Language:EN
Pages: 15
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
ensures the computer boots successfully

Ensures the computer boots successfully

IT Essentials (ITE v5.0 & v5.02) Chapters 1-6 Checkpoint Exam Answers 100% 2016

WWW.CCNA-v5.Net

Install WAP on the wireless clients.

2. When upgrading a CPU, what must be applied between the new CPU and the heat sink/fan?

IT Essentials (ITE v5.0 & v5.02) Chapters 1-6 Checkpoint Exam Answers 100% 2016

WWW.CCNA-v5.Net

Keep the equipment on an antistatic mat.

Remove cordless telephones from the area.*
7. What are two consequences of setting an incorrect boot order in the system BIOS? (Choose two.)
The computer displays an „Inaccessible Boot Device‟ error after POST.

WWW.CCNA-v5.Net

8. A network technician has been asked to determine the best Internet connection for a branch office located in a new metropolitan office building. Which
connection would provide the highest bandwidth and reliability at the lowest cost?

IT Essentials (ITE v5.0 & v5.02) Chapters 1-6 Checkpoint Exam Answers 100% 2016

The computer emits a pattern of beeps indicating the failing device.* The screen flashes with a red background and displays a warning message. 13.

IT Essentials (ITE v5.0 & v5.02) Chapters 1-6 Checkpoint Exam Answers 100% 2016

Press the F2 key during the boot process and start the computer is Safe Mode.

17. A technician wants to create a new partition on a new additional hard drive. Which tool should be used?

WWW.CCNA-v5.Net

19. Which key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration?

IT Essentials (ITE v5.0 & v5.02) Chapters 1-6 Checkpoint Exam Answers 100% 2016

OSHA web site
MSDS
The website of the laptop manufacturer
Local environmental regulations*
24. Where would a technician configure a PC to boot from a CD-ROM?

Control Panel
My Computer
BIOS Settings*
Start Menu
Device Manager
25. A technician just terminated some fiber optic cable and needs to properly dispose of the hazardous waste created during the termination. Where should the technician look for the proper disposal method for the waste?

Token Ring
802.11n
Ethernet*
WiMAX
27. A customer has a computer for a home business, but wants to have another computer as a web server. What would be the best solution for the customer to share the monitor, mouse, and keyboard between the two computers?

multipurpose device
access point
KVM switch*
network switch
USB hub
28. What is the default TCP destination port number or number combination that is used for SSH connections?

IT Essentials (ITE v5.0 & v5.02) Chapters 1-6 Checkpoint Exam Answers 100% 2016

ICMP
DNS
APIPA
DHCP*
33. What are the four layers in the TCP/IP reference model?

application, presentation, internet, network access application, transport, internet, data link
application, transport, internet, network access* application, presentation, session, transport

Dr. Watson
System Restore
Disk Defragmenter*
Chkdsk
35. A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?

it cannot communicate outside its own network.*
it has a public IP address that has been translated to a private IP address. it can communicate on the local network as well as on the Internet.

Reconfigure TCP/IP settings on the laptop.

Try moving the laptop to different places to see if a signal can be detected.* Reinsert the laptop battery.

The new memory should operate at the same speed as the hard drive.

The new memory should be as fast or faster than existing memory.*
The new memory should be as fast or faster as the cache found in the processor.

IT Essentials (ITE v5.0 & v5.02) Chapters 1-6 Checkpoint Exam Answers 100% 2016

The 64-bit operating system has additional security features.* The 64-bit operating system has a built-in virtualization mode.

The 64-bit operating system runs on a RISC chip architecture.

WWW.CCNA-v5.Net

setting up a peer-to-peer network so that a laser printer can be accessed by all workstations

No further action needed.

45. A technician is designing a hardware preventive maintenance plan for a company. Which strategy should be included in the plan?

46. A helpdesk technician takes a call, “Good morning, this is the helpdesk. My name is Greg. How may I help you today?” The frantic caller states, “My computer will not turn on and I have a presentation in 15 minutes.” The technician responds, “Now calm down and let us see what we can do.” The technician then proceeds to lead the caller through the process of checking power cables and power lights. Which troubleshooting step is being used at this point?

Identify the problem.*

Implement a solution.

Verify full system functionality and, if applicable, implement preventive measures. Establish a theory of probable cause.

Use the Last Known Good Configuration.*
Reinstall the user applications.

48. Which type of standard interface allows users to connect and disconnect peripheral devices while the computer is running without having to restart?

WWW.CCNA-v5.Net

Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem.

330 ft (100 m)*

500 ft (154 m)

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Eimhear Kerrigan

PageId: DOC99D3264