Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "220-702" Exam

IT Technician

 Question 1.
You are working as a senior network technician at ITCertKeys.com. A trainee asks you where in the OSI model layers the MAC address reside. 

What will you answer him?

A. data link
B. network
C. transport
D. session

Answer: A

Question 2.
You are working as a senior network technician at ITCertKeys.com. You have just installed a laser printer that is directly connected to your Windows XP workstation.

You wish to share the laser printer to the local workgroup consisting of the other technicians at ITCertKeys.com. You want to be able to control which users can access the printer but you can not find a permissions tab for the printer. 

Which of the following actions should you take?

A. Remove unwanted users from the Local Users and Groups.
B. Turn off Simple File Sharing and set the permissions for the shared printer.
C. Use the printer's operation panel menu to lock out unwanted users.
D. Set up a shortcut to the printer on the desktop and set the permissions for the shortcut.

Answer: B

Explanation: 
Windows XP lets you share a computer's disks and folders with other computers on the network, using a method called Simple File Sharing. And it really is simple. If a disk or folder is shared, everyone on the network can access it. There are no user permissions and no passwords. Because sharing in this way is so wide open, Windows XP tries to protect you from some potential security risks. 

Question 3.
You are working as a network technician at ITCertKeys.com. You are asked to install a new wireless network in one of ITCertKeys.com's branch offices. You have read about security flaws in wireless networks and therefore you are concerned with securing the wireless network as much as possible with reasonable amounts of administration. 

Which of the following would be the BEST method to maintain a secure wireless network?

A. Perform a network diagnostic.
B. Remove all 2.4 gigahertz telephones from the location.
C. Enable WEP.
D. Move wireless computers close to the router.

Answer: C

Explanation: 
Wired Equivalent Privacy or Wireless Encryption Protocol (WEP) is a scheme to secure IEEE 802.11 wireless networks. It is part of the IEEE 802.11 wireless networking standard.

Question 4.
You are working as a technician at ITCertKeys.com. You receive an call from a suspicious user that has received an email stating that the company's network administrators are attempting to validate the complexity of login passwords by requesting that users provide the password in a reply email. 

Which of following actions should recommend the user to take?

A. Send a reply message with an encrypted signature attached.
B. Send a reply message containing the password.
C. Deny the request by deleting the email.
D. Encrypt the reply and send the reply to the requestor.

Answer: C

Explanation: 
This is one of the numerous variants of a social engineering attack where someone asks to get your logon name and password by pretending to be someone who you normally would trust.

Question 5.
You work as a technician at ITCertKeys.com. You receive a telephone call from a user stating that he has forgotten the password and is unable to access company email.

What should you answer the calling person?

A. the password will be reset in several minutes.
B. the user should remember the password.
C. the telephone call is being recorded and give the user the password.
D. information confirming the user's identity is needed.

Answer: D

Explanation: 
It is easy to remain anonymous over a telephone call and therefore you should not trust the user being who he says he is without the user providing more reliable information concerning his or her identity

Question 6.
You are working as a technician at ITCertKeys.com. You are troubleshooting a computer that is experiencing strange troubles. After a little while you determine that the best solution would be to reload the operating system. 

Which of the following would be the BEST way to explain to a customer that the computer will need to have the operating system reloaded?

A. I need to rebuild the system.
B. I will need to restore the system and data loss may occur.
C. I need to kill the system and reload it.
D. I will need to format the hard drive and reload all software.

Answer: B

Question 7.
You are the ITCertKeys.com trainee technician currently installing 6 IDE devices in a computer. 

Which of the following is the minimum amount of IDE channels needed to accomplish this objective?

A. 1
B. 6
C. 4
D. 3

Answer: D

Explanation: 
Each IDE channel can support two IDE devices. Thus if you are installing 6 IDE devices you need 3 IDE channels.

Incorrect Answers:
A: 1 IDE channel is inadequate if you want to install 6 IDE devices.
B: 6 Channels would be too many since each channel is able to support two IDE devices.
C: 4 Channels would be too many since each IDE channel can support two IDE devices.

Reference:
James G. Jones and Craig Landes, A+ Exam Cram 2 (2nd Edition), QUE Publishing, Indianapolis, 2003, p. 321.

Question 8.
Which of the following components on the motherboard usually house the IDE connectors?

A. PCI bus.
B. North Bridge.
C. ISA bus.
D. South Bridge.

Answer: D

Explanation: 
The South Bridge is generally used for slower devices such as USB ports, IDE drives, and ISA slots.

Incorrect Answers:
A: The PCI bus is a sort of bridge between the processor and ISA bus.
B: The North Bridge is generally used for high-speed interface cards, such as video accelerators, Synchronous RAM (SRAM), and memory.
C: The ISA bus does not house the IDE connectors.

Reference:
James G. Jones and Craig Landes, A+ Exam Cram 2 (2nd Edition), QUE Publishing, Indianapolis, 2003, p. 80.

Question 9.
What is the minimum number of hard drives required for RAID level 0?

A. 1
B. 2
C. 3
D. 4

Answer: B

Explanation: 
RAID Level 0 (RAID 0) is not a fault-tolerance configuration. It is a striping process in which 64KB block data are in striped sets across two or more hard disks.

Incorrect Answers:
A: A minimum of two hard drives are required for RAID-0.
C, D: RAID 0 configuration can include 3 or 4 hard drives but it requires a minimum of two hard disks.

Reference:
James G. Jones and Craig Landes, A+ Exam Cram 2 (2nd Edition), QUE Publishing, Indianapolis, 2003, p. 731.

Question 10.
Of the following options, which one is the only RAID level that uses disk mirroring?

A. RAID-0
B. RAID-5
C. RAID-3
D. RAID-1

Answer: D

Explanation: 
RAID 1 is the most common form of RAID at the moment and is often used in disk mirroring and disk duplexing.

Incorrect Answers:
A: RAID Level 0 (RAID 0) is the no-fault-tolerance process of using 64KB block storage areas in a striped set.
B: RAID-5 is a fault-tolerant volume with data and parity striped intermittently across three or more physical disks.
C: RAID 3 is disk striping with parity, with data being moved at the bit level rather than the block level.

Reference:
James G. Jones and Craig Landes, A+ Exam Cram 2 (2nd Edition), QUE Publishing, Indianapolis, 2003, pp. 731 and 732.



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.