dinsdag 31 mei 2016

Windows Answers #Anssaries

Chapter 1:
1.        Which edition of Windows 7 does not support x64 CPU’s
#Starter
2.        Which edtion of Windows 7 are widely available in the retail secto? (choose all that apply).
#Home Premium
#Professional
#ultimate
3.        Which edtion of Windows 7 requires a Software Assurance Agreement with Microsoft?
Home Premium
Professional
Ultimate
#Enterprise
4.        Which of the following features is not included of Windows 7 Professional
#bitlocker
5.        Which tools scans your coomputer produces a report of any Windows 7 compatibility
#Windows 7 compatibility center
6.        Which windows 7 installation method uses sytem center configuration manager for deployment across a network
HT1
#LT1
7.        Which windows 7 installation method requires some human interaction but uses windows deployment services to automate most of the installation
#ZT1
8.        You can use the upgrade installation method when upgrading from windows vista business to which of the following? (choose all  apply)
#home premium
9.        What are two common methods of determining if your computer is running a 32 bit or 64 bit version of winodws 7 or windows vista? (Choose all apply)
#open the system window
#run the system information utillity
10.     Where might a windows 7 product key be located (choose all that apply)
#On a sticker on the back or bottom of your computer
#in a confirmation e-mail if you purchased and downloaded windows 7 online


Chapter  2
1.        Which of the following is not windows account type in windows 7?
Limited user
2.        Which of the following can you perform in the manage accounts window?
#set up parental controls
3.        Which of the following actions is most likely to trigger a user account control dialogue
uninstalling a program
4.        Where can you directly acces event viewer?
administrative tools
5.        Which of the following is not UAC LEVEL??
notify  me only when programs try to make changed to my computer
6.        Which Aero feature allows you to quickly minimize all open windows except the active
#show desktop
7.        Which of the following settings is not configurable from the screen resolution window?
font size
8.        Which of the following allows you to manage programs that run when windows starts or 
performance monitor
9.        Which versions of windows 7 support windows xp mode (choose all that apply)
professional
ultimate
enterprise
10.     Which of the following correctly explains the abbreviation VHD
virtual hard disk



Chapter 3
1.        Which of the following is not a security or privacy feature of internet explorer 9?
Pinned site
2.        Which of the following can you do with the snipping tool
Annotate an image with the pen tool.
3.        You want to use run command, however. The program requires elevated or administrative priveleges. When you right-click the program to run it, which command do you select from the shortcut menu?
run as administrator
4.        Which of the following can you do with media player 12 (choose all)
Rip music from the cd
Create a playlist
5.        Where do you configure security zones in internet explorer 9
Internet security tab
6.        You want to run the ps cmdlet. Which utility do you use?
Computer management.
7.        Which of the following are accesible from the computer management window? (choose all)
Diskmanagement
8.        You want to acces your home computer from work to get a file you worked last night. Which program do you use?
Sync center
9.        Which of the following is an option in windows media center but not in windows media player
Record tv programming
10.     Where can you find the program to help you use a projector connected to you computer?
The all programs accessories folder



Chapter 4
1.        An Application is a program that rune on top of the operating system and helps a user perform a specific task such as word processing appointment scheduling or accounting.
2.        GPO is a collection of settings (policies) stored in Active Directory on a windows
3.        network.Windows uses services to handle requests for printing spooling, file indexing, task scheduling, the windows firewall and much more.
4.        Msconfig allows you to enable or disable startup services, set boot options such as booting into safe mode.
5.        Most Winodws Vista and Windows 7 users use the NTFS file system because it supports larger disks than FAT 32 or FAT
6.        Using Group Policy, you can assign (for publish) an application to all users or computers in a signated group
7.        In Windows 7, a Library is a virtual folder that can display contnet from different locations
8.        Windows uses EFS to allow users to encrypt information on hard disks.
9.        Compressing is the process of decreasing the size of files or folders without affecting the files content.
10.     Bitlocker encrypts an entire drive, rather than individual files and folders on a disk





vrijdag 13 juni 2014

CCNA 1 - Final Exam Answers V5.0

Link for download - http://adf.ly/1apGWF

In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
Switch

Which password is automatically encrypted when it is created?
enable secret

A network administrator subnets the network 192.168.1.0/24 into four subnets which option correctly addresses router1 and hosta into the second subnet created?
network 192.168.1.65/26
host A 192.168.1.126 255.255.255.192

How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?
2046

Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255***
172.16.0.0 to 172.31.255.255***
192.168.0.0 to 192.168.255.255***

Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session before data can be exchanged?
The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.

What is the effect of using the Router# copy running-config startup-config command on a router?
A: The contents of NVRAM will change.

Which physical connector type is used for a serial V.35 connection to the CSU/DSU?
Answer is Option 4***

Which OSI layer addressing is required to route packets between two networks?
Layer 3***

Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
Image 3 The two switches

Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
The cable is suitable for connecting a switch to a router Ethernet port.
The cable is suitable for connecting dissimilar types of devices.

Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?
The clock rate command has not been entered on the DCE interface.***

which device should be used for enabling a host to communicate with another host on a different network.
Router

Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
Address translation

what is the first thing that happens when a collision occurs in an ethernet network
The transmitting devices invoke the backoff algorithm

which two programs can be used to accomplish terminal emulation for configuring a router from the CLI through the console port?
HyperTerminal Secure Shell

refer to the exhibit. which layer network model is shown in the diagram

TCP/IP

A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?
The “http” portion indicates the protocol that is being used.

Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
only computer D

Which statement describes the correct use of addresses to deliver an e-mail message from HostB to the e-mail service that is running on ServerA?
Router B uses a Layer 3 network address to route the packet

A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
Configure individual interfaces.

Refer to the exhibit. A network technician is trying to determine the correct IP address
configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17

which answer lists the cli mode hierarchy from least to most specific
global,user,provileged,specific

Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results indicate?
The TCP/IP stack on the local host operates properly.
A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts to log on from any of the six computers. What type of network should be used.
client-server network
a routing issue has occurred in your internetwork. which of the following type of devices should be be examined to isolate this error.
Router
What is the broadcast address for the network 172.16.70.32/28.
172.16.70.47
Cable A is plugged into the console port on switch S1. What is required on the PC for a network technician to enter the initial configuration on S1?
a terminal emulation program

Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection?
The SSH service is used to connect PC1 to RouterB.
Udp is the transport layer protocol for which application
TFTP
what command can be used to troubleshoot domain name resolution issues?
NSLOOKUP
which three ipv4 addresses represent subnet broadcast addresses (choose three.)
192.168.4.63 /26
192.168.4.191 /26
192.168.4.95 /27
Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
Refer to the exhibit. The nslookup command that is shown was issued on a Windows PC host. What does the 10.32.5.74 address represent?
the primary DNS server for the host
hich application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?
Telnet

which router cli mode will require user authentication if an administrator issues the enable secret command
Global
which two statements accurately describe the use of destination port numbers by clients on a network
The netstat command can be used to verify what connections are open and active.
A socket can be created by appending a well-known port number to a destination address.

What are the default terminal emulation software settings when configuring a Cisco device through a console port?
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None
which option shows how a router will route packets to a remote network
D C C D
which configuration mode is used to set a password to authenticate users that are accessing and configuring the network device using a Telnet connection
VTY line mode


Good Luck