CompTIA Core 1 Assessment

¡Supera tus tareas y exámenes ahora con Quizwiz!

A technician looks to wire an office for a medium-sized local area network (LAN). When considering the available standards and speeds, the technician decides to implement Gigabit Ethernet. What specific standard does the technician use? 1000BASE-T 100BASE-T 10GBASE-T IEEE 802.3

1000BASE-T 1000BASE-T refers to Gigabit Ethernet over copper twisted pair cabling. Gigabit Ethernet works at 1000 Mbps (or 1 Gbps). 1000BASE-T is the mainstream choice of standard for most LANs.

A manufacturing firm uses an older Windows NT computer to operate a unique piece of machinery. To support such a legacy system on the network, what common port settings are enabled for communications? 3389 RDP 137-139 NETBIOS 161 SNMP 389 LDAP

137-139 NETBIOS Ports 137-139 (UDP/TCP) are used for NETBIOS over TCP/IP communications. NETBIOS is used on a modern network to support networking features for legacy versions of Windows.

A laptop technician in a large corporation needs to upgrade the hard drives on employee laptops. Currently, the laptops have standard 5400 rpm 500 Gb magnetic drives. The technician needs to know what physical drive size to order. What is the normal size for a laptop magnetic drive? 3.5 in. 2.5 in. 1.8 in. 80 mm

2.5 in. A 2.5-inch drive is the standard size for a laptop magnetic HDD. On laptops, it is also important to consider the depth of the drive, since those vary by manufacturer and model.

A technician builds a spare computer with an older motherboard and purchases a new modular power supply. What type of P1 motherboard connector will the power supply most likely provide? 9-pin 20-pin 8-pin 20+4-pin

20+4-pin Most modular power supply units (PSUs) have a 20+4-pin P1 adapter cable for compatibility with older motherboards with a 20-pin port.

How many binary digits are found within a media access control (MAC) address? 32 12 48 16

48 A MAC address consists of 48 binary digits, making it 6 bytes in size. MAC addresses are represented in hexadecimal and each hex digit represents half a byte.

An engineer configures 6 disks in a workstation to be part of a redundant array of independent disks (RAID) volume where one-sixth of the space on each disk will be used for parity. Which RAID type does the engineer implement? 5 0 1 10

5 RAID 5 requires a minimum of three drives but can be configured with more. When configuring RAID 5, an equal portion of each disk is used for parity.

An engineer plans a new wired infrastructure rollout that will support wireless capabilities. The requirement includes the incorporation of access points that use 48V of power and 13 watts. Which specific IEEE standard does the engineer implement? 802.3at 802.3af 802.3bt 802.3

802.3af The 802.3af standard allows powered devices to draw up to about 13 W. Power is supplied as 350mA@48V and limited to 15.4 W. Usable wattage usually falls around 13 W.

A technician needs to troubleshoot problems. When problem-solving, what are the three items that define a problem? (Select all that apply.) Cause Fault Symptom Consequence

Cause Symptom Consequence Troubleshooting is problem-solving. It is important to realize that problems have causes, symptoms, and consequences. Knowing what issue the user or system is having helps define the symptoms of the problem. Identifying the symptom(s) allows one to properly assess a problem. Once the symptoms are defined, narrow down the cause. Identifying the cause of the problem is an important problem-solving step. This could be a faulty network interface card. Often, the consequence of the problem is that affected user(s) are unable to complete their work. Understanding the consequences of problems, allows the technician to prioritize problems.

A technician troubleshoots a motherboard issue. What the tech discovers is chip creep with a serial ATA (SATA) connector. What is the cause? (Select all that apply.) Changing temperature Dust and dirt Electrostatic discharge Capacitor swelling

Changing temperature Dust and dirt Chip creep is where an adapter works loose from its socket over time. This may happen perhaps because of temperature changes causing the plastic to flex over time. Dust and dirt can cause chip creep in a SATA connector by acting as an abrasive between the connector and socket, causing wear and damage to the pins over time.

A user's computer powers on, but it does not pass the power on self-test (POST) and there is no display on the monitor. The IT specialist starts with the POST issue. Which of the following troubleshooting tests are appropriate in this situation? (Select all that apply.) Check power management with ACPI. Check for faulty devices by removing one device at a time to see if this fixes the problem. Check for faulty devices by removing all non-essential devices, then adding them back one at a time. Check for a faulty CPU.

Check for faulty devices by removing one device at a time to see if this fixes the problem. Check for faulty devices by removing all non-essential devices, then adding them back one at a time. Check for a faulty CPU. A faulty device can halt the POST process. One way to test this is by removing devices one at a time to see if it resolves the problem. If a computer cannot pass POST, a faulty device could be to blame. Removing all non-essential devices, then adding them back one at a time will identify the problem device if it exists. A faulty central processing unit (CPU) could keep POST from executing, so replacing the CPU chip with a known good one will confirm or eliminate this as a cause.

The projector in the conference room is experiencing intermittent shutdowns. The technician begins troubleshooting by checking all the connector cables. What are the next troubleshooting steps for the technician? (Select the best two choices.) Check that the vents are free from dust. Check that the bulb is not burned out. Check that the LED array is situated properly. Check that the fan is working.

Check that the vents are free from dust. Check that the fan is working. Overheating is the main cause of intermittent shutdowns for projectors. Dust in the vents of a projector is a likely cause of intermittent shutdowns because the blocked vents could lead to overheating. When a projector shuts down intermittently, the technician should check that the fan is working. A projector uses a very strong bulb that becomes very hot and a faulty fan can cause overheating, which leads to shutdowns.

A small call center office asks their IT service provider to implement a voice-over-IP (VoIP) system for them. After discussing the office's needs, the technician learns that their ability to make and receive phone calls is critical. Considering this information, which of the following should the technician recommend? Configure QoS on the router. Implement DFS. Enable UPnP. Set up port flapping.

Configure QoS on the router. The technician should suggest configuring quality of service (QoS) on the router to prioritize the port used by VoIP over any other type of protocol.

Systems administrators deploy a virtualization solution that separates host resources for each instance that is running at the operating system level. Which solution is running? Type 1 hypervisor Type 2 hypervisor Container VM

Container With a container, resource separation occurs at the OS level. The OS defines isolated containers for each user instance to run in. Each container is allocated CPU and memory resources, but the processes run through the native OS kernel.

An engineer is evaluating a new unified threat management (UTM) appliance as a potential replacement for an outdated firewall. Which feature related to website browsing is the engineer most likely to find in the UTM? Content filtering Data loss prevention Workflow automation Load balancing

Content filtering UTM appliances commonly include content filtering capabilities, allowing administrators to block or allow access to specific websites, categories, or services based on security policies. This helps in preventing users from accessing potentially malicious or inappropriate content.

An engineer troubleshooting a network connection identifies a port flapping problem. What should the engineer investigate as a possible cause? (Select all that apply.) Port Security Ethernet cable NIC port Switch port

Ethernet cable NIC port Switch port A bad Ethernet cable, such as a cable that has a pinch or a kink in it, may experience intermittent connects and disconnects. Replacing the cable is recommended. A network interface card (NIC) port may experience connection issues if the card has been physically damaged in any way. As with a NIC port, a switch port can experience a malfunction. Such a malfunction in connectivity can be caused by a power surge or other physical damage.

A technician installs memory into a computer that supports a multi-channel configuration. A 4GB module is placed in bank A1 and a 12GB module is placed in bank B1. A diagnostic tool reports that 16GB is useable, but not as multi-channel. What mode does the system use in making all of the memory available? Single-channel Flex Dual-channel ECC

Flex In flex mode, memory that is of equal value within each channel can work as dual-channel while the remainder of the memory will work in single-channel mode.

Which of the following solutions can mitigate debris reaching components and address occasional overheating in a system that's positioned safely away from other objects by facilitating airflow to cool down the internal components? (Select all that apply.) Add more RAM Check the motherboard Install a new system fan Use blanking plates

Install a new system fan Use blanking plates Installing a new system fan will help increase the system's airflow and cooling. A new fan will be free of debris and contain healthy components to run at optimal speeds. Using blanking plates is also an effective solution. Always use blanking plates to cover up holes in the back or front of the PC. Holes can disrupt the airflow and decrease the effectiveness of the cooling systems.

A printer technician works in a corporate office. Their office has multiple types of printers that require regular maintenance. Which type of printer maintenance includes replacing and properly disposing of a toner print cartridge? 3-D printer maintenance Impact printer Maintenance Inkjet printer maintenance Laser printer maintenance

Laser printer maintenance Laser printers are printers that use toner for printing documents. Toner is kept in a cartridge that may need to be replaced during normal printer maintenance.

A remote facility cannot utilize a wired internet connection for a short period. When relying on a wireless solution, the company uses a technology that must be provisioned with a motor so it can periodically realign with the array. Which internet access technology is in use? Geostationary orbital satellite internet access Wireless internet service provider Low Earth orbital satellite internet access Global System for Mobile Communication

Low Earth orbital satellite internet access Satellites positioned in low Earth orbit (LEO) have a drawback such that the satellites move relative to the surface of the Earth. Premises antennas must be provisioned with a motor so that they can periodically realign with the array.

An employee at an organization requests a laptop upgrade. The request is for a laptop that is extremely lightweight. There is also a requirement for the fastest speeds possible in order to demo the company's software to potential clients. With these requirements in mind, which drive type should the laptop have? mSATA M.2 2.5" HDD 1.8" HDD

M.2 An M.2 SSD usually interfaces with the PCI Express bus, allowing much higher bus speeds than SATA. M.2 adapters can be different lengths.

A technician plans an upgrade for several company laptops with new internal storage devices. The requirement is that the new devices interface with a PCI Express bus. What type of device does the technician use? uSATA mSATA SATA M.2

M.2 An M.2 SSD usually interfaces with the PCI Express bus, allowing much higher bus speeds than SATA. M.2 adapters can be of different lengths (42 mm, 60 mm, 80 mm, or 110 mm).

A company realizes that it needs to implement a management solution for mobile phones. Which solution is specific to the restriction of apps installed from a device's app store? MAM EMM MDM BYOD

MAM Mobile application management (MAM) is part of an enterprise mobility management (EMM) suite that sets policies for apps that can process corporate data and prevents data transfer to personal apps. This type of solution configures an enterprise-managed container or workspace.

A college campus is spread throughout an entire city. There is a plan to upgrade the connectivity to all buildings for increased speed. What type do engineers upgrade to? MAN WAN LAN PAN

MAN A metropolitan area network (MAN) refers to a specific network type covering an area equivalent to a city or other municipality. The upgraded campus network will be this type of network.

A company places restrictions on the specific components and ports of mobile devices. This includes USB ports and cameras. Which specific enterprise management solution does the company deploy for this purpose? MAM MDM EMM SYNC

MDM Mobile Device Management (MDM) systems primarily focus on managing mobile devices in enterprise settings. They allow organizations to set specific policies that control various features of the device, including restricting access to components such as USB ports and cameras.

Non-volatile storage devices hold data when the system is powered off. These devices are also referred to as mass storage devices. What are the three types of technologies that mass storage devices use? (Select all that apply.) Magnetic Optical RAM Solid-state

Magnetic Optical Solid-state Magnetic drives, commonly called hard disk drives (HDDs), store data on metal or glass platters that are coated with a magnetic substance. Optical drives, such as Compact Discs (CDs), DVDs, and Blu-Ray drives, use a laser to read data that has been encoded on the surface of the disc. A solid-state drive (SSD) uses flash memory technology to implement persistent mass storage.

An organization experiences an internet outage. As fiber is being used, an engineer checks to see if the optical signal is being properly converted to an electrical signal. The router is connected using an RJ45 copper wire patch cord. What does the engineer check? OLT PoP PON ONT

ONT The optical network terminal (ONT) installed at the customer's premises converts the optical signal to an electrical one. The ONT is connected to the customer's router using an RJ45 copper wire patch cord.

A college would like to implement a secured print solution so that print jobs do not arrive at a printer until the printer is physically interacted with. This will help prevent students from potentially picking up faculty print jobs. Which two physical security solutions does the IT department consider to accomplish this? (Select all that apply.) Driver PIN code Badging Permissions

PIN code Badging A secured print job is held on the print device until the user authenticates directly with the print device. A PIN entry requires the user to input the correct password via the device control panel. Secured print mitigates the risk of confidential information being intercepted from the output tray. Badging means the print device is fitted with a smart card reader that enables print output to be retrieved.

A large technical firm deploys a cloud service. The service offers cloud storage along with web development capabilities. What deployment model does the firm utilize when a multi-tiered subscription option is available to the general consumers? Private Public Hybrid Community

Public A public (or multitenant) model is a service offered over the internet by cloud service providers (CSPs) to cloud consumers, often referred to as tenants. With this model, a cloud service provider can offer subscriptions or pay-as-you-go.

A data scientist needs to run complex algorithms and machine learning programs that require a significant amount of computing power. The scientist tells the company's IT pro that their current computer is too slow and their data is backed up daily. What RAID configuration would be best for the data scientist where they don't need redundancy? RAID 0 RAID 1 RAID 5 RAID 10

RAID 0 Since the data scientist needs speed and computing power and is not concerned about data loss, RAID 0 is the best option. RAID 0 uses striping and spreads data across all disks in the array, sacrificing redundancy for speed.

A computer has three disk drives. Which of the following RAID configurations will most likely be used with such a setup? (Select all that apply.) RAID 0 RAID 1 RAID 5 RAID 10

RAID 0 RAID 5 RAID 0 requires two or more disk drives. It works with as many disks as the computer can accommodate. It is a striping configuration where data is spread across the disks. RAID 1 is commonly used with just two disks although additional disks are possible. It is a mirrored drive configuration where data from one disk is duplicated on the second disk.

PBQ: PCI/PCIe RJ45 NIC Card Video Card Wireless NIC Card Sound Card Select the components that are not integrated into the motherboard:

RJ45 NIC Card- PCI Video Card- PCIe x16 (v1.x) Wireless NIC Card- PCIe x1 (v1.x) Sound Card- PCI Select the components that are not integrated into the motherboard: SSD & GUI

Which cloud characteristic handles changes in demand requirements in real time? Rapid elasticity Scalability High availability Metered utilization

Rapid elasticity Rapid elasticity refers to the system's ability to handle changes to demand in real time. This type of system would not experience loss of service or performance if demand doubles.

An engineer configures a workstation for development testing by using virtualization. The engineer chooses to use a type 1 hypervisor. Which statements describe the environment? (Select all that apply.) The hypervisor is a part of a bare-metal platform. The hypervisor is installed within an OS. The hypervisor is host-based. The hypervisor is managing access to the host hardware directly.

The hypervisor is a part of a bare-metal platform. The hypervisor is managing access to the host hardware directly. A bare metal virtual platform means that a type 1 hypervisor is installed directly onto the computer and manages access to the host hardware without going through a host OS. When a hypervisor is installed directly on the hardware of a host system, it is a type 1 hypervisor. This type has direct access to hardware on the host.

A printer technician troubleshoots a laser printer and determines that the exposing stage of the print job is the issue with print jobs printing incorrectly. What does the technician suspect is happening? The imaging drum is not properly losing its charge. The OS driver is improperly encoding the page in a page description language. The imaging drum is not being conditioned by the primary charge roller. The toner is not being fed evenly onto a magnetized developer roller.

The imaging drum is not properly losing its charge. In the exposing stage, as the laser receives the image information, it fires a short pulse of light for each dot in the raster to neutralize the charge that was applied by the PCR. In this stage, the imaging drum loses its charge when functioning properly.

A user complains about the quality of the disp[lay on a laptop. The user mentions that the laptop has been in use since the company started many years ago. IT determines that the display uses a very early thin film transistor (TFT) technology and will replace the laptop. WHich TFT technology does the display use? Vertical alignment Organic LED In-plane switching Twisted nematic

Twisted nematic In an early TFT implementation, twisted nematic (TN) crystals twist or untwist in response to the voltage level. This is the earliest type of TFT technology that can be in budget displays.

An organization conducts a weekly video conference from its home office to its field locations. Recently, employees at the field locations have been complaining of poor audio and video quality. Which protocol does an engineer monitor for performance issues? UDP TCP IP MAC

UDP The User Datagram Protocol (UDP) is an unreliable, connectionless protocol. It is used in time-sensitive applications, such as audio or video. Lost data results in poor audio and video streaming.

A company plans on live streaming a company-wide meeting once a month. Engineers prepare network equipment to allow the traffic. Which protocol is normally used for such a task? TCP IP DHCP UDP

UDP The User Datagram Protocol (UDP) provides unreliable, connectionless forwarding. UDP has less transmission overhead than TCP and is the protocol used with audio and video streams.

A technician plugs a USB device into a computer and notices that the speeds are slightly less than expected. The USB port and device are USB 3.x devices, and the achieved speed is roughly 9 Gbps. What USB standard is in use? USB 3.2 Gen 2x1 USB 3.2 Gen 1 USB 3.2 Gen 2x2 USB 2.0

USB 3.2 Gen 2x1 Variations of USB 3.x introduced new connector form factors and faster transfer rates than previous versions. USB 3.2 Gen 2x1 is capable of speeds up to 10 Gbps.

Which current USB standard supports 2 x 10 Gbps speeds and uses a USB-C connector type? USB 3.2 Gen 1 USB 3.2 Gen 2 x 1 USB 3.2 Gen 2 x 2 USB 3.1

USB 3.2 Gen 2x2 The universal serial bus (USB) 3.2 specification deprecated some of the older terms used to describe the supported transfer rates. USB 3.2 Gen 2x2 SuperSpeed USB is capable of 2 x 10 Gbps.

A new computer experiences a malfunction with a touch input device. A support engineer disassembles the computer to diagnose the problem. While troubleshooting, which component would the technician find has a 9-pin header on the motherboard? Power button USB port Drive activity light PSU main motherboard power

USB port Internal USB 2 connections are made via 9-pin headers, which accept up to two 4-pin port connections while the 9th pin is to orient the cable correctly.

What is the modern Android-based smartphone and tablet connector for wired peripherals and charging? Micro-B USB Mini-B USB-C Lightning

USB-C USB-C is the modern and current type of connector for Android-based smartphones and tablets. Laptops may also use USB-C ports. These can serve as either standard USB-C ports or function as Thunderbolt ports.

A computer technician replaces the power supply in a desktop system. To do this, the technician needs to know the output of the current power supply unit (PSU). What is the PSU output capability measured as? Voltage Power Wattage rating Efficiency

Wattage rating The PSU's output capability is measured as its wattage rating. Power is measured in watts (W), calculated for electrical components as voltage multiplied by current (V*I).

PBQ: Display Troubleshooting 1. Image appears very dim. 2. Color glitches. Purple or green horizontal lines. 3. Stuck or dead pixels 4. Image burn-in creating ghosted elements. 5. Artwork color output different than display's. 6. No image is displayed. 1. To minimize cabling, audio and video can be sent over a single cable using HDMI or: 2. A flickering image could also be caused by the display's backlight or what other component starting to fail? 3. When working a projector makes a "pop" sound, this may be an indication of a:

1. Adjust brightness/contrast 2. Check or replace cabling 3. Try to reactivate via touch or software 4. Use automatic screensavers 5. Calibrate color to output device 6. Verify source in OSD menu 1. DisplayPort 2. Circuitry 3. Burned-out bulb

PBQ: Setup Account on Cell Phone & Setup Wi-Fi Hotspot

Account- Select: Google, jdoe, company123abc.com Select these options: email, prompt fingerprint, Synchronization option: calendar, contacts, drive, gmail Location Mode: High accuracy Hotspot- Select: disable USB tethering, enable mobile hotspot, enable bluetooth tethering, WPA2-PSK, T078ah#!$5d3P5LA

A user states that a smartphone does not hold a charge for as long as it did in the past and seems to charge slowly after replacing a lost adapter. The change was noticed over the last few months. What could be the cause? (Select all that apply.) Swelling Battery type Aging battery Aftermarket AC Adapter

Aging battery Aftermarket AC Adapter An aging battery would be the cause of charging issues, including the likelihood of a battery no longer holding a full charge. As batteries age, so does the charging lifetime. An aftermarket or third party mobile power supply may impact how well a battery is being charged, as it may not have the manufacturer's power specifications needed for proper charging of the device.

A company implements a new wireless Infrastructure. During the installation, an engineer adjusts the signal of all antennas for optimal performance. Which setting does the engineer use to measure dBi? Transmit power Effective isotropic radiated power Antenna gain Frequency band

Antenna gain Antenna gain is the amount that a signal is boosted by directionality. This focuses the signal in a single direction rather than spreading it over a wide area. Gain is measured in dBi (decibels isotropic).

A user complains about a faulty network connection on a laptop. A technician traces the Ethernet cable in the office to a direct connection in a 16-port smart switch. While investigating the switch's activity, it becomes apparent that port flapping is occurring. What does the tech troubleshoot as a possible cause? (Select all that apply.) Bad cabling Latency Faulty port Interference

Bad cabling Faulty port Interference Bad cabling can cause port flapping. If a cable has been pinched, twisted, or suffered any other type of physical damage, it may be faulty. A port on a network interface card or the switch itself may be faulty. This could be caused by a number of issues, including a manufacturer's defect, damage from power, or it may simply be failing. External interference is possible. While the path of the cabling is not known in the scenario, fluorescent lighting and other electronic devices might be causing interference.

A hard disk drive in a system experiences extended read and write times. What is likely the cause? (Select all that apply.) Disk thrashing Bad sectors Bad blocks Data corruption

Bad sectors Bad blocks Bad sectors may be found on a traditional hard disk. While bad sectors can be marked as unusable, having them present is usually a sign of a failing disk. Bad blocks may be found on a hard disk. A block is a grouping of sectors. A single sector or multiple sectors in a block may have gone bad.

A universal asynchronous receiver transmitter (UART) port was traditionally a physical serial port in a legacy system. In a modern mobile device, how can a UART be utilized? (Select all that apply.) Wi-Fi Bluetooth USB Ethernet

Bluetooth USB A Bluetooth wireless radio creates a short-range personal area network (PAN) to share data with a PC, connect to a printer, and even connect to automobiles. A Bluetooth connection does use a UART. A universal serial bus (USB) connection allows systems to easily use peripherals and more. A USB connection does use a UART.

What issue does the help desk technician suspect is causing a problem of a mouse cursor moving on its own? Digitizer Swelling Calibration Overheating

Calibration On a laptop, if touchpad sensitivity is too high, typing can cause vibrations that move the cursor. Examples include the pointer drifting across the screen without any input or a "ghost cursor" jumping about when typing. Calibrating the touchpad is a recommended solution.

A user's monitor displays a distortedly large image. To fix the resolution problem, the IT specialist performs which software troubleshooting steps? (Select all that apply.) Use the OSD to check configuration settings on the graphics card. Check the configuration of the video card. Update the video card driver. Check that the monitor is powered on.

Check the configuration of the video card. Update the video card driver. If the output resolution of the video card does not match the resolution of the display device's native resolution, the image on the screen may be distorted and the card needs to be configured correctly. Updating the video card driver will install the most recent version of the driver, which should fix the configuration compatibility problem.

Which type of virtualization refers to any solution designed to run on ordinary desktops or workstations? Server-side virtualization Application virtualization Container virtualization Client-side virtualization

Client-side virtualization Client-side virtualization is any solution designed to run on "ordinary" desktops or workstations. Each user will be interacting from a PC with the virtualization host directly.

What service provides on-demand resources like server instances, file storage, databases, or applications over a network? Software-defined networking (SDN) Cloud computing Local area network (LAN) Software as a service (SaaS)

Cloud computing Cloud computing is a service that provides on-demand resources such as server instances, file storage, databases, or applications over a network, typically the internet.

When upgrading the RAM on multiple standardized laptops, what is the most important factor to consider to ensure compatibility with the existing hardware? Size of pins HDD size AC adapter power rating DDR version

DDR version The DDR version of a laptop is critical in the upgrade process. For example, a laptop designed to run DDR4 cannot run DDR3 RAM.

An organization looks to harden email services. The systems administrator uses every possible option to help prevent SPAM and other anomalies. During the final stages of configuration, the systems administrator creates a policy within the Domain Name System (DNS) to handle authentication failures. Which record is being configured? MX SPF DMARC DKIM

DMARC The Domain-based Message Authentication, Reporting, and Conformance (DMARC) framework ensures that SPF and DKIM are being utilized effectively. DMARC specifies a policy mechanism for senders to specify how authentication failures should be treated.

A user tries to connect a second monitor to a computer. The computer has an available digital visual interface (DVI) connector and the monitor has a video graphics array (VGA) connector. After looking at the computer, a technician recommends a VGA to which type of cable? DVI-D DVI-A DVI-I USB-C

DVI-I DVI-I is a technology that is capable of connecting a digital source to an analog display or an analog source to a digital display. A VGA to DVI-I cable will connect your digital computer to an analog monitor.

A technician follows a best practice methodology when troubleshooting a problematic computer system. Which of the following represents a consequence of having a problematic computer when considering that problems have causes, symptoms, and consequences? The printer is not working properly. The internet connection is slow. The computer is running low on memory. Data required for a meeting is missing.

Data required for a meeting is missing. It is important to realize that problems have causes, symptoms, and consequences. A consequence is the result of the problem. Not being able to provide data is a consequence of having a problematic system.

A user traveling on business reports that a company owned device suffered damage to the screen during a trip. A technician notices cracks on the screen and determines that touch input is no longer recognized. Visual elements on the screen look fine. What components need replacing? (Select all that apply.) Digitizer Protective glass Display panel Gyroscope

Digitizer Protective glass A touch sensitive component in a mobile device is referred to as a digitizer because of the way it converts analog touch input to digital software instructions. In this case, the digitizer is damaged. The touch sensitive component itself is covered by a thin layer of scratch-resistant, shock-resistant tempered glass. In this case, the glass is cracked.

A user contacts a printer technician to report that every print job sent to a laser printer has lines of toner in the same location on every page that is printed. What does the technician suggest may need cleaning or replacing? Toner Drum Fuser Pins

Drum Marks that appear in the same place (referred to as repetitive defects) are often due to dirty feed rollers or a damaged or dirty photosensitive drum.

Several users of a shared printer complain that the printer is printing on both sides of a sheet of paper when it should only print on one side. What setting does a technician change? Orientation Badging Quality Duplex

Duplex Duplex printing refers to the capability of a printer to print on both sides of a sheet of paper. The technician would adjust this setting to single-sided printing.

A systems administrator is wanting to use a process in which the TCP/IP protocol is used to query and update an X.500 directory. What can be used to accomplish this task? POP3 IMAP LDAP SMTP

LDAP The Lightweight Directory Access Protocol (LDAP) is a TCP/IP protocol used to query and update an X.500 directory. LDAP uses TCP and UDP port 389 by default.

What is a class of management software designed to apply security policies to the use of mobile devices and apps in the enterprise? Internet Mail Access Protocol (IMAP) Enterprise Mobility Management (EMM) Two-factor authentication (2FA) Mobile device synchronization (sync)

Enterprise Mobility Management (EMM) Enterprise Mobility Management (EMM) is a class of management software designed to apply security policies to the use of mobile devices and apps in the enterprise. The two main functions of the EMM suite are Mobile Device Management (MDM) and Mobile Application Management (MAM).

After identifying the problem with a user's computer and collecting detailed information from the user about the problem, a technician believes they know the cause. However, when testing this theory, the technician discovers they were wrong and may not be capable of resolving the issue. What are some appropriate troubleshooting steps for the technician to try next? (Select all that apply.) Back up the computer. Escalate. Develop a new theory. Ask colleagues if any changes have been made to the network infrastructure.

Escalate. Develop a new theory. If the technician believes the problem is now beyond their ability to solve, they should escalate it through the proper channel. After discovering the initial probable cause theory was wrong, the technician should develop a new theory based on what is known about the problem combined with what is now known not to work. If the technician believes their initial theory was the only solution within their skill set, they should escalate the problem.

A security team at a company discovers that malware is rapidly moving from one virtual machine to another in a live environment. What security issue is occurring? Escape Extension Intrusion Sprawl

Escape Virtual machine escaping (VM escaping) refers to malware running on a guest OS jumping to another guest or to the host system itself.

A support technician helps a user identify a problem with a newly installed application. The user states the application was working the day before. What does the technician do next? Test a theory to determine a cause. Establish a plan of action. Document the findings. Establish a theory of probable cause.

Establish a theory of probable cause. Establishing a theory of probable cause can include questioning the obvious. This might include questioning if there have been any system changes since the last use. If necessary, conducting research may be required.

A technician troubleshoots wired connectivity issues with a device. What should the technician check first to resolve a no connectivity issue? Ethernet cable Network interface card (NIC) Wall port Wi-Fi adapter

Ethernet cable When troubleshooting connectivity on a wired network, the first thing the technician should check is the Ethernet cable. Ensure that the RJ45 connectors are solidly connected to the cable, there are no obvious wear bends or breaks, and that it is properly connected to the device and the wall jack.

A technician that is new to 3D printers needs to call service for a malfunctioning printer. The technician explains that the problem is with what looks to be a print-head. Which component does the tech report as a problem? Extruder Motion control Build plate Bed

Extruder An extruder on a 3D printer is the equivalent of a print head in an inkjet printer. A motor in the extruder draws filament. It is melted and squirted onto the object.

A department within an organization would like to share a specific set of files with external users from a Windows 10 system. The users will also need to save files as well. Which solution does the systems administrator configure without needing to directly require Windows permissions? SMB NETBIOS HTTP FTPS

FTPS File Transfer Protocol-Secure (FTPS) allows a client to upload and download files from a network server. An FTPS server can be easily configured without the need for local user accounts.

While troubleshooting a user's computer that has no power, the technician eliminated these possible causes: power supply, cabling, wall socket, and connection issue. Therefore, which of the following could be the problem? Faulty CPU Corrupted BIOS Faulty motherboard Corrupted boot sector

Faulty motherboard Given all of the potential causes that were discounted by the technician, a faulty motherboard is the only available option that would cause a computer to have no power.

A network administrator adds several network printers to a business network. Users can install the printers easily by browsing resources that are available for use. Which protocol enables the ability for the printer to have an automatically populated address book? NAS AAA LDAP SSO

LDAP The Lightweight Directory Access Protocol (LDAP) is a TCP/IP protocol used to query and update resources in an X.500 directory. It is widely supported in current directory products such as Windows Active Directory.

PBQ: Storage Device Least Volatile to Most Volatile Does device require external power to store data?

Least Volatile: mSATA, no 2.5" HDD, no USB stick, no Ram, yes CPU cache, yes Most Volatile: ^

A user complains that a computer is too slow when opening numerous applications. A technician suggests purchasing a new computer that features CMP capabilities to handle the user's workload. Which statement describes the technician's suggestion? A single execution unit and set of registers for processes A multi-socket motherboard for multiple CPUs Multiple processing cores combined in the same package Multiple parallel thread capability within a process

Multiple processing cores combined in the same package A multi-core central processing unit (CPU) is multiple processors combined in one. This means that there are multiple execution units and registers. This is referred to as chip level multiprocessing (CMP).

A support firm installs and configures network access control systems for organizations. This includes implementing the security mechanisms for local and remote computers to authenticate with an internal server system. A switch is put in place on the edge of the network to protect the server and protect against unauthorized traffic. What role does the switch play in the implementation? Supplicant Network Access Server AAA RADIUS

Network Access Server A network access server (NAS) or network access point (NAP) is an access appliance, such as a switch, access point, a firewall, or a VPN gateway. It is the device that a system makes a connection to in order to access a network.

A technician is managing configuration settings in Windows for a LaserJet printer from the printer's properties dialog box. Among the following options, which one is NOT commonly found in the properties dialog box? Sharing and permissions Printing to a different port Print in color or black and white Configuring different feed trays

Print in color or black and white In Windows, there are two main configuration dialogs for a local printer: printer properties and printing preferences. In contrast to the properties dialog box, the preferences dialog sets the default print job options, such as finishing options or whether to print in color or black and white.

A systems administrator looks to control HTTP requests from client computers based on the time of day. What type of service does the administrator deploy when configuring clients in a non-transparent manner? Load balancer Proxy server Unified threat management Embedded system

Proxy server A proxy can perform a security function by acting as a content filter to block access to sites deemed inappropriate. A non-transparent proxy requires client configuration for the proxy server.

A company considers moving its infrastructure to the cloud. Management emphasizes the need to handle changes in resource usage in real-time. Which feature fulfills this need? Shared resources High availability Rapid elasticity Scalability

Rapid elasticity Rapid elasticity refers to the system's ability to handle changes to demand in real-time. A system will not experience loss of service or performance if demand suddenly doubles.

The office laser printer starts printing pages that smudge easily. The IT specialist is proficient in the common printing defects of laser printers and knows what is causing the problem. What will the IT specialist do to fix the problem? Clean the blocked ink nozzle. Realign the transfer belt. Replace the fuser. Adjust the platen gap.

Replace the fuser. The IT specialist will replace the fuser because smudging print indicates that the toner is not fusing to the paper.

A technician needs to repair a laptop. Symptoms are that some keyboard characters are not typing properly and the fingerprint reader is not recognized. What type of component is the technician inspecting? SODIMM slot M.2 slot PCIe card Ribbon cables

Ribbon cables When replacing components such as a keyboard or touchpad, a connection is made to the motherboard via a data cable, typically with a flat ribbon cable type.

An engineer plans a fiber cable implementation between two campus buildings about 50 kilometers apart. Due to the distance between the locations, the engineer selects single-mode fiber. What specifications does the engineer need to consider with this decision? Large core, long distances, short wavelength Small core, long distances, long wavelength Large core, short distances, long wavelength Small core, short distances, short wavelength

Small core, long distances, long wavelength Single-mode fiber (SMF) has a small core (8-10 microns) and is designed to carry a long wavelength over long distances.

A critical system is set to use secure boot. What properties are characteristic of the secure boot process? (Select all that apply.) The firmware is configured with cryptographic keys. The operating system boot loader is digitally signed. The microprocessor is hard coded with a unique key. It can be managed through the operating system.

The firmware is configured with cryptographic keys. The operating system boot loader is digitally signed. Secure boot is a unified extensible firmware interface (UEFI) feature designed to prevent a computer from being hijacked by malware. With secure boot, the computer firmware is configured with cryptographic keys. With secure boot, the firmware can identify trusted code and ensure that the bootloader has been digitally signed by the OS vendor.

A hardware technician replaces the central processing unit (CPU) on an Advanced Micro Devices (AMD) motherboard. What must be applied when connecting the heat sink to the CPU? Thermal grease Locking lever CPU socket PIN grid array (PGA)

Thermal grease During the installation of the heat sink on top of the CPU, a small amount of thermal grease must be applied in an X-pattern to allow for heat transference to be most successful.

A printer technician receives a complaint from multiple users sharing a laser printer that the pages they are printing are faded or faint. Upon troubleshooting, the technician ruled out user and server settings. What laser printer component needs replacing to fix this error? Fuser Print head Drum Toner cartridge

Toner cartridge If user settings can be ruled out, it is common that the toner cartridge has simply run out of toner and needs to be replaced.

A shared printer handles a lot of print jobs for a medium-sized company. As of late, all users are complaining about the print jobs having a speckled output. What does a printer maintenance technician find to be the problem? The fuser needs replacing. The feed rollers are dirty. The charge roller is dirty. Toner is loose in the printer.

Toner is loose in the printer. The speckling of toner on output is likely caused by loose toner that may be getting onto the paper. Cleaning the inside of the printer using an approved toner vacuum is helpful.

When troubleshooting internet connectivity issues on a wired network, the first step is to make sure the patch cables are working and physically connected to the network ports. If that is not the problem, what is the next troubleshooting step? Update the NIC driver. Verify the Ethernet speed and duplex configuration are set to auto-negotiate. Check that Wi-Fi is turned on. Use a loopback tool to test for bad ports.

Use a loopback tool to test for bad ports. After eliminating patch cables as a probable cause, the next step in troubleshooting internet connectivity is to test for bad ports using a loopback tool. This will verify the integrity of the network interface port by checking that it can receive a signal generated by itself.

A developer asks the IT department if virtualization would be possible to test software in a sandboxed environment. The developer's workstation ruins Windows 10, the central processing unit (CPU) has virtualization technology enabled, and has plenty of resources for virtual machines. Which Type 2 hypervisor does the IT staff install? Parallels Workstation VMWare Workstation VMWare ESXi Microsoft Hyper-V

VMWare Workstation VMWare Workstation would be the best choice of the available options. VMWare workstation is a type 2 hypervisor that would easily install in the Windows 10 operating system and provide the features the developer requires.

If there is not enough system Random Access Memory (RAM), the memory space can be extended by using disk storage as a page file or swap space. What is this combination of addressable memory called? ECC RAM Virtual RAM Address space Dual-channel memory controller

Virtual RAM The total amount of addressable memory (system RAM plus swap space) is referred to as virtual memory or virtual RAM. With virtual memory, the OS assigns memory locations to processes in 4-kilobyte chunks called pages.

Engineers need to share data between the team's laptop devices that are located in the same office space. The speed needs to be at least 50 Mbps. Which technology do the engineers use? Wi-Fi Bluetooth CDMA NFC

Wi-Fi Every laptop, smartphone, and tablet supports a Wi-Fi radio. While some automobiles also offer built-in Wi-Fi, this technology is not used to pair two devices.

A PC tech plugs a x4 PCIe adapter card into a x8 socket. What speed would the card be capable of running? (Select all that apply.) x1 x4 x16 x8

x1 x4 Each PCIe adapter card supports a specific number of lanes. Ideally, the card should be plugged into a port that supports the same number. Often a card will only work at x1 if in a mismatched port. If insufficient slots are available, a card will fit in any port with an equal or greater number of lanes. The card may work at x4.


Conjuntos de estudio relacionados

Psychology Chapter 7.4, 7.5, 7.6

View Set

Chapter 14 (Nonspecific Defenses) Superset

View Set

bk 10 lesson 1 (vending machines)

View Set

ACG 2021 Paterson FSU Ch.11 Quiz

View Set

Chapter 11 -Unemployment and Efficiency Wages

View Set

3.7 Floating-point numbers (double)

View Set

Personal Finance Chapter 3 - Taxes in Your Financial Plan

View Set