CISCO - NETWORKING


CISCO IT-ESSENTIAL PAST PAPERS 100% SCORES
CHAPTER 1 - 5









  • CHAPTER 01
1. undefined

Refer to exhibit. Based on the advertisement that is shown, what is the native resolution of this computer system ?
 8x
 3 GB
 2 GHz
 1919 MB
  1280*800 
 1335 * 9.57


2. Witch IEE standard defines the FireWare technology ?
 1284
  1394 
 1451
 1539


3. Wich three system resources are commonly used for communication between the CPU or memory and other components in the computer ? (Choose three.)
  IRQ
  DMA
 • UDP
  I/O address
 USB
 PnP


4. Which three devices are considered ouput devices ?
 Fingerprint scanner
  Headphones
 Keyboard
  Monitor
 Mouse
  Printer


5. Which two devices are considered input devices ? (Choose two.)
  Biometric authentication device
 Printer
 Digital camera
 Projector
 Speakers


6. Which two form factors are commonly used to build a new computer ? (Choose two.)
  BTX
 NLQ
  ATX
 CLV
 ECC


7. A tehnician creates a simple circuit that has a 9 V light bulb attached to a 9 V battery. The power ouput of the light bulb is 100 W. Wich equation should be used to calculate how much current in amps is required to archive the full 100 W ouput from the 9V bulb ?
  I=P/V = 100W/9V= 11.11A
 I=P*V=100W*9V=900A
 I=(P/2)*V=50W*9V=450A
 I=P*2*V=100W*(9v+9v)=8100A


8. A technician receives a complaint of poor image quality after the user changes the native resolution. While investigating the complaint, the technician discovers there is a mismatch between native mode and the native resolution of the peripheral. Which item is configured incorrectly?
 DLP
  LCD
 Printer
 scanner


9. What are the two connector types for the 1394a interface ? (Choose two.)
 2 pin
  4 pin
  6 pin
 8 pin
 9 pin
 15 pin


10. How many FireWire devices can be supported by a single FireWire port ?
 12
 25
 32
 54
  63
 127


11. What is a function of a KVM switch ?
 Digitizes an image or document and sends the information to multiple computers;
 Stores images from both digital stil cameras and video cameras on magnetic media;
  Provides capability to share a keyboard, a mouse, USB devices, and speakers with multiple computers;
 Provides biometric identification to an individual user by the use of fingerprints, voice recognition, or a retinal scan.


12. What is the function of a fan on top of a heat sink ?
 To cool the memory modules;
  To move the heat away from CPU;
 To draw cool air into the computer case;
 To provide a water-cooling system for extremely fast CPUs.


13. A student has passed the \compTIA A+ cfertification exam. Based on this passing score, for which job is the student now qualified ?
 Network associate;
 Security technician;
 Network technician;
 Network professional;
  PC hardware and software tehnician


14. Which memory module has a front side bus speed of 200MHz ?
 DDR-333
  DDR-400
 DDR-667
 DDR3-667
 PC100 SDRAM


15. What are two factors that must be considered when choosing a computer case? (Choose two.)
 The size of monitor;
 The vendor that manufactured the motherboard;
 The number of external or internal drive locations;
  The size of the motherboard and the power supply;
 The number of LED indicators at the front of the case.


16. Which important feature is offered by the USB standard ?
 A single USB connection to a computer can support up to 255 separate devices;
 It offers rates of around 580 Mb/sec in low-speed mode;
 It allows up to 920 Mb/sec in the 2.0 version.
  It can supply power from the computer to devices.


17. Wich tehnology would be best to use for drive redundancy and data protection?
 CD;
 DVD;
 PATA;
  RAID;
 SCSI.


18. Which type of computer resources are direct lines to the processor and are used by computer components to request attention from the CPU ?
 DMAs
 I/O addresses
  IRQs
 Memory addresses


19. What is a function of the operating system in a computer ?
 It defines the physical components in the computer;
  It instructs the computer how to process information;
 It provides instructions on how to access the internet;
 It identifies the type of firmware that is installed in the computer.


20. Which type of ROM can be reprogrammed with software while it is still physically installed in the computer ?
 EEPROM
 EPROM
 PROM
 ROM

******** tHE eNd ******


  • CHAPTER 02

1. Which two devices commonly affect wireless LAN ? (Choose two.)
 Blu-ray players;
 Home theaters;
  Wirelles phones;
  Microwaves;
 Incandescent light bulbs;
 External hard drive.


2. A technician has a room of computers wich are running very hot. The technician discovers that the heat sinks in the computers are very dusty. What should the technician use to clean the heat sinks ?
 Mild cleaning solution;
 Lint free cloth;
 Isoprpyl alcohol;
  Compressed air.


3. Which computer components must a technician never try to work on when wearing an antistatic wrist strap ?
 CPU;
 Hard disk;
 Keyboard;
  CRT monitor;
 RAM module.


4. Refer to the exhibit. Wich type of tool is shown in the grafic ?
 Cable meter;
  Digital multimeter;
 Network traffic monitor;
 Electrostatic discharger.


5. How does a technician discharge static buildup ?
 Touching the painted part of the computer case;
  Touching an unpainted part of the computer case;
 Touching an antistatic wrist strap before touching any computer equipment;
 Touching an antistatic mai before touching any computer equipment.


6. Refer to exhibit. Which type of tool is presented in the graphic ?
 Hex screwdriver;
 Stripped screwdriver;
  Philips-head screwdriver;
 Flat-head screwdriver.


7. Which step should be performed first when servicing computer equipment ?
 Wipe down the exterior with a lint free, damp soft cloth;
 Open the case and chek for any loose connections;
  Turn off and remove the power source;
 Replace any suspected bad components with known good components.


8. Wich condition refers to a sudden and dramatic increase in voltage, which is usualy caused by lighting ?
 Brownout;
 Sag;
  Spike;
 Surge.


9. Which Windows XP command-line scans the critical files of the operating system and replaces any files that have been corrupted ?
 Chkdsk;
 Defrag;
 Disk Cleanup;
 Disk Management;
 Scan System;
  System File Checker.


10. The performance of a computer is reduced after if has been using the Internet. Wich three tools could be run to try to improve the performance of the computer ? (Choose three.)
 Fdisk;
 Spyware Remover;
  Defrag;
  Disk Cleanup;
 A Bios updater;
 Device Manager Utility.


11. Why is documentation of all services and repairs an important organizational tool for a tecnician ?
 It allows for public sharing on the Internet;
 It increases the cost of services and repairs;
 It minimizes the requirements that are used when hiring new technicians;
  It provides reference material for similar problems when such problems are encounterd in the future.


12. Why should an antistatic wrist strap be worn when working on electronic equipment ?
 To prevent interference from clothing and loose jewelry;
  To equalize the electrical charge between a person and the equipment;
 To prevent clothing made of silk, polyester, or wool from generating a static charge;
 To draw static electricity away from a component and transfer it safetely from equipment to a grounding point.



13. Which precaution should be taken when working around electronic devices?
  Avoid using magnetized tools;
 Only use hard tools from the same vendor;
 Wear ESD protection to repair monitors in humid environments;
 Avoid using ESD wrist straps and ESD mats simultaneously.


14. Which tool in Windows XP gives a technician access to initialize disks and create partitions ?
 Defrag;
 Disk Cleanup;
  Disk Management;
 Format;
 Scandisk.


15. What are two significant sources of EMI ? (Choose two)
 Infrared mice;
 RAM modules
  Electrical storms;
 LCD monitors;
  Power lines.


16. Which two tools are recommended for cleaning a PC ? (Choose two)
 Antibacterial spray;
  Compressed air;
 Mild abrasive detergent;
 Nylon brush;
 Rubbing alcohol;
  Soft cloth.


17. Which tool should be used if a user needs to optimize space on a hard drive?
  Defrag;
 Disk Management;
 Fdisk;
 Format.


18. Which two types of tool can help protect a computer from malicious attacks? (Choose two)
  Antivirus software;
 Disk Cleanup;
 Disk Management;
 Fdisk;
 Scandisk;
 Spyware Remover.


19. Which three computer components contain hazardous materials and require special handing for disposal ? (Choose three)
  Batteries;
 Floppy drives;
  Monitors;
 Optical drives;
 Paralel cables;
 Printer toner cartridges.


20. Which two tools can help protect against ESD ? (Choose two)
  Antistatic wrist strap;
 Compressed air;
 Antistatic mat;
 Safesty glasses;
 Polyester clothing.
******* tHE EnD ********


  • CHAPTER 03

1.What is a function of a video adapter card?
 stores video files in RAM;
 connects a computer to a video storage device;
 provides the appropriate drivers for the monitor;
  provides an interface between a computer and a display monitor.


2.A technician has just finished assembling a new computer. When the computer is powered up for the first time, the POST discovers a problem. How does the POST indicate the error?
  It issues a number of short beeps;
 The LED on the front of the computer case flashes a number of times;
 It places an error message in the BIOS;
 It locks the keyboard.


3.What is a convenient way that a technician can tell whether a ribbon cable is for an IDE hard drive or a floppy drive?
 The IDE cable has a colored stripe on one edge;
 The floppy cable motherboard connector is normally gray;
 The IDE cable is gray;
  The floppy cable has a twist in the cable.


4.A field technician has been asked to install a wireless 802.11g NIC in a computer, but is unsure about the expansion slots available. Which two types of wireless NICs should the technician have available? (Choose two.)
  PCIe;
 AGP;
 SCSI;
  PCI;
 SATA.


5.Which type of drive is installed in a 5.25-inch bay?
 hard drive;
• optical drive;
 floppy drive;
 LS120 drive.


6.Which action is recommended to prevent the motherboard from contacting the metal base of the case?
 Ensure that the non-conductive side of the case is beneath the motherboard;
  Use standoffs to keep the motherboard above the metal base;
 Use a self-adhesive non-conductive membrane on the underside of the motherboard.


7.What is the first step that a technician should take before physically opening a computer case?
 Verify the room temperature;
  Consult the website of the manufacturer;
 Check the ventilation in the room;
 Provide small containers to collect small screws.


8.What is the most reliable way for users to buy the correct RAM to upgrade a computer?
 Buy RAM that is the same color as the memory sockets on the motherboard;
 Ensure that the RAM chip is the same size as the ROM chip;
 Ensure that the RAM is compatible with the peripherals installed on the motherboard;
  Check the motherboard manual or manufacturer's website.


9.After a technician has assembled a new computer, it is necessary to configure the BIOS. At which point must a key be pressed to start the BIOS setup program?
 before the computer is powered on;
 during the Windows load process;
  during the POST;
 after the POST, but before Windows starts to load.


10.Which two connections should be provided to a floppy disk drive during installation? (Choose two.)
  a floppy data cable to connect the FDD to the motherboard;
  a cable from the power supply to the Berg power connector on the FDD;
 a cable from the 3-pin fan power connector into the Berg power connector on the FDD;
 a data cable from the Molex connector of the optical drive to the Berg connector on the FDD;
 a cable from the 20-pin ATX power connector socket on the motherboard to the Berg power connector on the FDD.


11. #

Refer to the exhibit. What is the order of steps that should be followed for a power supply installation in a computer?
 Steps 1, 2, 4;
 Steps 1, 3, 2;
  Steps 1, 4, 3;
 Steps 2, 3, 4.


12.When building a computer, which two components are normally installed in 3.5-inch drive bays? (Choose two.)
  hard drive;
 optical drive;
 floppy drive;
 flash drive;
 video card.


13.Which two connectors are used to connect external peripherals? (Choose two.)
 EIDE;
 Molex;
 PATA;
  PS/2;
  USB.

#


14. Refer to the exhibit. Which should be the last step when connecting external cables to a computer?
 Step 1;
  Step 2;
 Step 3;
 Step 4;
 Step 5;
 Step 6.



15.A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to an ATX motherboard?
 Berg;
 Mini-Molex;
 Molex;
 20-pin connector.


16.Where should internal drives be installed in a computer?
 in internal bays;
 on the AGP channel;
 on the motherboard;
 on PCIe expansion slots.


17.What is a function of the BIOS?
 enables a computer to connect to a network;
 provides temporary data storage for the CPU;
  performs a check on all internal components;
 provides graphic capabilities for games and applications.


18.When installing a CPU in a ZIF socket, how should the technician align the pins to avoid damage?
 Pin 1 is always aligned with the opposite corner from the base of the lever;
  Pin 1 on the CPU is aligned with Pin 1 on the ZIF socket;
 Pin 1 is aligned with the corner closest to the memory;
 The removed corner of the CPU is always aligned with the corner opposite Pin 1.


19.What should be the next installation step after all the internal components of a PC have been installed and connected to the motherboard and power supply?
 Connect the monitor cable;
 Connect the network cable;
  Reattach the side panels to the case;
 Connect the power cables to the computer.


20.What is a function of the adapter cards that are installed in a computer?
 to transfer external power to the motherboard;
 to connect the motherboard to internal memory;
 to connect internal power cables to the motherboard;
  to provide functionality for external components to be connected to the computer.

********** tHE enD ************


  • CHAPTER 04

1. Which two are benefits of preventative maintenance? (Choose 2)
 Extends the life of the components
 Requires less manpower
 Reduces repair costs
 Teaches the users to help themselves



2.  Which of the following is not an example of software maintenance?
 Remove unwanted programs
 Clean the mouse and keyboard
 Review driver updates
 Review security updates
 Review software updates



3. What should a preventative maintenance plan be based on?
 The technician’s experience
 The company’s budget
 The needs of the equipment
 The complaints of the users



4. What are some of the things you should do when providing hardware maintenance? (Choose 3)
 Check the condition of the cables
 Clean the components with mild detergent and a lint free cloth
 Check and secure any loose cables
 Remove dust from the components
 Replace all parts after 1 year



5.  What statements are true regarding preventative maintenance? (Choose 3)
 It helps prevent failure of parts
 Ensures components are in good working condition
 It is a learned skill
 Provides a regular and systematic inspection
 It reduces the workload on the technicians



6.   Where can you find a list of all the devices that are configured on a computer?
 Motherboard manuals
 Control Panel
 Device Manager
 Hardware database


7. When you are researching possible solutions for a computer problem, name one location you may start your research?
Internet, other technicians, newsgroups, technical websites, online forums, computer manuals, device manuals, manufacturer’s FAQ’s



8. What is the second step of the troubleshooting process?
 Try quick solutions
 Gather data from the computer
 Gather data from the customer
 Verify obvious issues
 Evaluate the problem



9.   An employee of a small company inadvertently allows a visitor to see their username and password.  At home, the visitor then uses this information to gain access to the company network. What type of threat is this?
 Man-in-the-middle
 Phishing
 Physical
 Social engineering
 Spoofing



10.  Which threat to security uses traffic from zombie computers to overwhelm servers?
 DoS
 DDoS 
 Phishing
 Spoofing
 SYN flood



11.  Which two statements are true regarding username and password standards?
 Keep the username naming convention simple
 Usernames should expire periodically
 Keep the passwords simple and easy to remember
 Rules about password expiration & lockout should be defined
 Users should create their own username and password



12.  When setting up a new wireless access point, which basic security measure should be taken?
 Disable SSID broadcast
 Enable SSID broadcast
 Broadcast the default SSID
 Broadcast a unique SSID



13.  An attacker claiming to be a bank representative contacts a potential victim via e-mail and requests disclosure of vital account information. Which security attack is being implemented?
 Adware
 Phishing
 Spyware
 Trojan




14.  What is the best method for a company to secure data being transmitted across the internet between remote sites?
 Use plain text in an e-mail
 Use a shared server with an encrypted password on the file
 Use computers secured with smartcard authentication
 Use a VPN connection



15.  Which is the best way to secure a laptop left at the office while the user is away for an extended period of time?
 Cover the laptop with files and leave it on your desk
 Put the laptop in a desk drawer in your locked office
 Place the laptop in a locked security cage designed to store computer equipment
 Hide the laptop in your supervisor’s office



16.  What is the safest place to store backups?
 Portable lock box
 Locked telecommunications room
 Locked server room
 Offsite secure facility



17.  What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses?
 Download the latest signature files on a regular basis
 Schedule a scan once a week
 Schedule anti-virus updates using windows task manager
 Follow the firewall configuration guidelines on the anti-virus manufacturer website.



18.  Which two items can be downloaded from the Microsoft website to help protect Windows XP?
 ROM upgrades
 Service packs
 Security patches
 BIOS upgrades
 DirectX updates


19  A bank is upgrading the hard drives in a server.  What should be done to the old hard drives to permanently remove any confidential data?
 Delete the files containing the confidential data
 Reformat the hard drives
 Expose the hard drives to ultraviolet light
 Destroy the hard drives with a hammer



20.   A technician downloaded the latest Windows XP updates from the Microsoft website.  What should the technician do before installing the updates?
 Create a restore point
 Manually update the last know good configuration
 Reinstall the anti-virus software
 Change the firewall rules to enable the installer to access a port 8900 of the Microsoft server



21.   What is the difference between WEP64 and WEP 128?
 WEP64 can handle 64 simultaneous connections, & WEP128 can handle 128 simultaneous connections.
 WEP64 operates on a 64-bit processor, but WEP128 requires a dual core 128-bit processor
 WEP64 uses 64-byte packets, and WEP128 uses 128-byte packets
 WEP64 uses a 64-bit encryption key, and WEP uses a 128-bit key.



22.   Which best practice should be included in a password protection policy?
 Encourage users to document passwords in a personal file
 Enforce password protection at the BIOS level
 Implement lockout rules upon consecutive unsuccessful attempts at accessing the system
 Restrict passwords to text-bases strings



23.  The value of physical equipment if often far more than the value of the data it contains.
 True
 False



24.  What network uses encryption to protect data?
 Wireless
 VPN
 WEP
 Star



25.  What file system used in some versions of Windows lacks both journaling and encryption capabilities?
 NTFS
 FAT32
 FAT 16
 NTFS2



26.    Manufacturers of operating systems and software applications may provide code updates called __________ that prevent a newly discovered virus or worm from making a successful attack.
 Signatures
 patches
 Service pack
 SYN flood

************ THe eNd ***********


  • CHAPTER 05
1
A technician has installed new video drivers on a Windows XP computer and now the monitor shows distorted images. What startup mode can the technician use to access a new driver on the network?
 Safe Mode
 Safe Mode with Networking Support
 Real Mode with Networking Support
 Safe Mode with Rollback Support


2
Which mode allows applications that are not compatible with the current operating system to run in an environment that simulates an earlier operating system?
 real mode
 protected mode
 virtual real mode
 compatibility mode


3
Which operating mode is used by Windows XP to run a DOS application?
 protected mode
 64-bit mode
 virtual real mode
 real mode


4
A technician has a computer that is unable to boot Windows XP properly. The technician has decided that it is necessary to attempt a repair of XP. Which utility will be run if the technician selects Repair XP from the XP boot disk?
 Recovery Console
 Windows Disk Manager
 msconfig
 fix /mbr


5
Once minimum hardware requirements are satisfied, where should a technician look to determine if the computer hardware has been tested with Windows XP?
 the Microsoft Compatibility Assistant
the Windows XP Hardware Compatibility List
 the Microsoft Knowledge Base
 the Windows XP manual



6
A technician has finished installing Windows XP. What should the technician do to verify that all hardware has been installed correctly?
 Run HWINFO.EXE to verify that all devices are listed.
 Use the Windows XP Msconfig utility to prove that all the devices are operational.
 Use the Windows XP Testall utility to confirm that the devices are operational.
 Use the Device Manager utility to ensure that all the devices are operational. 


7
A user decides to install a new version of Windows Vista but needs to retain the configurations and customizations of the current Windows XP operating system. Which software can be used to achieve this?
 Windows Task Manager
 Windows Vista Setup Wizard
 Microsoft Management Console
 Windows User State Migration Tool


8
Which two operating systems can function correctly on a system with 64 MB of RAM? (Choose two.)
 Windows XP Home
 Windows XP Professional
 Windows XP Media Center
 Windows Vista Home Basic
 Windows Vista Home Premium


9
Which registry file contains information about the hardware and software in the computer system?
 HKEY_CLASSES_ROOT
 HKEY_CURRENT_USER
 HKEY_LOCAL_MACHINE
 HKEY_USERS


10
What are two features of the Microsoft Management Console (MMC)? (Choose two.)
 MMC logs a history of application events.
 It organizes operating system snap-ins.
 It can be used to create customized MMCs.
 It displays computer performance information.
 It enables virtual memory settings to be customized.



11
When troubleshooting a printer problem, a technician finds that the operating system was automatically updated with a corrupt device driver. Which solution would resolve this issue?
 Roll back the driver.
 Restart both the computer and the printer.
 Scan the downloaded driver file with a virus scanner.
 Use the Last Known Good Configuration to restart the computer.



12
Which directory contains Windows XP OS system files?
 C:\WINNT
 C:\WINDOWS
 C:\Program Files
 C:\Documents and Settings



13
A company with 40 computers needs to reduce repair costs, decrease downtime, and improve reliability. Which task will meet these needs?
 Enact a comprehensive security policy.
 Upgrade all the operating systems.
 Develop a preventive maintenance plan.
 Create an Automated System Recovery CD.



14
Which set of guidelines is used to ensure that programmers develop applications that are compatible with an operating system?
 ACAPI
 API
 IRQ
 PnP


15
A technician thinks that the file system on a computer has a problem because Windows XP is reporting data integrity issues. Which Windows XP utility will check the file system for errors?
Attrib
 Chkdsk
 Fdisk
 Format


16
What would be the result of having a corrupt Master Boot Record?
 A new application will fail to install.
 The operating system will fail to start.
 The printer will function incorrectly.
 The keyboard will be unresponsive to the user.



17
A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS. Which course of action should be taken to upgrade the file system to NTFS?
 Format all the existing files with the NTFS File tool.
 Create a new NTFS partition and copy the files into the new partition. The existing partition can not be changed.
 Run the Microsoft Convert utility.
 Overwrite the FAT32 file system with NTFS. Files will automatically be added to the new file system.



18
How much RAM can be addressed by a 64-bit operating system?
 4 GB maximum
 16 GB maximum
 32 GB maximum
 64 GB maximum
 128 GB or more



19
When a computer boots from the Windows Vista disc, which three functions are performed if the Custom (advanced) option is selected? (Choose three.)
 Existing files and settings are kept.
 Changes to disk partitions can be made.
 A clean copy of Windows Vista is installed.
 The existing Windows installation is repaired.
 The location of the Windows installation can be selected.
 The Recovery Console can be used to repair the Master Boot Record.


20
What is the term for the ability of an operating system to run multiple applications at the same time?
 multiuser
 multitasking
 multithreading
 multiprocessing

************ THe eNd ***********