop count?
IP
> RIP
ARP
OSPF
7
Why are open source technologies appealing to many people?
A more organized source of funding and development is available.
Proprietary technologies involve cooperation between many companies.
De facto standards allow for more choice.
> Users are not bound by copyright laws.
8
What are two advantages of Windows over Linux? (Choose two.)
Windows can be used publicly for free.
> Windows is easier to use than Linux.
Unlike Linux, Windows is standardized through the efforts of many independent sources.
> Unlike Linux, Windows has an organized source of funding and development.
9
What is a major advantage of UTP?
> It is inexpensive.
It is highly resistant to electromagnetic interference.
It limits the number of hosts on a network.
It is an inexpensive way to interconnect remote locations.
10
Which of the following is the most popular physical LAN topology?
ring
> star
bus
fiber
11
Which statement is true of peer-to-peer networks?
They scale easily as the size of the network grows.
Security is easily maintained.
> Computers may change roles from client to server as needed.
At least one computer functions as a dedicated server.
12
Which access control method is specified in the IEEE 802.3 standard?
CSMA/CA
> CSMA/CD
token passing
store and forward
13
What is the physical topology when all the computers in a network connect to a central point?
point-to-point
> star
ring
bus
14
Which of the following works as a "storage and retrieval" application?
Telnet
> e-mail
DNS
SNMP
15
What is an advantage of Linux?
Linux is easy to use.
With copyrights, Linux experiences fast technological growth.
> Linux is free for public use.
Linux has an organized source of development.
16
Which of the following statements best describes full-duplex transmission?
Data can be sent across bus hubs and switches.
> Data can be simultaneously sent and received.
Data can only be sent in one direction.
Data can be sent and then received.
17
Which of the following statements is true of print sharing?
It requires a company to purchase more printers.
It makes it more difficult for an administrator to control printers.
> It allows for more efficient use of printers.
It limits the user to a single network printer.
18
Which DSL technology is most commonly used?
SDSL
> ADSL
VDSL
IDSL
19
Which features are LANs generally designed to accommodate?
> many users, high speed, limited geographical area
many users, high speed, broad geographical area
few users, low speed, limited geographical area
few users, low speed, broad geographical area
20
What is the purpose of protocols?
> to provide a controlled sequence of messages between systems
to define which users have access to the network
to allow the network administrator to decentralize control
to limit access to network resources
21
What is one advantage of directory and name services?
All directories are kept in a single location.
User names have a standardized format.
> Text names are easier to remember than numeric addresses.
Network resources are bound to a physical location.
22
Which two types of cabling will support 100BASE-X? (Choose two.)
Category 2
> Category 5
> two-strand fiber-optic
50-ohm coaxial
23
Which technology provides the best support for upload-intensive Internet tasks?
ISDN
> cable modem service
analog modem service
ADSL
^^(& terdapat 3 pertanyaan yang menanyakan tentang pendapat)
***nilai : 100.0%***
1
Though obsolete in current desktop environments, what are three valid reasons for the continued use of MS-DOS? (Choose three.)
> MS-DOS supports legacy applications.
MS-DOS is an intuitive, high-overhead operating system.
MS-DOS rarely crashes because it is a multitasking operating system.
> MS-DOS is relatively easy to use.
> MS-DOS can run on inexpensive hardware.
2
Which of the following is a valid concern for a company considering a move from Windows to Linux?
Linux generally allows companies to recycle old hardware and software.
> Users may need special training to become productive with Linux.
Special third party software may be necessary to secure and configure Linux.
Linux generally requires more disk space than Windows.
3
What are three reasons why a company may choose Linux over Windows as an operating system? (Choose three.)
> The entire Linux installation can be completed using either a GUI or CLI.
The entire Windows installation can be completed using either a GUI or CLI.
Windows can be run entirely from a CD.
> Compared to Windows, Linux is virtually virus-free.
> Linux is a true multi-user system.
Linux has superior one-dimensional security.
4
What is meant by the statement, "We have to support our legacy system"?
Support must be provided for the newest Linux system.
> Support must be provided for the system called legacy.
Support must be provided for the newest Microsoft system.
Support must be provided for outdated software.
5
Which two statements describe the security features of Linux? (Choose two.)
> Compared to Windows, Linux is virtually virus-free.
> Users must have a valid username and password to log into a Linux system, by default.
Linux security is one dimensional.
Most security features for Linux must be purchased from a third party.
6
Which two of the following shells are commonly available for Linux? (Choose two.)
Bore shell
> Korn shell
Cash shell
> C shell
PC shell
7
Which two of the following statements are true? (Choose two.)
Linux is a true 16-bit operating system that uses preemptive multitasking.
Linux supports all Windows applications through the use of cooperative multitasking.
> Linux operating system code is available for anyone to modify and use.
Linux is a true 48-bit operating system that uses minimal virtual memory.
> Linux is a true 32-bit operating system that uses preemptive multitasking.
8
From which Windows configuration tool can a user perform hardware and network configurations?
Window Manager
My Computer
> Control Panel
Task Manager
9
What is a beneficial feature of preemptive multitasking?
Applications share the use of the processor by time slicing.
The processor dynamically adjusts the amount of memory needed by the application programs.
Application programs share memory addresses and exchange information.
> The operating system controls the allocation of processor time.
10
Which of the following is generally regarded as the standard GUI for Linux?
Red Hat Desktop
CDE
> GNOME
Star Office
11
Which two statements describe security in the Windows operating system? (Choose two.)
Windows is less susceptible to viruses than Linux.
By default, users must have a username and password to log into Windows.
> Windows security is generally one dimensional.
> Windows security is improved through the use of third-party applications.
Windows can securely support multiple users with the Terminal service installed by default on personal computers.
12
Network operating systems were designed to provide which of the following tasks? (Select three.)
> file security
multitasking
> user privileges
resource access for a single user
> resource sharing among multiple users
13
When compared to a command line interface, what is a major disadvantage of a GUI?
It requires an understanding of commands.
> It requires more memory and storage space.
It is more difficult to use.
Most server operating systems do not support a GUI.
14
Which acronyms describe the two general categories of OS user interfaces?
DOS and UNIX
DOS and GUI
UNIX and GUI
> CLI and GUI
15
Windows and Linux both use a file system that resembles an upside-down tree. What is the name of this type of file structure?
binary
> hierarchical
empirical
subsystem
16
Which command is entered in the Run dialog box of a Windows XP system to open a command prompt window?
run
start
> cmd
dosprompt
17
Which three of the following file systems does Windows 2000 use? (Choose three.)
EXT2
> FAT16
> FAT32
> NTFS
HPFS
18
What is the main reason FAT32 was created?
New operating systems required the use of filenames greater than eight characters.
> Earlier versions of FAT used disk space inefficiently.
FAT32 was needed to support drives up to 4 GB.
The maximum length of file extensions needed to be increased to three characters.
19
Which part of the OS, loaded into memory at boot time, controls memory allocation?
user interface
application software
> kernel
file system
20
With the FAT file system, what is the basic unit of logical storage on a disk?
megabyte
> cluster
directory
logical drive
***nilai : 95.5%***
1
ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?
NIC
Wireless NIC
USB gateway
RAID adapter
multiple slave hard disk adapter
2
Which power mode should be used by a laptop so that all the data is saved, all the applications the user was working on are left open, and there is no power used by the laptop?
Hibernate
Suspend
Left on with no power mode
Soft shutdown
3
When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?
BIOS reads the MBR.
NTDETECT.COM is used to detect any installed hardware.
NTDLR reads the registry files.
The WINLOGON.EXE program is started.
4
A user is reporting that a new external hard drive is defective. The laptop will allow access to the drive at times, and then will report that the drive cannot be found. Upon an initial examination of the laptop, it is discovered that the user has ten USB devices connected to the laptop.
What is the best quick solution to this problem?
Remove all the peripherals except the hard drive and observe the results.
Move the laptop to another location and observe the results.
Replace the power adapter and observe the results.
Replace the USB hub and observe the results.
Flash the BIOS on the laptop and observe the results.
5
Refer to the exhibit. Which type of removable media is depicted?
hard disk
USB optical drive
PC card
flash drive
6
Refer to the exhibit. Which sequence of steps describes the printing process used by a laser printer?
1,2,3,4,5,6
2,5,3,4,1,6
3,4,1,6,2,5
4,2,6,5,3,1
7
Where can a user change the idle time after which a laptop will switch to standby mode?
Right-click the desktop, then click Power Modes > Standby.
Right-click My Computer, then click Properties > Hardware > Device Manager > ACPI.
Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.
Left-click Start > All Programs > Accessories > System Tools > Power Management.
8
What is the default subnet mask for a Class A network?
0.0.0.255
0.0.255.255
0.255.255.255
255.0.0.0
255.255.0.0
255.255.255.0
9
When installing the Windows XP operating system, a technician is given a choice of file systems to use. If security is a requirement, which file system should be chosen?
FAT32
HPFS
NFS
NTFS
10
A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?
Administrative Tools
BIOS
Command Prompt
Safe mode
System Registry
11
Which three things should be investigated first when troubleshooting a printer? (Choose three.)
equipment power
corrupt print driver
low-ink warning
out of paper
operating system compatibility
firmware version
12
A technician is having trouble with laptops that keep overheating. What preventive maintenance procedure can be performed on the laptops to reduce this problem?
Regularly replace the laptop battery.
Encourage users to run the laptop from the battery more often.
Encourage users to run the laptop from the AC adapter more often.
Remove and clean the CPU.
Clean the air vents.
Replace the fan.
13
The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver?
manufacturer's website
Microsoft Update website
printer installation disk
Windows Device Manager
Windows hardware profiles
14
When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages?
A
B
C
D
E
15
A user has been writing data to a USB flash memory drive. What should the user do before removing the device?
Shut down the computer.
Click on the Safely Remove Hardware icon in the system tray then on the device.
Right-click on the drive in My Computer, then click on Remove Drive .
Remove the power to the drive.
16
Refer to the exhibit. Which two port types are shown in the graphic? (Choose two.)
modem
network
parallel
serial
USB
17
Which three rules increase the level of password strength? (Choose three.)
Passwords should never expire.
Passwords should be a combination of letters and numbers.
Passwords should combine a user's special dates and initials so they can be alphanumeric.
Passwords should be changed by the user after specific periods of time.
Password expiration and lockout policies should be clearly defined.
Passwords should be short to reduce the chances of users forgetting them.
18
Which two types of connectors can be found on DVI cables? (Choose two.)
19
Refer to the exhibit. Which three status LEDs are shown in the graphic? (Choose three.)
battery status
Bluetooth activity
caps lock
hard-drive activity
power on status
wireless activity
20
Which two interface types make it possible to attach different external components to laptops and desktops without powering the computer off? (Choose two.)
ExpressCard
FireWire
ISA
PCI
PCMCIA
USB
21
A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?
The computer automatically boots into Safe Mode and displays a warning on the screen.
The screen flashes with a red background and displays a warning message.
The computer emits a pattern of beeps indicating the failing device.
The computer returns an error message indicating the I/O address of the failing device.
22
Which type of power connector is used to connect devices such as optical drives and hard drives?
20-pin
24-pin
Berg
Molex
P8
P9
23
What characterizes a DDoS attack?
Many hosts participate in a coordinated attack.
Infected computers are called Daemons.
It is easy to identify the source of the attack.
All hosts must be in the same geographic area.
24
A technician has replaced a failing floppy drive. While testing the new drive, the technician notices that the floppy drive light remains lit constantly. What is most likely the cause of the problem?
The new floppy drive is faulty.
The ribbon cable is installed incorrectly.
The jumper settings are set incorrectly for the floppy drive.
The floppy drive has been disabled in the BIOS.
25
Which type of cable standard uses a 9-pin connector and supports data rates in excess of 800 Mbps?
DB-9
DB-25
IEEE 1284
IEEE 1394a
IEEE 1394b
26
A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and diagnostic utilities. Where would the technician set the boot order for the PC?
My Computer
Control Panel
Device Manager
BIOS
Start Menu
27
Which two general precautions should be taken before replacing any non-hot-swappable laptop component? (Choose two.)
Disconnect the power cord.
Keep any component in a plastic bag until installation.
Remove any batteries.
Use carpets in cool areas.
Wear rubber-soled shoes to work with the computer.
28
A computer can access devices on the same network but can not access devices on other networks. What is the probable cause of this problem?
The cable is not connected properly to the NIC.
The computer has an invalid IP address.
The computer has an incorrect subnet mask.
The computer has an invalid default gateway address.
29
What is the purpose of an IRQ?
Perform input/output between the CPU and peripherals.
Establish peer-to-peer communication between devices and software.
Request information from the CPU.
Access the computer RAM for reading and writing.
30
Which protocol adds security to remote connections?
FTP
HTTP
NetBEUI
POP
SSH
31
What is the logical topology used for the Ethernet architecture?
bus
double ring
extended star
ring
star
32
What are the four levels in the TCP/IP reference model.
HTTP, FTP, Telnet, SSH
TCP, IP, DNS, DHCP
application, transport, internetwork, network interface
application, presentation, session, transport
physical, data link, network, transport
33
Which type of scanner generally has high costs but produces top-quality images?
all-in-one
drum
handheld
flatbed
34
When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumables. Which two consumables are associated with an inkjet printer? (Choose two.)
drum
ink cartridge
ink ribbon
paper
toner
35
Which network device uses a MAC address table to segment the network?
concentrator
hub
PBX
router
switch
36
Where in Windows XP can the shutdown, hibernate, and standby modes be configured?
Start > Control Panel > Power Options
Start > Control Panel > Administrative Tools
Start > Control Panel > Power Modes
Start > Control Panel > System
37
Which protocol dynamically assigns IP addresses to network devices?
DHCP
DNS
ICMP
RARP
TCP
38
Which two quick solutions are commonly recommended when a technician is troubleshooting a laptop? (Choose two.)
Reboot the laptop.
Reinstall the operating system.
Disconnect the peripherals.
Have the customer verify the problem.
Call a level-2 technician.
39
Why do mobile devices such as laptop computers use specially designed CPUs?
They consume less power.
They are smaller.
They are lighter.
They require customized cooling mechanisms.
40
What characterizes spoofing?
Making data appear to come from a source other than the actual source.
Sending abnormally large amounts of data to a remote server to prevent user access to the server services.
Intercepting or inserting false information in traffic between two hosts.
Sending bulk e-mail to individuals, lists, or domains intending to prevent users from accessing e-mail.
41
A company uses a single computer to receive and test all Windows updates. When the most recent update was installed, several programs failed. What is the first course of action that a technician should attempt to remove the update?
Run a System Restore from the last restore point.
Use the Add or Remove Hardware applet in the Control Panel to remove the update.
Restore the hard drive from the last system backup.
Use the Recovery Console to restore the operating system.
42
Which Windows tool should be run before upgrading the operating system?
Convert
Fdisk
Msconfig
Ntbackup
43
A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack?
multi-ping attack
phishing
ping bomb
ping of death
spoofing
zombie attack
44
When installing a network adapter into a client computer, a technician notices that the contacts on the adapter need to be cleaned. Which solution should the technician use to clean the contacts?
glass cleaner
isopropyl alcohol
mild detergent
rubbing alcohol
slightly abrasive cleanser
45
A customer is upset and wants to speak to a specific technician to resolve a problem immediately. The requested technician is away from the office for the next hour. What is the best way to handle this call?
Refer the angry customer to a supervisor.
Advise the customer that the requested technician is out of the office and insist on trying to resolve the problem.
Make an offer to help the customer immediately, and advise the customer that otherwise the requested technician will call the customer back within two hours.
Ignore the request for the specific technician by walking through a step-by-step process with the customer in an attempt to refocus the customer and solve the problem.
46
A customer is angry and calls to complain that the service scheduled on his computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?
Verify that the computer is working properly now.
Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer.
Explain that the repair technician sent to perform the repair is inexperienced.
Put the customer on hold until a supervisor is available.
47
In the event of a catastrophic system or hardware failure, which Windows XP utility provides a framework for saving and recovering the operating system?
Emergency Repair Disk (ERD)
Automated System Recovery (ASR)
Windows Recovery Manager (WRM)
Automated Windows Recovery (AWR)
System Restore (SR)
48
Which three benefits are gained by networking computers? (Choose three.)
decreased need of personal training
fewer peripherals needed
decreased computer-to-user ratio
lower cost licensing
increased user specialization
increased communication capabilities
49
ABC Company wants to configure laptops to automatically power components off to improve battery life. Which power management control can be used to accomplish this?
ACPI
AMD
UPS
BIOS
PnP BIOS
50
A technician needs to configure the hard drive on a computer so that there appears to be one drive for the operating system and four drives for data from different applications. How can the hard drive be configured to provide this perception?
Create five primary partitions.
Create one extended partition with five logical drives within it.
Create one primary partition and an extended partition with four logical drives within it.
Create five extended partitions.
Create one logical partition with five primary partitions within it.
Create one primary partition and one logical partition with four logical drives within it.
Label: Experience