CNET 110 Introduction to Information Technology

¡Supera tus tareas y exámenes ahora con Quizwiz!

DNS Domain Name System (DNS) is an internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. For example, the name www.mydomain.com would be identified with a specific IP address.

Currently, the users in your company are required to use their IP addresses when connecting to other hosts. Since IP addresses are difficult to remember, you want to implement a protocol on your network that allows computers to automatically find another host's IP address using a logical name. Which of the following protocols would be the BEST to implement?

Network Connecting the printer to a network cable allows users from multiple locations to connect to the printer. Although a printer can be connected to a PC using the other types of connections, they would not grant access to all users. A network cable will connect the printer to the same router that the other computers in the department are using.

The manufacturing department consists of 50 employees. Due to the number of employees in this department, the company cannot afford to have a printer for each user. Your company has purchased a new and very expensive laser jet printer for this department's use. This printer needs to be configured so all users in the department have the ability to print to this device from their own computers. Which of the following printer connections would BEST facilitate multiple user access?

Enable virtualization support in the BIOS settings. For virtualization to work on Rachel's PC, you must ensure that the virtualization support is enabled in the BIOS settings. Some CPUs will have Virtualization Support turned on by default, and others will not. Although additional memory will increase performance of a computer using virtualization, it may not be required depending on the amount of memory currently installed. Likewise, an additional hard disk may be advantages in storing or running virtual machines, but they are not a requirement. Most modern CPUs support virtualization and do not require the BIOS to be flashed.

Rachel, an employee in the support department, wants to run a virtual machine on her computer from which she can troubleshoot customer issues. Which of the following must you complete before virtualization will work on her computer?

Multimeter In this case, you should use a multimeter to test the DC current flowing from the brick. If the current is incorrect, then you may need a replacement AC adapter. A power supply tester is specifically designed to test DC current flowing from a PC power supply and its associated connectors. A cable tester verifies that a network can carry a signal from one end to the other, and that all wires within the connector are in their correct positions. A loopback plug lets you test a port for proper functionality. The loopback plug crosses the receive and transmit wires, letting the computer send a signal to itself.

Recently, your laptop won't power on, and the battery is not charging. You suspect the block on the power cord (also known as a brick) no longer works. Which tool will help you troubleshoot this problem?

1. Bluetooth 2. Infrared Radio frequency wireless transmissions can reach up to 356 meters, depending upon the 802.11 standard used and interference present in the environment. Infrared wireless transmissions work best for devices within 1 meter, but can operate up to 30 meters in areas without ambient light interference. The maximum Bluetooth transmission distance depends on the device class: --Class 3 devices transmit up to 1 meter. --Class 2 devices transmit up to 10 meters. --Class 1 devices transmit up to 100 meters.

1. --Up to 100 meters for Class 1 devices. --Up to 10 meters for Class 2 devices. 2. Up to 30 meters in areas without interference.

1. Local Area Network (LAN) 2. Personal Area Network (PAN) 3. Metropolitan Area Network (MAN) 4. Wide Area Network (WAN) 5. Wireless Local Area Network (WLAN) 6. Metropolitan Area Network (MAN) 7. Local Area Network (LAN)

1. A network in a small geographic area that typically uses wires to connect systems together. 2. A small network used for connecting devices, such as a notebook computer, a wireless headset, a wireless printer, and a smartphone. 3. A network that is typically owned and managed by a city as a public utility. 4. A group of networks that are geographically isolated, but are connected to form a large internetwork. 5. Similar to a standard LAN, but uses radio signals instead of wires to connect systems together. 6. A network that covers an area as small as a few city blocks to as large as an entire city. 7. A set of subnets connected to each other, typically by wires, using at least one router.

1. Hard Disk Drive (HDD) are thick magnetic disks made of aluminum platters. They use read/write heads to access data stored on the platters. They provide up to several terabytes of storage capacity, and their cost per megabyte is very low. 2.A solid state drive (SSD) is a flash device with storage capacity similar to a small hard drive. They are faster than other devices. They have no moving parts and last longer than other storage devices. 3. Optical discs use lasers to read and write information that is stored in the form of pits in their reflective coating. They are ideal for storing and playing music and video. They are portable and cheap and have a long shelf life.

1. A thick magnetic disk made of aluminum platters. Uses read/write heads to access data stored on the platters. 2. A flash device and storage capacity similar to a small hard drive. 3.Uses lasers to read and write information stored in the form of pits in their reflective coating. 1. Providesup to several terabytes in storage capacity, and cost per megabyte is very low. 2. Faster than other devices. No moving parts. Lasts longer than other storage devices. 3. Ideal for music and video. Portable and cheap with a long shelf life.

1. 80 2. 443 3. 143 4. 22 5. 445 6. 427 7. 548

1. Hypertext Transfer Protocol (HTTP) 2. HTTP over SSL (HTTPS) 3. Internet Message Access Protocol (IMAP) 4. Secure Shell (SSH) 5. Server Message Block (SMB/CIFS) directly over TCP 6. Service Location Protocol (SLP) 7. Apple Filing Protocol (AFP)

1. Thermostat 2. Switch 3. Bulb 4. Plug 5. Security camera 6. Door Lock 7. Speaker/digital assistant

1. Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real-time, and adjusts itself depending on ambient conditions. 2. Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. 3. Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. It doesn't work when turned off. 4. Easy solution for making small appliances, such as lamps, coffee makers, and toasters, smart. 5. Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage. 6. Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device. 7. Uses voice recognition software and activates through a Wake Word or Hot Word.

At these critical times, memory problems can manifest themselves as follows: 1. First boot of a new computer - memory is not properly seated, missing, or the motherboard is defective. 2. After a memory upgrade - ensure that the memory is compatible and was installed and configured properly. 3. After software installation - new software can require more memory and can cause problems if there is not enough memory for the software. 4. After hardware installation or removal - incompletely or improperly installed hardware can cause errors that appear to be memory-related.

1. Memory is not properly seated or missing/the motherboard is defective. 2. The memory is not compatible and was not installed and configured properly. 3. This event can require more memory and can cause problems if there is not enough memory when it occurs. 4. Incompletely or improperly doing this can cause errors that appear to be memory-related.

1. Private Cloud-provides resources to a single organization. The cloud service provider ensures the organization's data is kept separate and secure from any other organization using the same service provider. 2. Hybrid Cloud-combines public, private, and community cloud resources from different service providers. 3. Community Cloud-is designed to be shared by several organizations. 4. Public Cloud-computing resources such as platforms, applications, and storage are made available to the general public by a cloud service provider.

1. Provides resources to a single organization. 2. Combines public, private, and community cloud resources from different service providers. 3. Designed to be shared by several organizations. 4. Provides computing resources that are accessible by the general public. 1. Keeps one organization data separate and secure from any other organization using the same service provider.

1. Full Virtualization-the virtual machine completely simulates a real physical host. This allows most operating systems and applications to run within the virtual machine without being modified in any way. 2. Partial Virtualization-only some of the components of the virtual machine are virtualized. The operating system uses some virtual components and some real physical hardware components in the actual device where the hypervisor is running. 3. Paravirtualization-the hardware is not virtualized. All of the guest operating systems running on the hypervisor directly access various hardware resources in the physical device; components are not virtual.

1. The virtual machine completely simulates a physical computer system. 1. Operating systems do not need modification to run within virtual machines. 2. Only some of the components of a virtual machine are virtualized. 3. Guest operating systems directly access hardware resources in the hypervisor host system.

1. Active Heat Sink--have an attached fan that helps cool off the component at a faster rate. Active heat sinks are used with the following components: CPUs High-end video cards 2. Passive heat sinks--do not have a fan and instead rely on increased surface area and passive air movement to cool the component. Passive heat sinks are used with the following components: Low-end video cards Memory modules 3. Power supply--ATX power supplies aid in cooling by exhausting hot air out the back of the case. 4. Liquid Cooling--Liquid cooling systems are used when air cooling is not sufficient. Because liquid cooling can dissipate heat much faster than air cooling, it is primarily used for high-end gaming computers and high-performance systems. 5. Case Fans--create a pressurized system that allows air to flow through the case in a specific way.

1. Used for cooling high-end video cards 4. Used for cooling high-end gaming computers 1. Has a fan attached to the heat sink 1. Used for cooling CPUs 3. Exhausts hot air out of the back of the case 2. Used for cooling memory modules 4. Used for cooling high-performance systems 2. Has no fan attached to the heat sink

1. Virtual network interfaces--one or more virtual network interfaces can be configured within each virtual machine. Virtual interfaces function in much the same manner as physical interfaces. Virtual interfaces use Ethernet standards to transmit and receive frames on the network. The operating system within the virtual machine must have the appropriate driver installed to support the virtual network interface, just as with a physical network interface. 2. Virtual switches--allow one virtual machine to communicate with another in much the same way that a physical switch allows physical hosts to communicate with each other. A virtual switch functions in the same manner as a physical switch: after initially coming online, a virtual switch floods each frame it receives until it builds a table that identifies which MAC addresses are connected to each port. 3. Virtual routers--unlike a physical router, a virtual router can support multiple networks on each router interface. A different routing table is used for each network. This is useful in situations where multiple virtual networks exist on the same physical network. As with physical routers, a routing protocol is used by the virtual router to route data between networks. 4. Virtual firewalls--virtual hosts are susceptible to the same network exploits as physical network hosts and need to be protected by a firewall. Protecting communications between virtual hosts is challenging because the data never leaves the virtual network, so it can't be protected with a physical firewall. One strategy is to implement a virtual firewall within the hypervisor to monitor and filter traffic on the virtual network as it flows between virtual machines. 5. Virtual VLANs--most virtual switch implementations support VLANs. You can define VLANs within a virtual switch and associate specific hosts with a specific VLAN. However, because virtual hosts are not physically connected to switches with cables, VLAN membership is defined within the configuration of each virtual machine.

1. Uses Ethernet standards to transmit and receive frames on the network 2. Builds a table that identifies which MAC addresses are connected to each of its ports 3. Can support multiple networks on each of its interfaces, unlike the physical version 4. Implemented within the hypervisor to monitor and filter traffic on the virtual network as it flows between virtual machines 5. Can be defined within the virtual switch and associated with specific hosts

1. PAN 2. LAN 3. WLAN 4. MAN 5. WAN

1. a very small network used for communication between personal devices. For example, a PAN may include a notebook computer, a wireless headset, a wireless printer, and a smartphone. A PAN's range is limited to only a few feet. 2. a network in a small geographic area, like an office. A LAN typically uses wires to connect systems together. For example, a LAN is usually a set of subnets connected to each other using routers to connect the subnets. 3. a network that covers an area that is roughly the same size as a standard LAN. However, it uses radio signals instead of wires to connect systems together. 4. a network that covers an area as small as a few city blocks to as large as an entire metropolitan city. MANs are typically owned and managed by a city as a public utility. 5. a group of LANs that are geographically isolated, but are connected to form a large internetwork.

1.Hotpsot 2.NFC 3.Mobile VPN 4.Tethering 5.Bluetooth

1.a physical location where you can obtain wireless internet access using a wireless local area network (WLAN) with a router connected to an internet service provider. 2.a type of connector used to emulate cryptographic smart card functionalities for RFID tags or memory cards. 3.provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks. 4.a means for connecting one device to another. In the context of mobile phones and tablet computers, tethering allows sharing the internet connection of the phone or tablet with other devices like laptops. 5.a wireless technology standard for exchanging data over short distances from fixed and mobile devices and for building personal area networks (PANs). It can connect several devices, overcoming problems of synchronization.

1. Digitizer-captures some type of analog signal and converts it into digital data. For example, graphics tablets capture analog stylus strokes written on a pad and convert them to digital data. These are mostly used by graphic artists to capture hand-drawn images. 2. Smart Card Reader-are used as an authentication method. A smart card, which contains an embedded microchip, is inserted into the reader. The reader then scans the chip, verifies its contents, and authenticates the user. Smart card readers can be stand-alone devices or integrated with other peripherals (such as a keyboard). 3. Biometric Scanners-are used as a form of authentication. They are able to scan users' unique physical features and use them to verify their identity. Biometric scanners commonly identify retinas, fingerprints, faces, and heart beats. 4. Barcode Reader-is a device that can scan barcodes. Barcodes are most commonly used in retail environments at checkout stands. Shipping companies, hospitals, and other organizations use barcodes to track or inventory items.

2. Used to scan hardware that contains an embedded microchip for authentication. 1. Used to capture some type of analog signal and convert it into digital data. 2. Can be a stand-alone device or integrated with other peripherals, such as a keyboard. 3. Used to scan users' unique physical features and use them to verify their identity. 1. Graphics tablets mostly used by graphic artists to capture hand-drawn images. 3. Fingerprint scanner. 4. Most commonly used in retail environments at checkout stands.

Change QoS settings to give VoIP traffic more priority. Poor VoIP performance is likely due to insufficient bandwidth to support both video streaming and VoIP calls. Changing the router's QoS settings to give a higher priority to VoIP traffic will most likely improve VoIP performance.

A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often when one person in the office streams video from the internet. Which of the following configuration changes on the SOHO router is MOST likely to improve VoIP performance?

Line-of-sight wireless Line-of-sight wireless uses microwave or radio frequency signals between two antennae. The direct patch between the antennae must not be blocked.

A SOHO's connection to the internet is through an antenna that sends and receives a microwave signal to the ISP's antenna. There can be no obstacles on the direct path between the two antennae. Which of the following internet connection types is being used?

1. What is this special IP configuration called? A-Automatic Private IP Addressing (APIPA) 2. Why did the workstation receive this type of configuration? A-The workstation was unable to contact the DHCP server. If a Windows client is configured to receive an IP address from a DHCP server but cannot contact a DHCP server, it will automatically assign itself an IP address within the range of 169.254.0.1 to 169.254.255.254 with the subnet mask 255.255.0.0. You can use APIPA instead of a DHCP server, but it should only be used on a small network that does not need default gateway or DNS server settings configured.

A Windows workstation is configured to receive its IP configuration information from a DHCP server on the company network. The user at the workstation reports that she cannot use email and is unable to reach the internet. Using the ipconfig command, you see that the workstation has been assigned the following special IP configuration: --IP address: 169.254.0.1 --Subnet mask: 255.255.0.0

User Datagram Protocol (UDP) User Datagram Protocol (UDP) is a Transport layer protocol that uses a simple connectionless communication model with a minimal protocol mechanism. This makes it suitable for broadcasting streaming video or sound. Guaranteed data delivery is not as important as fast transmissions.

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which of the following transport layer TCP/IP suite protocols is MOST likely used for this service

Rapid Elasticity Rapid elasticity describes the cloud provider's ability to increase or decrease service levels to meet customer needs without requiring hardware changes. Measured service refers to the way cloud services are measured or metered for billing purposes or according to a service level agreement. An on-demand cloud service is available to user at any time. Cloud services providers use resource pooling to supply services to multiple customers using shared physical resources.

A company has subscribed to a cloud service that offers cloud applications and storage space. Through acquisition, the number of company employees quickly doubled. The cloud service vendor was able to add cloud services to these additional employees without requiring hardware changes. Which of the following cloud concepts does this represent?

Synchronization to the cloud While iTunes can also be used to synchronize data to the desktop, iTunes , iCloud, Google Drive, Dropbox, and OneDrive can be used to synchronized mobile device data to the cloud. While iTunes can also be used to synchronize data to the desktop, iCloud, Google Drive, Dropbox, and OneDrive only synchronize data to the cloud.

A company is considering providing smartphones to their employees and is investigating the interaction of the phones with iTunes, iCloud, Google Drive, Dropbox, and OneDrive. Which of the following data synchronization methods is being considered?

Overheated processor--is the most likely cause of random system lockups. A loose monitor cable will only affect the display and cause the image to cut out or distort. A faulty mouse or keyboard only causes problems with user input. A failing network adapter will cause networking issues, such as internet connection loss, but the system will still be able to run.

A computer was brought into your help desk center for repair. You have been told that it randomly locks up. Which of the following is MOST likely causing this issue?

802.11ac The microwave oven interferes with wireless signals operating at 2.4 GHz. The 802.11ac standard is the best choice. It operates at 5.0 GHz and has a maximum throughput of 1300 Mbps.

A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased. Which of the following Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs?

Fiber optic The signal source used with Fiber optic cables is a light pulses. Fiber optic cabling can be a laser, but most often, it is an LED

A customer is upgrading the routers and switches in their network. The signal source in these network devices is a light-pulse. Which of the following network cabling options is MOST likely being used in this upgrade?

Memory When an application is started, it is loaded into memory. If the computer does not have sufficient memory, the application cannot start. To remedy the problem, add more memory to the computer. Upgrade the hard disk to provide additional storage space for files. Upgrade the CPU to execute programs faster or to provide advanced processing features. Upgrade the system board to support new components, such as newer memory modules, CPUs, or bus types.

A customer needs to use several applications. Currently, the computer cannot keep all the necessary applications open at the same time. Which of the following components should you consider upgrading?

1. For the best performance, both video cards should be identical. 2. The motherboard should support either SLI or CrossFire. For increased performance, especially in games, multiple video cards can be linked together using a special bridge clip. This allows multiple GPUs to draw a single screen. For the best performance, both video cards should be identical. In addition, the motherboard must be compatible with either SLI (used by NVIDA cards) or CrossFire (used by AMD cards). Because each cards is sharing the processing load, the memory banks and GPU in both video cards are being used. In a multi-GPU configuration, the secondary (bottom) card's display connectors are typically disabled.

A customer wants to add an additional video card to her computer so she can play the latest computer games. As a result, this system will now have a multi-GPU configuration. Which of the following statements are true? (Select TWO).

1. Use the Color Management tab of the printer driver to calibrate the driver's color settings. 2. Download and install the latest printer drivers. You should download and install the latest printer driver and then use the Color Management tab to adjust the driver's color settings. Many times, installing the latest driver alone will fix color issues. If not, then you can manually adjust the color settings until they match the original.

A customer who uses a Windows computer recently purchased an inkjet printer from your store. She is now calling to complain that the colors in the photos she printed on her new printer don't match the colors in the original photos created by the photo shop. Which of the following actions will MOST likely resolve the issue? (Select TWO).

1. Ensure that the video card is compatible with the expansion slot. 2. Install new the video drivers from CD and then install updated drivers from the internet. 3. Configure the PC to use the integrated graphics if available and needed. It is imperative that you always ensure that the video card is compatible with the expansion slot in which the video card will be installed. In some cases, you may have to disable the integrated graphics. However, if possible, you should configure the computer to default back to the integrated graphics if the new high-end graphics card fails or is removed. Otherwise, you may not be able to access the BIOS/UFI firmware to change the computer back to the integrated graphics. Some high-end graphic cards may require a connection to the power supply, but you do not need to disable power to the integrated graphics. You typically only need twice as much system memory as your graphics car has VRAM. Since this computer has 16GB RAM and the card is only 4GB, no additional RAM is required.

A customer would like you to install a high-end video card suitable for gaming. Your installation and configuration SHOULD include which of the following? (Select THREE).

Docking station

A docking station lets you use the notebook systems as a desktop system. The docking station includes special ports that connect to the back of the notebook and let you use normal-sized external mouse, keyboard, monitor, and speakers.The docking station provides a quick and easy way to connect these peripheral devices. While you could connect these devices manually each time, using the docking station will be more convenient.

Viewing the temperature from within the BIOS An easy way to check the temperature of your computer's CPU is to boot to the BIOS and locate the hardware monitor section. Different BIOS programs have different section labels. Some of the more common labels are H/W Monitor, Status, and PC Health. From within this section, you can view the temperature of your CPU. The other methods listed will not give you an accurate CPU temperature.

A few of your employees have complained that their computers sometimes shut down spontaneously. You have noticed that these employees all work in a part of the building where the air condition does not adequately cool the room. These employees also use CPU-intensive programs. You suspect that the spontaneous shutdowns are caused by overheating. Which of the following is the SIMPLEST way to monitor the temperature of the computer's CPU?

Cellular A cellular internet connection might be available. A worker may have an embedded cellular adapter or a USB broadband modem (air card). A laptop could be tethered to a mobile phone with a USB cable or Bluetooth, or the mobile phone might be able to create a mobile hotspot.

A group of workers attend a team-building retreat at a remote cabin. They can place calls on their mobile smartphones, but the cabin has no wired phone, television, or wired internet connectivity. The workers need to access an internet webpage using their laptop computers. Which of the following internet connection types might be available to the workers?

Personal Area Network (PAN) A piconet is an ad hoc network that connects personal devices and runs over Bluetooth technology. A piconet is an example of a PAN.A WAN covers a large geographical area and is made up of many smaller networks. A LAN covers a small local area and is used to connect workstations, printers, and other devices. A MAN covers a large campus or city and is smaller than a WAN.

A group of workers in an office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols. Which of the following network types is in use?

Satellite Satellite capability is available even in areas that do not have a local network infrastructure. Satellite requires a local portable transmitter with an antenna directed skyward, to a satellite. Satellite service providers offer nearly 100% global network coverage by maintaining a series of satellites that circle the earth in geosynchronous orbit. Dial-up, ISDN, and cable modem require a local network infrastructure provided by either a telephone company or cable television company.

A healthcare organization provides mobile clinics throughout the world and needs to transfer patients' statistical data to a central database via the internet. Which network technology should you select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

The num lock indicator light is lit. The num lock light indicates that num lock is in effect. Unlike a normal keyboard that has a dedicated number pad, on a laptop keyboard, the num lock causes several alphabetic keys to be remapped like a 10-key number pad for easy number entry. The user is likely thinking they are typing an alphabetic letter, but are, instead, typing a number. The scroll lock light indicates when scroll locking is in effect. In older applications, this would enable arrow keys to scroll the window instead of moving the cursor. The wireless indicator light is lit when Wi-Fi or Bluetooth is enabled. The power indicator light remains lit when the laptop is turned on.

A help desk technician has reset a user's password multiple times, but each time, the user is unable to log into a laptop. The user is confident that the password has been typed correctly. Which of the following indicates the MOST likely root cause of the problem?

DSL Digital Subscriber Line (DSL) uses a modem that connects to copper telephone lines, allows the use of the internet and phone calls at the same time, and has average download speeds of 3 Mbps to 7 Mbps.

A homeowner's connection to the internet is through an always-on modem that connects to existing telephone wiring and has a download speed of over 3 Mbps. The homeowner is able to make analog phone calls over the same wiring at the same time. Which of the following internet connection types is being used?

Static IP addressing Static IP addressing allows you to manually assign all configuration values. Static addressing is prone to error and should only be used under the following conditions: --The network has a small number of hosts. --The network will not change or grow. --You have some hosts that must always use the same IP address.

A host on your network that provides a service that requires the server to always use the same IP address. Which IP addressing method can you use to manually assign the specific IP address?

Tone Generator and probe A tone generator and probe can be used to identify the wall jack connected to the severed wire. The tone generator can be attached to the severed wire, and the probe will sound when it is brought close to the connected wall jack.

A maintenance worker accidently nicks a bundle of network cables routed to multiple wall jacks in a conference room. Only one of the cable's wires are severed. A technician is tasked with replacing the cable. Which of the following tools would the technician MOST likely use to identify which wall jack connects to the severed cable?

A laptop with a removable or rotating screen gives the user the flexibility of a notepad or tablet computer, especially if stylus functionality is included.

A manufacturing company has customized a computer application that supervisors will use to track line worker efficiency. Supervisors will interact with the application while walking within and between work areas and will also use the laptop while sitting at their desks. Which of the following laptop features would BEST minimize the awkward movement of carrying a bulky laptop with a hinged display while providing the flexibility to use the device at a desk?

1.Move the printer closer to the computer. 2.Block direct and reflected sunlight from the pathway between the PC and the printer.

A portable computer connected to a printer with an infrared interface works fine inside your office. However, when you go outside, it works sporadically. Which of the following would BEST resolve this issue? Infrared light is light that is near visible light in the electromagnetic spectrum. Therefore, very bright lights and, in particular, sunlight may cause interference with infrared interfaces. The best way to manage this interference is to minimize the distance between the connected devices and minimize interfering sunlight. There is no outdoor mode in BIOS settings. A GRS measures gamma radiation, not infrared. Adding ferrite shielding to power cords does nothing to reduce infrared interference.

Loopback Plug A loopback plug allows an output signal to be returned as input. Loopback plugs are used to test serial and parallel ports.

A printer is behaving erratically, and you suspect a faulty parallel port. Which tool can you use to test the parallel port?

A loptop docking station A docking station can quickly connect a laptop to an external monitor, keyboard, and other peripherals, as well as charge the laptop battery.

A sales person typically carries a laptop computer to several off-site customer meetings each day, but needs the flexibility to quickly attach other peripherals and charge the laptop battery while at their office desk. Which of the following laptop feature would BEST meet these requirements?

1. Configure the VPN connection to use IPsec. 2. Configure the browser to send HTTPS requests through the VPN connection. It is generally considered acceptable to use a VPN connection to securely transfer data over an open Wi-Fi network. As long as strong tunneling ciphers and protocols are used, the VPN provides sufficient encryption to secure the connection even though the wireless network itself is not encrypted. It is recommended that you use IPsec or SSL to secure the VPN, as these protocols are relatively secure. You should also configure the browser's HTTPS requests to go through the VPN connection. To conserve VPN bandwidth and to improve latency, many VPN solutions automatically reroute web browsing traffic through the client's default network connection instead of through the VPN tunnel. This behavior would result in HTTP/HTTPS traffic being transmitted over the unsecure open wireless network instead of through the secure VPN tunnel. Avoid using PPTP with MS-CHAPv2 in a VPN over open wireless configuration, as these protocols are no longer considered secure.

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take when implementing this configuration? (Select TWO. Each option is part of the complete solution.)

One end must be T568A, and the other must be T568B. A crossover cable connects two switches that don't support auto-uplinking. A crossover cable is constructed using the T568A wiring standard on one end and the T568B standard on the other end. If both ends are T568A, the cable is a straight-through cable. If both ends are T568B, the cable is a straight-through cable.

A technician connects two network switches using a twisted pair cable. Neither switch supports auto-uplinking. Which of the following identifies the TIA wiring standard required on each end of the cable?

Switch A switch maintains a table of MAC addresses by port and forwards network frames to only the port that matches the MAC address. This significantly reduces collisions.

A technician determines that an older network hub that connects 24 workstations is performing poorly due to excessive network collisions. Which of the following network devices would be the BEST replacement?

Dynamic Host Configuration Protocol (DHCP) Clients use DHCP to request an IP address, and servers use it to offer an IP address.

A technician has configured a client computer's network interface to request an IP address. Which of the following TCP/IP suite protocols does the client use to perform the request and a server use to offer an IP address?

Domain Name System (DNS) protocol DNS is used to associate readily recognizable domain names to numerical IP addresses.

A technician has configured a client computer's network interface with addresses of servers where the client will send requests for translating Fully Qualified Domain Names (FQDNs) to IP addresses and IP addresses to FQDNs. Which of the following TCP/IP suite protocols is used by the client to perform the request and also used by a server to respond to these requests?

1. DNS server address 2. IP address including a subnet mask (IPv4) or subnet prefix length (IPv6) 3. Default gateway address At a minimum, three TCP/IP settings must be configured properly for a client to communicate with the internet: an IP address (including a subnet mask), a gateway, and a DNS server.

A technician is configuring the static TCP/IP settings on a client computer. Which of the following configurations are needed for internet communications

RG6 Cable modems are connected to a cable wall outlet using coaxial cabling. RG6 is the most common coaxial cable used for this connection.

A technician is installing a cable modem that supplies internet connectivity for a home office. Which of the following cabling types would be used to connect the cable modem to the cable wall outlet?

Port forwarding Access to the smart home control system from the internet through the SOHO router is most likely gained using port forwarding.

A technician is installing a network-enabled smart home control system in a SOHO. To access the system from the internet, which of the following configurations is MOST likely required on the SOHO router?

Enable MAC filtering MAC filtering can be used to limit connectivity to a list of MAC addresses.

A technician is installing a new SOHO wireless router in a home office. The customer wants to secure the wireless network so only a smartphone, tablet, and laptop can connect. Which of the following router settings should the technician change?

Configure the SOHO router for NAT. Configuring NAT to translate the private IP addresses on the local network to public IP addresses on the internet will most likely restore internet connectivity.

A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet. Which of the following changes to the SOHO router is MOST likely to restore internet connectivity?

Coaxial Cable Coaxial cabling has an inner conductor that is a solid wire made of copper or copper-coated tin. The outer mesh conductor, or shield, is made of aluminum or tin-coated copper. A PVC plastic insulator surrounds the inner conductor and insulates the signal from the mesh conductor.

A technician is replacing a cable modem. The cable from the cable company has an inner solid wire conductor and an outer mesh conductor separated by PVC plastic insulation. Which of the following network cable types is being used?

Review the laptop manufacturer's documentation. The first step in repairing a mobile device is to refer to the manufacturer's documentation. This will guide you while disassembling, disconnecting, reconnecting, and reassembling the device. Documenting and labeling cable and screw locations adheres to proper procedures, but is not the first action. Obtaining the appropriate hand tools adheres to proper procedures, but is not the first action. Producing written disassembly notes and taping screws and parts to the notes adheres to proper procedures, but is not the first action.

A technician is replacing a hard drive in a laptop. Which of the following is the FIRST action the technician should perform before opening the laptop case?

Plenum-rated CAT-6a Plenum-rated CAT-6a cables can transfer data at 10 Gbps and can be placed in plenum spaces used for ventilation.

A technician is running a network above a dropped ceiling that is also used for ventilation. The cable must be twisted pair and must be capable of Gigabit Ethernet speeds. Which of the following cables should be used?

Replace the laptop battery. Since the laptop is unable to run using the power supplied by the battery, the battery is defective and should be replaced. Changing the power options mode to Power Saver will reduce the drain on the battery, but will not revive a defective battery. The laptop works correctly when using only the power supplied by the power adapter. The power adapter is not defective. Changing the power options mode to Balanced will balance the laptop performance with energy consumption, but will not revive a defective battery.

A technician is servicing a laptop that works properly when the power adapter is plugged in. Even though the battery icon shows that the battery is fully charged, when the laptop is unplugged, the laptop immediately shuts down. Which of the following actions should the technician perform?

S/MIME S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocol used to encrypt emails. It allows the sender to digitally sign and encrypt emails. An encrypted email server will encrypt email communications between the server and an email client, but will store the email in an unencrypted form. A proper certificate must be used to encrypt and decrypt S/MIME emails.

A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be opened. Which of the following email protocols is being used?

VPN A VPN (Virtual Private Network) creates an encrypted connection over a less secure network, such as the internet. Sometimes called a tunnel, a VPN allows users to access corporate applications and resources.

A technician is tasked with configuring a mobile device to connect securely to the company network when the device is used at off-site locations where only internet connectivity is available. Which of the following should the technician configure?

A Power over Ethernet injector A Power over Ethernet (PoE) injector acts as an intermediary device between a non-PoE switch and a PoE device to inject power over the Ethernet cable.

A technician is tasked with installing a network-enabled camera that runs on power that is supplied through its network connection. The network device that connects to the camera does not have the capability to supply this power. There is a power outlet close to the camera. Which of the following devices can be used to supply power?

Access Point An access point gives Wi-Fi access to a network

A technician is tasked with preparing a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the BEST choice for this connectivity?

Around the Laptop's bezel

A technician is tasked with replacing a Wi-Fi antenna in a laptop computer. Which of the following places would the antenna MOST likely to be located?

The motherboard UEFI/BIOS doesn't support hardware assisted virtualization. Most virtualization software requires that the motherboard UEFI/BIOS supports hardware assisted virtualization. While a CPU with multiple core processors will increase performance, it is not usually a requirement for virtualization software. Virtualization software may require a minimum amount of physical memory. However, it is not likely that it would not install if there were not enough memory to support both the host and any VM. While placing VM files on an auxiliary hard drive may increase performance, it is unlikely to be a requirement to install the virtualization software.

A technician is unable to install virtualization software on a host computer. The host has more free disk space than required. Which of the following is MOST likely to be the cause?

LC The LC connector is used with fiber optic cabling. It has a retaining tab that locks the connector in place.

A technician must press a cable connector's retaining tab to remove a faulty fiber optic network cable. Which of the following connectors does the cable use?

Toggle the touchpad function key

A user calls the help desk stating that the touchpad on a laptop does not work. Which of the following actions would BEST help the technician diagnose the problem?

Toggle the touchpad function key Many laptops have a function key that enables and disables the touchpad. Toggling the key would test whether the touchpad is enabled. While an external mouse moves the cursor, it has no effect on the touchpad. Attaching an external keyboard has no effect on the touchpad. Disabling the touchscreen has no effect on the touchpad.

A user calls the help desk stating that the touchpad on a laptop does not work. Which of the following actions would BEST help the technician diagnose the problem?

Replace the motherboard. The motherboard in this scenario has distended capacitors. This is evidenced by their bulging shape and the brown fluid leaking from them. The best way to remediate this problem is to replace the entire motherboard. Replacing individual capacitors on the motherboard is extremely difficult and could further damage the motherboard. The fan in this scenario is pushing air in the correct direction. Using additional mounting screws on the hard disk will not improve system stability. Installing matching memory modules may improve system performance, but will not remediate the system's instability problem.

A user calls to complain that her computer is behaving erratically. Some days it functions correctly, and other days, it crashes frequently. Sometimes, the system won't boot at all. You open the system case and notice the following: --Two of the mounting screws are missing from the system hard disk drive. --The system uses memory modules from several different manufacturers with mismatched capacities. --Several capacitors on the motherboard are bulging and have a brown liquid oozing from them. --The chassis fan on the front of the case is oriented to blow air into the system. What should you do?

Interference is affecting the wireless signal. In this scenario, interference from the elevator motor is the most likely cause. Cordless phones or motors can generate interference that could affect wireless signals. Interference is a common cause of intermittent problems. Windows clients automatically detect the channel to use. If the SSID had changed or MAC filtering were preventing access, the computer would not be able to connect at all, even from her office.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. She can access the network from her usual office, but today, she is trying to access the wireless network from a conference room, which is across the hall and next to the elevator. Which of the following is the MOST likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor. Because the user is only experiencing intermittent problems, the most likely cause is that she is out of the effective range of the wireless network access point. All of the other answers listed may be appropriate if the user was unable to connect to the network at all. However, as the user is experiencing only intermittent problems, none of the other answers is likely to be the cause of the problem.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the break room two floors above the floor where she normally works. Which of the following is the MOST likely cause of her connectivity problem?

The user is using an incorrect printer driver. In this case, the problem is limited to the single user, so target that user's configuration. Several pages of seemingly random characters is a classic symptom of the use of a Postscript print driver on a non-Postscript printer. Switching to the correct driver will resolve the issue.

A user generates printouts consisting of several pages of seemingly random characters every time he prints to a network printer. The printer seems to work fine for all other users. What is the most likely cause of the problem?

Verify that no keys are being pressed down during POST. You should have the user verify that no keyboard keys are being pressed during POST. With any error, you should always check the obvious first. This error is almost always caused by a stuck key on the keyboard or something resting on a keyboard key. On rare occasions, you may need to install a new keyboard; however, you should look for these obvious problems first.

A user has called to complain that her computer won't boot. It stops on the system startup screen right after the memory has been tested and displays a 301 keyboard error. Which of the following troubleshooting steps is the BEST to try first?

Install additional memory in the printer. If only part of a page is printed on a laser printer (and the rest of the page is blank), you most likely need to add memory in the printer. This is especially true if it happens when complex graphical documents are printed, but printing works correctly with text-only documents. In rare circumstances, updating the printer driver could also fix the issue, but this is unlikely. The speed of the network link does not affect the quality of the printer output.

A user has created a complex spreadsheet on her workstation containing many graphs and charts. She sent the document to an older network laser printer that is shared by everyone in her department. When she picked up the output, only the top half of each page was printed, and the bottom half was blank. Which of the following will MOST likely rectify this issue?

Enable pairing Wireless external speakers most often use Bluetooth. A mobile device and an external speaker must be paired when Bluetooth communication is used.

A user has purchased an external speaker to play music from a mobile device over a wireless connection. Which of the following actions is MOST likely needed for speaker connectivity.

Use the Fn key to redirect display to the external video port. Toggle the display setting with the Fn key. Most laptops offer several display choices, such as PC screen only, Second screen only, Duplicate (both screens), and Extend (both screens). The most likely culprit in this scenario is that the display has been toggled to PC screen only, so choosing either of the other two settings should allow the user to see the display on the projector.

A user in the sales department cannot get his laptop to display through a projector. He sees the screen output on the built-in display, but the video is not being seen on the projector. Which of the following steps would be BEST to try first?

143 The TCP/IP suite protocol that stores email messages on a server so that they can be synchronized across multiple devices is Internet Message Access Protocol (IMAP). IMAP typically uses port 143.

A user is configuring an email client application and decides to use the TCP/IP suite protocol that will store all messages on the email server so that they can be synchronized across a laptop, a smartphone, and a web email client. This protocol will store the email messages on the email server until the user explicitly deletes them. Which of the following TCP/IP port numbers will the client application typically use while using this protocol to contact the email server?

1. Internet Message Access Protocol (IMAP) 2. Post Office Protocol (POP3) Both POP3 and IMAP can be used to retrieve email messages from an email server.

A user is configuring an email client application and plans to use a standard TCP/IP suite protocol to retrieve email messages from an email server. Which of the following TCP/IP suite protocols can be used to retrieve email messages?

She has turned Num Lock on, causing the keyboard to register numbers instead of letters. The most likely cause of this user's problem is that the Num Lock key sequence for the notebook system has been pressed, causing the keyboard register numbers rather than letters. Turning Num Lock off should fix the problem. When Intruder Detection is enabled, no logon attempts are allowed, even if the correct password is used.

A user is trying to log into Windows on her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. Which of the following is MOST likely causing this problem?

Use a USB-to-RJ45 dongle and connect to a wall jack with an Ethernet cable. A simple solution is to use a USB-to-RJ45 dongle and connect to a wall jack with an Ethernet cable.

A user normally connects a laptop to a company's network using the laptop's internal wireless NIC. The laptop does not have an Ethernet port. The wireless network has failed, and the replacement part will take two days to arrive. Which of the following solutions will connect the laptop to the company's wired network?

The client system has moved too far away from the access point. In this case, the wireless client system has had no problems accessing the wireless access point until the move to the new office. In some cases, moving a system will cause signal loss either from the increased distance away from the WAP or from unexpected interference by such things as concrete walls or steel doors. There are several ways to correct the problem, including reducing the physical distance to the client, using a wireless amplifier, upgrading the antennas on the wireless devices, or adding another WAP to the infrastructure. Because the client could previously access the WAP and still has occasional access, it is likely that the move was the cause of the problem, rather than any configuration setting on the client system.

A user on your network has been moved to another office down the hall. After the move, she calls you to complain that she has only occasional network access through her wireless connection. Which of the following is MOST likely the cause of the problem?

NFC

A user pays for a retail purchase by placing a smart phone next to the merchant's reader. Which of the following mobile device connections is being used? Near-field communication (NFC) enables two electronic devices, one of which is typically a mobile device such as a smartphone, to establish communication by bringing them within 10 cm (3.9 in) of each other. A popular NFC application is mobile proximity payments.

Test the solution After implementing the solution, verify full system functionality. Make sure that the solution has fully fixed the problem and has not caused any other problems. Document the problem and solution after it has been fixed and verified. Determine if escalation is needed and create an action plan before implementing the solution.

A user reports that he is unable to access data on an external hard drive. You investigate the problem and determine that the USB cable connection to the hard drive is damaged. You replace the cable. Which of the following actions should you take NEXT?

Test the solution After you implement a solution, you should always verify full system functionality. Sometimes, more than one problem exists, or your solution may not have solved the problem. For example, in this case, an incorrect driver for the video card could potentially continue to cause display issues. By verifying system functionality, you can ensure the problem is completely resolved. Explaining what you did, implementing preventative measures, and documenting the solution would occur after you have tested the solution to make sure the problem is completely fixed.

A user reports that her monitor has stopped working. While troubleshooting the issue, you discover a bad video card in the system. You replace the card and connect the monitor cable to the card. Which of the following actions should you perform NEXT in your troubleshooting strategy?

Document the Solution You have identified the problem, completed and tested the task, and verified full system functionality. You should now document the solution so if the same display issue returns, you or your replacement will know what to do.

A user reports that the projector in the conference room has display issues when it is connected to his laptop. After identifying the cause and completely resolving the issue, the projector displays the images perfectly both on his laptop and on the projector. Which of the following troubleshooting strategies should be performed NEXT?

Educate the user as to how the problem was resolved and verify that they are satisfied with the results. After resolving any incident, you should spend a few minutes with the user, client, or customer, explain how the problem was resolved, and verify that they satisfied with the results.

A user sends a print job to a network printer, and it prints page after page of random characters. He calls the help desk, and a technician discovers that the wrong printer driver had been loaded on the user's workstation. The technician loads the correct driver, verifies that the system works correctly, and documents the resolution. Which of the following actions should the technician perform NEXT?

1. DisplayPort using a DisplayPort-to-HDMI cable 2. USB port using a USB-to-HDMI adapter You can connect a laptop to an HDMI monitor by connecting a DisplayPort-to-HDMI cable to the DisplayPort connection on the laptop and the HDMI connection on the monitor. You can also use a USB-to-HDMI adapter to convert the USB display signals from the laptop to HDMI signals, which are received by the monitor. A USB-to-Wireless dongle is used for networking, not for display monitors. An Expresscard Ethernet adapter is used for networking, not for display monitors. A USB-to-RJ45 dongle is used for networking, not for display monitors.

A user wants to use a laptop to display a presentation on a large TV monitor that has an HDMI connection. Which of the following laptop ports or connections can be used to add this display device? (Select TWO).

A. B. C. D. E. F. G. H. I. J.

A. HDMI B. Thunderbolt C. IEEE 1394 D. USB E. VGA F. DVI G. RJ45 H. RJ11 I. Fiber S/PDIF J. Audio Jack Picture on phone for reference

A. HDMI - used to send high-quality digital video and audio signals to LCD monitors and HDTVs. B. TRS jack - used by analog audio devices (such as speakers and headphones). C. IEEE 1394 - used to connect devices that require fast communication speeds, such as video cameras and external hard drives. D. VGA (DB-15) - used by analog monitors. E. DVI - used by digital monitors and does not carry audio. F. RJ45 - used by Ethernet network adapters and other networking devices. G. USB - used by USB devices (such as external storage devices). H. RJ11 - used by dial-up modems.

A. HDTV B. Headphones C. Video Camera D. Analog Monitor E. Digital Monitor(without audio) F. Network Adapter G. External Storage Device H. Dial-up Modem Extra definition--Fiber S/PDIF - used for home theatre systems or Dolby Digital surround sound systems. See phone for photo

A. Mini-ITX towers are designed to house Mini-ITX motherboards. They are typically smaller than Micro-ATX towers. The ITX form factor was designed for low-power, small, form factor (SFF) computers. The most common ITX form factor is the Mini-ITX form factor. Mini-ITX towers are often used with home theaters PC (HTPCs). B. Micro-ATX slim towers are typically half the width of a Micro-ATX tower and are designed to lay flat or upright. C. Micro-ATX towers are smaller cases designed to be placed on desktops. Micro-ATX towers typically only have one drive bay and are compatible with the micro-ATX and Mini-ITX form factors. D. ATX mid-tower cases are slightly smaller than ATX full-tower cases. Mid-tower cases have fewer external and internal bays. ATX mid-tower cases are compatible with the Standard ATX, microATX, Mini-ITX, and some EATX form factors. E. ATX full-tower cases are the largest computer cases. Full-tower cases have a lot of space for external and internal components. ATX full-tower cases are compatible with the Standard ATX, microATX, and EATX form factors. The ATX (advanced technology extended) form factor is the most commonly used form factor. Because of its popularity, several variants of the ATX form factor exist. Each variant has different specifications for dimensions and number of expansion slots. However, all ATX variants share the following characteristics: --Back plate measurements (6.25" x 1.75") --Power supply specifications as follows; 24-pin ATX power connector, on/off switch runs from the case to the motherboard, and soft-power control (OS can turn the computer off) --Expansion slot locations and spacing (0.8" between slots) --Mounting hole locations --CPU location (top of board near power supply)

A. Mini-ITX Tower B. Micro-ATX Slim Tower C. Micro-ATX Tower D. ATX Mid-Tower E. ATX Full-Tower Reference Photo on phone

The most likely cause of this problem is that the audio output is being directed to a Bluetooth speaker.

After a user checks the volume settings and makes sure it not muted, sound still isn't coming from the internal speaker on a tablet device. Which of the following is MOST likely reason?

Shut off the system immediately If you see smoke or smell something burning, shut off the system immediately to prevent further damage and increase fire hazard. While inspecting your computer, you should look for dust buildup on components and clean them as necessary. The Event Viewer shows past system events and error messages.

After arriving at work, you turn on your computer to begin your day. Instantly, you see smoke and smell a strange odor coming from the computer. Which of the following would be the MOST important action to take?

Have him verify that the wireless card's hardware switch is in the On position. Many built-in wireless cards can be turned off and on through a switch on the laptop case. Because this is a likely problem and easy to check, you should verify the switch's placement before trying other solutions.

After arriving in a new city today, a traveling sales team member calls you stating that his wireless connection no longer works. He has checked the wireless configuration, and he knows it to be correct because it was working yesterday. What should you do first?

Make sure that both modules are seated properly in their slots. In this case, you should check to ensure that you installed the memory correctly. Most BIOS programs include a memory count that displays the total amount of system memory. If it does not count the proper amount of memory, begin by checking to make sure the memory is inserted correctly. After the memory is installed correctly, if it is still not recognized, try removing one module to identify which module has the problem. Move the modules to different motherboard slots to see if you can get the system to detect the memory. In most cases, you will not need to change the memory timings. When you do, it is typically because the system is unstable or crashes. Testing memory helps you identify when specific memory storage locations are going bad. Device Manager will not enable memory the BIOS does not recognize.

After installing two memory modules, you power on the system to check for errors. You find that the BIOS program recognizes only one of the memory modules. While troubleshooting this issue, which of the following is BEST to try first?

Spots at regular intervals on the page Spots at regular intervals on the page typically indicate a dirty drum. Blank pages are caused by no toner or a faulty primary corona. Ghost images are caused by a faulty scraper blade or discharge lamp. Garbage characters are caused by using the wrong print driver.

After receiving several complaints from the employees in your company, you start to troubleshoot a laser printer. After a short while, you have concluded that the most probable cause is a dirty drum. Which of the following is the MOST logical reasons for this conclusion?

Fuser Rollers Because the fuser rollers heat and press the entire paper, dirty fuser rollers are the most likely problem. The other components do not touch the paper directly.

After removing the printed paper from your laser printer, the toner smudges and can be wiped off in places. Which of the following is the MOST likely problem?

An accumulation of dust has gradually built up. Over time, an accumulation of dust can gradually build up and cause significant overheating by constricting airflow through the system case. Vent holes and heatsink fins can become clogged with dust, which prevents heat dissipation. Remove the dust with compressed air or an anti-static vacuum. The BIOS should be flashed when firmware updates are available, but failing to do this will not lead to system overheating. Switching the power supply to the wrong voltage can damage system components, but this would not lead to the system locking up more frequently over time--the damage would happen immediately. A malfunctioning heat monitor could cause the system to lock up, but the frequency is likely to be intermittent, not consistently increasing in frequency.

After working without problems for a couple of years, your computer has begun to lock up. You suspect that it is a thermal issue, but you can't find any component that is not functioning correctly. You have not replaced the CPU or installed any new devices. The CPU cooling fan and the power supply fan are working properly. The lock-ups are happening with increasing frequency. Which of the following is the MOST common condition that might explain these symptoms?

20 and 21 The TCP/IP suite protocol that allows users to download files from a server that protects access to the files by requiring user authentication to access specific directories on the server is FTP. FTP uses ports 20 and 21.

An administrator configures a server to run the TCP/IP suite protocol that allows users to download files contained in specific directories on the server and also protects access to those files by requiring user authentication. Which of the following TCP/IP port numbers allow this protocol to work properly?

1. Common Internet File System (CIFS) 2. Server Message Block (SMB) 3. Apple File Protocol (AFP) AFP is the native file services protocol for macOS and the classic Mac OS. SMB provides shared access to files hosts on a network. Most SMG usage involves computers running Microsoft Windows. The CIFS protocol is an earlier, less-robust version of SMB.

An administrator is asked to configure all network file sharing devices so that both Windows and Mac OS computers can access files. Which of the following network protocols should the administrator enable?

The CMOS battery has failed The CMOS (a physical part of the motherboard) is a memory chip that houses setting configurations. The CMOS is able to maintain its setting when the computer is powered off by using a CMOS battery. If the CMOS battery is failing, you may see the effects, such as the time and day being slightly off. If the CMOS battery has failed, it will typically reset the date and time back to the date the CMOS was created. The CMOS is reset and loses all custom settings if the CMOS battery fails. Additionally, the system clock resets when the CMOS loses power.

An employee complains that every time they turn their computer off, the computer's time is set to 12:00 p.m., and the date is set back to January 1, 1990. Which of the following is the MOST likely cause of this anomaly?

ping 127.0.0.1 Use ping 127.0.0.1 to test the TCP/IP configuration of the local system. The special address of 127.0.0.1 is a loopback address that identifies the local host. A successful ping test to the local host identifies that TCP/IP is correctly configured. Use nslookup to find the IP address for a given hostname. Use ping -a to find the hostname for a given IP address. Netstat shows IP-related statistics.

An end user clams they are unable to connect to the internet and has called the company's help desk for a solution. Having been assigned to this issue, you decide to first test whether or not TCP/IP is working correctly on the local computer. Which of the following is the BEST command to use for this test?

Create a hypothesis You have performed the first two essential steps of gathering additional information and identifying what, if anything, has changed. The best next step is to create a hypothesis that could potentially explain the problem. To do this, you may need to do a lot of research. You should check frequently asked questions and knowledge bases that are available on the internet. You should also consult with your peers to try to validate your hypotheses. Using this information, you can then narrow down the results to the one or two most likely causes. After you have narrowed things down to the one or two most likely causes, you can determine the appropriate fix by consulting with your peers, reviewing knowledge bases, looking at other websites, and using your own experience to identify the steps that are needed to fix the problem. The fix can then be implemented as needed.

As an IT technician for your company, you have been notified that the Windows domain does not seem to be functioning properly. Being familiar with domains, you are fairly confident you know what the issue is. But just to be safe, you take the applicable time to gather additional information and to identify what, if anything, has changed. Which of the following is the BEST next step?

DHCP You can use the Dynamic Host Configuration Protocol (DHCP) to set up a DHCP server that will assign IP addresses to network hosts automatically. DHCP servers will not assign the same IP address to two different hosts.

As the IT technician for your company, you need to ensure that IP addresses are automatically assigned to hosts while at the same time preventing the same address from being assigned twice. Which of the following services would be BEST to use?

32 nm A 32 nm (nanometer) processor will consume the least amount of power (all other things being equal). A smaller process size means smaller transistors, which translates into a smaller CPU die with more transistors and less power consumption.

Assuming all other processor specifications are the same, which of the following processor sizes will consume the least amount of power?

Use preprinted paper that has been printed with laser-compatible printer toner. Aubrey is printing on preprinted paper, whereas the other employees are not. The heat and pressure used in laser printing causes the preprinted image to be transferred during the fusing process unless the preprinted paper was printed using laser printer compatible printer ink. Since the ghosting is only occurring for Aubrey, it is unlikely that the printer drum or the toner is the issue.

Aubrey, an employee in the marketing department, has told you that when she prints to her laser printer, faint ghost-like images are being printed on her new page. As an IT administrator, you check with other employees who use the same printer and find that they are not experiencing the same problem. Which of the following would be the BEST fix for this issue?

Brian's computer has a single-core CPU configured to use hyper-threading. A single physical CPU core with hyper-threading appears as two logical CPUs to an operating system. While the operating system sees two CPUs for each core, the actual CPU hardware only has a single set of execution resources for each core. The CPU acts as if it has more cores than it does, but uses its own logic to speed up program execution. Two physical CPUs (even without hyper-threading) would be faster than a single-core CPU using hyper-threading. Likewise, a dual-core CPU is faster than a single core with hyper-threading. The Quad-core processor even without hyper-threading would be faster than a single-core CPU with hyper-threading.

Brian is a new employee on the development team. As part of his job, he runs three virtual machines (VMs) on his computer. Each VM runs a different Windows license. After a while, Brian notices that his VMs are not running as fast as he thought. He has asked you to explore the issue. Which of the following BEST describes why Brian's VMs are running slowly?

1. CPU power (top-right connector): provides additional DC power to the processor itself. 2. CPU socket (larger square connector, left of the CPU power connector): provides an interface for connecting the CPU to the motherboard.

Consider the connectors highlighted on the motherboard diagram below. Select the CPU socket and CPU power connector. (Select TWO). See photo

USB connectors (middle-left): used to connect external USB devices.

Consider the connectors highlighted on the motherboard diagram below. Select the USB connectors. (Select ONE) Photo on phone

--PCI slot (top-left, colored white): used to connect PCI expansion boards. --PCIe x16 slots (right of the PCI slot, colored blue): used to connect PCIe x16 expansion boards. --PCIe x1 slot (right of the PCIe x16 slots, colored white): used to connect PCIe x1 expansion boards.

Consider the expansion and memory slots highlighted on the motherboard diagram below. Select the PCI, PCIe x16, and PCIe x1 slots. (Select FOUR). Photo on phone

Touchscreen

Considered an input device. It is a monitor that can receive input through touch.

DSL

DSL, or Digital Subscriber Line, is not a form of wireless networking communications. Rather, it is a form of high-speed WAN connection used to connect remote systems to the internet. Wireless communications are types of networking technologies that do not rely upon wires or cables to connect computers together in a networking relationship

Digitizer

Digitizer pad is used in Tbalet PCs to recieve input. Input is written onto the pen with a stylus pen, and those motions are tranferred into data that is processed by the system.

A GPS-enabled personal navigation device

Drivers for a small trucking company rely on a smartphone navigation application. When the smartphone loses internet connectivity, the maps don't update properly. Also, the company pays extra for a premium data service plan to support the application. Which of the following mobile devices could replace the smartphone navigation application, could provide map coverage when internet connectivity is lost, and does not require a data plan? A GPS-enabled personal navigation device stores map information on the device instead of downloading it when needed. The device does not need internet connectivity to function.

Push an unbent paper clip into the hole on the front of the drive. Optical drives have an emergency eject hole. To open the disc tray when the drive does not have power, push a thin, rigid object (such as an unbent paper clip) into the hole to open the disc tray. Adding a UPS to the computer may provide enough power to eject the disc, but is not the easiest method. Prying the tray open will most likely damage the drive. Pressing the Eject button on the drive and the Restart button on the machine will not eject the disc.

Due to a blackout, power is no longer coming from the wall outlet, and your computer is now off. You do not have a UPS, and you need to remove a disc out of the DVD drive. What is the easiest method for retrieving the disc?

Riser Riser cards attach to the motherboard and have expansion cards plug into them instead of the motherboard. The primary benefit of a riser card is that, by installing expansion cards parallel to the motherboard, it's possible to create a low-profile design. Communications and Networking Riser (CNR) is a type of expansion slot found on some motherboards that is used for network and sound expansion boards. Personal Computer Memory Card International Association (PCMIA) cards were used several years ago to add devices to laptops. VESA Local Bus was also a type of expansion slot found on older motherboards that was primarily used for the video interface.

For a special project, you have been asked to recommend the lowest profile desktop computers available. You are attempting to put together the specifications for these machines. Which of the following types of cards are attached to the motherboard to allow expansion cards to plug into them instead of the motherboard?

Use the automatic print head cleaning feature. Use an inkjet's automatic cleaning feature if letters have missing lines and there are gaps. With inkjet printers, the nozzles sometimes become clogged, preventing ink from leaving the nozzles and reaching the paper. On dot matrix printers, you should check the gap between the printer head and the paper to prevent printer images from becoming faint. Color profiles are typically created by the manufacturer, and they correct problems when the printed colors don't match what you see on the screen. Add memory to a printer if the end of a printed page is missing.

For the past several days, the print jobs from the inkjet printer are missing colors and leaving gaps. Which of the following will MOST likely resolve the problem?

169.254.1.26 In the event that a DCHP server is not available, Windows workstations can use APIPA to automatically provide themselves with an IP address. The default address range used by APIPA is 169.254.0.1 to 169.254.255.254. Of the options presented, only 169.254.1.26 falls within this range.

Given that your Windows workstation has Automatic Private IP Addressing (APIPA) implemented using default settings, which of the following TCP/IP addresses could be automatically assigned to the system should your DHCP server go down or become inaccessible?

1. Need to bring costs down 2. Growing demand for storage Some of the most widely used cloud storage for enterprises are Google Cloud, Amazon Web Services, and Microsoft Azure. Because of the growing demand for storage and desire to bring costs down, many companies have been taking advantage of cloud storage.

Google Cloud, Amazon Web Services, and Microsoft Azure are some of the most widely used cloud storage solutions for enterprises. Which of the following factors prompt companies to take advantage of cloud storage? (Select TWO.)

A large screen and a projector Since Ida is presenting to a large group, most monitors would be too small to view from the back of a room. Therefore, using a projector and screen will provide the best view of her presentation.

Ida, one of the employees in the sales department, needs a way to display her PowerPoint sales presentation to a large group of potential customers. She has asked you to set up the conference room in preparation for her presentation. You will need to purchase a display system for the conference room. Which of the following display systems would be the BEST to purchase?

Configure the printer to be a shared printer You can configure a printer attached to a Windows workstation as a network printer by configuring it to be a shared printer. This is done by accessing the Devices and Printers panel on the workstation and then opening the printer's Properties window and configuring the settings on the Sharing tab.

If a printer is connected directly to a Windows workstation, what can be done to allow other workstations on the same network to send print jobs to this printer?

If the printer is Ethernet capable, it can be connected to the network through a wireless router. If the printer is not Wi-Fi capable but has an Ethernet port, it can be connected to the network through a wireless router. Just use an Ethernet cable to connect the printer to a port on the wireless router. Users on the same network as the wireless router will be able to send jobs to the printer as if the printer has a wired connection. (All users will have to install the driver for that printer on their workstations.)

If a printer is not Wi-Fi capable, how can it be set up to provide the most reliable wireless printing?

1. Verify that speakers are plugged into the correct jack and are powered on. 2. Verify that the volume isn't muted. You should first verify that the speakers are plugged in correctly and powered on. You should also verify that the volume isn't muted in the operating system. Before investigating more complex possibilities, you should always check the obvious first when troubleshooting computer problems. The other actions might need to be performed if checking the obvious solutions does not correct the problem.

It is imperative that you always ensure that the video card is compatible with the expansion slot in which the video card will be installed. In some cases, you may have to disable the integrated graphics. However, if possible, you should configure the computer to default back to the integrated graphics if the new high-end graphics card fails or is removed. Otherwise, you may not be able to access the BIOS/UFI firmware to change the computer back to the integrated graphics. Some high-end graphic cards may require a connection to the power supply, but you do not need to disable power to the integrated graphics. You typically only need twice as much system memory as your graphics car has VRAM. Since this computer has 16GB RAM and the card is only 4GB, no additional RAM is required.

Add a very high-end video board. CAD applications need workstation graphics cards that can manipulate complex geometry and computing. Therefore, the best solution presented is to add a very high-end video board with a fast GPU. The GPU's job is to process all graphical information and output it to a display, which will increase performance for CAD-type systems. The onboard embedded video will not be sufficient for high-end applications such as a CAD system. Adding a second drive or monitor will not increase the performance of the issues Joe is describing.

Joe is working on a design team that uses a computer-aided design (CAD) system. Joe has been complaining that it takes too long to perform tasks such as panning, rotating, and zooming. You have been asked to look at Joe's computer and to make any changes required to increase Joe's productivity. Which of the following changes would BEST meet Joe's needs?

eSATA eSATA, or external SATA, allows the use of shielded cables outside of an enclosure. Shielded eSATA cables are available up to two meters in length. eSATA cables are not the same as SATA I cables; they are shielded and have a different connector than the L-shaped design of internal SATA I connectors. This prevents the use of unshielded internal cables in external applications. eSATA uses a point-to-point connection; therefore, each eSATA drive needs to be connected to its own eSATA port.

Joseph has started using virtual machines (VMs) to help his software development process. As the number of VMs has increased, Joseph has noticed that his hard drive is almost full. He would like you to buy and connect an external hard drive where additional VMs can be stored. When the drive arrives, you find it has the type of connector shown in image 1. Which type of connector is on the external hard drive? Picture on phone

Multi-touch

Most tablet devices use a capacitive touchscreen interface, meaning that they require conductive material, such as your finger tip, for input. Capacitive touchscreens provide multi-touch capabilities, which allow the tablet to recognize multiple finger touches at the same time.

DC volts To measure the output of a power supply, measure DC voltage. A power supply converts AC voltage to DC voltage and supplies the DC power to computer components. AC is the voltage input for a power supply. To measure the input, measure the power from the wall socket. An ohm is a measure of resistance used to check the properties of a resistor. Multimeters can measure amps, but do not measure watts.

Next You suspect that the power supply in your desktop PC is failing. You want to use a multimeter to test the power supply. Which multimeter setting should you use?

Screen Sharing You can use screen sharing to access your Mac while you're away, solve a problem on someone else's Mac, or collaborate with others on a project such as a website or presentation.

Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to access her MAC?

Fuser Unit After the toner has been applied to the paper, the pater passes through two heated rollers known as the fuser, or fuser unit. The heat and pressure from the rollers fuse the toner particles into the fibers of the paper. If the toner on the finished printed paper is smudging, the most likely issue is that the fuser unit is malfunctioning in some way. Since the text is being printed, the toner hopper is dispensing toner. The photoreceptor and the environmentally friendly version known as the organic photo conductor drums (OPC drums )received the charge from the corona wire. If these parts were not working, the text would not be transferred to the paper. Likewise, if the laser were not working, the image of the text would not be drawn on the photoreceptor drum, and the paper would come out blank.

One of the employees in your company calls and complains that text printed on the laser printer smudges easily and is staining hands and cloths. Which of the following, if adjusted or replaced, would BEST fix the printer?

Connect the computer to a UPS. If possible, you should connect the computer to an uninterruptible power supply (UPS) before updating the UEFI firmware. Losing power during the update process can cause catastrophic problems. Most BIOS/UEFI setup programs provide an option to save existing settings to a file; you should also back up your existing UEFI settings before you update. Upgrading the processor, changing the motherboard battery, or setting a system password are not required prior to updating the UEFI firmware.

One of the users in your company notices some strange behavior on his computer. After describing what is being seen, you do a little research and determine that the best course of action is to update the UEFI firmware. Before performing the upgrade, if possible, which of the following is the BEST action to take?

Check the gap between the printer head and the paper. In this case, you should check the gap between the printer head and the paper. If the gap between the platen and the print head is too large, the print could be faint because the pins are not firmly striking the ribbon and paper. Dot matrix printers do not use toner; they us a ribbon instead. Ribbons should be replaced, not initialized, if the printer images become faint. Maintenance kits are replacement components, such as fuser wires, rollers, and toner drums, needed after about 20,000 pages of printing.

One of your customers is still using an old dot matrix printer. While printing, the customer noticed that the text was light or faint. A new print head was installed, but the documents are still faint. Which of the following should you do to troubleshoot the MOST likely cause?

Configure a Wi-Fi infrastructure network In infrastructure mode, each wireless host connects to a central connecting device called a wireless access point (AP). In this configuration, hosts communicate with each other through the AP instead of communicating with each other directly. The AP behaves much in the same way as a wired switch in this mode. The wireless AP not only controls communication between devices, but is also able to bridge the wireless network with a wired network and the internet.

One of your customers wants to configure a small network in his home. The home has three floors, and there are computers on each floor. This customer needs to share files between computers, print to a centrally located printer, and have access to the internet. Which of the following print solutions would BEST meet this client's needs?

Electrostatic discharge (ESD)--is the only listed factor that can cause a CPU to fail prematurely. Be careful while working on your CPU to avoid ESD by working on a static mat grounded with a wrist strap.

Since it has no moving parts, a CPU will usually work properly for several years. Which of the following is a common factor that MIGHT cause a CPU to fail prematurely?

POST The Power on Self Test (POST) is a software process initiated by the BIOS during the boot process that verifies that computer hardware works properly. When a device has failed, a series of beeps indicate the type of problem. In this case, one long and two short beeps typically indicates a failed video card. initramfs is used as the first root filesystem that your machine has access to. It is used for mounting the real rootfs, which has all of your data. Complementary Metal-oxide Semiconductor (CMOS) is a technology for constructing integrated circuits that refers to the system configuration stored in a battery-powered memory chip used on computers. Extensible Firmware Interface Partition (ESP) is a partitioning scheme used by UEFI. ESP is the format used for the boot sector where the operating system and utilities for starting a computer are stored.

Steve, a computer technician, received a helpdesk ticket for a computer that will not start. When Steve powered the computer on, there was one long and two short beeps. Which of the following programs is reporting this error condition?

Susan has connected her drive to a USB 2.0 port, which does not have enough power for her drive. Susan has connected her drive to a USB 2.0 port, which does not support the requirements for her drive. Large high-speed USB drives require more power than a USB 1.0 or 2.0 can provide. USB 2.0 supports a maximum bandwidth of 480 Mbps and is, therefore, fast enough for Susan's drive. A 2.0 port only supports a maximum power consumption of 500 milliamps.

Susan works in the research and development department. She has recently purchased a large high-speed external drive and has attached the drive to her computer using a USB cable. Her drive requires a minimum bandwidth of 400 Mbps and at least 900 milliamps (mA) to function. Although the correct drivers are installed, the drive is not functioning. To troubleshoot the problem, she has connected her drive to her coworker's computer where the drive functions properly. No additional cables are required for this drive. Which of the following is the MOST likely reason Susan's external hard drive is not working?

1. MU-MIMO to allow multiple users to use the same channel. 2. Channel bonding to combine more channels in the 5 GHz band to allow for up to 160-MHz-wide channels. The 802.11ac wireless network standard increases bandwidth and communication speeds using the following technologies: --MU-MIMO is an enhancement to MIMO that allows multiple users to use the same channel. In addition to adding MU-MIMO, 802.11ac doubled the number of MIMO radio streams from four to eight. --Channel bonding is used to combine even more channels in the 5-GHz band, allowing up to 160-MHz wide channels. (Even though 160-MHz-wide channels are supported, most 802.11ac networks use 80-MHz-wide channels.)

The 802.11ac wireless networking standard provides increased bandwidth and communication speeds by using which of the following technologies?

HDMI HDMI is the default cable standard for newer electronic devices, such as Blu-Ray players and LED TVs. HDMI can carry both digital video and audio signals. Most modern computers include an HDMI port.

The CEO of your small company has asked you to connect his laptop computer to the small conference room LED TV. The CEO will be showing a new promotional video that demonstrates the new company strategy through images and sound. Which of the following cable types would work BEST for connecting his laptop to the display?

Edit the CMOS settings and enable the onboard sound. When installing dedicated expansion card, you will typically disable the onboard device so that only the device you want to use shows in Device Manager. To make the onboard device detectable to Windows, enable the device in the CMOS settings. You cannot update the device drivers or enable the device until Windows can detect the device and it appears in Device Manager. An audio codec is a file format for saving audio files. Sound cards require codecs to play sound files; however, the sound card must be properly configured before a codec can be used.

The PCI sound card in your computer has stopped working. You decide to use the motherboard's integrated sound until you can replace the PCI sound card. After removing the PCI sound card and powering on the computer, you have no sound ,and the built-in sound card does not show up in Device Manager. To solve this issue, which of the following is the BEST action to try first?

1. Which part of the example IPv6 address is the prefix? A--FEC0:1319:7700:F631 2. Which quartet in the example IPv6 prefix is used to identify the subnet? A--F631 (the last quartet in the prefix) 3. Which part of the example IPv6 address is the interface ID? A--446A:5511:CC40:25AB

The following is an example of an IPv6 address: FEC0:1319:7700:F631:446A:5511:CC40:25AB

Wearable devices

The human resources department wants to give gifts away at the company's summer party. They would like to have an assortment of fitness tracker wristbands, smartwatches, smart glasses, and virtual reality headsets. They have been trying to locate these on the internet, but have been unsuccessful. Which of the following types of mobile devices should you tell them to search for? Wearable devices are a type of mobile device meant to be worn somewhere on the body. These devices range from being as simple as a fitness tracker wrist band to as complex as smart glasses or virtual reality headsets. Most wearable devices are designed to interface with another device. For example, a smartwatch by itself has a limited set of functionality; smartwatches are designed to connect to smartphones using Bluetooth. This connection unlocks additional functionality, such as reading texts or answering phones calls through the smartwatch.

Buy a docking station for your notebook. The docking station provides a quick and easy way to connect these peripheral devices. While you could connect these devices manually each time, using the docking station will be more convenient.

The integrated mouse, the small monitor, and the compact nature of the keyboard are impeding your work when you use a notebook, but you still need a system that is portable if necessary. What is your best option?

The USB mouse receiver is not plugged into the computer. Since the computer and mouse are all new and were all purchased from the same vendor, the likelihood of the mouse and the driver not working is very slim. Therefore, the MOST likely reason is that the USB receiver for the mouse is not plugged in or is not seated correctly.

The marketing department has hired a new employee. Prior to the new employee's first day at work, you have set up and configured a new laptop computer. The computer and all of the peripherals were purchased from the same vendor. After the new employee begins work, you receive a phone call stating that the wireless mouse is not working. Which of the following is the MOST likely reason the mouse isn't working?

VLANs A virtual LAN (VLAN) uses switch ports to define a broadcast domain. When you define a VLAN, you assign devices on different switch ports to a separate logical (or virtual) LAN.

The servers for the company are all virtual machines and hosted on the same hypervisor. You need to keep users in all other departments from accessing the virtual servers used by the finance department. Which of the following technologies should you use to logically isolate the network?

3389 The Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer is Remote Desktop Protocol (RDP). By default, RDP uses port 3389.

To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer. Which of the following TCP/IP port numbers is the default port used by this protocol?

1. Download the flash utility or tool from the manufacturer's website. 2. Properly identify the motherboard. To successfully flash your BIOS, it is critical that you research and know the exact make, model, and revision of your motherboard to ensure that the correct flash file is used. Using the wrong flash file will probably cause errors. Although your computer may have shipped with a tool to perform a BIOS flash, it is best to download the latest tool to ensure that the flash is performed correctly. Testing the memory and creating a hard backup will not aid you while flashing a PC's BIOS.

To fix a problem you are having with your PC, you have determined that you must flash the computer's BIOS. Which of the following would MOST likely need to be completed prior to flashing the BIOS? (Select TWO).

Back off on the overclocking settings until the system runs in a stable manner. Configuring a motherboard to run with a higher multiplier than what the CPU specifies is called overclocking. If the system becomes unstable and crashes frequently, the multiplier may be set higher than the CPU can handle. To resolve this issue, lower the multiplier until the system becomes stable again. The real-time clock on the motherboard is not a factor in this scenario and has no role in overclocking. If the power supply is set to the wrong voltage, system components can be damaged, but not cause the behavior described in the scenario. BIOS firmware is not a factor in overclocking issues.

To improve system performance, you have configured a motherboard to run with a higher multiplier than what the CPU is specified to use. Since doing this, the system has become unstable and crashes frequently. To restore system stability, which of the following should be completed?

1.Connect an external keyboard. 2.Check for special keyboard features that could be enabled that may cause some keys to perform alternate tasks. If none of these options make the symptoms go away than the keyboard needs to be replaced.

Vera has brought her notebook computer to you for repair. After listening to her describe its symptoms, you hypothesize that the notebook may have a malfunctioning keyboard. Which of the following steps can you take to BEST determine whether the keyboard needs to be replaced?

1.Internal cloud services 2.External cloud services The two main types of cloud services are: --Internal cloud services, which are located within the private network of an organization. --External cloud services, which are located outside an organization's private network.

What are the main types of cloud services?

1. Z-Wave 2. Zigbee Zigbee and Z-Wave are two radio protocols many IoT devices work with because they are designed for low-data rate, low-power applications. They link all IoT devices to form a mesh network.

What are the two protocols used most often with IoT devices? (Select TWO.)

1. Privacy 2. Hacking Hackers and privacy are two majors concerns for IoT users. Because IoT devices are closely connected, all a hacker has to do is exploit one vulnerability to manipulate all the data, rendering it unusable. Also, companies that make and distribute consumer IoT devices could use those devices to obtain and sell users' personal data.

What are two major concerns regarding IoT devices?

Switch A physical star topology uses a switch or a hub.

What device is used to create a physical star topology?

232 Z-Wave allows up to 232 nodes on the mesh network.

What is the maximum number of nodes Z-Wave allows on its mesh network?

POST POST stands for power on self-test. It is the routine that tests system hardware on startup.

What is the name for the routine that tests the motherboard, memory, disk controllers, video, keyboard and other system hardware?

Multiple networks can be connected to a single interface. The key advantage of a virtual router is it can support multiple networks on a single router interface. It does this by using a different routing table for each network. Physical routers are limited to a single network on each interface. Like physical routers, virtual routers use routing protocols to route data between networks. The Virtual Router Redundancy Protocol is used by physical routers to specify backup routers in the case of a failure. Virtual routers do not offer significant performance

What key advantage does a virtual router have over a physical router?

23 Telnet uses port 23. However, you should avoid using the Telnet protocol for remote access connections because it opens a plain text, unsecured, remote console connection that is easy for an attacker to monitor or hijack.

What port does Telnet support

Type-A The blue tab indicates that the connector is a USB 3.0 Type-A connector and capable of USB 3.0 speeds. USB 3.0 Type-A connectors are backwards compatible with all previous USB versions. The USB 3.0 Type-B connector is larger in size and designed to carry both data and power. Due to their increased size, USB 3.0 Type-B connectors cannot be plugged into older USB Type-B ports. However, USB 3.0 peripherals that use this port are able to accept older USB Type-B connectors. The USB 3.0 Micro-B connector is used by portable devices, such as compact external storage devices, digital cameras, or smartphones.

What type of USB 3.0 connector is shown here? Picture on Phone

Touch pad Touch pads are typically found on notebook computers and are used in place of a mouse. Users slide their finger on the touch pad to manipulate the cursor. Motion sensors are devices that are able to detect the slightest amount of movement in an area. They are typically used with security systems and require special software and configuration. Gamepads are handheld controllers with directional controls on the left and buttons on the right. Scanners are used to scan hard-copy images and documents and convert them into digital input for the PC. A mouse is a hand-held device used to manipulate the cursor.

What type of peripheral device is typically found on a laptop computer and allows the user to control the cursor with a finger?

Cloud Resources

What type of resources offer the following advantages? -Flexibility of access -Ease of use -Self-service provisioning of resources -API availability -Metering of services -Ability to try out software applications

1. Gyroscope 2.Accelerometer

When a user rotates a mobile device, the operating system changes the screen orientation so that the display remains upright to the user. Which of the following technologies is uses to detect this device movement? There are two technologies that mobile operating systems use to detect device movement, accelerometers and gyroscopes.

It is a metaphor for the internet based on the basic cloud drawing used to represent the telephone network. The term cloud is a metaphor for the internet based on the basic cloud drawing used to represent the telephone network. It is now used to describe the internet infrastructure in computer network diagrams.

When referring to cloud computing, what does the term cloud mean?

Hyper-threading-- allows a single processor to run threads in parallel, as opposed to processing threads linearly. Multi-processing is an operating system's ability to use multiple CPUs. Overclocking causes the processor to operate at a higher speed. Dual Core is a type of processor that offers better performance by combining two or more independent processors into a single integrated chip.

When using Intel chips, which of the following features BEST allows a single processor to run two threads in parallel instead of processing single threads linearly?

1. Fluorescent lamp 2. Rubber scraper After a page is printed, a rubber scraper removes any remaining toner from the OPC drum. A fluorescent lamp removes any remaining electrical charge. If images from previous print jobs show up on the page, check these two components. The primary corona charges the drum prior to writing the image. The secondary corona charges the paper to attract the toner. If these two components are faulty, the current image might have streaks or missing parts. If the toner is not sticking to the paper, check the transfer roller.

When you print from your laser printer, the paper contains faint images from previous printouts. Which of the following components is MOST likely the cause? (Select TWO).

The motherboard battery has failes The system time and date are managed by the Real Time Clock (RTC) in the BIOS/UEFI firmware. If the motherboard battery goes dead, the RTC reverts back to a default date and time. In addition, the BIOS/UEFI may lose all of its configuration settings.

When you try to boot your computer, it hangs after POST. When you access the UEFI setup program, you see that the date is several years behind, and the time is set to 12:01 a.m. Which of the following is the MOST likely cause of this behavior?

802.11a and 802.11g Both the 802.11a and the 802.11g wireless standards specify maximum transmission speeds up to 54 Mbps.

Which IEEE wireless standards specify transmission speeds up to 54 Mbps?

Default Gateway The default gateway identifies the router to which packets for remote networks are sent. The subnet mask identifies which portion of the IP address is the network address. The WINS server address identifies the WINS server that is used to resolve NetBIOS host names to IP addresses. The DNS server address identifies the DNS server that is used to resolve host names to IP addresses. The alternate IP address identifies IP addressing information to be used in the event the DHCP server can't be reached. The host name identifies the logical name of the local system.

Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks?

Install a cellular USB adapter in a open port on the laptop. To access content on your computer (laptop): --Install a cellular adapter in a PCMCIA, ExpressCard, or USB slot. --Install and configure the software to use the card.

Which actions allow you to access the internet on your laptop via a cellular network?

Developing Roller The developing roller applies toner to the drum. The toner sticks to the charged areas on the drum. The transfer roller charges the paper to attract the toner. The primary corona prepares the photosensitive drum for writing by causing it to receive a negative electrostatic charge. Depending on the printer, the primary corona may be wires or rollers. Fusing rollers attach the toner to the paper by pressing and melting it.

Which component in a laser printer applies toner to the drum, causing the toner to stick to the charged areas on the drum?

Transfer Roller The transfer roller charges the paper to attract the toner. The primary corona prepares the photosensitive drum for writing by causing it to receive a negative electrostatic charge. Depending on the printer, the primary corona may be wires or rollers. A laser beam changes the charge on the surface of the drum in a pattern of the page's image. The toner sticks to the charged areas on the drum. Fusing rollers attach the toner to the paper by pressing and melting it.

Which component in a laser printer charges the paper to attract toner?

Primary Corona The primary corona (also called the main corona or the charge corona) prepares the photosensitive drum for writing by causing it to receive a negative electrostatic charge. Depending on the printer, the primary corona will be wires or rollers. The Ooganic photoconductor (OPC) drum is just another name for the photosensitive drum. The transfer corona (sometimes called the secondary corona) charges the paper to attract the toner. Fusing rollers attach the toner to the paper by pressing and melting it.

Which component in a laser printer prepares the photosensitive drum for writing by causing it to receive a negative electrostatic charge?

Virtual Switch Virtual switches allow multiple virtual servers and/or desktops to communicate on virtual network segments and/or the physical network. Virtual switches are often configured in the hypervisor. A virtual hard disk (VHD) is a file that is created within the host operating system and simulates a hard disk for the virtual machine. A physical machine (also known as the host operating system) has the actual hardware in place on the machine, such as the hard disk drive(s), optical drive, RAM, motherboard, etc. A virtual desktop is a virtual machine in a software implementation of a computer that executes programs like a physical machine.

Which component is most likely to allow physical and virtual machines to communicate with each other?

USB Most printers use a USB connector to connect directly to a desktop PC system. In the past, IEEE 1284 connectors were the most commonly used connectors, but that is no longer the case. A limited number of Firewire printers are available, but they are not as commonly used to connect printers and computer networks as USB. 802.11 wireless and Ethernet cards.

Which connector is most commonly used to connect printers to desktop PC systems?

RJ45 An RJ45 connector is used with unshielded twisted pair (UTP) cable.

Which connector is used with unshielded twisted pair (UTP) cable?

Multiple processor sockets on the motherboard A multiple-processor system has multiple CPUs, with each CPU requiring a different processor socket on the motherboard.

Which of the following is a characteristic of a multi-processor system?

11 Mbps The IEEE 802.11b standard defines wireless transmission rates up to 11 Mbps. 802.11b wireless network interface cards and wireless access points (also called wireless hubs or wireless routers) will automatically negotiate the best transmission speed up to 11 Mbps based on current network traffic load and the quality of the wireless connection between the client and access point. The wireless communications are affected by distance, dense physical obstructions, and other electromagnetic interference producing devices.

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

PCLe x16 The PCIe x16 expansion bus is the preferred bus for high-speed video cards. A PCIe x1 slot is not as fast as a PCIe x16 slot, and most video cards are designed for the x16 slot. APG is an older interface that is not used anymore. The PCIe bus was created to replace the PCI-X bus and, as such, has faster data transmissions.

Which expansion slot is best for high-end dedicated video cards?

180 degree rotating touchscreen Some notebooks have special touchscreens that can rotate 180 degrees, allowing the notebook to close and the screen to still be visible. Some notebooks have a removable touchscreen. This turns the notebook into a tablet.

Which feature makes it possible to close some notebook computers and still use the touchscreen?

2.4 GHz, 900 MHz, and 868 MHz Zigbee is a specification based on IEEE 802.15.4. The WPANs operate on 2.4 GHz, 900 MHz, and 868 MHz frequencies.

Which frequencies does Zigbee operate on?

RJ11 A standard telephone line connector is an RJ11. RJ45 jacks are used for Ethernet twisted pair cables. Video cards and monitors with a built-in TV tuner have an F-type video connector. RG58 is used for 10Base2 Ethernet networking (also called Thinnet).

Which kind of connector do you use to connect a modem to a standard telephone line?

Network Interface Card The network interface card (NIC) allows a device to send and receive messages over the transmission media.

Which network component connects a device to the transmission media and allows it to send and receive messages?

Network Interface Card (NIC)--allows a device to send and receive messages over the transmission media.

Which network component connects a device to the transmission media and allows it to send and receive messages?

UEFI UEFI was designed to replace the BIOS and is a firmware solution for controlling the startup process and loading the computer operating system into memory. CMOS is a legacy computer chip technology that was used to store system information prior to the introduction of EEPROM. EEPROM is a non-volatile memory chip that stores the system startup information configured through UEFI. BIOS 2 does not exist.

Which of the following (1 BEST describes the technology designed to replace the BIOS and (2 is a firmware solution for controlling the startup process and loading the computer operating system into memory?

Facilitates communication between the processor, memory, and peripheral devices. The chipset is a group of chips that facilitates communication between the processor, memory, and peripheral devices.With chipsets: --The memory controller and graphics controller are on the CPU. --The remaining functionality is combined into a single controller chip. --Intel processors use the Platform Controller Hub (PCH). --AMD processors use the Fusion Controller Hub (FCH). --The front-side bus is replaced by the Direct Media Interface (DMI). Expansion slots (also called expansion buses) allow you to expand the capabilities of your computer by installing expansion cards. Memory slots are designed to be compatible with a specific type of memory module. Internal connectors are ports that are connected to the motherboard's front panel connectors, which are also called headers.

Which of the following BEST describes the chipset?

Testing ports by returning outpust signals as input. Loopback plugs are used to test ports by returning output signals as input. Use a loopback plug to test the functionality of serial ports or networking ports.

Which of the following BEST describes the purpose for which loopback plugs are used?

169.254.0.1 - 169.254.255.254 The Internet Assigned Numbers Authority (IANA) has reserved 169.254.0.1 through 169.254.255.254 for Automatic Private IP Addressing (APIPA). APIPA also sets the subnet mask on the network to 255.255.0.0.

Which of the following IP address ranges is reserved for Automatic Private IP Addressing?

Switch A switch offers guaranteed bandwidth to each port, unlike a hub, which shares bandwidth among all the network ports.

Which of the following LAN devices receives a signal on one port and forwards that signal only to the port where the destination device is connected?

1. Pull cool air from the front and blow hot air out the back. 2. Create a pressurized system inside the case. Case fans create a pressurized system that allows air to flow through the case in a specific way. --Intake fans (at the front) pull air inside the case to cool components. --Outtake fans (at the back and top) exhaust warm air from inside the case. Because all computers generate heat, case fans are necessary on even basic computers to properly dissipate heat and prevent overheating issues. Even though intake case fans will pull in dust and debris, having all the case fans exhaust air would be extremely inefficient and could cause overheating issues. Case fan filters can be installed if dust and debris is an issue.

Which of the following accurately describes case fans? (Select TWO).

Print Driver The print driver is the software that allows the computer to communicate with the printer. The print queue is the portion of the hard drive where print jobs are stored before going to the printer. The printer port is the means by which a printer connects to a print server.

Which of the following allows a computer to communicate with a printer?

1. Immunity to electromagnetic interference 2. Greater cable distances without a repeater Compared to other types of cabling, fiber optic cabling allows greater cable distances without a repeater and is immune to electromagnetic interference. However, installation costs more and takes longer. In addition, fiber optic cabling is much less flexible than other cabling.

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select TWO.)

NetBIOS NetBIOS is a non-routable protocol. It is often combined with IPX or IP to enable internetwork communications. NetBIOS was used in earlier versions of Windows. NetBIOS is rarely used today because nearly every operating system supports IP

Which of the following protocols is non-routable and requires another protocol to enable internetwork communications?

Directional antenna Omnidirectional antenna Directional and omnidirectional are two types of antennae commonly used in wireless networks. A directional antenna: --Creates a narrow, focused signal in a particular direction, which increases the signal strength and transmission distance. --Provides a stronger point-to-point connection and is better equipped to handle obstacles. An omnidirectional antenna: --Disperses the RF wave in an equal 360-degree pattern. --Provides access to many clients in a radius.

Which of the following are antenna types that are commonly used in wireless networks? (Select TWO).

1. Faster startup times. 2. Supports drives larger than 2.2 TB. 3. Supports 64-bit firmware device drivers. Unlike BIOS, UEFI provides the following benefits: --Faster startup times. --Supports drives larger than 2.2 terabytes. --Supports 64-bit firmware device drivers. --Provides better security to protect against bootkit (malware attacks on the boot process) attacks. Similar to BIOS, UEFI does need to be flashed when updates are available to make new features available on the computer. EEPROM is the technology that provides non-volatile memory and allows individual bytes to be erased and reprogrammed.

Which of the following are benefits UEFI provides that BIOS does not? (Select three.)

1. Backwards compatible with 802.11b devices 2. Maximum bandwidth of 54 Mbps 3. Operates in the 2.4 GHz range 802.11g wireless networks: 1. Operate in the 2.4 GHz range 2. Have a maximum bandwidth of 54 Mbps 3. Are backwards compatible with 802.11b networks 802.11b provides 11 Mbps bandwidth. 802.11a operates in the 5.75 GHz range. For this reason, 802.11a is not compatible with 802.11b or 802.11g.

Which of the following are characteristics of the 802.11g wireless standard?

1. Two data Channels 2. Dial-up connection 3. One control channel Basic Rate ISDN service is a dial-up service consisting of two 64 Kbps data (bearer) channels and a single control (delta) channel. The two data channels can be used independently of each other or bonded together to provide a total bandwidth of 128 Kbps. Primary Rate ISDN (PRI) shares many of the features of BRI, but includes up to 24 data channels.

Which of the following are features of Basic Rate ISDN (BRI)? (Select THREE.)

1. 257.0.122.55 2. 145.8.260.7 3. 45.33.256.256 IP addresses have a value between 0 and 255 within each octet. In this list, 45.22.156.256, 145.8.260.7, and 257.0.122.55 are not valid IP addresses.

Which of the following are not valid IP addresses?

1. BD 2. DVD 3. CD Optical storage devices use lasers for both reading and writing information. The following are all optical storage devices: --CD (Compact Disc) --DVD (Digital Video Disc or Digital Versatile Disc) --BD (Blu-ray Disc)

Which of the following are optical storage devices? (Select THREE.)

You can connect a computing device, such as a notebook computer or a tablet, to a cellular network by using any of these four options: 1. Use a USB cable to connect the device to the network through a smartphone. 2. Use the device's Wi-Fi to connect to the network through a cellular Wi-Fi hotspot. 3. Use a USB cellular antennae to connect the device directly to the cellular network. 4. Use an integrated cellular antennae to connect the device directly to the cellular network. A transmitter antennae, or a dish, will connect you to a satellite network, not a cellular network. Connecting to the cable service does not connect you to a cellular network (cable is a separate type of networking service).

Which of the following are options for connecting a computing device, such as a notebook computer or a tablet, to a cellular network? (Select FOUR.)

1. User desktop environments are centrally hosted on servers instead of on individual desktop systems. 2. In the event of a widespread malware infection, the administrator can quickly reimage all user desktops on a few central servers. Virtual Desktop Infrastructure (VDI) is a service that hosts user desktop environments on centralized servers. Users access their desktops from low-end systems over a network connection using a remote display protocol such as Remote Desktop or VNC. This allows users to access their desktop environment with their applications and data from any location and from any client device. Roaming profiles are not needed. VDI provides administrators with a centralized client environment that is easier and more efficient to manage. For example, if a widespread malware infection hits multiple user desktops, the affected systems can be quickly reimaged on the VDI server. There is no need to push large images down to client systems over the network.

Which of the following are true concerning the Virtual Desktop Infrastructure (VDI)? (Select TWO)

1. The memory controller must support dual-channels. 2. Bandwidth is increased by 5-15%. Dual-channel systems increase the memory bandwidth by only 5-15%, although it does have a 100% theoretical increase. Dual-channel support is mainly a function of the motherboard, not the memory itself. DDR, DDR2, and DDR3 can all work in dual-channel systems (depending on the memory supported by the motherboard); a triple channel system can only use DDR3.

Which of the following are true regarding a dual-channel memory bandwidth configuration? (Select TWO).

1. 2.2.2.2 2. 172.16.1.26 A valid IPv4 address consists of four 8-bit (1 byte) numbers separated by periods. For example, 10.0.0.65 is a valid IP address. Because they are e8 bits long, these numbers are frequently called octets. Even though we typically express these numbers using decimal notation, it's important to remember that these numbers are binary numbers. The lowest value one of these numbers can have is 00000000. The decimal equivalent for this number is simply 0. The highest value one these numbers can take is 11111111. The decimal equivalent of this number is 255. Therefore, in decimal notation, each octet must contain a number between 0 and 255.

Which of the following are valid IP addresses?

1. 6384:1319:7700:7631:446A:5511:8940:2552 2. 141:0:0:0:15:0:0:1 An IPv6 IP address is a 128-bit address listed as eight 16-bit hexadecimal sections. Leading zeros can be omitted in each section. Therefore, 6384:1319:7700:7631:446A:5511:8940:2552 and 141:0:0:0:15:0:0:1 are both valid IPv6 IP addresses. A single set of all-zero sections can be abbreviated with two colons (::). Therefore, 141::15:0:0:1 would also be a valid way of writing that address. Digits in a hexadecimal system range from 0-9 and A-F. H is not a valid hexadecimal number. 343F:1EEE:ACDD:2034:1FF3:5012 is too short, having only six sections instead of eight.

Which of the following are valid IPv6 addresses? (Select TWO.)

It connects multiple cable segments or devices and forwards frames to the appropriate segment. Switches have multiple ports and can connect multiple segments or devices. The switch forwards frames to the appropriate port. They function similarly to a hub except, instead of sending packets to all ports, switches send packets only to the destination computer's port.

Which of the following best describes how a switch functions?

PaaS delivers everything a developer needs to build an application onto the cloud infrastructure. Platform as a Service (PaaS) delivers everything a developer needs to build an application onto the cloud infrastructure. The deployment comes without the cost and complexity of buying and managing the underlying hardware and software layers. Software as a Service (SaaS) delivers software applications to the client either over the internet or on a local area network. Infrastructure as a Service (IaaS) delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. The client deploys and runs software without purchasing servers, data center space, or network equipment. Data as a Service (DaaS) stores and provides data from a centralized location without the need for local collection and storage.

Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?

SSH You can use Telnet or SSH to remotely log on to a server and complete configuration tasks. However, SSH provides a secure connection; Telnet does not.

Which of the following can be used to create a secure connection to a remote server?

SaaS Software as a Service (SaaS) delivers software applications to the client either over the internet or on a local area network. Infrastructure as a Service (IaaS) delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. The client deploys and runs software without purchasing servers, data center space, or network equipment. Platform as a Service (PaaS) delivers everything a developer needs to build an application onto the cloud infrastructure. The deployment comes without the cost and complexity of buying and managing the underlying hardware and software layers. Data as a Service (DaaS) stores and provides data from a centralized location without the need for local collection and storage.

Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network?

1. Hexadecimal numbers 2. 32 numbers, grouped using colons IP version 6 addresses are made up of 32 hexadecimal numbers organized into eight quartets. The quartets are separated by colons. An IPv6 address is a 128-bit number (128 binary digits). IP version 4 addresses use decimal numbers organized into four octets and separated by periods.

Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select TWO.)

1. 128-bit address 2. Eight hexadecimal quartets IP version 6 addresses are 128-bit addresses. They are commonly written using 32 hexadecimal numbers organized into eight quartets. Each quartet is represented as a hexadecimal number between 0 and FFFF. The quartets are separated by colons. IP version 4 addresses are 32-bit addresses. They have four octets, each octet being a binary number of eight digits. Each octet has a decimal value between 0 and 255.

Which of the following describes an IPv6 address?

The last quartet in the IPv6 address prefix. The part of the IPv6 address that identifies the subnet address is the last quartet in the prefix. For example, in the following address, FEC0:1319:7700:F631:446A:5511:CC40:25AB, the quartet used to identify the subnet is F631.

Which of the following describes the part of the IPv6 address that identifies the subnet address?

Ethernet over Power An Ethernet over Power device allows for network communications to be transmitted over existing AC power lines. An Ethernet over Power device is plugged into one AC power outlet, and a second Ethernet over Power device is connected to the same AC circuit. These devices multiplex the AC copper power lines to transmit digital network signals at a frequency higher than the AC electrical power already on the circuit.

Which of the following devices allows network communications to be transmitted over existing AC power lines?

Power over Ethernet Power over Ethernet (PoE) technology can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher). Power is usually supplied by a PoE-enabled Ethernet switch. PoE is commonly used to power network devices that are located where physical access to a power outlet may not be available. For example, a PoE-enabled surveillance camera mounted on a tall pole can be powered via its Ethernet cabling.

Which of the following devices can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher)?

Bar code Reader Installing a bar code reader will allow you to take inventory at a retail store by scanning the UPC symbols on products. A scanner is used to scan documents. A touch screen is an interactive monitor for a computer. A trackball is a type of mouse.

Which of the following devices would you add to a computer if you needed to take inventory at a retail store by scanning the UPC symbols on products?

Hub A hub and a repeater send received signals out all other ports. These devices do not examine the frame or the packet contents.

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?

1. the last four quartets of an IPv6 address 2. the last 64 bits of an IPv6 address An IPv6 address is a 128-bit binary number that uses the first 64 bits as the address prefix and the last 64 bits of the address as the interface ID. The 128-bit binary number is organized into 32 hexadecimal numbers that are organized further into eight quartets. The last four quartets correspond with the last 64 bits of the IPv6 address.

Which of the following identifies the Interface ID component of an IPv6 address?

1. The first 64 bits of an IPv6 address. 2. The first four quartets of an IPv6 address. An IPv6 address is a 128-bit binary number that uses the first 64 bits as the address prefix and the last 64 bits of the address as the interface ID. The 128-bit binary number is organized into 32 hexadecimal numbers that are organized further into eight quartets. The first four quartets correspond with the first 64 bits of the IPv6 address.

Which of the following identifies the prefix component of an IPv6 address?

It saves time and money in troubleshooting problems. By keeping adequate documentation, you can reduce the time and money spent troubleshooting. While documentation can help reduce troubleshooting, it can never completely eliminate it. Documentation helps you know when regular maintenance of hardware is required, but does not eliminate maintenance. Documentation helps you plan for hardware updates, but does not reduce the requirements to replace the hardware.

Which of the following is a benefit of good documentation?

FEC0::AB:9007 FEC0::AB:9007 is a valid IPv6 address. The :: in the address replaces blocks of consecutive 0s. The longer form of this address would be FEC0:0000:0000:0000:0000:0000:00AB:9007. Leading 0s within a quartet can also be omitted. You can only omit one block of 0s using the double colon. Each number in the IPv6 address must be between 0-9 or A-F; G is not a valid number for the IPv6 address. An address without double colons should have a total of 32 hexadecimal numbers in 8 blocks.

Which of the following is a valid IPv6 address?

Ethernet Ethernet is a wired local area network (LAN) standard. Most laptops and desktop computers have built-in Ethernet network ports.

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

Parity Parity error detection can only detect errors with only one bit, while Error Correcting Code (ECC) can detect errors with more than one bit. EDO is not a type of error correction, it is a type of memory that can start a new access cycle while keeping the data output of the previous cycle active.

Which of the following is an error detection technique that can detect errors with only one bit?

DSL DSL, or Digital Subscriber Line, is not a form of wireless networking communications. Rather, it is a form of high-speed WAN connection used to connect remote systems to the internet. Wireless communications are types of networking technologies that do not rely upon wires or cables to connect computers together in a networking relationship.

Which of the following is not an example of wireless networking communications?

Lines or splotches repeated at regular intervals on the print job. A dirty drum or roller can create lines or splotches at regular intervals on the print job.

Which of the following is the MOST likely symptom of a dirty drum or roller in a laser printer?

A network in a small geographic area, like in an office

Which of the following is the best definition for a LAN?

Move the tabs holding the RAM out of the way; pull straight up to remove the RAM. Most RAM is held in place with small tabs on either end. Push the tabs down to rotate them back and then pull the RAM straight up.

Which of the following is the most common method for removing RAM from a motherboard?

Wireless clients must use a static IP address within the correct IP address range to connect to the network. Disabling DHCP prevents addresses from being automatically assigned to wireless systems. If DHCP is disabled, clients must use a static IP address and only those who know the IP address range and other parameters will be able to connect. Enabling MAC address filtering denies access to clients with unauthorized MAC addresses. Encryption keys are only needed when wireless networks implement some type of encryption (WEP, WPA, or WPA2). The SSID is the identifier for the wireless access point and is used to associate wireless clients with the access point.

Which of the following is true when the DHCP setting is disabled in a wireless network?

1. Plug an Ethernet cable into the network port in the printer. 2. Connect your printer to an external print server device that is connected to the network. There are two common ways to make a printer a network printer. Most printers come with an integrated network card or have a slot for adding a network card. Otherwise, it is possible to connect it to the network using an external printer server. The external print server functions as a gateway between the printer's parallel interface and the network topology. While a USB-to-Ethernet adapter can be used to connect a workstation to a wired network, it won't work with a printer, as software drivers must be loaded on the host for the adapter to work.

Which of the following methods can be used to connect a printer to a network? (Select TWO.)

SSH The Secure Shell (SSH) service uses TCP/IP port 22. SSH is a terminal emulation program that provides a secure authenticated connection to a remote system over the network. It is most commonly used with UNIX and Linux systems, but can be used on Windows as well.

Which of the following network services or protocols uses TCP/IP port 22?

ISDN ISDN is a digital service that operates over standard telephone company copper wiring offered in a variety of configurations. ISDN consists of multiple 64 Kbps channels. Basic Rate Interface (BRI) is a standard ISDN offering for household service.

Which of the following network technologies is packaged as part of a BRI plan?

NAT When using a VPN through a NAT device, check your NAT solution to make sure that the router can support VPN connections. Not all VPN solutions are compatible with NAT.

Which of the following networking devices or services is LEAST likely to be compatible with VPN connections?

600 DPI The dots per inch (DPI) describe the level of detail produced by a printer. The higher the DPI, the higher the print quality.

Which of the following printers would produce the highest print quality?

Throttling Throttling modifies the operating characteristics of a processor based on current conditions. Overclocking is a feature offered on special motherboards that causes the processor to operate at a higher speed. A multi-core processor has multiple processor cores integrated into a single processor package. Hyper-threading is a feature of some Intel processors that allows the CPU to process threads in parallel. Caching, when used to describe processors, is a temporary storage area for data that is waiting for the processor.

Which of the following processor features used is MOST likely to dynamically reduce power consumption based on current operating conditions?

1. L2TP 2. PPTP PPTP (Point-to-Point Tunneling Protocol) and L2TP (Layer Two Tunneling Protocol) are two VPN (Virtual Private Networking) protocols that let you access your company's network through a public network, such as the internet.

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select TWO).

VoIP Voice over IP (VoIP) is a method for carrying phone calls over an IP-based network. RTSP is used to stream multimedia content over IP networks.

Which of the following protocols carry phone calls over an IP-based network?

POP3 The POP3 protocol is part of the IP protocol suite and used to retrieve email from a remote server to a local client over a network connection.

Which of the following protocols do email clients use to download messages from a remote mail server?

IMAP IMAP allows a mail server to keep a copy of a user's messages on the server after they are downloaded to the mail client

Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?

IPsec IPsec is a security implementation that provides security for all other TCP/IP based protocols. IPsec provides authentication through a protocol called IPsec Authentication Header (AH) and encryption services through a protocol called IPsec Encapsulating Security Payloads (ESP).

Which of the following protocols provides authentication and encryption services for VPN traffic?

Multi-Core A multi-core processor has multiple processor cores integrated into a single processor package. A multi-processor motherboard allows you to install two (or more) processors on the same motherboard. Hyper-threading is a feature of some Intel processors that allows a single processor to run threads in parallel, as opposed to the older and slower technology of processing threads linearly. Multi-threading is an operating system feature that allows more than one process to work at the same time.

Which of the following refers to placing two processors on a single processor chip or die?

1. Uses port 443 2. Encrypts the entire communication session SSL VPN uses the SSL protocol to secure communications. SSL VPN: --Authenticates the server to the client using public key cryptography and digital certificates. --Encrypts the entire communication session. --Uses port 443, which is already open on most firewalls.

Which of the following statements about an SSL VPN are true? (Select TWO).

1. A workstation must request addressing information from a DHCP server. 2. It can deliver a DNS server address in addition to the host IP address. DHCP servers deliver IP addresses as well as other host configuration information to network hosts. DHCP can be configured to assign any available address to a host, or it can assign a specific address to a specific host. DHCP clients, typically workstations, must send a request to a DHCP server before it will send IP addressing information to them.

Which of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true? (Select TWO.)

1. It modulates digital data from the PC into analog data and transmits it on a telephone network. 2. It demodulates analog data from a telephone network into digital PC data. Modem is shorthand for modulator/demodulator. Its job is to convert (or modulate) digital data from a PC into analog telephone signals and transmit them through a telephone network. It also receives analog data from the telephone network and converts (or demodulates) it into digital PC data.

Which of the following statements accurately describes how a modem works?

1. The watt rating indicates how much power can be supplied to various devices. 2. The wattage requirement for each individual circuit uses formula W = V x A. Power supplies are rated in watts. The watt rating indicates how much power can be supplied to various devices. The more devices you have in your computer, the more wattage you will require. You can calculate the system's wattage requirements using the following method: --Find the watt requirement for each component by multiplying volts by amps (W = V x A). --Add each value together to find the total watt requirements.

Which of the following statements are true regarding power supply wattage? (Select TWO).

1. Changing the hosts file of a user's computer 2. Exploiting DHCP servers to deliver the IP address of poisoned DNS servers Pharming redirects one website's traffic to a bogus website designed to look like the real website. Once the user is there, the attacker tricks the user into supplying personal information, such as bank account and PIN numbers. Pharming works by resolving legitimate URLs to the IP address of malicious websites. This is typically done using one of the following techniques: --Changing the hosts file of a user's computer --Poisoning a DNS server --Exploiting DHCP servers to deliver the IP address of malicious DNS servers in DHCP leases

Which of the following techniques are used in a pharming attack to redirect legitimate web traffic to malicious websites? (Select TWO).

Antistatic pad and wrist strap An antistatic pad provides an insulated covering to prevent static electricity from moving between objects and damaging computer components. When working with computer components, use a wrist strap connected to the antistatic pad and connect the pad to a ground.

Which of the following tools can help prevent damaging when working with computer components?

Power Supply Tester A power supply tester is specifically designed to test DC voltage on most connectors coming from a PC power supply. A multimeter measures electrical properties such as voltage, amps, and resistance. A multimeter can also be used to test DC voltage on a Molex connector; however, it isn't a tool dedicated to this purpose. A cable tester verifies that a network can carry a signal from one end to the other and that all wires within the connector are in their correct positions. A loopback plug lets you test a port for proper functionality. The loopback plug crosses the receive and transmit wires. Essentially, this lets the computer send a signal to itself.

Which of the following tools is specifically designed to test the DC voltage on a hard disk drive power connector?

Cellular Cellular networking uses the cellular phone infrastructure for internet access. The computing device, such as a notebook or tablet, must have a cellular antennae to connect directly to the cellular network. You can travel anywhere and stay connected to the network, as long you are within the coverage area of the cellular service provider. You can also connect a computing device to a cellular network by tethering it to a smartphone or by using a smartphone as a Wi-Fi hotspot.

Which of the following types of internet connection services can allow you to be truly mobile while maintaining your internet connection?

Bubble jet (Inkjet) The bubble jet inkjet printer applies heat to the ink and squirts it through tiny nozzles in the print head and onto the paper. A laser printer also uses heat, but the heat is applied to thermal rollers (not a print head). A piezoelectric printer uses pressure to apply ink. A thermal printer uses heat to cause a reaction on specially treated paper.

Which of the following types of printers heats the ink in its print head to print?

Static Without DCHP, many network hosts assign their own non-routable link-local IP address. To avoid link-local addresses when DHCP addressing is unavailable, static addresses should be assigned to all devices that will communicate on the local network.

While setting up a home office, a technician disables the DHCP service on the office router, but does not want to rely on link-local addressing. Which of the following IP addressing methods should be used?

Print to Image Print to Image allows you to print any document into an image file that is independent of the application you use to view them. For example, you can convert a Word document into a .jpg file. The resulting images are print-ready and optimized for websites, smartphones, and tablets. You can also print them on a physical printer for excellent printouts. Print to the XPS allows you to create .xps files using any program that you can print from in Windows. Use the Print to XPS Document Writer when you want to view, save, share, digitally sign, and protect your document's content. The Print to PDF feature allows you to print your document to PDF format. Print to File saves the formatting and layout information of your file so a printer can create the document without the program or computer that created it.

Which of the following virtual printing options allows you to convert a Word document into a .jpg file?

1. Leave space between the case and any walls or obstructions. 2. Keep the ambient temperature below 80° F. 2. Bundle cables together and secure unused cables to the case. Consider the following recommendations to ensure optimal system cooling: --Keep the case free of dust and debris. Excess dust can restrict airflow and prevent proper heat transfer. --Reduce the number of airflow obstructions. ----Employ proper cable management (bundle cables together and secure unused cables to the case). ----Space out multiple hard disk drives instead of stacking them next to each other. --Maintain appropriate ambient temperatures. Optimal ambient temperatures are between 60 and 80 degrees Fahrenheit. --Ensure proper ventilation; leave space between the computer and any walls or desks. --Preserve negative pressure inside the case by keeping all covers and shields installed (unused expansion cards, I/O shield, front drive bays).

Which of the following will ensure optimal system cooling? (Select THREE).

NFC Near-field communication, or NFC, uses the 13.56 MHz frequency and has a very short range. In order for devices to communicate, they have to be within two inches of each other. NFC chips are being used for applications such as passports and credit cards to contain all the information about the passport holder or the credit card account. NFC chips use encryption algorithms to secure the connection, but constantly emit a signal and use a much slower transmission speed than other wireless technologies.

Which of the following wireless communication technologies can be described as follows? Has a very limited transmission range of less than two inches. Used with credit cards and passports. Slower than other wireless technologies. Constantly emits a signal.

802.ac The 802.11ac standard uses the 5 GHz frequency and supports data transmission speeds up to 1.3 Gbps.

Which of the following wireless networking standards uses a frequency of 5 GHz and supports transmission speeds up to 1.3 Gbps?

3389 The firewall on a Windows system must be configured to allow Remote Desktop traffic through. This is done by opening TCP port 3389 (by default). This port is opened automatically on the Remote Desktop host when remote connections are enabled.

Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established?

Printer Properties View the printer properties to see the drivers used by a printer. You can also use the printer properties to view the port used by a printer, manage user permissions, and configure color management profiles. Use the print server properties to view all printer ports used on the computer. This function can also be used to view the print drivers used on the system, including drivers required by network users, notifications, and the spooler location. The Print spooling service is a software process that captures print jobs from applications, places them in the print queue, and then sends each print job to the print device. The print queue is a location on the hard disk that holds print jobs waiting to be processed.

Which printer management component would you use to view the drivers used by a printer?

1. Print server properties 2. Printer properties Use the print server properties or the printer properties to view the port used by a printer. Print server properties displays printer ports used on the computer. The printer properties displays the port for the individual printer, as well as all printer ports for the computer. The Print Spooling service is a software process that captures print jobs from applications, places them in the print queue, and then sends each print job to the print device. The print queue is a location on the hard disk that holds print jobs waiting to be processed.

Which printer management components would you use to view the port a printer uses? (Select TWO.)

Manage this Printer Users with the Manage this printer permission can pause the printer and edit the printer properties, but cannot manage any documents waiting to be printed. Users with the Manage documents permission can manage all documents in the queue (pause, resume, delete, or rearrange the order). Users with the Print permission can print using the printer. The Pause printers permission does not exist.

Which printer permission would you assign to a user so that she can pause the printer?

SMTP SMTP sends email from a mail client to a mail server.

Which protocol is used to send email messages from a mail client to a mail server?

HTTP and HTTPS The HyperText Transfer Protocol (HTTP) is used by web servers and browsers to transmit webpages over the internet. This is often confused with HTML or HyperText Markup Language, which is the markup language used to create web content.

Which protocols are used on the internet to transmit webpages from web servers to web browsers running on client workstations?

Hypervisor

Which term describes the layer of software that resides between the virtual operating system and the physical hardware it is running on in a virtualization environment?

Hypervisor A hypervisor is a thin layer of software that resides between the virtual operating system(s) and the hardware. A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. A hypervisor manages access to system resources such as: --CPU --Storage --RAM A virtual machine is a software implementation of a computer system that executes programs like a physical machine. A Virtual hard disk is a disk file used by a virtual machine. Workload management relates to the portability of virtual machines.

Which term describes the layer of software that resides between the virtual operating system and the physical hardware it runs on in a virtualization environment?

Virtual Machine A virtual machine is a software implementation of a computer system that executes programs like a physical machine. A virtual machine functions as a self-contained and autonomous system. A hypervisor is a thin layer of software that resides between the virtual operating system(s) and the hardware. The physical host is the actual hardware that the hypervisor software runs on. Workload management relates to the portability of virtual machines.

Which term refers to a software implementation of a computer system that executes programs like a physical machine?

Print Queue The print queue is the portion of the hard drive where print jobs are stored before going to the print device. The print device is the physical device connected to the print server where print output occurs. The print driver is the software that allows the printer to communicate with the print device. The printer port is the hardware that allows a print device to connect to a print server.

Which term refers to the portion of the hard drive where print jobs are stored before going to the print device?

Multimeter

Which tool would you use to measure electrical properties such as voltage, amps, and resistance?

Dynamically expanding A dynamically expanding disk allocates physical disk space in the VHD file as virtual disk storage is used by the system. The size of the VHD file grows as more disk space is used. This disk type makes the most efficient use of hard disk space. However, be aware that it is possible for the physical disk to run out of space as the VHD file size grows. A fixed disk occupies a set amount of hard disk space. Thick provisioning is, essentially, the same technology as fixed disk; however, this terminology is not commonly used when working with VHD files. VHDX is an improved version of the traditional VHD file format used by newer versions of Hyper-V.

Which type of VHD file allocates additional physical disk space in the file as virtual disk storage is used?

Ad hoc Configure an ad hoc connection to connect one computer directly to another using a wireless connection.

Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection?

Coper telephone wire ISDN is a set of standards that allow digital data to be sent and received over copper wiring.

Which type of network medium is used by an Integrated Services Digital Network (ISDN) adapter?

Dot Matrix Dot matrix printers use an inked ribbon. The printing mechanism strikes the ribbon to put ink onto the paper. A dye sublimation printer is a non-impact printer that uses film-embedded dye. Inkjet printers are quiet, non-impact printers that store ink in a reservoir. Bubble jet printers are the most popular form of inkjet printers. Laser printers use lasers and electrical charges to transfer images to paper.

Which type of printer uses an inked ribbon?

Laser A laser printer uses lasers and electrical charges to transfer images to paper. A thermal inkjet printer applies heat to the ink in print head nozzles, causing the ink to boil and expel itself from the nozzle. A piezoelectric printer uses pressure, not heat, to apply the ink. A dot matrix printer uses pins striking the ink ribbon to transfer the ink.

Which type of printer uses lasers and electrical charges to transfer images to paper?

802.11a 802.11a can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz. 802.11b can stream data at a rate of up to 11 Mbps using a frequency of 2.4 GHz. 802.11g can stream data at a rate of up to 54 Mbps using a frequency of 2.4 GHz. 802.11n can stream data at a rate of up to 600 Mbps using a frequency of 2.4 GHz or 5 GHz.

Which wireless standard can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz?

Use an anti-static micro-filtering vacuum. Excess toner should be removed from a laser printer with an anti-static and micro-filtering vacuum. A regular vacuum will build up an electrostatic charge from the toner, which could shock you, damage the printer, or damage your vacuum. Using any kind of liquid to clean up a toner spill could cause damage to the printer and may permanently adhere the toner to the printer. Although you should try to collect as much of the toner as possible using some type of scoop, doing this and wiping the spilled toner will not clean the printer thoroughly. If you do use a cloth, it should be a static-free cloth.

While changing the toner cartridge in your laser printer, you accidently spill toner in and around the printer. Which of the following is the BEST method for cleaning up the spilled toner?

Cable Tester A cable tester is the BEST choice for determining whether there are problems in the cable between the wall jack and the patch panel.

While investigating a network connectivity issue, a technician finds that the link light on a workstation is not lit, and there is no connectivity after replacing the patch cable both between the workstation and the wall jack and between the patch panel and the switch with cables that are known to be good. If the wall jack and patch panel ports are labeled correctly, which of the following tools would the technician MOST likely use next?

Tone generator A tone generator can be used to identify which port in the patch panel connects to the wall jack. The technician could then investigate further by following the cable from the patch panel to the switch.

While investigating a network connectivity issue, a technician finds that the link light on a workstation is not lit, and there is no connectivity after replacing the patch cable with one that is known to be good. The wall jack is not labeled, and within the switch room, none of the cables or patch panel ports are labeled. Which of the following tools would the technician MOST likely use next?

443 The TCP/IP suite protocol web browsers use for encrypted communications is HTTPS. HTTPS typically uses port 443.

While making an online bank transaction, a customer checks to see that the web browser is displaying a lock icon that indicates that an encrypted TCP/IP suite protocol is being used. Which of the following TCP/IP port numbers does this protocol typically use when the browser encrypts its communications with the bank's web server?

Crossover cable configuration used to connect computers directly to one another for networking. This is a crossover cable configuration. Using this configuration, computers can connect directly to one another. The easiest way to create a crossover cable is to arrange the wires in the first connector using the T568A standard and arrange the wires in the second connector using the T568B standard.

While sorting through a box of cables in your storage room, you find one that matches the configuration shown in the image. Which of the following BEST describes the type of cable configuration and the purpose for which it would be used? Picture on phne for reference.

Hotspot

While traveling in a car, a user who has an unlimited data plan on a smartphone opens a wireless connection to share the internet with other passengers. Which of the following connection types is MOST likely being used? A mobile device such as a smartphone can be set up as a wireless hotspot to allow others access to the internet.

3389 The RDP protocol runs on port 3389 by default.

While working on a Windows workstation, you've enabled Remote Desktop. Which of the following ports MUST be opened in the server's firewall to allow remote clients to access the desktop?

Gyroscope

Within a tablet device, a gyroscope measures the vertical and horizontal orientation of the device at the same time. It also measure the Horizontal and vertical acceleration at the same time.

CAD / CAM design workstation -2 GB GDDR5 PCIe video adapter -16 GB PC3-21300 DDR4 ECC RAM -1 TB SATA HD Virtualization workstation -32 GB PC4-21300 DDR4 RAM -4 TB SATA HD -Integrated video adapter Home theater PC -HDMI output -Compact form factor -5.1 channel surround sound adapter -TV tuner adapter

You are a PC technician for a national computer retailer. A business customer asks you to build three custom computers to be used by employees at a branch office: CAD / CAM design workstation Home theater PC Virtualization workstation Drag and drop each PC hardware configuration on the left to the most appropriate workstation type on the right.

Home office server -2 TB RAID 5 disk array -600 W power supply -No audio adapter -Integrated video adapter Gaming PC -1000 W power supply -1 TB SATA HD -Dual SLI 6 GB PCIe video adapters -5.1 channel surround sound adapter -Liquid CPU cooler Thick client workstation -400 W power supply -500 GB SATA HD -512 MB PCIe video adapter -Basic desktop applications installed

You are a PC technician for a national computer retailer. A customer asks you to build three custom computers for him to use at his home office. He requests a gaming PC, a home office server, and a thick client workstation. Drag and drop each PC hardware configuration on the left to the most appropriate workstation type on the right.

Home office server -2 TB RAID 5-disk array -600W power supply -No audio adapter -Integrated video adapter Gaming PC -1000W power supply -1 TB SATA HD -Dual SLI 6GB PCIe video adapters -5.1 channel surround sound adapter -Liquid CPU cooler Home theater PC -HDMI output -Compact form factor -5.1 channel surround sound adapter -TV tuner adapter Virtualization workstation -AMD 12-core 4 GHz CPU -4 TB SATA HD -32 GB DDR4 RAM -Hardware-assisted virtualization Thin client workstation -Intel Celeron dual-core 2.7 GHz CPU -500 GB SATA HD -2 GB DDR3 RAM -Few or no applications installed Audio/video editing workstation -Intel Core i7 six-core 3.4 GHz CPU -2 TB SSD SATA HD -16 GB DDR4 RAM -High-end audio adapter with speaker system -High-end video adapter with dual displays

You are a PC technician for a national computer retailer. You are asked to build each of the systems listed on the right. You need to use the most appropriate hardware components to ensure that each of these systems will fulfill its intended role. Drag and drop the most appropriate list of components on the left to the system type on the right that needs the component to function fully. (One list of components will not be the most appropriate for any listed system.)

Active heat sink, thermal paste, liquid pipes, and fan At a minimum, a heat sink should always be used in conjunction with a fan. The fan's job is to blow air over the heat sink to increase the air flow which, in turn, removes heat from the heat sink faster. Although this is a good solution for many systems, a better cooling system is one that incorporates a heat sink, fan, and pipes filled with water. The heat pipes that are filled with a liquid absorbs heat from the CPU. Doing this actually causes the liquid within the pipe to evaporate. Since vapor is less dense than the liquid around it, the vapor rises towards the heat sink on the other end of the heat pipe. This type of heat sink also includes a fan that cools the vapor, causing it to re-condense back into a liquid, which then drops back down to the CPU on the other end of the heat pipe. This cycle repeats indefinitely to remove heat from the CPU. In all cases, heat sinks should be attached using a thermal paste. Active heat sinks use an electric power to run the fan or any other devices to actively divert heat away from the components. Passive heat sinks have no mechanical parts, making them dependable and easy to install.

You are a high school student learning about computers and how to build them. As a class project, you have built a new computer. You power on your computer and begin to configure the system. After a short while, you notice smoke coming from the PC, and shortly after that, the computer stops working. After removing the computer case, you see that the CPU and surrounding areas are burnt and very hot. You realize that the costly mistake you made was not using a heat sink. When rebuilding your computer, which of the following cooling systems would MOST efficiently remove heat from the CPU?

UDP The User Datagram Protocol (UDP) protocol can be used with the IP protocol to create unacknowledged connections between the server application and its clients. Because the packets are sent unacknowledged, latency will be dramatically reduced, providing better streaming performance.

You are a software developer, and you are creating a multimedia streaming application. Data will be streamed from your streaming server to streaming clients over IP networks. Which transport protocol should your application use to send data between the clients and the server?

KVM switch A KVM (keyboard, video, and mouse) switch allows multiple computers to use a single keyboard, mouse, and monitor. KVM switches have multiple input groups. Each group accepts keyboard, video, and mouse connections from one computer. A single output group connects to the shared peripheral devices. Buttons on the KVM switch are used to toggle between each connected computer. Some KVMs allow you to switch devices using a special keyboard key combination. An HDMI splitter is used to take a single source (such as a computer) and distribute that HDMI signal to multiple output devices, such as monitors. A VGA splitter is a cable or device that allows you to separate a video signal into multiple connections and connect those individual signals to multiple devices. A multi-port USB hub is a device that expands a single Universal Serial Bus (USB) port into several so that there are more ports available to connect devices to a host system, similar to a power strip.

You are an IT professional that works with home users. One of your customers works from home and uses multiple Windows computers as well as an Apple Mac computer. Your customer wants to be able to switch between his computers without changing the keyboard and monitor currently in use. Which of the following devices would BEST facilitate sharing his monitor and other input devices with all of his computers?

Use a multimeter to test the power supply A failing power supply can cause the computer to continuously reboot. For example, pin eight on the power supply connector connects to the power good wire on the motherboard. If power disappears from that wire, the motherboard shuts down. If power quickly reappears on that wire, the system may attempt to come back on by itself, which causes the symptom of continual reboots. Using a multimeter allows you to verify the amount of voltage supplied by the power supply. You could replace the power supply, but it is best to test the original power supply first, as other issues may be causing the reboots. A running fan is not a good indication of a properly functioning power supply, since the fan may be running, but the power supply is not supplying the correct voltage for other components to run properly. Some BIOS may have a POST beep code that can give you a clue about a failing power supply, but this is not a reliable method for determining that the power supply is bad and needs to be replaced, and you may not have spare power supplies on hand to use.

You are an IT technician for your company. One of your employees has a computer that continually reboots when it is powered on. He has asked you to fix it. You suspect that the power supply may be failing. Which of the following is the BEST way to determine whether the power supply is causing the reboots?

Mac address filtering MAC address filtering allows or rejects client connections by hardware address.

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections by hardware address?

Either no memory is installed or the memory was not detected. If the system boot fails and sounds a beep code, the most likely cause is that either no memory is installed or the memory was not detected. If a card or memory module is not seated properly or the system includes unsupported memory, the system will boot, but the display will remain blank. If POST fails to recognize all of the memory, the system will boot, but the memory count will be incorrect.

You are attempting to boot a new system. The boot fails, and the system sounds a beep code. Which of the following describes the MOST likely cause of this error?

Use an adapter cable to connect two 4-pin Molex connectors to the 8-pin PCIe connector. Use an adapter cable to convert 4-pin Molex connectors to the connectors you require. You can typically purchase adapters for PCIe video, SATA power, or processor power cables. Purchasing a new power supply or video card would work, but would be more expensive than using an adapter.

You are building a new computer from both new and used parts. The video card is a PCIe video card that requires an 8-pin power connector. However, your power supply doesn't have an 8-pin PCIe power connector. Which solution would be the least expensive option for your system?

HDCP High-bandwidth digital content protection (HDCP) is a method for protecting digital media, such as Blu-ray movies, from being intercepted and copied. When playing protected content from a PC, the optical device, video card, and external display must all support HDCP. Both DirectX and OpenGL are API collections that are used to improve graphic, animation, and multimedia creations. HDTV is a high-definition signal used to broadcast digital TV signals.

You are building an HTPC (home theater PC) that will be connected to an HDTV. You want to be able to play Blu-ray movies on the HTPC. Which of the following features should your video card and HDTV MOST likely support?

Web server and email server TCP/IP port 80 is associated with accessing webpages from a web server using the Hypertext Transfer Protocol (HTTP). Email can be accessed using a number of protocols, including the Simple Mail Transfer Protocol (SMTP), the Post Office Protocol version 3 (POP3), and the Internet Message Access Protocol version 4 (IMAP4). SMTP uses TCP/IP port 25, while POP3 uses TCP/IP port 110, and IMAP4 uses TCP/IP port 143.

You are configuring a firewall to allow access to a server hosted in the demilitarized zone of your network. You open IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to be configured to provide access, which applications are most likely to be hosted on the server?

1. Fitters or splitters 2. RJ11 connectors To connect to the internet through a DSL connection: -Install an internal DSL card in a single computer or connect a DSL router to the phone line. -Use a phone cable with an RJ11 connector to connect the DSL card or router to the phone line. For ADSL, place filters (splitters) on the line everywhere that an analog phone is used. -Do not install a filter on the line connected to the DSL router. Analog modems are used for dial-up internet access. F-type connectors and RG-6 cable are used for cable internet access.

You are configuring an ADSL connection. Which of the following will be part of the configuration?

1. RJ11 connectors 2. Filters or splitters To connect to the internet through a DSL connection: --Install an internal DSL card in a single computer or connect a DSL router to the phone line. --Use a phone cable with an RJ11 connector to connect the DSL card or router to the phone line. For ADSL, place filters (splitters) on the line everywhere that an analog phone is used. --Do not install a filter on the line connected to the DSL router. Analog modems are used for dial-up internet access. F-type connectors and RG-6 cable are used for cable internet access.

You are configuring an ADSL connection. Which of the following will be part of the configuration? (Select TWO.)

ARM

You are currently managing a few Apple iPad devices that run the iOS operating system. Which of the following BEST describes the architecture used by this device? Most tablet devices, such as the iPad, use the ARM architecture. ARM is more power-efficient and less expensive to manufacture than x86. Android also runs primarily on ARM.

802.11n 802.11n is the best choice for this client. 802.11b and 802.11g both operate in the 2.4 GHz to 2.4835 GHz range, which would cause interference with the client's wireless phone system.

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

Electrostatic discharge (ESD) Memory modules are very sensitive to ESD. It is possible that the memory modules have already been damaged by the possible lack of proper ESD prevention if the user removed the modules from the packaging while standing on the carpeted floor. But you can still take proper steps to prevent ESD before you proceed to install the modules. The CRT monitor is not likely to emit a high voltage discharge unless you take it apart. An unused CRT monitor does not emit a strong magnetic field, and memory modules are not susceptible to magnetic fields. Memory modules are not susceptible to electromagnetic interference.

You are in a carpeted office lighted by fluorescent bulbs. You are preparing to add memory modules to a user's computer. The user has already unpacked the memory modules and stacked them on top of an old, unused CRT monitor. In this environment, what is the greatest threat to these memory modules?

Purchase two identical video cards For increased performance, especially in games, you can install multiple video cards and link those cards together so that multiple GPUs draw a single screen. Scalable Link Interface (SLI) from NVIDIA and CrossFire from AMD are two different methods for linking video cards.

You are in the process of building a new computer. You would like to configure your computer to use Crossfire to improve performance when playing your favorite game. Which of the following will be part of the configuration process?

1. Connect at least one monitor to the graphics card. 2. Purchase two graphics cards with SLI and similar specifications. 3. Purchase a motherboard with two (or more) PCIe x16 slots. For increased performance, especially in games, you can install multiple video cards and link those cards together so that multiple GPUs draw a single screen. Scalable Link Interface (SLI) from NVIDIA and CrossFireX from AMD are two different methods for linking video cards. In most cases, you will need to install identical video cards, or at least video cards with very similar specifications. Cards are linked using a special bridge clip or through software (depending on the implementation). Both the motherboard and the video cards must support the selected method (either SLI or CrossFireX). The motherboard must have at least two 16x PCIe slots. Some motherboards are able to link an onboard graphic controller and video card installed in a single PCIe slot. Connect the monitor to an output port on the first video card. VGA is an older video technology and would not be used for SLI. Power supply output requirements are not dependent on graphic card power requirements. Hard drive speed is independent of SLI.

You are in the process of building a new computer. You would like to configure your computer to use SLI to improve performance while playing your favorite game. Which of the following will MOST likely be part of the configuration process? (Select THREE).

Move the modules to the correct motherboard slots. To use dual-channel memory, you will need to install memory in the correct slots. Depending on the motherboard, the two slots might be next to each other or alternating. Consult the motherboard documentation for the correct configuration. Dual-channel support is mainly a function of the motherboard, not the memory itself. Continuity modules are used with Rambus RAM; if continuity modules were required on this system, none of the memory would have been detected. The CAS latency is used for memory timing. You might modify the timing if the system is unstable at the current memory timing settings.

You are in the process of configuring a new computer. The motherboard has four memory slots and supports dual-channel memory. You install two memory modules. When you boot the computer, the BIOS recognizes both modules, but the memory is not configured to run in dual-channel mode. What should you do?

Bluetooth A Bluetooth connection would be the best choice because it automatically detects Bluetooth-enabled devices and creates a wireless PAN between them. It can be used for both voice and data signals, and it also provides 128-bit encryption to protect sensitive information in transit.

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which of the following would be the BEST choice?

1. An SSD uses flash technology to store data. 2. An SSD opens files faster than an HDD. A solid state drive is a flash device with a storage capacity similar to a small hard drive. Solid state drives are used as replacements for hard disk drives and store operating system, application, and data files. Solid state drives have several advantages. They: --Are faster than hard drives. --Have no moving parts. --Have lower power consumption than hard drives (which is good for laptops). --Are less susceptible to physical damage (from dropping) and immune to magnetic field damage. --Are smaller and lighter than hard drives. The main disadvantage of solid state drives is cost--they are several times more expensive than comparable hard drives. However, their advantages make them a good choice in many situations, especially for portable devices.

You are in the process of purchasing several new Windows-based computers to replace broken or outdated computers. You have heard that solid state drives (SSDs) can significantly increase the overall performance of the system. Which of the following BEST describes the features of solid state drives (SSDs) compared to hard disk drives (HDDs)? (Select TWO).

1. Typically, an AMD uses a Pin Grid Array (PGA) socket type. 2. Typically, AMD chips are less expensive. Generally speaking, CPUs manufactured by AMD tend to be less expensive than those manufactured by Intel, but they also don't perform quite as well as Intel CPUs. AMD chips typically use a pin grid array (PGA) socket type and do not include a number in their name to represent the pins used on the chip.

You are in the process of purchasing several new computers to replace broken or outdated computers. After much research, you have determined to purchase computers that use AMD sockets. Which of the following BEST describes an AMD and why you would select this option? (Select TWO).

Connect a 6- or 8-pin power connector to the video card. Most high-end PCIe x16 video cards require a special 6-pin or 8-pin power connector for additional power. Be sure to connect the power after inserting the card in the system and prior to turning the system on. If the motherboard has integrated graphics, it should be disabled in the BIOS when installing a dedicated video card. CrossFire bridge cables are used when installing two video cards in a multi-GPU configuration. Multiple display connectors on a video card do not need to be configured or enabled.

You are installing a high-end PCIe x16 video card in a new computer. The video card has connectors for two displays. The card also has dual fans to cool the unit. Which of the following will MOST likely be part of the installation?

The satellite dish must be pinted in the correct direction for communicating with the satellite During installation, the satellite dish must be pointed in the correct direction to communicate with the satellite. With a single-line satellite installation, the satellite connection is used for downloads, and a phone line with a modem is used for uploads. Connect a satellite modem/router to the satellite disk using coaxial cable (RG-6) and an F-type connector. Connect the modem/router to your computer using a USB or Ethernet connection.

You are installing a satellite connection so your home office can connect to the internet. Which of the following statements is true?

Plenum Plenum cable is fire resistant and non-toxic, making it optimal for wiring above ceiling tiles. PVC cable cannot be used to wire above ceilings because it is toxic when burned. Both STP and fiber optic cables can be rated for plenum areas, but are not fire resistant.

You are installing networking cable in the air space between the ceiling and the roof of a building. Which type of cabling should you use?

1. RAID 1+0 array 2. 64-bit multi-core processor The following hardware selection criteria is most important for a PC system that will be used as a file and printer server in a small business: --RAID 1+0 array --64-bit multi-core processor A high-end video board with HDMI output is not required for a server system. A RAID 0 array offers performance, but does not protect data with redundancy.

You are purchasing a PC system that will be used as a file and print server in a small business. Which of the following hardware selection criteria is the MOST important for this system? (Select TWO).

Gigabit Ethernet adapter A thin client only needs to be able to connect to a remote desktop session, so it only needs to meet the minimum requirements for running Windows locally. You should select a system with the fastest network adapter supported by the network it will be connected to. Gigabit speeds (or faster) are recommended. This will help ensure that the remote desktop session provides a reasonable end user experience. A RAID 0 array, high-end video adapter, or 8-core CPU really isn't needed in this type of system.

You are purchasing several PC system that will be used as thin clients in a large organization. Which of the following hardware selection criteria would be the MOST important for this system?

Identify the problem. Currently, you have no idea what problem the user is having. The first step is to identify the problem. You need to ask questions to identify what the problem and its symptoms are. You can find out what has changed only after you know a bit more about the problem. Before taking any actions, back up the system to protect user data. Establish a theory and a plan of action only after you know what the problem is.

You are responsible for managing client workstations for your company. A frantic user calls you one morning exclaiming, "Nothing is working!" Which of the following actions should you perform FIRST?

Replace the power supply because it is failing. The power supply in this scenario is failing. Any time the voltage on the yellow wire of a Molex connector drops below about 11 volts, the power supply should be replaced. Switching the power supply to use 230 volts AC will not fix the issue. Low voltage issues aren't contained to a single connector, so even if you stop using that particular Molex connector, the system will still have problems.

You are servicing a client's computer that has been randomly restarting. You decide to test the power supply using a multimeter. You connect the positive lead to the yellow wire on one of the Molex connectors. Which of the following BEST describes the action you should take based on the multimeter reading shown below? It shows 10.24

Install and configure the DHCP service on your server. The DHCP protocol allows you to assign IP addresses automatically. In this scenario, you should configure the DHCP service to run on the network server. The DHCP client on each workstation can then contact the DHCP server when the workstations connect to the network to be automatically assigned IP addressing information. You could instruct each user to manually enter IP addressing information, but this creates a higher chance of error and will likely require more administrative overhead.

You are setting up a small network in your office with one Windows server and 50 Windows workstations. You want to spend as little time as possible configuring the workstations with IP addressing information. What should you do?

Wrong Printer Driver When you print a test page from your computer and it does not work properly, you most likely have an incorrect print driver or a printer cable that is not fastened properly. Memory or power supply problems are rare in printers. You would probably not be able to install an incorrect toner cartridge into the printer.

You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them. What is the most likely cause of the problem?

Thin Client A thin client only needs to be able to connect to a remote desktop session. As such, it only needs to meet the minimum requirements for running Windows locally. A thick client, CAD/CAM workstation, and tablets have additional requirements to run their operating system and applications.

You are the IT administrator for your company. You have several users who want to work from home by connecting to a server running at the corporate headquarters. Your manager has asked you to keep costs to a minimum as you provide computers for this environment. Which of the following types of PCs would work BEST for these remote users?

1. DNS 2. hosts file You can use the Domain Name System (DNS) to get the IP address from a given host name. You can also use the local hosts file to map host names into IP addresses. On Windows systems, this file is located in C:\Windows\system32\drivers\etc\

You are the IT technician for your company. Which of the following mechanisms would BEST allow you to resolve a hostname into its associated IP address?

Create an action plan The next action you should take is to create an action plan and account for side effects of the proposed plan. Identifying the effects ahead of time helps you put measures into place to eliminate or reduce any potential negative consequences. Escalation is not necessary because you are already in charge of managing and maintaining the desktop computers. Fix the problem only after creating the action plan and identifying possible effects. Document the problem and the solution after the problem has been fixed and the solution has been verified.

You are the manager in charge of maintaining desktop computers. A user reports that she can't turn her computer on. After some investigation, you find that the power supply is malfunctioning. Which of the following actions should you perform NEXT?

EMI interference In this case, the most likely cause of the problem is electromagnetic interference (EMI) from the florescent lights. Cables run near air conditioners, lights, or other large electronic devices can create interference for data traveling through the cable. UTP cables in an Ethernet network have a maximum segment length of 100 meters. Distances beyond this length may require signal regeneration. Devices such as Ethernet switches provide signal regeneration. Attenuation describes the process of signal degradation as it passes through network media. As mentioned, UTP cables in an Ethernet network can run 100 meters before attenuation becomes a significant problem. Crosstalk refers to the interference caused by overlapping signals when cables are run in close proximity to each other.

You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the unshielded twisted pair patch cable runs 75 feet from the wall outlet and then passes through the ceiling and over several florescent light fixtures before reaching the client system. Which of the following is the MOST likely cause of the connectivity problem?

ping www.widgets.com To test both name resolution and communication with the server, use the ping command with the hostname. The first step in the ping test is to find the IP address of the specified host. Using ping with just the IP address will not test name resolution. Using nslookup only tests name resolution; it does not test communication with the end device.

You are troubleshooting connectivity between your computer and the www.widgets.com server, whose IP address is 192.168.1.1. Which of the following commands tests connectivity to the device as well as name resolution?

1. +/- 5 v 2. +/- 12 v The computer power supply provides +/- 5 v and +/-12 v. Many power supplies also provide +/- 3.3 volts, although 3.3 volts is not used in many newer components and is optional in recent specifications. Most power supplies accept AC 110/115 or 220/230 volts as input.

You are trying to troubleshoot a desktop power supply issue using a voltmeter. Which of the following options are the MOST common voltages produced by the power supply? (Select TWO).

Green with White According to the T568A standard, the green with white wire should be connected to pin 1 in the RJ45 connector.

You are using a crimper to attach an RJ45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the individual wires to the connector. Which wire should be connected to pin 1?

Fixed Size A fixed disk VHD file occupies a set amount of hard disk space on the physical hard disk. The size of the virtual hard disk file is the total storage capacity of the virtual disk. The entire disk size, including empty space within the virtual hard disk, is reserved on the physical disk. This disk type takes longer to create than other disk types. However, performance is improved because the entire virtual disk is a contiguous block. A dynamically expanding disk allocates physical disk space in the VHD file as virtual disk storage is used by the system. This disk type makes the most efficient use of hard disk space. However, it does not provide the same level of performance as a fixed disk VHD file. Thin provisioning uses essentially the same technology as a dynamically expanding disk. However, this terminology is not commonly used when working with VHD files. VHDX is an improved version of the traditional VHD file format used by newer versions of Hyper-V.

You currently use a Windows 7 Ultimate desktop system. You have been asked to evaluate Windows 10 as a possible upgrade for the Windows 7 systems you manage. You decide to install Windows 10 in a VHD file on your Windows 7 system. To ensure that the evaluation is realistic, you need to ensure the best possible performance. Which type of VHD file should you use?

No Media The No Media status shows for an optical or removable media drive that does not contain a valid disc. A Foreign disk is a dynamic disk that was created in one system and moved to another system. The Unreadable status indicates a hardware failure, I/O errors or other corruption but might also be caused by a delay in reading the disk in Disk Management. The Missing status shows when a dynamic disk has failed.

You have a DVD-ROM disc with no label, and you want to know if it has any important files on it. You insert the DVD-ROM into your optical media drive, then you double-click the drive letter for the optical drive to see the contents of the disc. If the DVD-ROM is not a valid disc, which error message will you see?

1. Verify the operating system SATA drive is configured as the boot drive in the UEFI configuration. 2. Change the boot order in the UEFI configuration. The most likely cause is that the boot configuration in the UEFI firmware of the new motherboard needs to be modified. First, you should specify that the SATA hard disk with the operating system installed is the hard disk to boot from. Then set the boot order to boot from the hard disk first. When you replace the motherboard, the UEFI chips are replaced and previous boot configuration is lost.

You have a Windows system with two SATA hard drives, one used for the operating system and the other used for storing data. You have traced recent problems to a fault in the system motherboard. You replaced the motherboard and reconnected all the hardware. When you started the computer, the system showed the startup information screen, but then returned an error that an operating system could not be found. What should you do? (Select TWO. Each option is part of the complete solution.)

Read the motherboard documentation to identify which processors are supported. The first thing you need to do before purchasing and installing a new processor is use the motherboard documentation to verify that the new processor is supported by your existing motherboard. After you have determined that the new processor is supported by the motherboard, you can take additional steps, such as installing the processor, editing the CMOS, configuring jumpers, and replacing the VRM if necessary.

You have a computer system with a dual-core processor. You would like to upgrade to a quad-core processor, but you don't want to replace the motherboard. Which of the following steps SHOULD you perform first?

All memory will operate at 300 MHz In this scenario, all memory will operate at 300 MHz. When you mix memory with different speed ratings, all memory will operate at the slowest frequency. Memory can operate at a frequency lower than its rating. The only way to get memory to operate at a higher frequency is to overclock the memory. However, memory is tested and rated at the highest frequency at which it is stable. While you can likely get some small performance gains through overclocking, it is unlikely that you will be able to push the PC-2400 memory up to PC-4000 and still have a stable system.

You have a computer with a Pentium 4 CPU and two PC-2400 DDR modules. The motherboard has room for two additional memory modules, and you'd like to install two PC-4000 modules. Which of the following statements is true?

Install the application normally You can install a 32-bit application on a system with a 64-bit processor. If the processor runs the x86-64 architecture, the processor itself is capable of running the 32-bit application without modifications.

You have a computer with a dual-core 64-bit processor that uses the x86-x64 instruction set. You want to install the 32-bit application on the computer. Which of the following BEST describes the action you should perform?

Upgrade to a power supply that provides more watts. The number of devices a powers supply can support is directly related to the number of watts the power supply provides. In this situation, the new RAID array, along with all of the other components in the system, is drawing more watts than the power supply can provide. A watt is a rating of the amount of work that the power supply can do. Volts are a measure of electrical pressure and are not directly related to the number of devices it will support. The voltage is dependent on the wall socket's voltage. The voltage switch on the power supply should match the voltage at the wall outlet. 115 is used in the United States, while 230 is typically used in Europe.

You have a desktop computer that uses a 250-watt power supply. You recently added a four-disk RAID 10 array to the system, and now it spontaneously shuts down. Which of the following would MOST likely rectify this issue?

90 Watts Power consumption for a processor is measured in Watts. A 90-Watt processor consumes less power than a 125-Watt processor. It is possible that a single-core processor, one with less cache, or one with a smaller process size will consume less power. However, only the Watt rating will tell you for sure how much power the processor requires.

You have a laptop with a dual-core processor that has the following characteristics: 1024 KB L2 cache 125 Watts 45nm process size You want to upgrade the processor to one that uses less power. Which of the following characteristics would MOST likely identify a processor that uses less power?

Use an adapter to connect the monitor HDMI port to the DVI-D connector on the PC. Using an adapter to connect the DVI-D connector on the video adapter to the HDMI port provides the best quality output at the lowest cost. Because DVI-D and HDMI both use digital signaling, the signal is not degraded during conversion. In fact, HDMI was specifically designed to support DVI-D signaling. DVI-D to HDMI converters can be purchased for less than $20.00 USD.

You need to connect a monitor that provides an HDMI port and a VGA port to a video adapter in a PC system that uses a DVI-D connector. Which of the following options would provide the BEST display quality at the lowest cost?

Alternate IP configuration With an alternate IP addressing configuration, the system's IPv4 Properties are configured on the General tab to use DHCP to automatically obtain TCP/IP configuration information. If a DHCP server cannot be contacted, the static IP configuration information on the IPv4 Properties' Alternate Configuration tab is used.

You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP address from the DHCP server so you configure it to obtain IP and DNS information automatically. When he's working from home, the laptop must use IP and DNS information that connects with his home network. Which IP addressing method can you use to make sure he gets a network connection at home?

External Network You must use the external network connection type when you configure the virtual switch in Hyper-V Manager. This connection type allows the virtual machine to communicate with the physical network using a bridged connection over the physical host's network adapter. An internal network connection only allows the virtual machine to communicate with the host machine and other virtual machines running on the same host. A private network connection allows virtual machines running on the same host to communicate with each other, but not with the host.

You have a virtual machine and have installed the Windows 10 operating system on it. You want this machine to be able to communicate with the physical network using a bridged connection over the physical host's network adapter. Which of the following connection types will you use when configuring the virtual switch in Hyper-V Manager?

1. On your computer, add the x86 drivers. 2. Manually install the correct driver on each computer that is having a problem. Each network host that wants to use the printer must have the correct printer driver installed. When you share a printer in Windows, the current printer driver is automatically delivered to clients that connect to the shared printer. If the client computers run a different version of Windows, you can add the necessary printer drivers to the printer object. Manually adding drivers to every client is also an option, but is not efficient, as the drivers can be delivered automatically when the computers connect to the shared printer. Sharing the printer on a 32-bit operating system would require adding the drivers for 64-bit clients. There's no such thing as 32-bit emulation mode on printers.

You have a workstation running Windows 10, 64-bit edition. A local printer connected to a USB port is shared so that other users can print to that printer. Users running 32-bit versions of Windows report that they can't install the driver for the shared printer. Users running a 64-bit version of Windows do not have any problems. Which of the following actions will MOST likely fix this problem? (Select TWO).

1. Purchase additional modules that are the same as what is currently installed. 2. Check the motherboard documentation to find which modules are supported. To purchase the correct memory for your system, you can: --Check the motherboard documentation or the motherboard manufacturer's website to identify supported memory modules. --Purchase modules that are the same as what is currently installed. Be aware, however, that some motherboards may have limitations on the capacity of modules supported. For example, if a motherboard has four slots, you might be able to fill all slots only when memory modules are 1 GB or smaller. If you use larger modules, you may not be allowed to fill all of the slots. --Use an online configuration tool from a leading memory manufacturer to identify supported modules. Updating the BIOS might enable the motherboard to support newer memory modules, but you will still need to verify which modules are supported.

You have an existing system that has a single DDR3 memory module installed. You would like to add more memory to the three remaining empty memory slots. Which of the following steps should MOST likely be taken to make sure you get the right memory for the system? (Select TWO).

Impact Because dot matrix (impact) printers strike the image onto paper, they are good printers to use when carbon-copy documents are being printed. A dye sublimation printer uses film-embedded dye. Laser printers use lasers and electrical charges to transfer images to paper. Inkjet printers spray ink from ink stored in a reservoir.

You have been asked to recommend a printer that will be used in a travel agency. The printer will be used to print airline tickets. Each ticket has four pages (multi-part carbon-based forms), and the same information must show up on all four pages with a single pass of the printer. Which printer type would you recommend?

802.11n Of the technologies listed, only the IEEE 802.11n wireless standard addresses the desired requirements. The 802.11a wireless standard offers maximum speeds of 54 Mbps and uses the 5 GHz frequency range

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?

1. RAM configured to run in quad-channel mode 2. 64-bit processor with eight cores Virtual machines place a very heavy load on the host system's RAM and CPU. Therefore, the most important criteria to be included in the design for this workstation would be: --RAM configured to run in quad-channel mode --64-bit processor with eight cores A video card with HDMI output and an HTPC form factor would be more appropriate for a home theater system. A RAID 5 disk array would be appropriate for a virtualization workstation, but is less important than the choice of processor and RAM.

You have been tasked with designing a workstation that will run VMware Workstation virtualization software. A software engineer will use it to run virtual machines for application development and testing. Which of the following criteria should MOST likely be included in your design for this system? (Select TWO).

Update the UEFI firmware. Flashing the BIOS or UEFI firmware is often required to upgrade system components that are part of the motherboard, such as upgrading to a faster processor. If the motherboard documentation lists the processor as supported but it is not correctly recognized, updating the BIOS or UEFI firmware to the latest version may fix the problem.

You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You check the motherboard documentation and purchase the fastest processor supported by the motherboard. However, when you start the computer, it beeps regularly, nothing is displayed on the screen, and it doesn't start. While troubleshooting this computer, which of the following would be BEST to try first?

1. Flash the UEFI firmware. 2. Reinstall the old processor in the motherboard. Flashing the BIOS or UEFI firmware is often required to upgrade system components, such as upgrading to a faster processor. If the motherboard documentation lists the processor as supported but it is not correctly recognized, updating the BIOS or UEFI firmware to the latest version may fix the problem. Before you can do this, you must reinstall the old processor in the system to get it back up and running again.

You have been using the same computer for several years. To improve performance, you decide to upgrade the processor. You check the motherboard documentation and purchase the fastest processor supported by the motherboard. However, when you try to start the computer, it beeps regularly, and nothing is displayed on the screen. Which of the following actions would MOST likely rectify this issue? (Select TWO).

Virtual OS1 can communicate with the following machines: --Virtual OS2 --Virtual OS3 The virtual switch port configuration allows these three virtual machines to communicate as if the machines were part of a real, physical network. Virtualized networks allow virtual servers and desktops to communicate with each other, and can also allow communication (via the host operating system) to network devices out on the physical network. Virtual networks typically include the following components: --Virtual switches allow multiple virtual servers and/or desktops to communicate on virtual network segments and/or the physical network. Virtual switches are often configured in the hypervisor. --Virtual network adapters are created and assigned to a desktop or server in the hypervisor. ----Multiple network adapters can be assigned to a single virtual machine. ----Each network adapter has its own MAC address. Each network adapter is configured to connect to only one network at a time (i.e., a virtual network or the physical network, but not both). Virtual OS4 and all of the other Physical OS machines are configured to communicate on the physical network.

You have configured a virtual network that includes the following virtual components: Four virtual machines (Virtual OS1, Virtual OS2, etc.) One virtual switch The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network. Given the port configuration for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virtual OS1 can communicate with. Device Port Port Assignment Virtual Switch P1 Virtual Network1 P2 Virtual Network1 P3 Virtual Network1 P4 Physical Network P5 Physical Network Physical Switch P1 Physical Network P2 Physical Network P3 Physical Network P4 Physical Network P5 Physical Network Photo on phone

1. ping www.widgets.com 2. tracert www.widgets.com 3. nslookup www.widgets.com To get the IP address from a hostname, use the nslookup command. You can also try to ping the device using the host name. The first step in the ping test is to find the IP address of the specified host. tracert will also display IP addresses it discovers in the route.

You have had several employees call the help desk where you work, complaining that they are not able to reach the www.widgets.com server. To help troubleshoot this issue, you decide to run a variety of commands. Which of the following commands is MOST likely to return the IP address of the desired server? (Select THREE).

Install a 64-bit version of the operating system. In this scenario, the most likely cause is the operating system being a 32-bit operating system. You must use a 64-bit operating system to use memory above 4 GB.

You have installed a new computer with a quad-core 64-bit processor, 6 GB of memory, and a PCIe video card with 512 MB of memory. After installing the operating system, you see less than 4 GB of memory showing as available in Windows. Which of the following actions would MOST likely rectify this issue?

Install a 64-bit version of the operating system. In this scenario, the most likely cause is the operating system being a 32-bit operating system. You must use a 64-bit operating system to use memory above 4 GB. The AGP aperture is a method for sharing system memory with an AGP video card instead of PCIe. With shared memory, some of the memory is used by the video card and is not available for the system. You do not update memory controller drivers.

You have installed a new computer with a quad-core 64-bit processor, 6 GB of memory, and a PCIe video card with 512 MB of memory. After installing the operating system, you see less than 4 GB of memory showing as available in Windows. Which of the following actions would MOST likely rectify this issue?

Memory not installed or not detected If memory was not installed in the new computer or was not detected during boot up, the system boot will fail, and a beep code sound will be heard. If unsupported memory was installed, the system will boot, but the display will be blank. If incompatible memory was installed, such as combining dual-bank with single-bank memory, the system will boot, but the memory count will be incorrect. If a mix of new and old memory was used, the system will boot, but will display a memory error message.

You have just built a new system from scratch. You turn the computer on, but the system boot fails and sounds a beep code. Which of the following is the MOST likely cause?

Default Gateway Check the default gateway setting on the computer. The default gateway value is used to send packets to other subnets. If the value is incorrect, then the packets will not be sent to the correct router. In this scenario, the host can communicate with other hosts on the same subnet, meaning that the IP address and subnet mask are correctly configured. The DNS server address probably isn't the problem, as name resolution is not mentioned in the scenario. In addition, if name resolution were a problem, it could affect access to both local and remote hosts.

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configuration values would you most likely need to change?

Default gateway Check the default gateway setting on the computer. The default gateway value is used to send packets to other subnets. If the value is incorrect, then the packets will not be sent to the correct router. In this scenario, the host can communicate with other hosts on the same subnet, meaning that the IP address and subnet mask are correctly configured. The DNS server address probably isn't the problem, as name resolution is not mentioned in the scenario. In addition, if name resolution were a problem, it could affect access to both local and remote hosts.

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configuration values would you most likely need to change?

The USB front panel connector was not properly connected. The most likely cause is that the USB cable is not connected or is not connected properly. It is unlikely that the hard drive suddenly failed. Since the operating system and applications are functioning properly, the power supply is functioning correctly as well.

You have just finished replacing the motherboard in your friend Ethan's computer with the same type of motherboard it originally had. You tested the motherboard by powering it on and verifying that the operating system started, and his applications were working. Now Ethan is complaining that his computer no longer recognizes his external hard drive. Which of the following is MOST likely causing the external hard drive not to function?

Make sure that the hard disk is connected to the power supply Because you have just made a system change, you should check items related to the change you have made. In this case, check to make sure that power connectors are plugged in.

You have just finished upgrading the 250 W power supply in your desktop computer to a 450 W power supply. Now the BIOS doesn't recognize one of the hard disk drives in the system during POST. Which of the following troubleshooting steps is the BEST to try first?

1. Check the CPU fan power. 2. Check the thermal shutdown threshold in the BIOS. Because you have just replaced the processor, the most likely cause of the problem is related to the CPU. System lockups and restarts can be caused by an overheated processor. Make sure that the CPU fan is running and that you have used thermal paste between the CPU and the heat sink. Also, check to see what the thermal shutdown rating is for the new CPU and verify that the thermal shutdown threshold is set in the BIOS accordingly.

You have just finished upgrading the CPU in your desktop system. After running for about 15 minutes, the system spontaneously shuts down. Which steps should you take to begin troubleshooting the issue? (Select TWO).

1. Check the thermal shutdown threshold in the BIOS. 2. Check the CPU fan power. Because you have just replaced the processor, the most likely cause of the problem is related to the CPU. System lockups and restarts can be caused by an overheated processor. Make sure that the CPU fan is running and that you have used thermal paste between the CPU and the heat sink. Also, check to see what the thermal shutdown rating is for the new CPU and verify that the thermal shutdown threshold is set in the BIOS accordingly.

You have just finished upgrading the CPU in your desktop system. After running for about 15 minutes, the system spontaneously shuts down. Which steps should you take to begin troubleshooting the issue? (Select TWO).

1. Make sure the heat sink is properly mounted and has thermal paste. 2. Check the CPU fan power. System lockups and restarts can be caused by several problems, including an overheated processor. Because the CPU has just been replaced, this is the most likely cause of the problem. First, you should make sure the CPU fan is running. After that, you should check if the heat sink is properly mounted and has thermal paste between it and the CPU.

You have just finished upgrading the CPU in your desktop system. After running the system for about 10 minutes, the system locks up and automatically restarts. Which of the following is the BEST first step in troubleshooting the problem? (Select TWO).

Reset the page count After installing a maintenance kit in your laser printer, you should reset the page count. The parts in a maintenance kit are replaced on a regular basis (usually after about 20,000 pages of printing).On dot matrix printers, you should check the gap between the printer head and the paper to avoid printer images become faint. Use an inkjet's automatic cleaning feature if letters have missing lines. The print drivers may need reinstallation if they become corrupt.

You have just installed a maintenance kit in your laser printer. Which of the following is the BEST next step to perform?

Run any diagnostic software that came with the device. As a first step, run any diagnostic software that came with the device. Using an older driver, like one that came on the installation CD, will rarely correct a problem. In addition, you should only try this solution and others after performing the self-test and trying obvious fixes.

You have just installed a new hardware device, upgraded the driver, and installed the custom software that came with the device. Now you can't get the device to work. Which of the following troubleshooting steps is the BEST to try first?

1. HTPC form factor 2. Video card with HDMI output A video card with HDMI output and an HTPC form factor is more appropriate for a home theater system. A RAID 5 disk array, 12-core CPU, and quad-channel RAM are more appropriate for a virtualization workstation.

You have just purchased a new home and want to purchase a home theater computer system. Which of the following hardware selection criteria isthe MOST important for this system? (Select TWO)

Laptop computers Small outline dual in-line memory modules (SODIMM) is a compact form factor of DIMM. It is typically used in smaller computers, such as laptops.

You have just received an order of various system components from an order you placed several weeks ago. One of the components is labeled as SODIMM memory. For which of the following was this memory MOST likely purchased?

Edit the printer properties to configure device-specific settings. After installing a printer, you should configure device-specific settings before performing any further tasks. Documenting the steps you took to complete the configuration and reporting to your supervisor that the job was completed are good things to do, but not until after you have configured device-specific settings. Sharing the printer over the network is not required unless specified in the implementation plan or statement of work.

You have just set up a new laser printer for the company president on her Windows workstation. You have installed the printer and the drivers. What should you do next?

1. Make sure the CPU is seated properly, oriented properly, and locked into the socket. 2. Look for something that could be causing the new CPU to overheat. The most common issues that occur when a new CPU has been installed are: 1. The system locks up because it gets too hot. You should check for the following: --The heatsink and fan are not placed correctly or are in poor condition --Thermal paste or the thermal pad have not been used between the processor and the heatsink --The heatsink is not firmly attached to the processor 2. The system locks up because the CPU is not properly seated or is oriented incorrectly.

You have just upgraded the CPU on your computer. You consulted the motherboard documentation to make sure the CPU is compatible with the motherboard. However, when you turned the system on, it locks up shortly after startup. While troubleshooting this issue, which of the following are the BEST steps to try first? (Select TWO).

Run the cable through the ceiling area instead of across the floor. Because the cable is a plenum-rated cable, you can run the cable through the ceiling area. This is the best method of preventing wear to the cables. The cable shielding will also protect the cable from some electromagnetic interference. However, you should be sure to avoid running the cable directly across light fixtures.

You have recently been called to troubleshoot network connectivity problems at a user's workstation. You have found that the network cable runs across high-traffic areas on the floor, causing the cable to wear through and break. You have replaced the cable with a plenum-rated and shielded twisted pair cable. You would like to minimize the problem and prevent it from happening again. Which of the following will BEST protect the cable from further damage?

NFC chips

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following technologies is being used in these phones?

Mutual Authentication Mutual authentication is a security feature in which a client process must prove its identity to a server, and the server must prove its identity to the client before any application traffic is sent over the client-to-server connection.

You have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the data to be synchronized, this service uses a process where the cloud service and the client on the mobile device verify each other's security certificates. What is this process called?

KVM A KVM (keyboard, video, mouse) switch would allow you to control all three computers with one keyboard, one monitor, and one mouse. The KVM switch has multiple input groups, and each group accepts keyboard, video, and mouse connections from a single computer. A single output group connects to the shared input/output devices. Buttons on the KVM switch or keyboard shortcut combinations allow you to toggle the input/output devices between computers. A USB hub allows multiple USB-compatible devices (up to 127) to be connected to a single USB connection, but the hub does not connect to or control multiple PCs. A router is a networking device that connects multiple networks. DVI is a standard for connectors to digital video cards.

You have three computers in your office. You would like to reduce the time it takes to move from one computer to the next, and you would like to use only one keyboard, one monitor, and one mouse for all three computers. Which of the following devices BEST allows this type of setup?

Reset the page count After performing regular maintenance tasks on a laser printer, you should reset the page count. A printer needs maintenance on a regular basis (usually after about 20,000 pages of printing), so it helps to know how many pages have been printed since the last time it was serviced. On dot matrix printers, you should check the gap between the printer head and the paper to avoid printer images becoming faint. Use an inkjet's automatic cleaning feature if letters have missing lines. The print drivers would only need reinstallation if they had become corrupted.

You installed a new toner cartridge in a company-owned laser printer and did some maintenance tasks that you noticed needed to be done. Which of the following BEST describes the next step you should perform?

An iPad can be connected to a Windows 10 PC in three different ways: 1. USB cable 2. Wi-Fi wireless connection 3. Bluetooth wireless connection The iPad does not support wired Ethernet connections, serial connections, or Firewire connections.

You just purchased an iPad tablet device. You want to synchronize your photos, music, email, and contacts from your Windows 10 PC to the device. How can you connect the device to the PC?

Incorrect default gateway In this example, the default gateway address is incorrect. The default gateway address must be on the same subnet as the IP address for the host. The host address is on the 192.168.1.0/24 subnet, but the default gateway address is on the 192.168.2.0 subnet.

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . . : 192.168.2.20 Which of the following is the MOST likely cause of the problem?

incorrect default gateway In this example, the default gateway address is incorrect. The default gateway address must be on the same subnet as the IP address for the host. The host address is on the 192.168.1.0/24 subnet, but the default gateway address is on the 192.168.2.0 subnet.

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . . : 192.168.2.20 Which of the following is the MOST likely cause of the problem?

Incorrect subnet mask In this example, the network is using a mask of 255.255.255.0 (24-bits), but the workstation is configured to use a mask of 255.255.0.0.

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet, which uses the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask. . . . . . . . : 255.255.0.0 Default Gateway . . . . . . : 192.168.1.1 DNS Servers . . . . . . . : 192.168.1.20 192.168.1.27 Which of the following is the MOST likely cause of the problem?

Install the scanner drivers and then connect the scanner to the USB port and complete the Add a Device wizard when it pops up. To install USB devices, start by installing the driver. Then connect the device to the USB port. The operating system will detect the device and configure it automatically. The driver is used to tell the operating system how to communicate with the device.

You need to connect a new USB scanner to the USB port on your computer. However, the first time you plugged the scanner in, it was not recognized. What should you do?

A private virtual network You should implement a private virtual network on your Windows 10 system. A private virtual network allows communication only between virtual machines on the same host. A private virtual network is not bound to a physical network adapter. A private virtual network is isolated from all external network traffic on the virtualization host and any network traffic between the host operating system and the external network. This type of network implementation allows you to create a sandbox environment that is very useful for protecting your network from testing or troubleshooting on a virtual host. An internal virtual network is used to allow communication between virtual machines on the same virtualization host and between virtual machines and the host operating system. An external virtual network is used to provide virtual machines with access to a physical network, allowing them to communicate with externally located servers and clients. A bridged network is another term for an external virtual network.

You need to create a virtualization environment on your Windows 10 system using Client Hyper-V to test potentially rogue applications that end users' downloads from the internet. Because the applications may be malicious, you need to isolate the virtual machines from your production network and the host system; however, you need the virtual machines to be able to communicate with each other. Which type of virtual network should you implement?

Virtual Servers Server virtualization runs multiple instances of a server operating system on a single physical computer. With server virtualization, you can migrate servers on older hardware to newer computers, or add virtual servers to computers with extra unused hardware resources. Virtual desktops do not provide DHCP services. Virtual networks allow virtual servers and desktops to communicate with each other, and they can also allow communication (via the host operating system) to network devices out on the physical network. Network as a Service (NaaS) servers and desktops that are all virtualized and managed by a contracted third party.

You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?

Tone generator A tone generator is used to trace a UTP cable through walls and ceilings. A tone generator is attached to one end of the cable. Then the probe is used to audibly trace the wire.

You need to trace the route that a Cat 6 UTP cable takes through the ceiling and walls of your building. Which tool should you use?

Thin client PC -Intel Celeron dual-core 2.7GHz CPU -320 GB SATA HD -2 GB DDR3 RAM -Few or no applications installed Video editing workstation -Intel Core i7 six-core 3.4 GHz CPU -1 TB SSD SATA HD -16 GB DDR4 RAM -Video capture card Virtualization Workstation -AMD 12-core 4 GHZ CPU -4 TB SATA HD -32 GB DDR4 RAM -Hardware-assisted virtualization (HAV)

You own a custom PC retail store. A small business client asks you to build three workstations for her organization: Virtualization workstation Video editing workstation Thin client PC Drag and drop each PC hardware configuration on the left to the most appropriate workstation type on the right.

Establish a Remote Desktop connection and update the driver. As long as it is set up correctly, you can use Remote Desktop to connect to the user's system remotely. You can then perform tasks as if you were at the computer.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do?

Make sure the case fans are plgged in Because you have recently replaced the processor, check things related to the processor or to items you had to disconnect and reconnect when replacing the processor. In addition, periodic shutdowns are often caused by overheating. Because of the limited space in a notebook case, the processor uses a heat pipe to pull heat toward the side of the case, where a small fan can vent the heat from the case. Make sure the system case fans are plugged in and work properly.

You recently upgraded the processor in your laptop computer to a faster processor. The computer runs, but after you use it for several minutes, it shuts down unexpectedly. Which of the following steps would you MOST likely perform first to troubleshoot this issue?

Printer cartridge calibration Printer cartridge calibration is a task that needs to be done every time ink cartridges are replaced. Most inkjet printers include a calibration utility that you can use to align the new print head in the new cartridge. Skipping this task will cause print quality to degrade, with lines becoming fuzzy and the colored areas in images starting or stopping before they should.

You replaced the ink cartridges in a color inkjet printer. Users are now complaining that print quality has degraded, lines are fuzzy, and the colored areas in images are starting or stopping before they should. Which inkjet maintenance task do you need to perform?

Calibrate the printer. After replacing print cartridges, perform a calibration. The calibration uses the self-test to check the printed image and make minor adjustments automatically. Calibration helps avoid blurry text, misalignment (jagged lines), and incorrect colors. Dot matrix printers use a ribbon and should be replaced if printer images become faint. Fuser roller assemblies are found in laser printers and should be replaced or cleaned if there are lines or splotches at regular intervals on the print job.

You replaced the print cartridge on an inkjet printer. Which of the following BEST describes the next step you should perform?

Use a riser card to allow the new card to be installed parallel to the motherboard. Riser cards attach to the motherboard and have expansion cards on the side. Using these expansion slots allow you to install additional cards parallel to the motherboard. This is especially useful in low-profile computers.

You work as the IT administrator for a small corporate network. One of the company employees needs to add an additional PCI card to the motherboard. When you open the computer, you see that the card purchased will not fit due to the card's height. Which of the following is the BEST method for using the newly purchased card?

1. Processor 2. Memory 3. Video Card When a computer first boots, it checks the processor, memory, and video card. If any of these three components are faulty, the boot process will stop. Depending on the problem, you might see nothing displayed on the screen. If the hard disk is bad, the system will boot past the BIOS, but be unable to locate the operating system files. You will see a message displayed on the screen indicating this and other problems (such as a bad keyboard). The startup sequence typically does not diagnose the mouse.

You turn on your desktop computer. You can hear the fans start up, but the monitor remains blank. You wait a while, but it doesn't appear that anything else is happening. The hard drive activity light doesn't show activity, and you never hear the sound that plays when Windows loads. Which of the following are the most likely cause of the problem? (Select THREE).

No. You need more RAM if you plan to run multiple virtual machines using Client Hyper-V. If you plan to run multiple virtual machines, your Windows 10 Professional or Enterprise system needs far more than the minimum requirement of 4 GB of RAM for Hyper-V. Virtual machines use the physical RAM that is installed on the host machine. For example, if you're running four virtual machines, and if each has been assigned at least 1 GB of RAM to maintain a decent level of performance, a host machine that only has 4 GB of RAM will not have any RAM left for its own operating system. System requirements for Client Hyper-V include the following: --A 64-bit CPU --A modern Intel and AMD microprocessor that includes Second Level Address Translation (SLAT) technology --Virtualization enabled in the BIOS/UEFI configuration --At least 4 GB of RAM in the system (however, much more RAM than this will be required if you choose to run multiple virtual machines)

You use a 64-bit version of Windows 10 Professional on your desktop computer. This system has a 500 GB hard disk installed and 4 GB of system RAM. Using Hyper-V, you plan to test a network design that will have multiple virtual servers and virtual workstations. Does your system meet the requirements for the test you plan to run?

eSATAp eSATAp (also known as Power over eSATA or Power eSATA) is meant to replace eSATA. It combines the functionality of eSATA and USB ports with a source of power in a single connector. It integrates data and device power into a single cable, and the connector and port are neither L-shaped nor rectangular.

You want a storage device that has the ability to: Integrate data and device power into a single cable. Use a connector and port that is neither L-shaped nor rectangular. Which of the following SATA devices is the BEST to use?

FTP You should implement the File Transfer Protocol (FTP). It enables file transfers and supports user authentication.

You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?

Implement a virtual firewall within the hypervisor. Virtualized hosts are susceptible to the same network exploits as physical network hosts and need to be protected by a firewall. By implementing a virtual firewall within the hypervisor itself, you can monitor and filter traffic on the virtual network as it flows between virtual machines. While routing VM-to-VM traffic through a physical firewall would work, it is very inefficient. A virtual router with VRF is used to create multiple networks from a single router interface. Configuring VLAN membership would not allow you to monitor and filter traffic.

You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?

DNS You can use DNS name resolution for Linux workstations (as well as for most other operating systems).

You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this?

Choose the type of memory that is supported by your motherboard. Different memory module forms are not interchangeable. A motherboard will only accommodate one type of memory. Subsequently, the fastest memory in this case is the memory that fits in the system.

You want to upgrade all memory in your system with the fastest memory available. Which of the following should you choose?

PPTP PPTP is used with VPNs, which allow you to send data securely over a public network

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

Bluetooth Bluetooth would be the best choice because it has a high transfer rate and because it automatically detects other Bluetooth devices in the area and creates an encrypted PAN between them.

You want to use a wireless keyboard and mouse with your laptop computer. Which method should you choose?

IP The IP is the protocol of the internet. If you want to use the internet, your computer must have the IP protocol installed and configured.

You want to use your Windows workstation to browse the websites on the internet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this?

IaaS Infrastructure as a Service (IaaS) delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. The client deploys and runs software without purchasing servers, data center space, or network equipment. Software as a Service (SaaS) delivers software applications to the client either over the Internet or on a local area network. Platform as a Service (PaaS) delivers everything a developer needs to build an application onto the cloud infrastructure. The deployment comes without the cost and complexity of buying and managing the underlying hardware and software layers. Data as a Service (DaaS) stores and provides data from a centralized location without the need for local collection and storage.

You were recently hired by a small start-up company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the current size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power. Which cloud service model should you use?

Recalibrate the digitizer pad To fix this problem, you need to recalibrate the digitizer pad. Over time, digitizer pads on notebooks can develop drift. You can fix this issue by running a recalibration program, which is usually included with the pad.

You're troubleshooting a notebook system that uses a digitizer pad and stylus for user input. The user has complained that the digitizer pad registers stylus registers taps about one inch to the right of where the taps actually occur. Which of the following actions would MOST likely fix this issue?

1. The CPU is not supported by the BIOS. 2. The CPU is bad. A bad CPU or a CPU not supported by the BIOS can cause the computer to display a blank screen when trying to power on. If the processor is not supported by the BIOS, you might be able to perform a BIOS update to make it recognize the new processor. However, you would need to install a supported processor first, flash the BIOS, and then re-install the new processor.

You work at a computer repair store. You just upgraded the processor (CPU) in a customer's Windows-based computer. The customer purchased the latest AMD Phenom II processor, and you installed it in the computer. When you power the computer on, you only see a blank screen. Which of the following is MOST likely causing the computer displaying a blank screen? (Select TWO).

1. The CPU is not supported by the BIOS. 2. The CPU is bad. A bad CPU or a CPU not supported by the BIOS can cause the computer to display a blank screen when trying to power on. If the processor is not supported by the BIOS, you might be able to perform a BIOS update to make it recognize the new processor. However, you would need to install a supported processor first, flash the BIOS, and then re-install the new processor. An improperly installed fan or heat sink may cause issues shortly after power-on, but will not initially cause the computer to boot to a blank screen. Although you should always shutdown your computer using the proper steps, it is unlikely that this would cause the computer to boot to a blank screen.

You work at a computer repair store. You just upgraded the processor (CPU) in a customer's Windows-based computer. The customer purchased the latest AMD Phenom II processor, and you installed it in the computer. When you power the computer on, you only see a blank screen. Which of the following is MOST likely causing the computer displaying a blank screen? (Select TWO).

the fan has no power Today, most computers are designed to turn off automatically if inner components overheat. In this case, the power connector for the fan was not connected to the motherboard. Either this cable was intentionally unplugged while the upgrade was performed or the cable was accidently disconnected. If the CPU was bad or not supported, the computer would most likely not boot to the operating system. Although a virus could cause this symptom, the computer was not shutting down before you ever worked on it. And since you did not need to connect to the internet to upgrade the CPU, a virus is an unlikely cause.

You work at a computer repair store. You just upgraded the processor (CPU) in a customer's computer. The computer starts, but it shuts down shortly after starting Windows. Which of the following is MOST likely causing the computer to automatically shut down?

Replace the imaging drum, as it is probably at end of life. When ghost images are within 2 to 3 cm of the original image, this is an indication that the ghosting is caused by the imaging drum. When a drum unit comes to the end of its useable life cycle, it may not discharge properly, leaving behind faint traces of the previous printing job. An imaging drum can also become defective and discharge incorrectly between print runs, also causing ghosting to occur. In either case, the best solution it to replace the imaging drum. Using heavier weight paper will not fix ghosting images. If the drum is bad, the ghosting will still be present regardless of the weight of paper. Heavier weight paper can actually cause ghosting to occur if the ghosting issue is the result of a faulty fuser unit. If this printer was in a high-humidity environment, it is possible that the toner may clump together inside the cartridge. When this happens, the toner powder does not get distributed evenly when printing, which can lead to ghost images on the page. However, Arizona is a very dry environment, so this probably isn't the issue.

You work for a company based in Phoenix, Arizona, which is a very hot and dry area. Several people in the research department have reported that even though their files are printing to their laser printer correctly, a much lighter copy of the same text also prints within 2 to 3 cm of the original text. Which of the following would MOST likely fix this type of ghosting image?

Operating System The motherboard and the operating system must be able to support the processor in use. Many 64-bit CPUs can run a 32-bit version of the operating system. However, the operating system will run only in 32-bit mode and will not take full advantage of the 64-bit processor. Even if you stick with the 32-bit operating system, chances are you will need to upgrade the hardware abstraction layer (HAL) to one that is compatible with the 64-bit processor. The BIOS must support the 64-bit processor. However, when you upgrade the motherboard, you will get a new BIOS chip, so upgrading the BIOS will not be an issue.

You would like to upgrade the processor in your system to a 64-bit processor. Which of the components will you most likely need to upgrade as well to take full advantage of the new processor?

Use an anti-static vacuum You should use an anti-static vacuum to remove excess toner from the interior of a laser printer. You should avoid using removal methods that will disperse the toner into the air, such as compressed air or a broom.

You're conducting scheduled maintenance on a laser printer. You notice that there is a build-up of excess toner inside the interior of the printer. Which of the following is the BEST way to remove the excess toner?

Toner cartridges recommended by the printer manufacturer. You should order the toner cartridges recommended by the printer manufacturer. Because reliability is paramount in this scenario, you should avoid using discount or remanufactured cartridges or toner refill kits.

You're responsible for ordering consumables for your organization's printers. Users print from these printers frequently and demand the utmost in reliability. Which of the following would be the BEST option when ordering new toner for these printers?

1.The inverter in the LCD assembly has malfunctioned 2.The cold cathode fluorescent lamp has burned out and needs to be replaced. 3.It's also possible to have a power management setting that turns off the backlight to save power; however, it would only be applied if the system were running on battery. Wireless radio signals do not interfere with the workings of the backlight. Extended downloads does not demand higher DC power. There is no malware that can target backlight circuitry.

You're troubleshooting a malfunctioning notebook computer system. The user has indicated that the LCD screen suddenly became dark and difficult to read while he was downloading a large file through his wireless network card while the system was plugged in at his desk. You've checked the system and determined that the backlight has stopped working. Which of the following is the MOST likely cause?

Install a maintenance kit You should install a maintenance kit. Accordion jams are usually caused by worn rollers. Replacement rollers are included in most maintenance kits. Replacing the cartridge, drum, or fuser wires is necessary to correct print quality problems.

You're troubleshooting an older laser printer that is creating accordion jams where the paper is crumpled as it exits the printer moving into the output tray. Which of the following will MOST likely fix this problem?

53 The DNS service runs on port 53 by default.

You've just installed the DNS service on a Windows server. Which port must be opened in the server's firewall to allow clients to access the service?

1. Verify that it is working correctly by printing a test page. 2. Edit the printer properties to configure paper tray and other device-specific settings. After you install a new printer for a customer, client, or user, configure device-specific settings and then print a test page to verify that the printer is working properly.

You've just set up a color laser printer on a customer's Windows workstation. You've connected it to the workstation using a USB cable and have loaded the appropriate drivers. Which of the following are the BEST steps to take next? (Select TWO).

SMB The Server Message Block (SMB) protocol is used by Windows systems to access shared resources over the network.

You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share?

--1. Resolution 2.Refresh Rate The quality of video is determined by both the video card and the external display. When selecting a video card, the following specifications should be considered: --Resolution: the number of pixels displayed on the screen. A higher resolution means that more information can be shown on the screen (screen "real estate"). A video card is rated by its max resolution, which is the highest possible resolution it can display (e.g., 1920 x 1080 or 4096 x 2160). A video editor is going to need as much real estate as you can afford. --Refresh rate: the number of times in one second that the GPU draws a frame. Refresh rates are measured in hertz. A refresh rate of 70 Hz or lower may cause eye fatigue. An optimal refresh rate is between 75 Hz and 85 Hz. The display specifications should match the video card specifications. Memory, GPU configuration, and display connection type are all factors that will contribute to video performance or compatibility with the display. But these factors do not directly determine the display quality.

Your company has decided to hire a full-time video editor. You have been asked to find a system with the level of display quality needed by someone who will be working with video all day. Which of the following video card specifications will have the greatest impact on display quality? (Select TWO).

Laser Although laser printers may cost more to purchase, in the long run, the cost to print black-and-white text (with occasional graphics) will be less per page than an inkjet printer. Dot matrix printers are inexpensive, but they are slow, do not offer two-sided printing, and have a low quality output. Thermal printers typically cost more to purchase and require specialty materials, making them more expensive than a laser printer for the type of work this company requires.

Your company needs to print a lot of high-quality black-and-white text documents. These documents need to be printed as quickly and inexpensively as possible. The printer must also have the capacity to perform duplex printing. Which of the following printers BEST meets the printing requirements for your company?

Toggle the voltage switch on the power supply to the different voltage. Most power supplies have the capacity to receive either 115 and 230 volts of power just by toggling a switch on the power supply case. You can use this switch when using the power supply in other countries. 115 volts setting is used in the United States. 230 volts is used in Europe and the United Kingdom.

Your company relocated you from the United States to their United Kingdom office in London. You brought your personal computer with you and are in the process of setting it up. Your computer was previously configured to receive 115 VAC, but the electricity in London uses 230 VAC. Which of the following would allow your computer to run on 230 VAC?

Replace the existing processor. A multi-core system supports processors that have multiple processors on a single processor die. Multi-core systems have a single processor slot. To upgrade this system, you need to remove the existing processor and replace it with one that has four cores. Multi-processor systems have multiple processor slots on the motherboard. All processors in the system should be of the same speed. Unused slots are filled with a terminating resistor. Dual-channel memory does not affect using dual processors or dual core processors.

Your computer has one single core processor installed. The motherboard supports processors with up to four cores. You want to upgrade your computer to a quad-core system. Which of the following will be part of your configuration?

A corona wire is dirty If a corona wire is dirty, it might not create a uniform charge. As a result, the toner might not be attracted correctly to the photosensitive drum or paper. A vertical stripe is a typical symptom of this problem. Be careful when cleaning a corona wire because they are delicate.

Your laser printer prints a vertical black line on every page. You change the toner cartridge, but the problem does not go away. What is the MOST likely problem?

Upgrade to a 64-bit version of Windows In this situation you are using a 32-bit version of Windows which can only address a maximum of 4 GB of RAM. Some of the 4 GB is used by drivers, so it only reports 3.5 GB of system RAM. Upgrading to a 64-bit version of Windows should fix the problem. The BIOS should display the total amount of system memory during POST. If it does not count the proper amount of memory, verify that the memory is inserted correctly. In most cases, you do not need to change the memory timings. When you do, it is typically because the system is unstable or crashes. Testing memory helps you identify when specific memory storage locations are going bad. Device Manager does not enable memory the BIOS doesn't recognize.

Your motherboard has two memory slots and supports a maximum of 8 GB of RAM. You are using a 32-bit version of Windows. After installing two 4 GB modules and booting your system, you find that Windows only recognizes 3.5 GB of RAM. Which of the following would MOST likely fix this issue?

VPN concentrator With a remote access VPN, a server on the edge of a network (called a VPN concentrator) is configured to accept VPN connections from individual hosts. Hosts that are allowed to connect using the VPN connection are granted access to resources on the VPN server or the private network.

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be BEST to implement?

Replace the suspect CPU with a known good CPU of the same make and model. Replacing the suspect CPU with a known good CPU of the same make and model is the best way to determine if the CPU is the problem. There is only one variable in this test. If the system stops crashing after the CPU was replaced, it is safe to assume that the suspect CPU was not functioning properly. Any other course of action introduces more variables to the environment. If intermittent problems continue to occur, you are no closer to finding the cause.

Your system crashes at various times: sometimes on startup, sometimes when running a software application, sometime when a certain group of applications is running. You suspect a malfunctioning CPU, but none of the common issues seem to be present. You have not configured overclocking. There is no overheating. The CPU is seated correctly and locked into its socket. What can you do to definitively determine if the CPU is causing the system crashes?

Loopback plug Use a loopback plug to test the network card's ability to send and receive signals. Pinging the local host (ping 127.0.0.1) tests the TCP/IP protocol stack, but does not actually send signals out the network card. A cable tester tests continuity of all wires in a cable and ensures that wires are connected appropriately in the plugs. Use a multimeter and an ohmmeter to test the electrical properties of cables and signals.

Your workstation is unable to communicate with any other computer on the network. Which of the following tools should you use to test the network card's abilities to send and receive signals?

Overheated CPU An overheated CPU will cause a spontaneous reboot or intermittent system crashes. A spontaneous reboot can also be caused by a bad power supply or device driver. A clicking noise when reading or writing data from the hard disk is an early sign of a failing drive. A failed UPS (or failed battery in the UPS) would result in a complete loss of power to the computer if the outlet (or wall) power was lost. A system notification would indicate whether there is a failed drive, as it would not allow reading or writing.

Zoey has brought her computer in for servicing. When she dropped off her computer, she mentioned that her computer will sometimes spontaneously reboot and freezes occasionally. Which of the following is the MOST likely cause of this problem?

1. 64-bit processor with eight cores 2. RAM configured to run in quad-channel mode Virtual machines place a very heavy load on the host system's RAM and CPU. Therefore, the most important criteria to be included in the design for this workstation would be: --RAM configured to run in quad-channel mode --64-bit processor with 8 cores A video card with HDMI output and an HTPC form factor would be more appropriate for a home theater system. A RAID 5 disk array would be appropriate for a virtualization workstation, but is less important than the choice of processor and RAM.

ou have been tasked with designing a workstation that will run VMware Workstation virtualization software. It will be used by a software engineer to run virtual machines for application development and testing. Which criteria should be included in your design for this system? (Select TWO.)

Pointing Stick (trackpoint)

small knob or extra button on the center of the keyboard that moves the mouse cursor


Conjuntos de estudio relacionados

Module 14: A Universe of Galaxies: Fundamentals of Cosmology

View Set

Frankenstein Chapters 17, 18, And 20 For Quiz

View Set

Chapter 2 Market System and Circular Flow

View Set

TestOut PC Pro A+ 220-801 and 220-802

View Set

The Water Cycle - Virtual Academy

View Set

DIASS LESSON 2: What is Counseling

View Set

Paragraph Writing Vocabulary - 184 Unit 3/4/5/6

View Set