901-Exam questions
Which of the following wireless netowrking standards operates at 5GHz only? a. 802.11a b. 802.11b c. 802.11g d. 802.11n
802.11a operates at 5GHz only. 802.11 b and g operate at 2.4 GHz only. 802.11n operates either 2.4 and 5 GHz No standard for 802.11x
A laptop you are troubleshooting will not display any video through the laptop's screen or through external monitors. Which of the following should be replaced? a. inverter b. video card c. LCD d. Drivers
If the laptop can't display on the LCD or on an external monitor, that tells you that the video card is most likely faulty. The laptop would need to be opened to replace this. In some cases, it is integrated to the motherboard, requiring an entire motherboard replacement. If the inverter fails, you would still see a dim display. If the LCD fails, you'd be able to see on an external but not the laptop display. Incorrect drivers can give a variety of problems: garbled screen, unattainable maximum resolutions.
Which of the following tools can be used to test an AC outlet? (two answers) a. Multimeter b. PSU tester c. Receptacle tester d. Loopback plug
Receptacle tester and multimeter can be used (with caution) to test an AC outlet. A power supply (PSU) tester is used to test the main P1 power connection and possibly other connections of a power supply. Loopback has nothing to do with power
Which of the following does a laptop have, yet a tablet does not? a. touchpad b. display c. keyboard d. wireless network adapter
Tablets do not have a touchpad!
Which of the following is the local loopback IPv6 address? a. 127.0.0.1 b. ::1 c. 192.168.0.0 d. FE80::/10
The IPv6 loopback address used for testing is ::1. This determines if IPv6 is working correctly on the network card but does not generate network traffic. It exists on every computer that runs IPv6 127.0.0.1 is the IPv4 loopback address. 192.168.0.0 is a private IP network number. FE80::/10 is the range of aut-assigned addresses in IPv6
You are required to rip the contents of a CD to a compressed file format that can be read easily on PCs, Linus, or MACs. Which format should you select? a. .AAC b. .WMA c. .MP3 d. .MOV
The MPEG Audio Layer III (.MP3) works best when dealing with multiple platforms. Advanced Audio Coding (.AAC) is used more commonly on apple computers and devices and gaming consoles. Windows Media Audio (.WMA) is a Microsoft format developed especially for the Windows Media Player. .MOV is a QuickTime file format meant to be used with movies and other video .
Which of the following are examples of virtual printing? (two answers) a. start printing after last page is spooled b. print to xps c. print to a printer spool d. print to PRN
Two examples of virtual printing include XPS printing and print to file (one example of which saves the file as a .PRN). Other examples include printing to PDF and printing to image. "Start printing after the last page is spooled" is a spooling setting used to lessen the load on physical or virtual printers, but is a technology that printers use, not a type of virtual printing. Printing to a printer pool is another type of printer config used to print to a group of printers, making use of the collective whole for efficiency; but again, these could be physical or virtual printers and it is not a type of virtual printing in itself.
If your "bandwidth" is 1000 Mbps, how many bits are you sending/receiving? (two answers) a. 100,000,000 bits per minute b. 1000 bits per second c. 1,000,000,000 bits per second d. 1 gigabit per second
1000Mbits is 1000 megabits per second, otherwise notated as 1,000,000,000 bits per second, or 1Gbps
Which of the following IP addresses is private? a. 11.58.254.169 b. 169.255.10.41 c. 172.31.1.1 d. 192.169.0.1
172.31.1.1 is the only address listed that is private. It is within the Class B range of private addresses: 172.16.1.1-172.31.255.255. 11.58.254.169 is not private because it is on the class A 11 network. The class A private range is with the 10.0.0.0 network. 169.255.10.41 is not private either. Microsoft's APIPA, however, uses the 169.254.0.0 network, which is private. 192.169.0.1 is a public because of the second octet: 169. The class C private range is 192.168.00.0-192.168.255.255
Which of the following statements describe advantages of using Dynamic Host Configuration Protocol (DHCP)? (two answers) a. IP addresses can be managed from a central location b. The network speed can automatically adjust based on the type of traffic being generated c. the hosts file on the computer can be validated for proper entries d. media access control addresses can be changed e. computers can automatically get new addressing when moved to a different network segment.
Advantages of using DHCP include: -IP addresses can be managed from a central location -computers can automatically get new addressing when moved to a different network segment (perhaps one that uses a different DHCP server) QoS (quality of service) adjusts the network speed based on the type of traffic generated. DHCP has nothing to do with HOSTS.txt file; the file contains static entries of hostname to IP address conversions. Media access controll address are usually not changed on a network adapter, although they can be masked. MAC filtering maintains a list of MAC addresses that are allowed to access a network but still, a different concept.
How many pins would you see in a high-quality printhead on a dot matrix printer? a. 24 b. 15 c. 8 d. 35
High-quality dot matrix printheads can come in 9, 18, or 24 pins, with 24 being the highest quality
Your organization relies heavily on its server farm for resources and is less reliant on the client computers. Which type of client computer is most likely used by the organization? a. Virtualization Workstation b. Client/Server c. Thin Client d. Thick Client
In this scenario, the organization probably has thin client computers for its users. These have OS that are embedded in flash memory, and the rest of the information they require comes from a server. Thin clients normally have no hard drive; this is why they are referred to as DISKLESS workstations. Virtualization workstations definitely need a hard drive and require lots of other resources; they are not as dependent on servers. Client/server is a type of networking organizational technique. Thick Clients are for the most part PCs, the typical desktop computer
At the beginning of the workday, a user informs you that her computer is not working. When you examine the computer, you notice that nothing is on the display. Which of the following should be done first? a. Check whether the monitor is connected to the computer b. check whether the monitor is on c. check whether the computer is plugged in d. reinstall the video driver
Most simplest solutions first check if monitor is on > check if computer is plugged in > check if monitor is connected to the computer > reinstall video driver
A client brings in a printer that is giving a paper-feed error. Which of the following is the most likely cause? a. The separation pad b. the developing rollers c. the paper tray d. the pickup rollers
Paper-feed errors are often caused by the pickup rollers, which are in charge of feeding the paper into the printer. If a separation pad fails, it might cause more than one sheet of paper to be entered into the printer. The developing rollers transfer ink to the imaging drum. The paper tray simply holds the paper.
Which of the following uses port 427? a. FTP b. DNS c. SLP d. HTTPS e. RDP
The Service Location Protocol (SLP) uses port 427. It enables access to network services without previous configuration of the client computer. FTP uses port 21 by default. DNS uses port 53 HTTPS uses port 443 RDP uses 3389
Which of the following ports is used by AFP? a. 22 b. 23 c. 80 d. 143 e. 445 f. 548
The apple Filing Protocol (AFP) uses port 548. AFP offers file services for Mac computers running OS X and can transfer files across the network. SSH - Port 22 Telnet - 23 HTTP - 80 IMAP - 143 SMB - 445
Which of the following devices limits network broadcasts, segments IP address ranges, and interconnects different physical media? a. Switch b. WAP c. Firewall d. Router
A router can limit network broadcasts through segmenting and programmed router of data. This is part of a router's job when connecting two or more networks. It is also used with different media. For example, you might have a LAN that uses twisted-pair cable, but the router connects to the internet via a fiber-optic connection. That one router will have ports for both type of connections. A switch connects multiple computers together on a LAN - does not limit IP-based network broadcasts. However, the switch does not segment by IP address - it communicates with computers and segments the network via MAC addresses. A wireless access point (WAP) connects the computers on a wireless LAN (WLAN). Only has one RJ-45 port connection. A hardware-based firewall usually connects to the network via RJ45; regardless, it will have only one or only a few connections. It doesn't deal with routing, or broadcasts, instead it prevents intrusion to a network.
Which of the following IP addresses would a technician see if a computer running Windows is connected to a multifunction network device and is attempting to obtain an IP address automatically but is not receiving an IP address from the DHCP? a. 172.16.10.10 b. 192.168.0.10 c. 169.254.10.10 d. 192.168.10.10
C. If the computer fails to obtain an IP address from a DHCP server, Windows will take over and apply an Automatic Private IP address (APIPA) on the 169.254.0.0 network. All the other addresses could possibly be obtained from a DHCP server. 172.16.10.10 is a Class B private IP address. 192.168.0.10 and 192.168.10.10 are Class C private IP addresses.
Which of the following cable types is not affected by EMI but requires specialized tools to install? a. cat 6 b. STP c. fiber optic d. coaxial
Fiber optic cable is the only answer isted that is not affected by electro magnetic interference (EMI). This is because it does not use copper wire or electricity, instead uses glass or plastic fibers and light. Any copper cable will be susceptible to EMI ato a certain degree. Regular UTP cable such as a Cat 5e or 6 will be very susceptible, Coaxial slightly less Shielded twisted pair (STP) even less than that. -STP is difficult to install and must be grounded. Which makes it less common in networks.
Which of the following commands displays a network interface card's MAC address? a. Ping b. ipconfig/all c. ipconfig d. ipconfig/release
IPconfig/all shows a lot of information, including the MAC address IPconfig shows only the IP address, subnet mask, and gateway address Ping tests whether other computers are alive on the network. Ipconfig/release is used to troubleshoot DHCP-obtained IP addresses. It often used in conjunction with IPconfig/renew
In order to perform a network installation of Windows, which of the following must be supported by the computer's network interface card? a. PXE b. PCI c. PCL d. PnP
Network installations require that the netowrk card be configured for Preboot eXecution Environment (PXE). This allows the network cared to boot off of the network, locate a network installation server, and request that the installation being. This configuration might be done in the BIOS/UEFI of the computer (if the network adapter is integrated in to the motherboard), within a special program in Windows, or one that boots from disc or other removable media.k PCI is an expansion bus that accepts network adapter cards, sound cards, and so on. PCL stands for Printer Command Language, developed by HP so a computer can properly communicate with dot matrix or thermal printers. PnP stands for plug and play, a Windows technology that allows devices to be located and installed automatically
Which of the following addresses is a valid IPv4 address for a network host? a. 127.0.0.1 b. 169.254.0.0/16 c. 172.17.58.254 d. 255.10.15.7
Of the answers listed, 172.17.58.254 is the only valid IPv4 address for a network host. A host on the network is any computer or network device that uses an IP address to communicate with other computers or devices (hosts). 172.17.58.254 is a Class B private IP address so it fits the description of the valid IPv4 address for a network host. 127.0.0.1 is the local loopback address. TCP/IP gets this address; it is used for testing. It cannot be used to communicate with other hosts on the network. 169.254.0.0/16 means an IP address of 169.254.0.0 with a default subnet mask of 255.255.0.0 indicating the network number is 169.254. It is not a valid host IP address because it ends in 0.0. NORMAL HOST IP ADDRESS' FIRST OCTECT WILL EITHER BE BETWEEN 1-126 AND 127-223.
Setting an admin password in the BIOS accomplishes which of the following? a. prevents a user from rearranging the boot order b. prevents a user from reading email. c. prevents a virus from infecting the MBR d. prevents and attacker from opening the case
Setting an admin password in the BIOS/UEFI prevents a user from rearranging the boot order. The idea behind this is to stop a person from attempting to boot off of an optical disc or USB flash drive. As an admin, you should change the BIOS boot order to hard drive first. Then apply an administrative (also known as supervisory) password. That'll stop them right in their tracks! To prevent a user from reading an email, you'd have to remove outlook and browser (unfeasible) To prevent a virus from infecting the MBR, you could turn on boot sector scanning in the BIOS (if it supports it) To prevent an attacker from opening a case, use a case lock.
Which of the following is the first thing you should check when a computer cannot get on the internet? a. NIC driver b. Disk defrag c. Patch cable d. firewall settings
The simplest solution is often the most common. Check cables whether the power is on for your devices and computers. Then the drivers via Device Manager, then the firewall.
Which type of cable should be used to connect a laptop to a PC? a. Cat 6 patch cable b. Parallel cable c. IEEE 1394b cable d. Cat 5e crossover cable
To connect one computer to another directly by way of network adapter cards, use a CROSSOVER CABLE (the category such as 5e or 6 doesn't matter. That cable is designed to connnect like devices. It is wired as T568B on one end and T568a on the other. Those standards are ratified by the Telecommunications Industries Association/Electronic Industries Alliance (TIA/EIA). A regular CAT 6 cable is known as a straight-through cable. It is used to connect unlike devices, such as a computer to a switch. Normailly this is wired with the 568B standard on each end. A parallel cable might be used to connect an older printer to a computer or an external hard drive to a SCSI card. IEEE 1394 cables are not used to connect computers to each other.