Anthony Schulmeister
Quiz por , criado more than 1 year ago

Michael Haines' Hardware Support Exam CH 16, 17, 18

122
1
0
Anthony Schulmeister
Criado por Anthony Schulmeister quase 9 anos atrás
Fechar

Hardware Support Exam CH 16, 17, 18

Questão 1 de 67

1

A WLAN covers a large geographical area and is made up of many smaller networks.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 2 de 67

1

A half duplex connection allows a device to send and receive, but not at the same time.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 3 de 67

1

Phone cords are a type of twisted-pair cable and use an RJ-45 connector.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 4 de 67

1

10Base5 cabling runs at speeds up to 1 Gbps and distances to 500 meters.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 5 de 67

1

A punchdown tool is used to wire twisted-pair cabling to a keystone jack.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 6 de 67

1

Which of the following network types covers a large campus or city?

Selecione uma das seguintes:

  • PAN

  • WLAN

  • MAN

  • WAN

Explicação

Questão 7 de 67

1

Which physical topology uses a centralized device to manage traffic on the network?

Selecione uma das seguintes:

  • mesh

  • ring

  • bus

  • star

Explicação

Questão 8 de 67

1

What type of network can you set up to share files if you have two laptops with wireless NICs but there is no Wi-Fi hotspot available?

Selecione uma das seguintes:

  • ring network

  • infrastructure network

  • ad hoc network

  • hybrid network

Explicação

Questão 9 de 67

1

Which network technology that is used to connect to the Internet has a maximum speed of 44 Mbps, uses dedicated lines, and is used by large companies?

Selecione uma das seguintes:

  • SDSL

  • T3

  • Fast Ethernet

  • OC-3

Explicação

Questão 10 de 67

1

Which of the following is true about cable Internet?

Selecione uma das seguintes:

  • you share the cable infrastructure with your neighbors

  • you need filters on every phone jack

  • fiber optic cabling is required

  • provides up to 2.3 Mbps of bandwidth

Explicação

Questão 11 de 67

1

What does a NIC use to connect to wired network media?

Selecione uma das seguintes:

  • HDMI port

  • RJ-45 port

  • 10BaseT port

  • Half duplex port

Explicação

Questão 12 de 67

1

What should you choose in the properties of a network connection so that Windows will use the best possible speed and duplex mode?

Selecione uma das seguintes:

  • Optimal Configuration

  • Automatic Configuration

  • Auto Negotiation

  • Default Settings

Explicação

Questão 13 de 67

1

Which feature should you configure on a network adapter to control which applications have priority on the network?

Selecione uma das seguintes:

  • PoE

  • WoL

  • QoS

  • PoTS

Explicação

Questão 14 de 67

1

What is the unit of information called when a network adapter adds the source and destination MAC address to the segment of data before it is transmitted on the network?

Selecione uma das seguintes:

  • frame

  • packet

  • bit

  • segment

Explicação

Questão 15 de 67

1

Which type of network device keeps a table of the MAC addresses of the devices connected to it?

Selecione uma das seguintes:

  • hub

  • router

  • NIC

  • switch

Explicação

Questão 16 de 67

1

What type of device do you need if you want to connect two network segments together such as a wireless network and a wired network?

Selecione uma das seguintes:

  • hub

  • NAS

  • repeater

  • bridge

Explicação

Questão 17 de 67

1

What device should you consider if you want to have access to hard drives via an Ethernet connection?

Selecione uma das seguintes:

  • NAS

  • VoIP

  • AP

  • RAID

Explicação

Questão 18 de 67

1

Which of the following cabling systems uses fiber-optic cable?

Selecione uma das seguintes:

  • 10GBaseT

  • 1000BaseFX

  • 10Base2

  • 10Base5

Explicação

Questão 19 de 67

1

Which type of cabling should you use for Gigabit Ethernet?

Selecione uma das seguintes:

  • coaxial

  • thinnet

  • Cat-6

  • RG-59

Explicação

Questão 20 de 67

1

Which of the following is true about 10-Gigabit Ethernet?

Selecione uma das seguintes:

  • you can use Cat-5e or Cat-6 cabling

  • it is a good choice for backbone networks

  • it is sometimes called Fast Ethernet

  • coaxial is a good choice for cabling

Explicação

Questão 21 de 67

1

Under what circumstance might you use a loopback plug?

Selecione uma das seguintes:

  • to test a USB port

  • to capture network packets

  • to test a network cable

  • to find the max speed of a connection

Explicação

Questão 22 de 67

1

Which of the following provides multiple network ports for cables that converge in an electrical closet?

Selecione uma das seguintes:

  • patch panel

  • RJ-45 jack

  • terminal adapter

  • loopback port

Explicação

Questão 23 de 67

1

Which of the following is true about a crossover cable?

Selecione uma das seguintes:

  • it’s normally used to connect a computer to a hub or switch

  • you use the T568B wiring standard on both ends

  • it is required to connect two Gigabit Ethernet switches together

  • it can be used to connect two PCs together

Explicação

Questão 24 de 67

1

Which of the following is a reason that there are twists in the wires used for network cabling?

Selecione uma das seguintes:

  • the twists increase the cable strength

  • the twists reduce crosstalk

  • the twists make it easier to punchdown the cable

  • the twists reduce the amount of copper needed

Explicação

Questão 25 de 67

1

What’s the first thing you should do to troubleshoot a network problem related to hardware?

Selecione uma das seguintes:

  • test with a network cable

  • use a different cable

  • use a loopback plug

  • check the indicator lights

Explicação

Questão 26 de 67

1

On the IE General tab you can block cookies.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 27 de 67

1

The default value of the security level in IE is Medium-high.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 28 de 67

1

To use Remote Desktop, the computer you access remotely can be running Windows 7 Home Premium or Windows 7 Professional.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 29 de 67

1

When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 30 de 67

1

If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 31 de 67

1

Which of the following is a task you CAN’T do from the IE General tab?

Selecione uma das seguintes:

  • change the home page

  • disable file downloads

  • delete browsing history

  • manage the IE cache

Explicação

Questão 32 de 67

1

Which of the following is described as a computer that intercepts requests that a browser makes of a server and can cache received content.

Selecione uma das seguintes:

  • DNS server

  • VPN server

  • proxy server

  • Web server

Explicação

Questão 33 de 67

1

Which of the following is NOT true about Remote Desktop?

Selecione uma das seguintes:

  • the client can be running any version of Windows 7

  • by default all users can access Remote Desktop

  • Windows firewall can block Remote Desktop connections

  • you can start the remote desktop client using the mstsc command

Explicação

Questão 34 de 67

1

If you want to be able to power up a computer remotely, what feature should you use?

Selecione uma das seguintes:

  • QoS

  • RDP

  • RemoteApp

  • WoL

Explicação

Questão 35 de 67

1

Which of the following is NOT true about Group Policy?

Selecione uma das seguintes:

  • policies can be applied to a computer

  • all policies are applied before the logon screen appears

  • Group Policy is available in Windows Professional edition

  • you can set the QoS level for an application using Group Policy

Explicação

Questão 36 de 67

1

Which statements is true about controlling access to folders and files?

Selecione uma das seguintes:

  • permissions refer to the tasks an account is allowed to do in the system

  • account configuration should keep in mind the principle of highest privilege

  • rights are assigned to accounts

  • in Windows, accounts have no rights assignments until you configure them

Explicação

Questão 37 de 67

1

Which of the following is NOT true about user accounts and groups?

Selecione uma das seguintes:

  • a user account can belong to only one group at a time

  • by default, standard users accounts belong to the Users group

  • Guest group has limited rights on the system

  • Backup Operators group can restore any files regardless of the group’s permissions to those files

Explicação

Questão 38 de 67

1

Which built-in group might Windows automatically assign a user account to when determining its permissions?

Selecione uma das seguintes:

  • Administrators

  • Guests

  • Backup Operators

  • Anonymous users

Explicação

Questão 39 de 67

1

To which group does Windows give access to folders that you create which are not part of your user profile?

Selecione uma das seguintes:

  • Power Users

  • Guests

  • Authenticated Users

  • Anonymous Users

Explicação

Questão 40 de 67

1

When all users on a network require the same access to all resources, what type of network model should you use?

Selecione uma das seguintes:

  • Domain

  • Homegroup

  • Workgroup

  • Guestgroup

Explicação

Questão 41 de 67

1

Which of the following is true about which folders to use to hold shared data when working with a workgroup?

Selecione uma das seguintes:

  • private data for each user should be kept in their C:\Users folder

  • all users have access to the folders in the C:\Users folder

  • C:\Users\Public should only be used by the Guest account

  • Only Administrators and Guest have access to C:\Users\Public

Explicação

Questão 42 de 67

1

Which type of permission should you set to control access to files and folders by local and network users?

Selecione uma das seguintes:

  • Sharing on FAT32 volumes only

  • NTFS on NTFS volumes only

  • NTFS on exFAT or NTFS volumes

  • Sharing on NTFS or exFAT volumes

Explicação

Questão 43 de 67

1

Which is NOT true about using share and NTFS permissions?

Selecione uma das seguintes:

  • if both permissions are used, the least restrictive permission between the two applies

  • if NTFS permissions conflict between a user and group the least restrictive permission applies

  • when you copy a file, the file takes on the permissions of the destination folder

  • inherited permissions pass from parent folder to child file or folder

Explicação

Questão 44 de 67

1

Which NTFS permission(s) should you assign if the user should be able to create folders and files and open files to read data, but not delete files.

Selecione uma das seguintes:

  • Full control

  • Read & execute

  • Full control, Modify

  • Write, Read

Explicação

Questão 45 de 67

1

When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?

Selecione uma das seguintes:

  • \\sharedfolder\server

  • \server\sharedfolder

  • \\server\sharedfolder

  • /sharedfolder/server

Explicação

Questão 46 de 67

1

When troubleshooting a live network cable, what should you use

Selecione uma das seguintes:

  • a cable tester

  • a DVM

  • a loopback plug

  • an LED indicator

Explicação

Questão 47 de 67

1

On a peer-to-peer network, authentication is the responsibility of the domain.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 48 de 67

1

Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 49 de 67

1

After initially installing Windows 7, you need to disable the Guest account so nobody can use it.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 50 de 67

1

Using Group Policy, you can set security policies to help secure a workstation.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 51 de 67

1

It’s usually a good idea to run several anti-malware programs at the same time on your computer.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 52 de 67

1

What keystroke should you press to get a logon window if you don’t use the welcome screen?

Selecione uma das seguintes:

  • Alt+F1

  • Ctrl+Ins+Home

  • Alt+F5+End

  • Ctrl+Alt+Delete

Explicação

Questão 53 de 67

1

Which of the following is true about the Guest account in Windows 7?

Selecione uma das seguintes:

  • it is disabled by default

  • it automatically has a complex password

  • you cannot rename it

  • it has administrative access

Explicação

Questão 54 de 67

1

Which of the following is true about passwords.

Selecione uma das seguintes:

  • it’s best to write your password down so you don’t get locked out of your computer

  • passwords cannot be longer than 14 characters

  • by default, accounts with a blank password cannot logon remotely

  • letters and numbers are allowed, but no symbols such as ‘@’ or ‘!’

Explicação

Questão 55 de 67

1

Which of the following is true about the Windows Encrypted File System?

Selecione uma das seguintes:

  • files can be marked for encryption, but not folders

  • an encrypted file moved to an unencrypted folder remains encrypted

  • EFS only works on NTFS and FAT32

  • you need to download special software to use EFS

Explicação

Questão 56 de 67

1

Which of the following is NOT true about using Group Policy on business and professional editions of Windows?

Selecione uma das seguintes:

  • you can rename default user accounts

  • you can require user accounts to have non-blank passwords

  • you can use gpedit.msc to see if any policies conflict

  • you can disable logon scripts

Explicação

Questão 57 de 67

1

If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?

Selecione uma das seguintes:

  • a USB port

  • an authentication key on the hard drive

  • a TPM chip on the motherboard

  • a PIN on the BIOS

Explicação

Questão 58 de 67

1

If you don’t want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?

Selecione uma das seguintes:

  • Windows POP technology

  • the BIOS

  • a feature available on some DVD drives

  • your USB keyboard

Explicação

Questão 59 de 67

1

One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?

Selecione uma das seguintes:

  • retinal scanner

  • LoJack token

  • smart card

  • TPM

Explicação

Questão 60 de 67

1

An RFID badge is related to which type of authentication method?

Selecione uma das seguintes:

  • smart card

  • biometric scanner

  • digital certificate

  • privacy filter

Explicação

Questão 61 de 67

1

A privacy filter is used for what aspect of security?

Selecione uma das seguintes:

  • theft of a laptop

  • computer authentication

  • data encryption

  • screen viewing

Explicação

Questão 62 de 67

1

Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive?

Selecione uma das seguintes:

  • ATA Secure Erase

  • low-level format

  • degausser

  • magnetic data filter

Explicação

Questão 63 de 67

1

You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?

Selecione uma das seguintes:

  • shoulder surfing

  • tailgating

  • social engineering

  • session hijacking

Explicação

Questão 64 de 67

1

Which type of malware hides in the MBR program of a hard drive?

Selecione uma das seguintes:

  • boot sector virus

  • Trojan horse

  • keylogger

  • spyware

Explicação

Questão 65 de 67

1

Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

Selecione uma das seguintes:

  • Trojan horse

  • rootkit

  • adware

  • worm

Explicação

Questão 66 de 67

1

Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?

Selecione uma das seguintes:

  • fixmbr

  • bootrec /fixmbr

  • fixboot

  • bootrec /fixboot

Explicação

Questão 67 de 67

1

If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?

Selecione uma das seguintes:

  • Task Manager

  • SearchIndexer

  • Process Explorer

  • Windows Defender

Explicação