Cisacad.net

Examenes Cisco CCNA v7.0 y IT Essentials v8 en Español
Menu
  • Inicio
  • CCNA v7.02
    • CCNA 1 v7.02
    • CCNA 2 v7.02
    • CCNA 3 v7.02
  • CCNA v6.0
    • CCNA 1 v6.0
    • CCNA 2 v6.0
    • CCNA 3 v6.0
    • CCNA 4 v6.0
  • CCNA v5.0
    • Exámenes Cisco CCNA 1 v.5.0
    • Exámenes Cisco CCNA 2 v.5.0
    • Exámenes Cisco CCNA 3 v.5.0
    • Exámenes Cisco CCNA 4 v.5.0
  • Security
    • Network Security v1.0
    • CCNA Security 2.0
  • It-essentials v7.01
  • Ciberseguridad
    • Introducción a la Ciberseguridad v2.1
    • Cybersecurity Essentials v1.1
  • Mas Cursos
    • Introduccion a IoT v2.0
    • GetConnected
    • Networking Essentials v2
    • Entrepreneurship

IT Essentials v4.1 Chapter 9 Exam

IT Essentials v4.1 Chapter 9 Exam

1
Which factor affects the speed of an inkjet printer?

the desired quality of the image
the cost of the inkjet cartridges
the size of printer power supply
the quality of the paper

2
What are two cables that are used to connect a computer to a printer? (Choose two.)

FireWire
HDMI
serial
PS/2
eSATA

3
What is a characteristic of thermal inkjet nozzles?

Heat is applied to the ink reservoir of each nozzle.
The vibration of the crystal controls the flow of ink.
A charge is applied to the printhead.
The heat creates a bubble of steam in the chamber.

4
In laser printing, what is the name of the process of applying toner to the latent image on the drum?

fusing
developing
charging
transferring

5
What is the purpose of the Additional Drivers button in the Sharing tab of the Printer Properties?

to add additional drivers for other operating systems
to add additional drivers for duplex printing
to add additional drivers for other printers connected to the computer
to add additional drivers for other printers in the network

6
A small LAN uses a shared printer that is connected to a computer. None of the users can print but all of the users can access the shared resources on the computer to which the printer is locally connected. What is a possible cause of this?

The cable that connects the printer to the PC is faulty.
The printer needs a new ribbon.
The printer has the wrong paper loaded.
The printer spool is full.

7
How would a user install a new USB printer on a PC that is running Windows 7 Professional?

Configure the BIOS to accept the specific model of printer in the USB port.
Copy the printer driver to the System32 folder.
Click Start > All programs > Control Panel > Printers and Faxes > right-click on the desired printer and choose Add.
Connect the printer and power it on. Windows will detect the printer and install the needed drivers.

8
A Windows 7 computer has several printers configured in the Control Panel Devices and Printers window. Which printer will the computer choose to be the first option for printing?

the software-based printer that is used to create XPS files
a manual selection, which is always needed
the printer that is set as the default printer
the software-based printer that is used to create PDF files

9
What are two methods to share a printer wirelessly? (Choose two.)

infrared
satellite
WiMax
IEEE 802.11 standards
microwave

10
A user discovers that an inkjet color printer is printing different colors from those that are shown on the screen. What can be done to solve this problem?

Replace the fuser.
Replace the drum.
Adjust the printer spool.
Calibrate the printer.

11
The users on a LAN are reporting that computers respond slowly whenever high resolution photographs are being printed on the color laser printer. What would be the cause of this problem?

The printer is not configured for duplex printing.
The printer does not have enough memory to buffer an entire photograph.
The paper is not adequate for photograph printing.
The printer is not configured for the proper paper orientation.

12
What is a characteristic of global and per-document options in print settings?

It is not possible to configure per-document options.
Per-document options override global options.
Global options take precedence over per-document options.
It is not possible to configure global options.

13
What is true about the PostScript language?

It prints faster than other languages do.
It handles complex printing jobs.
It requires less printer memory than other languages require.
It allows the page to be rendered in the local workstation.

14
What are two closed-ended questions that a technician could ask a user while trying to identify the problem with a printer? (Choose two.)

Can you print a test page on the printer?
What were you doing when the problem occurred?
What recent software or hardware changes have been made to your computer?
Is the printer powered on?
What error messages were displayed when the problem occurred?

15
After applying a solution to a printer problem, a technician restarts the printer and prints a test page. Which step of the troubleshooting process is the technician applying?

documenting findings, actions, and outcomes
testing a theory to determine the cause of the problem
verifying the solution and system functionality
identifying the problem

16
A user notices that a job submitted to a printer is displayed in the print queue, but the printer is not printing the document. What is a probable cause of this problem?

an incorrect printer driver
the wrong paper type
a bad cable connection
a printer spooler not installed

17
A technician recorded that a new fuser roller unit was installed in a laser printer to solve a printing problem. Which step in the troubleshooting process did the technician just perform?

verifying the solution and system functionality
testing a theory to determine the cause of the problem
identifying the problem
documenting findings, actions, and outcomes

18
Where would network printer sharing be configured in a Windows 7 environment?

Network and Sharing Center
Ease of Access Center
Devices and printers
Printers and Other Hardware

19
What are two functions of a print server? (Choose two.)

ensure that the connected client computers have up-to-date printer drivers
store backups of documents sent to the printer
provide uninterrupted power to the printer
provide print resources to all connected client computers
store print jobs in a queue until the printer is ready

20
Which action supports an effective printer preventive maintenance program?

Clean inkjet print heads when they stop working.
Replace laser printer toner at set predetermined time intervals.
Reset the printer page counters if available.
Disconnect the printer from the power source when it is not in use.

21
Which two replacement parts are typically found in a laser printer maintenance kit? (Choose two.)

pack of paper
toner cartridge
replacement print head
transfer rollers
fuser assembly

22
How can the life of a thermal printer be extended?

Clean the inside of the printer with a vacuum cleaner with a HEPA filter.
Wipe the outside of the printer with a damp cloth.
Clean the heating element regularly with isopropyl alcohol.
Keep the paper dry in a low humidity environment.

23
What are two important outcomes of good computer and network security? (Choose two.)

keep equipment functioning
expose confidential information
allow unrestricted network access
reduce available network resources
provide access only to authorized users

24
Which three questions should be addressed by organizations developing a security policy? (Choose three.)

What items need to be protected?
How should the items be protected?
What is to be done in the case of a security breach?
When do the items need protecting?
What insurance coverage is required?
What are the possible threats to the items?

25
A company network was subjected to several security attacks after TCP/IP had been installed on the company computers. Analysis has shown that in most of the attacks, attackers used network sniffers to extract user names and passwords of critical accounts on the network. Which type of TCP/IP attack did these attackers deploy?

denial of service
ping of death
replay
SYN flood

26
A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates?

Create a restore point.
Manually update the Last Known Good Configuration.
Reinstall the antivirus software.
Change the firewall rules to enable the installer to access port 8900 of the Microsoft server.

27
At which step of the troubleshooting process will a computer technician ask the customer a series of open-ended and closed-ended questions?

Document findings.
Identify the problem.
Implement a solution.
Determine an exact cause.

28
Why should everyone in an organization give high priority to computer and network security?

because antivirus software often does not work
because computer and network security is included in every job description
because everyone can be affected by computer and network security problems
because computer and network security is the primary responsibility of every employee

29
 
Refer to the exhibit. What is the correct order for the steps in the troubleshooting process?

2, 4, 5, 3, 1, 6
2, 5, 4, 3, 6, 1
5, 4, 2, 3, 6, 1
3, 5, 4, 2, 6, 1

30
For troubleshooting security problems, what should be done immediately after the exact cause of the problem is determined?

Document the findings.
Verify full system functionality.
Establish a theory of probable causes.
Establish a plan of action for resolution.

31
Which two actions improve security on a wireless network? (Choose two.)

Enable WEP.
Broadcast the default SSID.
Keep the default administrator password for the access point.
Enable MAC filtering.

32
A large number of e-mail messages are appearing in the inbox of a home computer user. The messages relate to products for which the user has never requested information. Which name is given to this type of e-mail?

spoof
adware
grayware
spam

33
A computer that is configured for automatic updates is shut down during a scheduled update. However, the update is downloaded successfully without any file being corrupted in the process. What will happen to the update as a result of this shutdown?

Notification for downloading available updates will be displayed when the computer is rebooted.
The update will be lost.
The update for the computer will be queued on the website.
The update will be installed as soon as the computer is powered on.

34
Which best practice should be included in a password protection policy?

Encourage users to document passwords in a personal file.
Enforce password protection at the BIOS level.
Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.
Restrict passwords to text-based strings.

35
Which two questions are examples of open-ended questions that could be used in the security troubleshooting process? (Choose two.)

Have you shared your password?
Is your security software up to date?
What problems are you experiencing?
What websites have you visited recently?
Have you scanned your computer recently for viruses?

36
How can web tools, such as Java or ActiveX, be used for a malicious attack?

by altering the interactivity level of a web page
by creating popup windows
by causing the web browser to crash, leaving the system vulnerable
by installing unwanted programs on a computer

37
What is a signature as the term is used in antivirus and antispyware software development?

a system restore point
a software removal tool
an operating system patch
a programming code pattern

38
Which precaution helps protect against social engineering in the workplace?

disclosing passwords to company personnel only
guiding visitors within the premises and escorting them personally when they leave
keeping hidden from public view any passwords that are posted in the work area
sharing access cards with other employees

39
What are two examples of malware? (Choose two.)

registry cleaner
pop-up blocker
spyware
e-mail
grayware

40
Which security device stores user physical characteristics to provide a user level of facility access?

a biometric sensor
a card key
a key fob
a smart card

41
What condition can allow unauthorized access to a network for users who are not physically connected to the network?

exposed network cables
active jacks in public areas
poor wireless device security
unattended PCs that are logged into the network

42
What must be done to ensure that the antivirus software on a computer is able to detect and eradicate the most recent viruses?

Download the latest signature files on a regular basis.
Schedule a scan once a week.
Schedule antivirus updates using Windows Task Manager.
Follow the firewall configuration guidelines on the antivirus manufacturer website.

 

Tweet Pin It
Prev Article
Next Article

Related Articles

IT Essentials v4.1 Chapter 3 Exam
IT Essentials v4.1 Chapter 3 Exam 1 What is a function …
IT Essentials v4.1 10 noviembre, 2013 No hay comentarios

IT Essentials v4.1 Chapter 3 Exam

IT Essentials v4.1 Chapter 2 Exam
IT Essentials v4.1 Chapter 2 Exam 1 Which tool should be …
IT Essentials v4.1 10 noviembre, 2013 1 comentario

IT Essentials v4.1 Chapter 2 Exam

About The Author

CisacadESP

Leave a Reply Cancel Reply

Este sitio usa Akismet para reducir el spam. Aprende cómo se procesan los datos de tus comentarios.

CCNA v7.0 en Español Preguntas y Respuestas

  • CCNA 1
  • CCNA 2
  • CCNA 3
  • Módulos 1 - 3: Examen de conectividad de red básica y comunicaciones
  • Módulos 4 - 7: Examen de conceptos Ethernet
  • Módulos 8 - 10: Examen de comunicación entre redes
  • Módulos 11 - 13: Examen de direccionamiento IP
  • Módulos 14 - 15: Examen de comunicaciones de aplicaciones de red
  • Módulos 16 - 17: Examen de crear y asegurar una red pequeña
  • Evaluación de habilidades prácticas de PT (PTSA)
  • CCNA 1 v7 Examen Final de Práctica Respuestas
  • CCNA 1 v7 Examen Final de habilidades ITN (PTSA) Respuestas
  • CCNA 1 Examen Final Preguntas y Respuestas
  • Módulos 1 - 4: Examen de conceptos de Switching, VLANs y enrutamiento entre redes VLAN
  • Módulos 5 - 6: Examen de Redes Redundantes
  • Módulos 7 - 9: Examen de redes Disponibles y Confiables
  • Módulos 10 - 13: Examen de seguridad L2 y WLAN
  • Módulos 14 - 16: Examen de conceptos de enrutamiento y configuración
  • Evaluación de habilidades prácticas de PT (PTSA) SRWE - Parte 1
  • Evaluación de habilidades prácticas de PT (PTSA) SRWE - Parte 2
  • CCNA 2 Examen Practico Final - SRWE Preguntas y Respuestas
  • Examen Final de Habilidades SRWE (PTSA) Respuestas
  • CCNA 2 Examen Final de SRWE Preguntas y Respuestas
  • Módulos 1 - 2: Examen de conceptos OSPF y configuración
  • Módulos 3 - 5: Examen de seguridad de la red
  • Módulos 6 - 8: Examen de conceptos de WAN
  • Módulos 9 - 12: Examen de optimización, supervisión y solución de problemas de redes
  • Módulos 13 - 14: Examen de Tecnologías de Redes Emergentes
  • Evaluación de habilidades prácticas de PT (PTSA) ENSA Respuestas
  • CCNA 3 Examen Practico Final - ENSA Preguntas y Respuestas
  • Examen Final de Habilidades ENSA (PTSA) Respuestas
  • CCNA 3 Examen Final de ENSA Preguntas y Respuestas Opcion A
  • CCNA 3 Examen Final de ENSA Preguntas y Respuestas Opcion B
  • Examen de práctica de certificación CCNA (200-301) Respuestas

CCNA v7.0 in English

  • CCNA 1 v7.0
  • CCNA 2 v7.0
  • CCNA 3 v7.0
Examen Modulos 1 – 3 Respuestas Examen Modulos 4 – 7 Respuestas Examen Modulos 8 – 10 Respuestas Examen Modulos 11 – 13 Respuestas Examen Modulos 14 – 15 Respuestas Examen Modulos 16 – 17 Respuestas CCNA 1 v7 Practice Skill Assessment CCNA 1 v7 Practice Final Exam CCNA 1 v7 Practice Final Exam
Examen Modulos 1 – 4 Respuestas Examen Modulos 5 – 6 Respuestas Examen Modulos 7 – 9 Respuestas Examen Modulos 10 – 13 Respuestas Examen Modulos 14 – 16 Respuestas CCNA 2 v7 Practice Skill Assessment
Examen Modulos 1 – 2 Respuestas Examen Modulos 3 – 5 Respuestas Examen Modulos 6 – 8 Respuestas Examen Modulos 9 – 12 Respuestas Examen Modulos 13 – 14 Respuestas CCNA 3 v7 Practice Skill Assessment

Cisacad.net

Examenes Cisco CCNA v7.0 y IT Essentials v8 en Español
Copyright © 2023 Cisacad.net
Política de Privacidad CCNA v7.0 y v6.0 Examenes Cisco 2021 - Cisacad.net
Utilizamos cookies en nuestro sitio web para ofrecerle la experiencia más relevante al recordar sus preferencias y visitas repetidas. Al hacer clic en "Aceptar", usted consiente el uso de TODAS las cookies.
No vender mi información personal..
Cookies configuraciónACEPTO
Manage consent

Resumen de la privacidad

Este sitio web utiliza cookies para mejorar su experiencia mientras navega por el sitio web. De ellas, las cookies clasificadas como necesarias se almacenan en su navegador, ya que son esenciales para el funcionamiento de las funciones básicas del sitio web. También utilizamos cookies de terceros que nos ayudan a analizar y comprender cómo utiliza usted este sitio web. Estas cookies se almacenan en su navegador sólo con su consentimiento. También tiene la opción de excluirse de estas cookies. Pero la exclusión de algunas de estas cookies puede afectar a su experiencia de navegación.
Necesarias
Siempre activado
Las cookies necesarias son absolutamente imprescindibles para que el sitio web funcione correctamente. Estas cookies garantizan las funcionalidades básicas y las características de seguridad del sitio web, de forma anónima.
CookieDuraciónDescripción
cookielawinfo-checbox-analytics11 monthsEsta cookie es establecida por el plugin GDPR Cookie Consent. La cookie se utiliza para almacenar el consentimiento del usuario para las cookies de la categoría "Analytics".
cookielawinfo-checbox-functional11 monthsLa cookie se establece por el consentimiento de cookies GDPR para registrar el consentimiento del usuario para las cookies en la categoría "Funcional".
cookielawinfo-checbox-others11 monthsEsta cookie es establecida por el plugin GDPR Cookie Consent. La cookie se utiliza para almacenar el consentimiento del usuario para las cookies de la categoría "Otros".
cookielawinfo-checkbox-necessary11 monthsEsta cookie es establecida por el plugin GDPR Cookie Consent. Las cookies se utilizan para almacenar el consentimiento del usuario para las cookies en la categoría "Necesario".
cookielawinfo-checkbox-performance11 monthsEsta cookie es establecida por el plugin GDPR Cookie Consent. La cookie se utiliza para almacenar el consentimiento del usuario para las cookies de la categoría "Rendimiento".
viewed_cookie_policy11 monthsLa cookie es establecida por el plugin GDPR Cookie Consent y se utiliza para almacenar si el usuario ha consentido o no el uso de cookies. No almacena ningún dato personal.
Funcional
Las cookies funcionales ayudan a realizar ciertas funcionalidades como compartir el contenido del sitio web en las plataformas de las redes sociales, recoger opiniones y otras características de terceros.
Rendimiento
Las cookies de rendimiento se utilizan para entender y analizar los índices de rendimiento clave del sitio web, lo que ayuda a ofrecer una mejor experiencia de usuario a los visitantes.
Analytics
Las cookies analíticas se utilizan para entender cómo interactúan los visitantes con el sitio web. Estas cookies ayudan a proporcionar información sobre las métricas del número de visitantes, la tasa de rebote, la fuente de tráfico, etc.
Publicidad
Las cookies de publicidad se utilizan para ofrecer a los visitantes anuncios y campañas de marketing relevantes. Estas cookies rastrean a los visitantes en todos los sitios web y recopilan información para ofrecer anuncios personalizados.
Otras
Otras cookies no categorizadas son aquellas que están siendo analizadas y que aún no han sido clasificadas en una categoría.
GUARDAR Y ACEPTAR