IT Essentials v4.1 Chapter 9 Exam

IT Essentials v4.1 Chapter 9 Exam

Which factor affects the speed of an inkjet printer?

the desired quality of the image
the cost of the inkjet cartridges
the size of printer power supply
the quality of the paper

What are two cables that are used to connect a computer to a printer? (Choose two.)


What is a characteristic of thermal inkjet nozzles?

Heat is applied to the ink reservoir of each nozzle.
The vibration of the crystal controls the flow of ink.
A charge is applied to the printhead.
The heat creates a bubble of steam in the chamber.

In laser printing, what is the name of the process of applying toner to the latent image on the drum?


What is the purpose of the Additional Drivers button in the Sharing tab of the Printer Properties?

to add additional drivers for other operating systems
to add additional drivers for duplex printing
to add additional drivers for other printers connected to the computer
to add additional drivers for other printers in the network

A small LAN uses a shared printer that is connected to a computer. None of the users can print but all of the users can access the shared resources on the computer to which the printer is locally connected. What is a possible cause of this?

The cable that connects the printer to the PC is faulty.
The printer needs a new ribbon.
The printer has the wrong paper loaded.
The printer spool is full.

How would a user install a new USB printer on a PC that is running Windows 7 Professional?

Configure the BIOS to accept the specific model of printer in the USB port.
Copy the printer driver to the System32 folder.
Click Start > All programs > Control Panel > Printers and Faxes > right-click on the desired printer and choose Add.
Connect the printer and power it on. Windows will detect the printer and install the needed drivers.

A Windows 7 computer has several printers configured in the Control Panel Devices and Printers window. Which printer will the computer choose to be the first option for printing?

the software-based printer that is used to create XPS files
a manual selection, which is always needed
the printer that is set as the default printer
the software-based printer that is used to create PDF files

What are two methods to share a printer wirelessly? (Choose two.)

IEEE 802.11 standards

A user discovers that an inkjet color printer is printing different colors from those that are shown on the screen. What can be done to solve this problem?

Replace the fuser.
Replace the drum.
Adjust the printer spool.
Calibrate the printer.

The users on a LAN are reporting that computers respond slowly whenever high resolution photographs are being printed on the color laser printer. What would be the cause of this problem?

The printer is not configured for duplex printing.
The printer does not have enough memory to buffer an entire photograph.
The paper is not adequate for photograph printing.
The printer is not configured for the proper paper orientation.

What is a characteristic of global and per-document options in print settings?

It is not possible to configure per-document options.
Per-document options override global options.
Global options take precedence over per-document options.
It is not possible to configure global options.

What is true about the PostScript language?

It prints faster than other languages do.
It handles complex printing jobs.
It requires less printer memory than other languages require.
It allows the page to be rendered in the local workstation.

What are two closed-ended questions that a technician could ask a user while trying to identify the problem with a printer? (Choose two.)

Can you print a test page on the printer?
What were you doing when the problem occurred?
What recent software or hardware changes have been made to your computer?
Is the printer powered on?
What error messages were displayed when the problem occurred?

After applying a solution to a printer problem, a technician restarts the printer and prints a test page. Which step of the troubleshooting process is the technician applying?

documenting findings, actions, and outcomes
testing a theory to determine the cause of the problem
verifying the solution and system functionality
identifying the problem

A user notices that a job submitted to a printer is displayed in the print queue, but the printer is not printing the document. What is a probable cause of this problem?

an incorrect printer driver
the wrong paper type
a bad cable connection
a printer spooler not installed

A technician recorded that a new fuser roller unit was installed in a laser printer to solve a printing problem. Which step in the troubleshooting process did the technician just perform?

verifying the solution and system functionality
testing a theory to determine the cause of the problem
identifying the problem
documenting findings, actions, and outcomes

Where would network printer sharing be configured in a Windows 7 environment?

Network and Sharing Center
Ease of Access Center
Devices and printers
Printers and Other Hardware

What are two functions of a print server? (Choose two.)

ensure that the connected client computers have up-to-date printer drivers
store backups of documents sent to the printer
provide uninterrupted power to the printer
provide print resources to all connected client computers
store print jobs in a queue until the printer is ready

Which action supports an effective printer preventive maintenance program?

Clean inkjet print heads when they stop working.
Replace laser printer toner at set predetermined time intervals.
Reset the printer page counters if available.
Disconnect the printer from the power source when it is not in use.

Which two replacement parts are typically found in a laser printer maintenance kit? (Choose two.)

pack of paper
toner cartridge
replacement print head
transfer rollers
fuser assembly

How can the life of a thermal printer be extended?

Clean the inside of the printer with a vacuum cleaner with a HEPA filter.
Wipe the outside of the printer with a damp cloth.
Clean the heating element regularly with isopropyl alcohol.
Keep the paper dry in a low humidity environment.

What are two important outcomes of good computer and network security? (Choose two.)

keep equipment functioning
expose confidential information
allow unrestricted network access
reduce available network resources
provide access only to authorized users

Which three questions should be addressed by organizations developing a security policy? (Choose three.)

What items need to be protected?
How should the items be protected?
What is to be done in the case of a security breach?
When do the items need protecting?
What insurance coverage is required?
What are the possible threats to the items?

A company network was subjected to several security attacks after TCP/IP had been installed on the company computers. Analysis has shown that in most of the attacks, attackers used network sniffers to extract user names and passwords of critical accounts on the network. Which type of TCP/IP attack did these attackers deploy?

denial of service
ping of death
SYN flood

A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates?

Create a restore point.
Manually update the Last Known Good Configuration.
Reinstall the antivirus software.
Change the firewall rules to enable the installer to access port 8900 of the Microsoft server.

At which step of the troubleshooting process will a computer technician ask the customer a series of open-ended and closed-ended questions?

Document findings.
Identify the problem.
Implement a solution.
Determine an exact cause.

Why should everyone in an organization give high priority to computer and network security?

because antivirus software often does not work
because computer and network security is included in every job description
because everyone can be affected by computer and network security problems
because computer and network security is the primary responsibility of every employee

Refer to the exhibit. What is the correct order for the steps in the troubleshooting process?

2, 4, 5, 3, 1, 6
2, 5, 4, 3, 6, 1
5, 4, 2, 3, 6, 1
3, 5, 4, 2, 6, 1

For troubleshooting security problems, what should be done immediately after the exact cause of the problem is determined?

Document the findings.
Verify full system functionality.
Establish a theory of probable causes.
Establish a plan of action for resolution.

Which two actions improve security on a wireless network? (Choose two.)

Enable WEP.
Broadcast the default SSID.
Keep the default administrator password for the access point.
Enable MAC filtering.

A large number of e-mail messages are appearing in the inbox of a home computer user. The messages relate to products for which the user has never requested information. Which name is given to this type of e-mail?


A computer that is configured for automatic updates is shut down during a scheduled update. However, the update is downloaded successfully without any file being corrupted in the process. What will happen to the update as a result of this shutdown?

Notification for downloading available updates will be displayed when the computer is rebooted.
The update will be lost.
The update for the computer will be queued on the website.
The update will be installed as soon as the computer is powered on.

Which best practice should be included in a password protection policy?

Encourage users to document passwords in a personal file.
Enforce password protection at the BIOS level.
Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.
Restrict passwords to text-based strings.

Which two questions are examples of open-ended questions that could be used in the security troubleshooting process? (Choose two.)

Have you shared your password?
Is your security software up to date?
What problems are you experiencing?
What websites have you visited recently?
Have you scanned your computer recently for viruses?

How can web tools, such as Java or ActiveX, be used for a malicious attack?

by altering the interactivity level of a web page
by creating popup windows
by causing the web browser to crash, leaving the system vulnerable
by installing unwanted programs on a computer

What is a signature as the term is used in antivirus and antispyware software development?

a system restore point
a software removal tool
an operating system patch
a programming code pattern

Which precaution helps protect against social engineering in the workplace?

disclosing passwords to company personnel only
guiding visitors within the premises and escorting them personally when they leave
keeping hidden from public view any passwords that are posted in the work area
sharing access cards with other employees

What are two examples of malware? (Choose two.)

registry cleaner
pop-up blocker

Which security device stores user physical characteristics to provide a user level of facility access?

a biometric sensor
a card key
a key fob
a smart card

What condition can allow unauthorized access to a network for users who are not physically connected to the network?

exposed network cables
active jacks in public areas
poor wireless device security
unattended PCs that are logged into the network

What must be done to ensure that the antivirus software on a computer is able to detect and eradicate the most recent viruses?

Download the latest signature files on a regular basis.
Schedule a scan once a week.
Schedule antivirus updates using Windows Task Manager.
Follow the firewall configuration guidelines on the antivirus manufacturer website.