|
Question 1 Which of the following statements about the Level 1 cache is true? Each correct answer represents a complete solution. Choose two. A. Also known as external cache, it is included in every CPU. B. Also known as internal cache, it is included in every CPU. C. It eliminates the need to wait for the data to be fetched from DRAM. D. It uses low-speed memory chips for caching. Answer: B,C Explanation: The Level 1 cache is a type of RAM that is included in a CPU. All the commands for the CPU go through the cache. It stores a backlog of the commands so that, if a wait state is encountered, the CPU can continue to process data by using the commands from the cache. It improves computer performance by eliminating the need to wait for data to be fetched from DRAM. The Level 1 cache is also known as internal cache. What is wait state? Wait state is a condition in which a microprocessor waits for DRAM to get information. This slows down computer operations. When a computer runs without encountering a wait state, it runs faster. This is known as a zero wait state operation. Answer option A is incorrect. The Level 2 cache is mounted directly on the motherboard, outside the CPU. It is also known as external cache. Answer option D is incorrect. Cache RAM uses high-speed memory chips, known as SRAM, for caching. Question 2 Which of the following should be included in the server baseline document? A. Date of server purchase B. Server response time C. Disk performance statistics D. Network bandwidth Answer: B,C Explanation: The following should be included in the server baseline document: Server response time Disk performance statistics Baseline is a document that contains performance statistics for computers and other devices in the network. Administrators record a device's baseline performance when they add the device to the network. This document is very helpful in comparing a device's performance on any given day to the baseline. It helps administrators determine if a device is operating properly. Answer options A and D are incorrect. The dates of server purchase and server response time have nothing to do with the server baseline. 2 Question 3 Which of the following practices should be avoided in order to prevent your server's security from being compromised? Each correct answer represents a complete solution. Choose two. A. Putting a lock on the server room's door B. Using a phrase for the server password C. Using personal information in the server room password D. Writing the server password on a paper for self reminder Answer: C,D Explanation: The following practices should be avoided in order to prevent your server's security from being compromised: Writing the server password on a paper for self reminder Using personal information in the server room password. The personal information, such as phone number and date of birth, can be guessed easily by unauthorized users. Answer options B and A are incorrect. Using a phrase for the server password and putting a lock on the server room's door are good practices for keeping your server secure. Question 4 When you start your computer, Windows operating system reports that the hard disk drive has bad sectors. What will be your first step in resolving this issue? A. Run DEFRAG on the hard drive. B. Run SCANDISK with the Thorough option. C. Run the FORMAT command from DOS prompt. D. Replace the data cable of the hard disk drive. Answer: B Explanation: Running SCANDISK with the Thorough option should be your first step in resolving this issue. With Thorough option, SCANDISK checks files and folders for errors. It also checks the physical integrity of the disk surface. When SCANDISK encounters a bad sector, it tries to fix the sector. Answer option A is incorrect. DEFRAG, a Windows-based utility, is used to reorganize files on a disk to optimize disk performance. Answer options C is incorrect. The FORMAT command is used to format disks. It will not help in resolving the issue. Answer option D is incorrect. The data cable is used to transfer data. Reference: TechNet, Contents: "How ScanDisk Fixes Bad Sectors [Q103956]" 3 Question 5 Which of the following protocols is used to send e-mail between two mail servers? A. NNTP B. SMTP C. IMAP D. SNMP Answer: B Explanation: Simple Mail Transfer Protocol (SMTP) is used to send e-mail between two mail servers. Simple Mail Transfer Protocol (SMTP) is a protocol for sending e-mail messages between servers. Emailing systems use this protocol to send mails over the Internet. SMTP works on the application layer of the TCP/IP or OSI reference model. The SMTP client typically initiates a Transmission Control Protocol (TCP) connection to the SMTP server on the well-known port designated for SMTP, port number 25. However, e- mail clients require POP or IMAP to retrieve mails from e-mail servers. Answer option D is incorrect. Simple Network Management Protocol (SNMP) is a part of the TCP/IP protocol suite, which allows users to manage the network. SNMP is used to keep track of what is being used on the network and how the object is behaving. Answer option A is incorrect. NNTP stands for Network News Transfer Protocol (NNTP). It is a simple ASCII text-based protocol used to post, distribute, and retrieve network news messages from NNTP servers and NNTP clients on the Internet. Answer option C is incorrect. IMAP stands for Internet Message Access Protocol. This protocol helps to retrieve e-mail messages stored on a shared e-mail server. Through this protocol, a user can use a client e-mail program/Mail User Agent (MUA) for downloading an e-mail from the shared server. A user can also use this protocol to edit or delete an e-mail from the shared e-mail server. An example of the IMAP protocol is the POP3 protocol that is quite simple and used for retrieving e-mails from a mail server. Reference: "http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol" Question 6 What other backup mode must be used while creating a differential backup? A. Daily backup B. Incremental backup C. Sequential backup D. Full backup 4 Answer: D Explanation: Backup is a graphical program used to back up and restore user data. In the event of data deletion or hard disk failure, the backup copy can be used to restore lost or damaged data. The Backup utility supports three modes of backup: Full backup backs up all selected files for backup and takes maximum space and time. It needs only one tape to restore data. Incremental backup provides a backup of files that have changed, or are new, since the last incremental or full backup. It needs the last full backup tape and all intermediate tapes used for incremental backup to restore data. A differential backup strategy takes minimum space on the hard disk or network drive. The differential backup backs up only those files that have been created or changed since the last full backup. It takes only the last full backup tape and the last differential backup tape to restore data. Reference: TechNet, Contents: "Chapter 12 - Backup" Question 7 Which of the following serial bus specifications is also known as Firewire? A. DIN B. RS-232 C. IEEE 1394 D. IEEE 1284 Answer: C Explanation: IEEE 1394 is a high-speed serial bus that provides enhanced PC connectivity for a wide range of devices. These devices include consumer audiovisual components, traditional PC storage devices, and handheld devices. IEEE 1394 is also known as Firewire. Answer option A is incorrect. DIN is a type of connector that is used in standard 101-key IBM-style keyboards. Answer option B is incorrect. RS-232 standard is a specification for serial communication ports, also known as COM ports, serial ports, or RS- 232 ports, and is used to connect RS-232 compatible serial devices, such as modems and pointing devices to a computer. Answer option D is incorrect. Institute of Electrical and Electronics Engineers (IEEE) 1284 is a specification of a printer cable used to take advantage of bi-directional printing. Typically, bi-directional cables have the number 1284 printed on them. Question 8 Which of the following statements is true about a polymorphic virus? 5 A. This type of virus hides system files. B. It copies itself onto the boot sector of hard disk drives. C. It has the ability to change its own signature at the time of infection. D. It is a type of virus that removes access permissions from files. Answer: C Explanation: Polymorphic virus has the ability to change its own signature at the time of infection. This virus is very complicated and hard to detect. When the user runs the infected file in the disk, it loads virus into the RAM. The new virus starts making its own copies and infects other files of the operating system. The mutation engine of polymorphic virus generates a new encrypted code, this changes the signature of the virus. Therefore, polymorphic viruses cannot be detected by the signature based antivirus. Reference: TechNet, Contents: "Security Threats" Question 9 Which of the following cables are used to connect one computer to another? Each correct answer represents a complete solution. Choose three. A. SCSI cable B. 10Base2 cable C. Parallel cable D. Serial cable Answer: B,C,D Explanation: You can connect computers to communicate with each other using any one of the following cables: 10Base2 cable Parallel cable Serial cable What is 10Base2? 10Base2 is a type of cable, also known as Thinnet Coax. The maximum length of a 10base2 cable network can be 185 meters . 10Base2 cable is used in Bus topology. 10Base2 network uses the British Naval Connector (BNC) along with the T connectors to connect to the LAN card. What is a parallel data cable? A standard parallel data cable consists of twenty-five wires that transfer data one byte at a time. Each wire terminates in a connector called a pin, so it is often referred to as a 25-pin connector. The 8-bits that make up each byte travel in parallel mode across eight of the twenty-five wires. The parallel channel is fast, reliable and preferred way to connect printers and other external devices to a computer. A standard parallel data cable has a DB-25 connector on one end and a Centronics connector on the other end. Answer option A is incorrect. SCSI cable is used to connect mass storage devices to a computer. What is SCSI? Small Computer System Interface (SCSI) is the second most popular drive interface in use today after the Integrated Drive Electronics (IDE) interface. SCSI is faster than IDE and supports more devices. SCSI devices, such as hard disk drive and CD-ROM drive, are better suited in a network environment in which many users access 6 shared drives simultaneously. SCSI has three standards: SCSI-1, SCSI-2, and SCSI-3. Question 10 Mark works as a Network Administrator for NetTech Inc. During the boot process, a server displays a POST error. Which of the following actions can Mark take to identify the problem? A. Check the security log of the operating system for the BIOS error code. B. Call the helpdesk of the operating system's vendor. C. Check the system log of the operating system for the BIOS error code. D. Refer to the server documentation for the BIOS error code. Answer: D Explanation: In order to identify the problem, Mark can refer to the server documentation for the BIOS error code. The server documentation contains information about BIOS error codes. The manufacturer of the server provides the server documentation. Answer option C is incorrect. The system log of the operating system does not contain information about BIOS error codes. The system log is used to store events logged by the operating system components. For example, events such as driver failure during startup are recorded in the system log. Answer option A is incorrect. The security log of the operating system does not contain information about BIOS error codes. The system log is used to store security-related events. Answer option B is incorrect. The helpdesk of the operating system's vendor cannot provide any help regarding a BIOS error.
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.