Computer Hardware

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following BEST describes the theoretical capacity of a DDR4 standard system memory module? Answer 256 GB 512 GB 128 MB 512 MB

512 GB DDR4 theoretically allows DIMMs of up to 512 GB in capacity. DDR3 has a theoretical capacity of 128 GB per DIMM.

Which of the following are considered input devices? select three Scanner Microphone RAM Printer Keyboard Monitor

Microphone, Scanner, Keyboard

Match each of the motherboard components on the left with the appropriate description on the right. Each component is used once. CMOS BATTERY / INTERNAL CONNECTORS / PCI SLOTS / FLASH MEMORY / I/O CONNECTORS / CHIPSET 1 Maintains an accurate system time and date, even when the power is off. 2 Allow components such as LED lights and fans to be plugged in. 3 Often called an expansion slots, they allow you to add cards to expand computer capabilities. 4 Contains firmware that is used to configure motherboard settings and initialize devices. 5 Include components such as USB ports, audio jacks, and an ethernet port 6 Facilitates communication between the processor, memory, and peripheral devices.

1 CMOS Battery 2 Internal Connectors 3 PCI SLOTS 4 FLASH MEMORY 5 I/O Connectors 6 Chipset A typical motherboard includes the following components: PCI slots, often called an expansion slots, allow you to add cards to expand computer capabilities. CMOS battery is used to maintain an accurate time and date, even when the motherboard has no power. Older systems used the CMOS battery to power the CMOS chip, which contained custom BIOS settings. Flash memory contains firmware that is used to configure motherboard settings and initialize devices. The chipset is a group of processing chips that facilitate communication between the processor, memory, and peripheral devices. I/O connectors include components such as USB ports, audio jacks, and an ethernet port. Internal connectors allow components such as LED lights and fans to be plugged in.

Drag each internal hard drive connector type on the left to the appropriate description on the right. A common type of connector used to power internal computer components. SCSI / SAS / IDE / SATA 1 Usually found only in high-end servers, mainframe computers, and RAID storage devices. 2 Frequently used in modern computers to connect hard drives to the motherboard. 3 An older technology where the cable connects to the motherboard and two devices. 4 A point-to-point interface typically found in enterprise-level storage systems, like RAID and tape drives.

1 SCSI 2 SATA 3 IDE 4 SAS

You have an older computer that has four DDR2 memory slots. Currently, there are two 512-MB memory modules installed. You check the motherboard documentation and find that the system has a 4-GB memory limitation. You want to add more memory to this system. What is the maximum total amount of usable RAM you can have in this system by adding new memory modules (and without replacing the existing memory modules)? 3 GB 2 GB 4 GB 4.5 GB 3.5 GB 1.5 GB

3GB The two existing modules total 1 GB of RAM. You have two remaining slots with which you can add memory to the system. Because the motherboard has a 4 GB memory limit, there is also a 1 GB limit for each memory slot. So, you could add (at most) two 1-GB modules in the remaining slots, which would bring the system's total RAM to 3 GB.

Dual-channel memory systems only theoretically double memory bandwidth. What is the bandwidth increase in actual terms? 5-15% 10-25% 25-40% 35-50%

5-15% Dual-channel systems theoretically double the bandwidth. However, in practice, only a 5% to 15% increase is gained.

You want to build a new system that supports 16 GB of memory. Which of the following is the MOST important consideration when building the computer? CAS Latency 64-bit processor DDR3 memory ECC memory

64-Bit Processor To use over 4 GB of memory, you need a 64-bit processor and a 64-bit operating system. 32-bit processors support up to (or slightly below) 4 GB of memory. While 16 GB of memory will likely use DDR2, DDR3, or DDR4, this is not a requirement. ECC memory includes error correction. CAS latency (CL) is a delay between the time data is requested and the time that the data is available on a memory module's output pins. While lower latency results in faster processing, CL is not the most important consideration in this scenario.

You are installing a new SATA hard drive in your Windows workstation. Which of the following connectors should you use to connect your hard drive to the motherboard? 7-pin connector 40-pin connector 50-pin connector 80-pin connector

7-pin connector You use a 7-pin connector to connect a SATA hard drive to the motherboard. IDE hard drives use a 40-pin connector. SCSI and SPI-SCSI parallel interfaces use 50-, 68-, or 80-pin connectors.

Which of the following BEST describes a Security Policy? Answer A document that outlines how long a password should be and which characters can be used in the password. A document or collection of documents that provide information about an organization's network security. A document that outlines who has access to company resources. A document that defines how often backups should run and where they should be saved.

A document or collection of documents that provide information about an organization's network security. A Security Policy is a document or collection of documents that provide information about an organization's network security. While passwords, backups, and accessibility may be addressed in some portions of the Security Policy, the policy itself covers more than these specific topics.

A clicking noise in your computer has now evolved into a grinding noise. In addition, you are beginning to see frequent error messages while running software, and your computer occasionally freezes. What is the MOST likely cause of these issues? A failing internal fan A failing RAM card A failing hard drive A failing video card

A failing hard drive A failing hard drive can cause a clicking noise, which eventually evolves into a grinding noise. Other indicators are frequent error messages while running software and your computer freezing (locking up). While a failing fan can also cause a grinding noise, it does not start out as a clicking noise. In addition, it probably won't cause application error message. A failing video card can freeze your screen, but will not normally cause application errors or produce a grinding noise. While a failing RAM card may cause issues with applications, it will not produce any noises.

Which of the following documents might a new employee need to sign during the onboarding process? (Select two.) Answer Regulatory and Compliance Policy Backup Policy Bring Your Own Device (BYOD) Policy User Education and Awareness Policy Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Bring Your Own Device (BYOD) Policy An Acceptable Use Policy (AUP) defines an employee's rights to use company property. A Bring Your Own Device (BYOD) Policy defines which types of personal devices an employee can use for business tasks and which restrictions may apply. An employee may be asked to sign these during the onboarding process. A Regulatory and Compliance Policy demonstrates adherence to laws, regulations, guidelines, and specifications relevant to its business processes. It is not signed by an employee. A User Education and Awareness Policy may dictate some of the content included in an onboarding process, but this policy would not be a document signed by a new employee. A Backup Policy would not be part of the onboarding process, as it outlines backup procedures for company data.

Which of the following is the process of tracking and managing an organization's assets? Asset management Decommissioning Deployment Procurement

Asset management Asset management is the process of tracking and managing an organization's assets. Procurement, Deployment, Operations, and Decommissioning are all phases of the asset management life cycle.

While running a graphics editing program on your Windows workstation, a screen suddenly pops up with an error message warning. You note the error message, but the only way to continue working is to reboot your system. What is this type of error screen called? Answer HVAC BSoD POST SPoD

BSoD You are experiencing a Blue Screen of Death (BSoD). This is a proprietary crash screen officially known as a stop error or blue screen error. A BSoD happens when the Windows OS encounters a fatal system error. An SPoD (Spinning Pinwheel of Death) is the macOS equivalent of a BSoD. In this case, you are running a Windows system, so an SPoD does not apply. POST errors are encountered when booting your system (before running Windows) and do not apply in this scenario. HVAC stands for Heating, Ventilation, and Air Conditioning. This is the system that moves air between indoor and outdoor areas in a room. HVAC does not directly apply to computer systems.

Which of the following features should you look for when selecting a vacuum cleaner for your cleaning kit? (Select two.) Washable filters Blows as well as vacuums Coarse grade bag Static induction motor Non-static generation

Blows as well as vacuums Non-static generation It's important to select a vacuum cleaner for use with computer equipment that won't generate harmful static. Electrostatic discharge should always be avoided around sensitive computer components, and one that blows as well as vacuums can be important as it may be better to remove dust and other foreign matter by applying a blowing force rather than vacuuming. A static induction motor relies on static electricity, which can damage computer components. Washable filters are not necessary when looking for a vacuum for your computer cleaning kit. The bag used in your computer cleaning kit vacuum should be fine enough to collect toner particles (instead of a coarse grade bag). Otherwise, these particles may circulate within and outside the vacuum and spread toner.

You work as the IT administrator for a small corporate network. Sam, an employee in the support department, wants to run a virtual machine on his computer for troubleshooting customer issues, and he needs a very stable computer from which to work. You need to decide whether to install buffered or non-buffered RAM in his computer. Which of the following BEST describes the reason to choose buffered instead of unbuffered memory for this new computer? Buffered memory reduces the load on the memory controller, but due to the extra clock cycle, is less stable. Buffered memory reduces the load on the memory controller and allows the system to be more stable. Buffered memory is faster and less expensive. Buffered memory increases the load on the memory controller, but is faster and more stable.

Buffered memory reduces the load on the memory controller and allows the system to be more stable.

With a memory module read request, there is a delay between the time of the data request and the time the data is available for output from the memory module. What is this delay called? Frequency Capacity Clock cycle parity CAS latency

CAS latency A factor that affects the performance of memory is the latency associated with accessing data in RAM. With a memory module read request, there is a delay between the time the data is requested and the time that the data is available on the module's output pins. This delay is called the CAS latency (CL). CL is expressed in the number of clock cycles that pass between the time of the request and the moment the data is available. Given memory modules of the same type and frequency, a lower CL indicates which memory module is faster. Frequency (also referred to as speed) is a major factor in measuring how fast or slow a memory module is. Capacity (also referred to as size) indicates how much data a memory module can store. Clock cycle parity does not exist as a measurement for memory modules.

You've just installed a new USB card reader on your Windows computer. Every time you perform a certain action using the card reader, you get an error message that you've never seen before. Which of the following actions should you perform FIRST? Check the manufacturer's website for information about the error. Uninstall the device and then reinstall it. Install the device on another computer. Replace the card reader with a new device.

Check the manufacturer's website for information about the error. For information about a specific error, check the manufacturer's website. Taking any other action (such as replacing the card reader, installing the device on another computer, and reinstalling the device) might fix the problem but would most likely just waste time. In most cases, device-specific problems can be corrected with a new driver or other software update.

When booting your workstation, you hear a series of audible beeps, and the system locks up. What is the FIRST step you should take when troubleshooting this issue? Check the motherboard documentation for POST errors . Replace the motherboard battery. Disconnect non-essential peripherals and try to reboot. Check for dust buildup inside the case.

Check the motherboard documentation for POST errors Every time a workstation boots, it runs a Power-On Self Test (POST) to make sure that all of the basic hardware in the system is present and functioning correctly. If a problem is identified during POST, an error is generated, which can be a series of beeps. You need to check the motherboard documentation to interpret what the series of beeps represents. If the motherboard battery fails, the system clock can lose time, or the BIOS/UEFI settings may reset to their defaults. However, this would not cause the series of beeps you are hearing when the system boots. Dust buildup can cause overheating and other symptoms. However, this is not related to the POST error beeps you are hearing when the system boots. Disconnecting non-essential peripherals and then rebooting is a troubleshooting step for resolving a Blue Screen of Death issue and is not related to POST error beeps.

Which of the following are common tools used to physically clean the inside of a computer? (Select two.) Natural bristle brush Damp rag Correct Answer: Compressed air Wire brush Industrial degreaser

Compressed Air, and Natural Bristle Brush You can use a natural bristle brush and a can of compressed air to blow dust off of a motherboard and other circuit cards. Never use anything harsh on the inside of a computer, such as a wire brush or industrial degreasers. Rags are also discouraged because they easily snag on electrical leads and parts.

You plan on including Employee Education and Awareness Policy training for all new employees. As part of that training, which of the following should you instruct your employees NOT to do as part of company procedures? (Select three.) Connect unauthorized devices. Access restricted areas in the company building. Install software on their company laptops. Click on links in a phishing email. Respond to social engineering attacks. Become familiar with the company Security Policy. Bring your own devices to work.

Connect unauthorized devices. Click on links in a phishing email. Respond to social engineering attacks. During training for the Employee Education and Awareness Policy, employees are normally instructed NOT to: Click on links in a phishing email. Respond to social engineering attacks. Connect unauthorized devices. Most companies now have a Bring Your Own Device (BYOD) Policy that outlines rules and procedures for using your own devices (such as cell phones and tablets) in a work situation. They do not prohibit using these devices in a company work environment. Most companies verify that employees have access to a library of software that is critical to performing their job tasks. While this limits the software that can be installed on work computers, installing it generally is not completely prohibited. Accessing restricted areas is part of the Physical Security Policy and limits access to these areas by specific employees. It does not prohibit all employees from accessing these areas. All employees should become familiar with the company's Security Policy as part of their onboarding and continuing employee training.

As an IT technician for your company, you have been notified that the Windows domain does not seem to be functioning properly. Being familiar with domains, you are fairly confident you know what the issue is. But just to be safe, you take the applicable time to gather additional information and to identify what, if anything, has changed. Which of the following is the BEST next step? Identify what has changed. Implement the fix. Create a hypothesis. Determine the appropriate fix. Gather information.

Create a hypothesis. The best next step is to create a hypothesis that could potentially explain the problem. To do this, you may need to do a lot of research. You should check frequently asked questions and knowledge bases that are available on the internet. You should also consult with your peers to try to validate your hypotheses. Using this information, you can then narrow down the results to the one or two most likely causes. You've performed the first two essential steps of gathering additional information and identifying what, if anything, has changed. After you've narrowed things down to the one or two most likely causes, you can determine the appropriate fix by consulting with your peers, reviewing knowledge bases, looking at other websites, and using your own experience. Then you can implement the fix as needed.

You are the manager in charge of maintaining desktop computers. A user reports that she can't turn her computer on. After some investigation, you find that the power supply is malfunctioning. Which of the following actions should you perform next? Determine whether escalation is required. Document the problem. Create an action plan. Fix the problem.

Create an Action Plan The next action you should take is to create an action plan and account for your proposed plan's side effects. Identifying the effects ahead of time helps you put measures into place to eliminate or reduce any potential negative consequences. Escalation is not necessary because you're already in charge of managing and maintaining the desktop computers. Fix the problem only after creating the action plan and identifying possible effects. Document the problem and the solution after the problem has been fixed and the solution has been verified.

You suspect that the power supply in your desktop PC is failing. You want to use a multimeter to test the power supply. Which multimeter setting should you use? AC volts DC volts Watts Ohms

DC Volts To measure a power supply's output, use DC voltage. A power supply converts AC voltage to DC voltage and supplies the DC power to computer components. An ohm is a measure of resistance used to check the properties of a resistor. AC is the voltage input for a power supply. To measure the input, measure the power from the wall socket. Multimeters can measure amps but do not measure wat

Your motherboard has sockets for 184-pin DIMM RAM. Which type of RAM should you install? SDRAM FPM EDO DDR

DDR Double data rate synchronous dynamic RAM (DDR) has 184 pins in a dual in-line memory module (DIMM) form factor. Extended data out (EDO), fast page mode (FPM), and SDRAM are available in a 168-pin DIMM form factor and are interchangeable with each other.

Which of the following DDR memory types can be used by a triple-channel memory system? (Select two.) DDR DDR-400 DDR3 DDR2 DDR4

DDR3 DDR4 Both triple-channel and quad-channel memory systems use DDR3 and DDR4. DDR, DDR2, DDR3, and DDR4 can all work in a dual-channel memory system. DDR-400 is a bandwidth rating of DDR (which cannot be used with triple-channel memory).

What are the advantages of DDR4 over DDR3, assuming the same operating frequency? (Select two.) DDR4 includes a buffer between the data bus and the memory. DDR4 accepts sixteen consecutive 64-bit words per bus clock cycle. DDR4 doubles the data transfer rate of DDR3. DDR4 uses less power than DDR3. DDR4 accepts four consecutive 64-bit words per bus clock cycle.

DDR4 doubles the data transfer rate of DDR3. DDR4 accepts sixteen consecutive 64-bit words per bus clock cycle. DDR4 doubles the data transfer rate of DDR3 and generally requires less voltage than DDR3 memory. DDR4 accepts eight consecutive 64-bit words per bus clock cycle, the same as found in DDR3. Both DDR3 and DDR4 memory includes a buffer between the data bus and the memory.

Which of the following memory ratings identifies the fastest memory? DDR2-667 PC-2700 PC-133 PC-3200 DDR4-1600

DDR4-1600 DDR4-1600 has the fastest memory rating. It has a bus frequency of 800 MHz and bandwidth of 12800 MB/s. For DDR, DDR2, DDR3, and DDR4, the number following the DDR- designation is always twice that of the bus speed, specifying that the double data rate memory transfers double the data in a single clock cycle. This means that DDR2-667 has a bus frequency of 333 MHz. The older PC designation identified the bus frequency, so PC-133 has a frequency of 133 MHz. The newer PC- designation identifies the bandwidth, so PC-2700 has a bandwidth of 2700 MB/s. To get the frequency from the bandwidth, divide the bandwidth by 16, giving you 166 MHz for PC-2700 and 200 MHz for PC-3200.

Jason is a system administrator for a hospital. As part of his role, he helps to maintain all devices in the hospital that connect to the internet (IoT devices). Recently, the hospital has purchase some new heart-rate monitoring devices that are IoT-enabled. Jason needs to add the devices to the inventory management database. Which of the following is the asset management phase that Jason is currently involved with? Procurement Deployment Operations Priority

Deployment Deployment is the asset management phase where information about an asset is recorded in the inventory management database. Operations is the asset management phase where maintenance is performed on an asset. This phase comes after recording the asset in the database. Procurement is the asset management phase where decisions are made that impact the purchase of the asset. This phase comes before the Deployment phase. Priority is often related to ticketing systems to help determine when action should be taken on an issue. It is not an asset management phase.

Candace is a purchasing manager for a large metropolitan hospital and is responsible for making purchasing decisions for millions of dollars worth of equipment each year. The hospital board has recently decided that many of the older hospital devices need to be upgraded to IoMT (Internet of Medical Things) equipment to become more efficient and effective in their procedures. Candace has decided to start by ordering new IoMT heart-monitoring devices that track a patient's heart information remotely. She immediately talked to her equipment sales representative and ordered several new IoMT heart-monitoring devices. However, after deploying them, she finds that they do not provide all the data that nurses and doctors were expecting. Which of the following steps did Candance fail to complete during the asset management Procurement phase that led to this issue? Finalize the purchase order Determine goods and services required Obtain a list of suppliers Negotiate with the supplier

Determine goods and services required Candace immediately contacted her supplier without determining exactly which IoMT heart-monitoring services were required by the nurses and doctors, causing expectation issues once the heart monitors were deployed. Finalizing the purchase order is a valid step in Procurement phase, which Candance did complete. However, she did not determine the goods and services required by the hospital staff. Candace also failed to negotiate with the hospital equipment supplier. However, missing this step did not impact the equipment. Candace also failed to obtain a list of suppliers. However, missing this step did not impact the equipment.

You are a first-line desktop support technician. A user reports that he cannot access several network files. After some investigation, you determine that the problem is with a network server. Which of the following actions should you perform next? Determine if escalation is needed. Fix the problem. Document the problem. Create an action plan.

Determine if escalation is needed. After you identify the most probable cause, escalate the problem if it is beyond your ability to fix or your scope of management. For example, the problem might be on the network server configuration, which you are not authorized to correct. When forwarding the problem to someone else, be sure to describe the nature of the problem, the actions you've already taken, and the symptoms that lead you to believe the problem is outside of your area of responsibility. If you've decided that escalation is not necessary, create an action plan that includes the fix and identifies possible side effects of implementing it. After you've implemented the solution, verify that it works and that there were no unforeseen consequences. Finally, document the problem and the solution.

Which of the following are procedures that should be included when offboarding (ending a relationship with) an employee? (Select two.) Disable electronic access for the employee. Collect physical access items from the employee. Make sure the employee has access to the company's knowledge base. Review the Acceptable Use Policy (AUP) with the employee. Have the employee sign a Non-Disclosure Agreement.

Disable electronic access for the employee. Collect physical access items from the employee. When offboarding an employee (whether voluntarily or involuntarily), you should make sure that: You collect all physical access items, such as keys, key fobs, and smart cards. You disable all electronic access, such as closing the employee's user account and disabling access codes and passwords. Having the employee sign a Non-Disclosure Agreement, reviewing the AUP with the employee, and making sure the employee has access to the knowledge base are all part of the onboarding procedure.

A user reports that the projector in the conference room has display issues when it is connected to his laptop. After identifying the cause and completely resolving the issue, the projector displays the images perfectly both on his laptop and on the projector. Which of the following troubleshooting strategies should you perform next? Identify the problem. Establish what has changed. Test the solution. Document the solution.

Document the solution Explanation You've identified the problem, completed and tested the task, and verified full system functionality. You should now document the solution so if the same display issue returns, you or your replacement will know what to do.

When you turn on your workstation, you immediately hear a grinding noise coming from inside the computer case. Which of the following are the MOST likely causes of this noise? Dust buildup that needs to be cleaned. An uneven case surface that causes fan blade and motor noise. A connector that is not seated properly. A video card that is failing. A POST test error message.

Dust buildup that needs to be cleaned. An uneven case surface that causes fan blade and motor noise. When you hear a buzzing or grinding noise, the most likely cause is your PC's fan. There are many things that can cause your fan to make a grinding noise, including dust buildup that needs to be cleaned and an uneven case surface. A failing video card may result in a noise from the video card fan, but it will not be a grinding noise. A POST test error message can result in a series of beeps or a text message on the screen, but this error does not cause an audible grinding noise. A connector that is not seated properly can cause an electrical arch, resulting in smoke or a burning smell. However, the connector will not produce a grinding noise.

A user sends a print job to a network printer, and it prints page after page of random characters. He calls the help desk, and a technician discovers that the wrong printer driver had been loaded on the user's workstation. The technician loads the correct driver, verifies that the system works correctly, and documents the resolution. Which of the following actions should the technician perform next? Formally close the incident in any job tracking tool. Upgrade to a newer printer that uses embedded drivers. Educate the user as to how the problem was resolved and verify that they are satisfied with the results. Write an email to the user's supervisor and insist that he train his employees on how to use the network printer. Disable the network printer until users learn to use the correct drivers.

Educate the user as to how the problem was resolved and verify that they are satisfied with the results. After resolving any incident, you should spend a few minutes with the user or customer, explaining how the problem was resolved and verifying that they are satisfied with the results. You can then formally close the incident in any tracking tool. Writing an email to the user's supervisor insisting on training is not your responsibility. Disabling the network printer or upgrading to a newer printer are not actions that are part of the action plan or solution.

Aaron is a system administrator for a school district and has been assigned to maintain and decommission computer equipment throughout the district schools. He has been assigned to review all the workstations currently being used by the administrative staff at the district and school levels to determine if they need to be replaced or upgraded to meet current administrative requirements. He decides to replace the workstations with new equipment, decommission the existing computers, and sell them to the public as surplus. After selling several of the decommissioned computers, a local paper publishes an article about financial corruption in the school district with documentation to prove the accusations. Which of the following steps in the Decommissioning process did Aaron fail to do that might have BEST prevented this situation? Determine whether the workstations should have been destroyed or disposed of properly in the trash. Remove the workstations from the asset management database. Ensure that any sensitive or proprietary information was permanently removed from the workstations before selling them to the public. Remove the workstations from the production network.

Ensure that any sensitive or proprietary information was permanently removed from the workstations before selling them to the public. Before selling the workstations to the public, Aaron should have made sure that any sensitive or proprietary information was thoroughly and permanently removed from any storage devices. Although the workstations could have been destroyed or disposed of properly in the trash, disposal does not ensure that the storage devices are wiped clean before disposal, leaving them available to someone who can retrieve data from them. Removing the workstations from the production network was accomplished before selling them to the public. This does not guarantee that sensitive data cannot be retrieved from any storage devices. Removing the workstations from the asset management database is a step in the Decommissioning phase, but this has nothing to do with preventing access to sensitive information.

You are in the process of setting up an Ethernet network for a new building at your company's headquarters. You need to connect the wires from the different Ethernet office wall plates to your network rack. Which of the following components on the network rack should you use to connect the wires from the office wall plates? Ethernet switch Ethernet patch panel Ethernet router UPS

Ether Net Patch Panel An Ethernet patch panel typically terminates wires that run from different Ethernet office wall plates. Once you have terminated the wires on the patch panel, you can then use patch cables (Ethernet cables with RJ-45 connectors) to connect these ports to the Ethernet switch. An Ethernet router is a device that connects two or more network segments or subnets. It is not designed to terminate wires that run from different Ethernet office wall plates. An uninterruptible power supply (UPS) is a device that constantly provides battery power to a computer while the batteries recharge through the wall outlet. A UPS is not designed to terminate wires that run from different Ethernet office wall plates.

You are assembling components in a network rack and need a device that connects three network segments. Which of the following devices will meet your networking needs? Ethernet patch panel: Ethernet router Wireless controller Ethernet switch

Ether Net Router An Ethernet router is a device that connects two or more network segments or subnets. This would meet your networking needs. An Ethernet switch lets you connect multiple devices to the same network segment, but does not connect the network segments. A wireless controller monitors and manages wireless access points in a wireless network architecture. An Ethernet patch panel provides an easy way to connect devices and accommodate different types of cabling, such as twisted-pair and fiber optic cables.

You are removing screws within a computer, but several have fallen into places you can't reach. Which tool would help retrieve the small screws? Network tap Extension magnet Combination ratchet/screwdriver Punch down tool

Extension Magnet An extension magnet is a small magnet on a collapsible rod that's used to retrieve screws that have fallen into a computer case or other areas you cannot reach. A punch down tool is used to secure cable wiring to a punch-down block or a patch panel, not to retrieve screws that have fallen into a computer case or other areas you cannot reach. Unless the lost parts are in an easily accessible location, a combination ratchet/screwdriver would be unlikely to help you retrieve the screws. A network tap is used to collect data on traffic traveling across a network, not for retrieval of hardware parts.

You are in the process of installing a new motherboard in your workstation. You have already installed the CPU, heat sink, and memory. You have inserted the I/O shield into the case, fastened the standoffs to the case, and attached the motherboard to the standoffs. You are now ready to complete the installation. Drag each remaining step on the left to the right in the appropriate order that you need to complete them. Connect the power and accessory cables. , Connect the wires for the front/top panel ports. , Install additional devices in the expansion slots., Document the settings of the new motherboard., Connect your drives to the SATA connectors.

First Connect the power and accessory cables. Second Connect your drives to the SATA connectors. Third Install additional devices in the expansion slots. Fourth Connect the wires for the front/top panel ports. Last Document the settings of the new motherboard. You should perform the steps in the following order to complete the motherboard installation: Connect the power and accessory cables. Connect your drives to the SATA connectors. Install additional devices in the expansion slots. Conned the wires for the front/top panel ports. Document the settings for the new motherboard.

Your organization has expanded into an adjacent office. You have been tasked with laying cables to connect the new space with the existing space. Which document should you look at to ensure that there will be no interference or damage to the cables from existing infrastructure? Physical security diagram Knowledge base Floor plan Network topology diagram

Floor Plan A floor plan provides a layout of all electrical, plumbing, HVAC, and wiring components. This is a valuable reference when determining where you can safely lay cables and install devices without the risk of interference or damage from the existing infrastructure. While a network topology diagram, physical security diagram, and knowledge base can be valuable resources, they do not provide you with information about electrical, plumbing, HVAC, and other potential cable interferences.

Your server runs in quadruple-channel memory mode. How many memory controllers are being used? Four Two Eight One

Four Dual-channel systems use two memory controllers, while triple-channel systems use three memory controllers. Quadruple-channel (quad-channel) systems use four memory controllers. Each memory controller can communicate with one or more memory modules at the same time.

As an IT technician for your company, you are in the process of setting up several servers in your network. During the process, one of the servers was misconfigured and is having trouble synchronizing information with the other servers. Which of the following is the BEST next step? Gather information. Create a hypothesis. Implement the fix. Identify what has changed. Determine the appropriate fix.

Gather Information A technician's first step is to gather information. This is critical. You need to determine exactly what has happened. What were the symptoms? Were there any error messages displayed? What did those error messages say? How extensive is the problem? Is it isolated to a single system, or are many systems experiencing the same problem? By gathering additional information, you can identify what has changed, and then you can form a hypothesis. With a hypothesis in place, you can then determine the appropriate fix. Lastly, you can implement the fix and test it for favorable results.

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select two.) Answer Lower installation cost Faster installation Greater cable distances without a repeater Immunity to EMI Increased flexibility

Greater cable distances without a repeater Immunity to EMI Compared to other types of cabling, fiber optic cabling allows greater cable distances without a repeater and is immune to EMI (electromagnetic interference). On the other hand, installation costs more and takes longer. In addition, fiber optic cabling is much less flexible than other cabling.

What is a major benefit STP provides that UTP does not? Lower cost Ability to install longer cable lengths Safer for installations in overhead ceiling spaces Greater resistance to interference

Greater resistance to interference Shielded twisted pair (STP) has a grounded outer copper shield around the bundle of twisted pairs or around each pair. This provides added protection against EMI. Unshielded twisted pair (UTP) does not have a grounded outer copper shield. STP costs considerably more than UTP. Neither is safer for installations in overhead ceiling spaces unless they are made with plenum plastic shielding. STP and UTP are equally effective at transmitting a signal over the same distance.

The CEO of your small company has asked you to connect a laptop computer to the small conference room LED TV. The CEO will be showing a promotional video that demonstrates the new company strategy through images and sound. Which of the following cable types would work BEST for connecting the laptop to the display? Composite VGA HDMI DVI

HDMI HDMI is the default cable standard for newer electronic devices, such as Blu-ray players and LED TVs. HDMI can carry both digital video and audio signals. Most modern computers include an HDMI port. DVI and VGA only support video signals. Composite cables support video, but not audio.

A technician is troubleshooting a computer that doesn't start up correctly. Which of the following could the technician use to troubleshoot the computer? 3-prong parts retriever Known good spares Loopback plug Tone generator and probe

Known Good Spares Known good spares are sets of components that you know are in proper functioning order, such as a power supply or an expansion card. In this scenario, swapping the current power supply with a known good part would be a good method for troubleshooting the computer. A 3-prong parts retriever is used to grasp and retrieve small parts that have fallen into areas that are difficult to reach. A tone generator and probe are used to trace a wire from one location to another, especially through the walls of a building. A loopback plug is used to test network communications by redirecting a signal from the transmit port on a device to the receive port on the same device.

A new laptop was delivered to your home and left on the porch while you were at work. It is very cold outside, and you don't know how long it has been there. You unpack the laptop. You would like to know if it is working properly. Which of the following is the BEST action to take? Blow compressed air into the cooling ports before turning the laptop on. Visually inspect the LCD screen for cracks before turning the laptop on. Turn on the laptop and run self-diagnostic tests. Let the laptop warm up to room temperature before turning it on. Place the laptop next to a heater set to High.

Let the laptop warm up to room temperature before turning it on. If a laptop has been in a cold environment, you should let it warm up to room temperature before turning it on. Otherwise, the heat produced by the components might create water condensation. This water might then damage system components. Avoid turning on the laptop to run self-diagnostic tests before letting it warm up to room temperature. Blowing compressed air into the cooling ports will not warm up the laptop. Visually inspecting the LCD screen for cracks is an option, but you should let the laptop warm up to room temperature before doing anything. Placing the laptop next to a heater set to High would be a poor strategy for warming the system up because it could potentially melt the plastic parts within the unit.

A printer is behaving erratically; you suspect a faulty parallel port. Which tool can you use to test the parallel port? Loopback plug Ammeter Multimeter Cable tester

Loop Back Plug A loopback plug allows an output signal to be returned as input. Loopback plugs are used to test serial and parallel ports. A cable tester verifies that a network can carry a signal from one end to the other and that all wires within the connector are in their correct positions. A multimeter measures electrical properties, such as voltage, amps, and resistance. An ammeter is an instrument that measures the flow of electric current in a circuit.

Your workstation is unable to communicate with any other computer on the network. Which of the following tools should you use to test the network card's abilities to send and receive signals? Cable tester ping command Multimeter Loopback plug

Loop Back Plug Use a loopback plug to test the network card's ability to send and receive signals. A cable tester tests the continuity of all the wires in a cable and ensures that wires are connected appropriately in the plugs. Pinging the local host (ping 127.0.0.1) tests the TCP/IP protocol stack but does not actually send signals out the network card. Use a multimeter and an ohmmeter to test the electrical properties of cables and signals.

You are a system administrator for a financial institution. Most of your employees work at home and have various work environments. One of your account managers is complaining that customer data is disappearing from her account management application. She insists that she saves data regularly and has not had a problem until recently. Her workstation has both a solid-state drive (SSD) and a traditional hard drive. She runs the application from the SSD drive, but stores the customer data on the hard drive. She has recently moved her desk to a room in her house that is used for entertainment. The room has a sound system with several installed speakers for surround sound. Which of the following types of interference might be causing the issue with disappearing customer data? Electromagnetic interference (EMI): Magnetic fields Radio frequency interference (RFI) Negative pressure HVAC system

Magnetic fields Hard drives use magnetic charges to store data. While hard disks are shielded and protected from all but the strongest magnets, getting a magnet too close to these components (such as speakers) could erase data. In this case, the employee keeps her customer data on her hard drive and has moved her computer to a room full of speakers that could cause data loss. Electromagnetic interference (EMI) is interference that affects wired network signals. It does not cause data loss on a hard drive. Radio frequency interference (RFI) is interference on a radio channel used by wireless networking devices. RFI does not cause data loss on a hard drive. Negative pressure HVAC systems can cause dust accumulation in a computer, which can lead to overheating, but this is not normally associated with hard drive data loss.

A customer needs to use several applications. Currently, the computer cannot keep all the necessary applications open at the same time. Which of the following components should you consider upgrading? Hard disk drive System board CPU Memory

Memory When an application starts up, it is loaded into memory. If the computer does not have sufficient memory, the application cannot start. To remedy the problem, add more memory to your computer. You upgrade the hard disk to provide additional storage space for files. You upgrade the CPU to execute programs faster or to provide advanced processing features. You upgrade the system board to support new components, such as newer memory modules, CPUs, or bus types.

Which of the following are considered computer hardware? (Select two.) Microsoft Office Operating system Printer Drivers Motherboard

Motherboard, Printer The physical components that compose a computer system or network are computer hardware. Common hardware components include: Keyboard, mouse, monitor, and printer Connectors and cables Hard disk drives Circuit boards Software is instructions or data that are stored electronically, either on a hard drive or a special chip. Software components include: Operating systems Program applications (such as Microsoft Office) Hardware drivers (special programs that tell the operating system how to use the hardware)

Anna is an account rep for a financial firm and has submitted a ticket in the company ticketing system to resolve an issue with a high-profile customer's account. The account is frequently losing important financial transactions. She has filled out the following information on the ticket: Customer's name and contact information Relevant problem information After waiting three days, the ticket is assigned to a tier-two support operator and set to an in-progress status. In addition, the operator sends the ticket back to Anna with a request for information about her work computer. She is frustrated because a resolution to the issue is not being addressed. SOLUTION: Anna adds additional information in the ticket description about the importance of resolving the issue immediately. She also includes the make and model of her work computer and then sends the ticket back to the support operator. Does this action provide what the support operator needs to help resolve the ticketing system issue?

NO Although adding additional information about the importance of the customer and the issue can help, Anna should have set a severity level so that the issue's priority and time sensitivity is clearly stated. In addition, she should have provided detailed information about the work computer beyond the make and model (including network ID, operating system, and application) to help the support operator determine whether the problem is with the computer, network, or application.

You are an information security specialist in charge of developing and implementing security measures for your company. You are currently working with the company's IT system administrator to make sure that all policies and procedures meet city, state, and industry regulations. You have noted that employees often allow coworkers into restricted areas who may not have authorized access. In addition, employees often work from home using company laptops that are often unsecure and frequently contain sensitive company data on the local hard drive. SOLUTION: You update the Acceptable Use Policy (AUP) to clearly state that only authorized employees can access restricted areas with a proper key fob (no tailgating), along with any penalties for non-compliance. To address the laptop security issue, you work with the IT system administrator to update the network diagram and inform employees of the changes to help secure their laptops. Does this solution provide a reasonable approach for addressing the security area and work-from-home issues?

NO The Acceptable Use Policy (AUP) addresses who has access to company resources, along with restrictions on personal internet, email, and storage usage and which browsers, applications, and hardware platforms are supported. It is not designed to address security issues such as access to restricted areas. The Physical Security Policy specifically addresses access to restricted areas and how to properly access them. Updating the policy (including any consequences for non-compliance) would be a good first step to resolve the access issue, but you should also accompany this with a user education training program to help employees become aware of the policy and any associated procedures. The network diagram provides a visual representation of a network's logical and physical layout. It is not designed to directly address laptop security issues dealing with sensitive company data. The issue with laptop security can be initially resolved by working with the IT system administrator to make sure that employees are reminded (possibly through a splash screen) to lock down their laptops when leaving them in an unsecure area. If this is not effective, you may need to take other measures.

You decided to upgrade your PC with a faster processor. To do this, you ordered a new motherboard over the internet that supports the processor that you want to use. When the motherboard arrives, you discover that the motherboard uses the Micro-ATX form factor. Your current case is an ATX mid-tower with a standard ATX motherboard inside. Which steps must you take for the Micro-ATX motherboard to work in the ATX case? Drill new holes in the Micro-ATX motherboard to match the mounting hole pattern in the ATX case. Return the motherboard and replace it with an ATX form factor motherboard, as the Micro-ATX motherboard does not fit without modifying the case. Drill new holes in the ATX case to match the mounting hole pattern in the Micro-ATX motherboard. No additional steps are necessary. You can install the Micro-ATX motherboard in the ATX case.

No additional steps are necessary. You can install the Micro-ATX motherboard in the ATX case. ATX mid-tower cases support all ATX form factors, including Micro-ATX. The main difference between ATX and Micro-ATX is the number of bus and memory slots on the motherboard. You do not need to return the motherboard, and drilling holes in the motherboard or case can compromise or damage the integrity of both.

During which asset management phase would you perform maintenance tasks, such as installing updates and patches or upgrading a hard drive? Deployment Decommissioning Procurement Operations

Operations Updates, patches, and hard drive upgrades occur during the Operations phase. Procurement, Deployment, and Decommissioning involve the purchasing, implementation, and disposal of assets.

A user reports that her system is running slowly when saving files. You determine that you'll need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon. Which of the following steps have you forgotten in your troubleshooting process? Perform a backup. Verify system functionality. Implement the solution. Create an action plan.

Perform a back up plan You need to perform a backup before making changes. The backup could be used to restore current settings or data in the event of additional issues resulting from the troubleshooting process. Implementing the solution should only be done after performing the backup. Verifying and documenting the solution occurs after the problem has been resolved. You've already established a probable cause and created an action plan.

Which pin on the power supply connector connects to the power good wire on the motherboard in order to indicate an appropriate action for the motherboard if the power disappears, quickly reappears, or does not appear at all? Pin 2 Pin 5 Pin 8 Pin 6

Pin 8 Pin 8 on the power supply connector connects to the power good wire on the motherboard. If power disappears from this wire, the motherboard shuts down. If power quickly reappears on this wire, the system may attempt to come back on by itself, resulting in continual reboots. If power does not reappear on this wire, the system shuts off.

A technician is running a network above a dropped ceiling that is also used for ventilation. The cable must be twisted pair and must be capable of Gigabit Ethernet speeds. Which of the following cables should the technician use? Plenum-rated Cat 6a Riser-rated Cat 5e Plenum-rated multimode fiber Riser-rated RG-58

Plenum-rated Cat 6a Plenum-rated Cat 6a cables can transfer data at 10 Gbps and can be placed in plenum spaces used for ventilation. Riser-rated RG-58 cables are coaxial and can transfer data at 10 Mbps. Plenum-rated cables can be used in riser applications, but riser-rated cables cannot be used in plenum applications. Riser-rated Cat 5e cables can transfer data at 1 Gbps, but they cannot be used in plenum applications. Plenum-rated multimode fiber can transfer data at 10 Gbps, but it is not twisted pair.

While performing data entry on your Windows 11 laptop, your screen suddenly goes black. What can you do immediately to troubleshoot the issue without losing any data that you have entered? Press F5 four times Press the Windows key + P four times Press Ctrl + Shift + B Press Ctrl + Alt + Del

Press the Windows key + P four times If your screen suddenly goes black, try using the Windows key + P four times to switch between the four different display modes to see if the black screen disappears. Pressing Ctrl + Shift + B resets the video driver in Windows 10 and can be useful when encountering a black screen. However, this is a Windows 11 laptop. Pressing Ctrl + Alt + Del lets you terminate an application task or reboot the operating system. However, in this scenario, you probably want to check the display first before terminating applications or rebooting the system. Pressing F5 refreshes the screen, which will probably not resolve your black screen issues. In addition, pressing F5 may cause the data entry software to close, causing you to lose your data.

Which computer function takes data through a series of procedures as defined by a set of instructions? Networking Storage Output Processing

Processing Processing is data flowing through a series of procedures as defined by a set of instructions. Storage is the act of saving or maintaining data. Output is the processes of presenting, displaying, or giving data. Networking is the practice of connecting two or more computers.

During which asset management phase would you consider whether an asset would replace an existing one and whether it will have any impact on the existing network and users? Procurement Operations Decommissioning Deployment

Procurement During the Procurement phase, you want to be sure to consider whether an asset would replace an existing one or if it would be a new addition to the network. You would also determine whether adding it would have any impact (positive or negative) on the existing network and users. During the Deployment phase, the asset is added to an inventory management database. During the Operations phase, you perform periodic maintenance. Decommissioning an asset means that the asset is no longer required. You complete the Procurement phase before the Deployment, Operations, and Decommissioning phases.

Which tool would be the BEST choice for securing cable wiring to a patch panel? Combination ratchet/screwdriver Network tap Punch down tool Extension magnet

Punch Down Tool A punch down tool is used to secure cable wiring to a punch-down block or a patch panel, not to retrieve screws that have fallen into a computer case or other areas you cannot reach. An extension magnet is a small magnet on a collapsible rod that's used to retrieve screws that have fallen into a computer case or other areas you cannot reach. A combination ratchet/screwdriver is not designed to secure cable wiring to a patch panel. A network tap is used to collect data on traffic traveling across a network, not for retrieval of hardware parts.

Which of the following is true about RFI? Unshielded twisted-pair cables and fiber optic cables can protect RFI signals. RFI is caused by nearby devices, such as cordless phones or microwave ovens. RFI is caused by motors, machinery, and fluorescent lights. You can reduce RFI by using a wireless networking standard that operates in the 2.4 GHz range.

RFI is caused by nearby devices, such as cordless phones or microwave ovens. RFI (radio frequency interference) is caused by nearby wireless devices using the same channel, cordless phones, or microwave ovens. EMI (electromagnetic interference) is caused by motors, heavy machinery, and fluorescent lights. Use shielded twisted-pair cables to protect signals sent on Ethernet twisted-pair cabling. If necessary, use fiber optic cables to eliminate the effects of interference. Wireless networks that use the 2.4 GHz frequency range (801.11b and 802.11g) are susceptible to RFI.

A technician is installing a cable modem that supplies internet connectivity for a home office. Which of the following cabling types would they use to connect the cable modem to the wall outlet? Cat 5e Multi-mode fiber RG-6 Cat 6a

RG-6 Cable modems are connected to a wall outlet using coaxial cabling. RG-6 is the most common coaxial cable used for this connection. Cat 5e, Cat 6a, and multi-mode fiber cables cannot be used to connect cable modems to a wall outlet.

You need to connect the satellite television signal to your HD 4K flat screen TV using a coaxial cable. Which of the following is the BEST type of coaxial cable to use? RG-6 RG-59 F-type BNC

RG-6 RG-6 cables have much lower signal loss over long distances than RG-59, resulting in a higher quality signal. RG-6 cables are used for cable television, satellite television, and cable modems. RG-59 coaxial cables are not used much anymore because they lose signal quality over long distances. Instead, almost all industries are using RG-6. BNC and F-type are types of connectors for coaxial cabling. They are not types of coaxial cables.

An employee calls to complain that their computer is behaving erratically. Some days, it functions correctly, and other days, it crashes frequently. Sometimes, the system won't boot at all. You open the system case and notice the following: Two of the mounting screws are missing from the system hard disk drive. The system uses memory modules from several different manufacturers with mismatched capacities. Several capacitors on the motherboard are bulging and have a brown liquid oozing from them. The chassis fan on the front of the case is oriented to blow air into the system. What should you do? Replace the motherboard. Replace the leaky capacitors on the motherboard. Replace the existing memory modules with matching modules. Reorient the chassis fan to draw air out of the system case. Use additional screws to mount the hard disk drive to the system case.

Replace the motherboard. The motherboard in this scenario has distended capacitors. This is evidenced by their bulging shape and the brown fluid leaking from them. The best way to solve this issue is to replace the entire motherboard. The fan in this scenario is pushing air in the correct direction. Installing matching memory modules may improve system performance, but this will not remediate the system's instability problem. Using additional mounting screws on the hard disk drive will not improve system stability. Replacing individual leaking capacitors on the motherboard is extremely difficult and could further damage the motherboard.

When playing videos games or watching movies on your workstation, the screen sometimes freezes and displays strange colors. You suspect that your video card is causing the issues. What is the BEST solution to resolve your display issues? Answer Check the video card connectors. Replace the video card. Update the video card driver. Check the video card fan.

Replace the video card. The best remedy is to replace the video card because it will fail completely at some point. While updating the video card driver may resolve the display issues for now, it is more likely that your video card is failing. The best solution is to simply replace the video card. If the video card has been working properly until now, it is highly unlikely that you have a loose video card connector. If you are not hearing any noise from the fan while it is spinning, it is highly unlikely that the fan is the cause of the display issues.

Jason is a sales rep with a computer company that sells customized laptops to the public. He is opening a ticket to help resolve a customer issue with a malfunctioning laptop, which was purchased by an important customer who is relying on the laptop to complete a critical project. Which of the following items in the ticket can Jason use to help the support team immediately determine the time sensitivity of resolving this issue? Detailed issue description Severity level Tier assignment Department assignment

Severity Level One of the most important ticket categories is the severity level. This helps the support team determine the time sensitivity of resolving an issue. While you can also include a department assignment in the help ticket to direct it to a specialized group (such as networking or application resolution), this information does not help the support team determine time sensitivity. While it's important to provide as many details as possible to help the support team understand exactly what's going on, the severity level is the best way to help them determine the time sensitivity of resolving an issue. Although you can assign a ticket to a one-, two-, or three-tier level, this assignment does not indicate the time sensitivity of resolving the issue.

After arriving at work, you turn on your computer to begin your day. Instantly, you see smoke and smell a strange odor coming from the computer. Which of the following would be the MOST important action to take first? Open the computer case and look for dust buildup. Call the IT director. Log in and check Event Viewer. Shut off the system immediately.

Shut off the system immediately. If you see smoke or smell something burning, shut off the system immediately to prevent further damage and the chance of a fire hazard. Event Viewer shows past system events and error messages, but this function would not help in this scenario. While calling the IT director might be your next step, your first step should be to shut off the system. While inspecting your computer, you should look for dust buildup on components and clean them as necessary. However, inspecting for dust buildup is not the first step you should take in this scenario.

Which of the following statements is true regarding single- and double-sided memory? Single-sided memory uses half the number of memory modules as double- sided memory of the same capacity. Double-sided RAM always has modules on both sides of the circuit board. Double-sided RAM allows the computer to access all of the memory. Single-sided RAM can be organized into two banks.

Single-sided memory uses half the number of memory modules as double- sided memory of the same capacity. Single-sided memory uses half the number of memory modules as double-sided memory of the same capacity. Single-sided RAM has memory modules that are organized into a single logical bank; double-sided RAM has modules organized into two banks. Because the computer can only access data in one bank at a time, single-sided RAM allows access to all of the memory, while with double-sided RAM, the computer must switch between banks. Originally, double-sided RAM had modules on both sides of the circuit board, and single-sided RAM had modules on only one side. However, you can also have double-sided RAM with modules on only one side with the internal memory divided into separate banks.

You need to replace a broken monitor on a desktop system. You decide to replace it with a spare monitor that wasn't being used. Even though the monitor is made by a different manufacturer than the desktop computer, it still works with the computer. Which computer design concept makes this possible? Firmware Plug and play Standardization Componentization

Standardization Standardization allows components from different manufacturers to be interchangeable. If a component meets the specified standards, it will work in the computer, regardless of manufacturer. Componentization means that a computer is a combination of several constituent parts that can be easily replaced by a field-replaceable unit (FRU). Firmware is a special type of software that has been embedded in the memory of a hardware component. Plug and play allows devices to work with computers without the need for additional configuration on the computer.

You are in the process of installing a motherboard in a system case. Which of the following objects should you place between the motherboard and the system case? Heat spreaders Standoffs Support manual Fans Passive heat sink

Standoffs Standoffs go between the motherboard and the case. Standoffs prevent the motherboard circuits from touching the system case and grounding or shorting. Heat spreaders go on memory modules to help cool them. Fans are installed in the system case, but not between the motherboard and the case. Passive heat sinks are installed with chipsets and low-performance processors. The support manual is a booklet that contains information about the motherboard.

Susan works in the research and development department. She recently purchased a large high-speed external drive and has attached the drive to her computer using a USB cable. Her drive requires a minimum data transfer speed of 5 Gbps and needs to have access to 600 mA/15 volts of USB power to function properly. Although the correct drivers are installed, when she plugs her drive into her workstation, the drive is not working. To troubleshoot the problem, she has connected her drive to her coworker's computer, where the drive functions properly. No additional cables are required for this drive. Which of the following is the MOST likely reason that Susan's external hard drive is not working? Susan has connected her drive to a USB 2.0 port, which does not have the required data transfer speed. Susan has connected her drive to a USB 3.2 port, but the drive is only made to work with a 2.0 port. Susan has connected her drive using a Type-C cable, which does not have enough power for her drive. Susan has connected her drive to a USB 3.2 port, which does not support the minimum data transfer speed required.

Susan has connected her drive to a USB 2.0 port, which does not have the required data transfer speed. Susan has connected her drive to a USB 2.0 port on her computer, which only supports up to 480 Mbps data transfer speeds. However, her external hard drive requires a minimum of 5 Gbps, which is provided by a 3.2 USB port. Because the external hard drive requires 5 Gbps and 600 mA of USB power, the drive is most likely designed to be used with a 3.2 USB port. A USB Type-C cable provides up to 20 volts of power, which meets the external hard drive requirements.

A user reports that her monitor has stopped working. While troubleshooting the issue, you discover a bad video card in the system. You replace the card and connect the monitor cable to the card. Which of the following actions should you perform NEXT in your troubleshooting strategy? Implement preventative measures. Test the solution. Document the solution. Explain what you did to fix the problem.

Test The Solution After you implement a solution, you should always test it to verify full system functionality. Sometimes, more than one problem exists, or your solution may not have solved the problem. For example, in this case, an incorrect driver for the video card could potentially continue to cause display issues. By verifying system functionality, you can ensure the problem is completely resolved. Explaining what you did, implementing preventative measures, and documenting the solution occur after you've tested the solution to make sure the problem is completely fixed.

A user reports that he is unable to access data on an external hard drive. You investigate the problem and determine that the USB cable connection to the hard drive is damaged. You replace the cable. Which of the following actions should you take next? Test the solution. Determine if escalation is necessary. Document the problem and solution. Create an action plan

Test the solution After implementing a solution, test it to verify full system functionality and make sure that it has fully fixed the problem and hasn't caused any additional issues. You document the problem and solution after everything has been fixed and verified. You determine if escalation is needed and create an action plan before implementing the solution.

You have just finished replacing the motherboard in your friend Ethan's computer with the same type of motherboard that the computer had originally. You tested the motherboard by powering it on and by verifying that the operating system started and that the applications work. Now Ethan is complaining that his computer no longer recognizes his external hard drive, which he had connected to the previous motherboard. Which of the following is MOST likely causing the external hard drive not to function? The computer's power supply was not connected properly. The replacement motherboard does not support external hard drives. The hard drive has failed. The USB front panel connector was not properly connected.

The USB front panel connector was not properly connected. The most likely cause is that the USB cable is not connected or is not connected properly. If the motherboard is a replacement, and Ethan had the external hard drive connected previously, the new motherboard should also support the external hard drive. It is unlikely that the hard drive suddenly failed in such a short time. Since the operating system and applications are functioning properly, the power supply is functioning correctly as well.

Jared, an employee in Human Resources, left the company two months ago as part of a company downsizing initiative. A new Human Resources VP is now running the department and has re-hired Jared to work as a manager in Human Resources. As a new IT system administrator for the company, you have been assigned to re-establish all of Jared's accounts, including network accounts, email, software, and VPN access. However, you discover that no accounts exist for Jared. What should have been done during Jared's offboarding process to make sure his accounts were still available for a period of time? The accounts should have been deleted, but not removed from the trash. The account passwords should have been changed. The accounts should have been left in place for a required period of time. The accounts should have been disabled instead of deleted.

The accounts should have been disabled instead of deleted. As part of the offboarding process, you should disable a user account instead of deleting it right away. This ensures that you can back up or transfer any valuable data that the user might have saved as well as save time in re-establishing those accounts. Accounts are normally designed to either be disabled or deleted. There is no retrieving them from a trash location once they have been deleted. Leaving the accounts in place for a period of time (such as a couple of months) would have allowed Jared to continue accessing sensitive company information, which could have resulted in a security breach. While you could have changed the passwords on all the accounts, the best way would have been to disable the accounts immediately.

Which of the following BEST describes the purpose of the north bridge chipset? The chip that controls the PCI bus. The chip that controls the audio. The chip that controls all of the USB ports. The chip that controls the system BIOS.

The chip that controls the PCI bus. The north bridge is the chip that connects a CPU to memory, the PCI bus, Level 2 cache, and AGP activities. The north bridge chip sits near the CPU and communicates with the CPU through the front-side bus (FSB). The other options are functions of the south bridge chipset.

Which problem can occur if your system case fan blows in the wrong direction? The flow of air is negated and the system can overheat. Condensation can build up in the computer. Extensive dust can build up and the system can overheat. A rapid change from cold to warm can cause damage to the components.

The flow of air is negated and the system can overheat. Verify that your system's cooling fans are blowing air through the system case in the correct direction. A fan blowing in the wrong direction can negate the airflow through the case and cause the system to overheat. Although extensive dust, a rapid change from cold to warm, and condensation are valid concerns, they are not direct results of fans blowing in the wrong direction.

Which of the following are included in a network topology diagram? (Select two.) The location and IP addresses of hubs, switches, routers, and firewalls. The relationship between remote locations and the WAN links that connect them. A layout of server racks, cooling, and air circulation systems. A layout of all electrical wiring and components. A layout of all plumbing and HVAC components.

The location and IP addresses of hubs, switches, routers, and firewalls. The relationship between remote locations and the WAN links that connect them. A network diagram provides a visual representation of the logical and physical layout of your network. A single diagram or a collection of diagrams can include the location and IP addresses of hubs, switches, routers, and firewalls. It can also show the relationship between remote locations and the WAN links that connect them. A floor plan provides a layout of all electrical, plumbing, HVAC, and wiring components. For example, a server room's floor plan would include information on server racks, cooling, air circulation, and fire suppression systems.

When you try to boot your computer, it hangs after POST. When you access the UEFI setup program, you see that the date is several years behind, and the time is set to 12:01 a.m. Which of the following is the MOST likely cause of this behavior? The UEFI firmware is outdated. The motherboard battery has failed. The UEFI firmware is corrupt. A RAM module has become unseated from its socket.

The motherboard battery has failed. The system time and date are managed by the real-time clock (RTC) in the BIOS/UEFI firmware. If the motherboard battery goes dead, the RTC reverts back to a default date and time. In addition, the BIOS/UEFI may lose all of its configuration settings. While outdated IEFI firmware might cause certain issues, in this scenario, the date and time issues are most likely caused by a failed motherboard battery. RAM modules have no direct impact on UEFI settings.

What should you use to clean an inkjet printer's print heads? Anti-static vacuum Denatured alcohol The printer's cleaning function Damp cloth

The printer's cleaning function On inkjet printers, use the printer's cleaning function to clean the print heads. Do not use an anti-static vacuum, denatured alcohol, or a damp cloth to clean the print heads.

You are responsible for updating your company's onboard training for all new employees. Which of the following items are important to include in that training? (Select three.) Answer The procedure for closing user accounts The help desk's contact information The Data Backup Policy The Security Policy The User Education and Awareness Policy The process for reporting suspicious behavior The network diagram

The process for reporting suspicious behavior The Security Policy The help desk's contact information The Security Policy, the help desk's contact information, and the process for reporting suspicious behavior are all important items to include in onboard training for new employees. The procedure for closing user accounts is part of offboarding and is not performed by the employee. The network diagram provides a visual representation of a network's logical and physical layout. A review of this diagram is not part of the company-wide onboarding process or training. The Data Backup Policy is used by the IT department to outline a company's data backup procedures. This policy is not included in the training for all new employees. The User Education and Awareness Policy normally includes a list of what should be included in the onboard training for all new employees. This policy is not part of the training itself.

Which of the following situations is MOST likely to justify an investment in a Cat 6a cable instead of a Cat 6 cable? Users will be streaming a lot of video. Users will be doing a lot of high-resolution printing. The work area has a lot of electromagnetic interference (EMI). The cable needs to be run though a raised floor.

The work area has a lot of electromagnetic interference (EMI). A Cat 6a (advanced) cable is designed to be less susceptible to electromagnetic interference (EMI) than Cat 6. Network performance can be greatly diminished by higher-than-average EMI. When cabling is run under the floor, the cabling must be plenum-insulated so as to be fire resistant and non-toxic, but it does not need to be Cat 6. Streaming video or doing high-resolution printing does not justify the extra cost of a Cat 6a cable when Cat 6 can handle the same bandwidth.

Which of the following is true about negative pressure systems? They filter out airborne particles. They force air out through windows, doors, and other openings. They are more energy-effective than positive pressure systems. They can bring in airborne particles, such as dust or smoke.

They can bring in airborne particles, such as dust or smoke. Negative pressure systems draw air in, potentially bringing in airborne particles, such as dust or smoke. In areas with heavy smoke or dust, add filters to air intake systems to filter out airborne particles. Positive pressure systems are more energy-effective. Positive pressure systems protect the air quality in a facility by causing air to be forced out through doors, windows, and other openings.

Which of the following BEST describes the primary role of Tier 1 support operators? They use their specialized training and experience with the organization to help resolve an issue. They track the progress of and open and close tickets. They gather information about a problem and perform basic troubleshooting. They solve issues behind the scenes and handle the most complex situations.

They gather information about a problem and perform basic troubleshooting. Most support teams have two or three tiers. The first tier is typically a triage tier. They collect customer and problem information and perform basic troubleshooting. If they're unable to solve the issue, they escalate it to a second-tier team. This team is typically comprised of individuals with a bit more experience within the company or specialized training. If the second-tier support is unable to solve the problem or if they do not have the required permissions, they escalate it to the third tier. This tier is typically not customer facing. Instead, they solve issues behind the scenes and handle the most complex situations. Opening and closing tickets, as well as tracking progress, is not the primary responsibility of Tier 1 support operators (although they may occasionally open or close a ticket).

A maintenance worker accidently nicks a bundle of network cables routed to multiple wall jacks in a conference room. Only one of the cable's wires are severed. A technician is tasked with replacing the cable. Which of the following tools would the technician MOST likely use to identify which wall jack connects to the severed cable? Tone generator and probe Multimeter Cable stripper Loopback plug

Tone Generator and Probe A tone generator and probe can be used to identify the wall jack connected to the severed wire. The tone generator can be attached to the severed wire, and the probe will sound when it is brought close to the connected wall jack. A multimeter measures voltage, current, and resistance on a wire. A loopback plug can be plugged into a network adapter to test whether the NIC can send and receive properly. A cable stripper is used to cut away the plastic jacket or coating from a network cable.

Your local area experiences brownouts or blackouts during frequent electrical storms. Which of the following components could you add to your network rack to help protect your servers from brownouts or blackouts? Ethernet switch Patch panel Wireless controller UPS

UPS An uninterruptible power supply (UPS) is a device that constantly provides battery power to a computer while the batteries recharge through the wall outlet. A UPS typically provides several locations to plug in devices, and it can help protect your servers from brownouts or blackouts. A wireless controller monitors and manages wireless access points in a wireless network architecture. A wireless controller is not designed to provide power during a brownout or blackout. An Ethernet switch lets you connect multiple devices to the same network segment, but is not designed to provide power during a brownout or blackout. A patch panel provides an easy way to connect devices and accommodate different types of cabling, such as Ethernet twisted-pair and fiber optic cables. However, a patch panel is not designed to provide power during a brownout or blackout.

A laptop that you previously purchased was shipped with SO-DIMM memory to accommodate the laptop's form factor. You would now like to upgrade the memory. Which of the following is an upgrade to the SO-DIMM standard? SODIMM2 DDR4 UniDIMM DDR3

UniDIMM UniDIMM (Universal DIMM) is a specification for DIMMs and is designed to carry DRAM chips. UniDIMMs can be populated with either DDR3 or DDR4 chips, but do not support any additional memory control logic. Because of this, the computer's memory controller must support both DDR3 and DDR4 memory standards. In addition, UniDIMM: Is an upgrade to the current SO-DIMM standard. Allows mobile platform users to use both DDR3 and DDR4.

You work in the computer repair department of a large retail outlet. A customer comes in with a workstation that randomly shuts down. You suspect that the power supply is failing. What should you do first to troubleshoot the issue? Use a power supply tester on the power supply. Use a multimeter to test the power supply's electrical properties. Use a known good spare to swap with the existing power supply. Use a cable tester to check the power supply's connections.

Use a known good spare to swap with the existing power supply. Known good spares are sets of components that you know are in proper functioning order. If you suspect a problem with a component, first try to swap it with a known good component. If the problem is not resolved, you can then continue troubleshooting other possible issues. A power supply tester is a custom multimeter used to test output from a PC power supply. The power supply tester has multiple connectors to test the output for each connector type. However, in this case, intermittent shutdowns are a common symptom of a failing power supply. While using a multimeter can test various electrical properties of the power supply, the first step should be to simply swap the current power supply with a known good spare to verify that the existing power supply is the cause of intermittent shutdowns. A cable tester verifies that a network can carry a signal from one end to the other and that all wires within the connector are in the correct positions. This tool is not used to test power supply connections.

You are an IT technician for your company. One of the employees has a computer that continually reboots when it's powered on. He has asked you to fix it. You suspect that the power supply may be failing. Which of the following is the BEST initial step to determine whether the power supply is causing the reboots? Replace the power supply. Listen for POST code beeps to determine the error's cause. Use a multimeter to test the power supply. Verify that the fan on the power supply is spinning.

Use a multimeter to test the power supply. A failing power supply can cause the computer to continuously reboot. For example, pin 8 on the power supply connector connects to the power wire on the motherboard. If power disappears from that wire, the motherboard shuts down. If power quickly reappears on that wire, the system may attempt to come back on by itself, which causes the symptom of continual reboots. Using a multimeter allows you to verify the amount of voltage supplied by the power supply. You could replace the power supply, but it is best to test the original power supply first, as other issues may be causing the reboots. A running fan is not a good indication of a properly functioning power supply since the fan may be running, but the power supply may not be supplying the correct voltage for other components to run properly. Some BIOSs may have a POST beep code that can give you a clue about a failing power supply, but this is not a reliable method for determining that the power supply is bad and needs to be replaced, and you may not have spare power supplies on hand to use.

You work as the IT administrator for a small corporate network. One of the company employees needs to add an additional PCI card to the motherboard. When you open the computer, you see that the card that you purchased does not fit due to the card's height. Which of the following is the BEST method for using the newly purchased card? Use a FireWire card to allow the new card to be installed parallel to the motherboard. Use a riser card to allow the new card to be installed parallel to the motherboard. Use an expanded case to accommodate the height of the newly purchased card. Use a parallel card to allow the new card to be installed parallel to the motherboard.

Use a riser card to allow the new card to be installed parallel to the motherboard. Riser cards attach to the motherboard and have expansion cards on the side. Using these expansion slots allow you to install additional cards parallel to the motherboard. This is especially useful in low-profile computers. Using a different case impacts the type of motherboard form factor that you can use. Using a different case does not resolve the issue. A parallel card adds additional parallel ports (for things like printers). A FireWire card gives the computer the ability to connect to a device using FireWire.

Which document outlines how to communicate standards, procedures, and baselines that help an employee perform their job safely and effectively? User Education and Awareness Policy Security Policy Bring Your Own Device (BYOD) Policy Acceptable Use Policy (AUP)

User Education and Awareness Policy A User Education and Awareness Policy establishes content for mandatory end user training. The policy outlines how to communicate standards, procedures, and baselines that will help an employee to do their job safely and effectively. A BYOD, AUP, and User Education and Awareness Policy are often included in an organization's Security Policy.

Which of the following are most helpful in keeping a computer cool? (Select two.) Vacuum dust from the system regularly. Remove the slot cover from the back of the computer. Verify that cooling fans are not circulating air in the wrong direction. Use a high-wattage power supply. Install a thermostat in the fan circuit.

Verify that cooling fans are not circulating air in the wrong direction. Vacuum dust from the system regularly. Vacuuming dust from the system is critical to keeping the computer cool. In addition, verify that your cooling fans are blowing air in the right direction and are not working against each other. Do not remove any slot covers in an attempt to cool the computer. Lacking slot covers decreases the fan's ability to remove hot air from inside the computer. Installing a thermostat in the fan circuit is not necessary.

The router below provides several ports for connecting two or more network segments or subnets. The port circled in red is a small form-factor pluggable (SFP) connector. Which type of network can connect to this port? DHCP LAN Wireless network WAN

WAN A wide area network (WAN) is connected to the router using a small form-factor pluggable (SFP) connector. A local area network (LAN) is connected to the router using an RJ45 cable. A wireless network uses a wireless controller on the network rack to monitor and manages wireless access points. DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to automate the process of configuring devices on IP networks. It is not a type of network.

When do you need to upgrade the system BIOS? Whenever the BIOS settings need to be modified. Whenever you add a new peripheral device, such as a keyboard, mouse, or printer. Whenever you install a new hard disk drive. Whenever a BIOS update provides functionality that is not currently supported, but is required by the operating system or hardware.

Whenever a BIOS update provides functionality that is not currently supported, but is required by the operating system or hardware. In general, you need to upgrade the system BIOS whenever the current BIOS does not support a function required by the operating system or by the hardware. Use the CMOS program to change system configuration settings used by the BIOS. Installing a new hard drive, modifying the BIOS settings, or adding a new peripheral device do not normally require a BIOS update.

You have just upgraded the memory in one of your network servers by adding two 4-GB ECC memory cards. Before purchasing the new memory, you made sure that the modules fit in the memory slots (packaging) and the speed (memory frequency) was supported by the memory controller. What did you forget to check that would significantly impact the memory checking of your new ECC memory cards? Whether or not the new memory modules are buffered. Whether or not the new memory modules are single- or double-sided. Whether or not the existing memory modules support parity RAM. Whether or not the existing memory modules support ECC.

Whether or not the existing memory modules support ECC. You forgot to check whether or not the existing memory cards support ECC. Mixing ECC and non-ECC memory would disable the error correction function on the new memory cards. Parity RAM is an earlier version of error-checking memory that has been replaced by ECC. Single- or double-sided RAM is simply the way the memory modules on the memory card are organized and accessed. This would not impact your new ECC memory cards' memory checking capability. Buffered memory holds memory addresses or data in a buffer before being transferred to the memory controller. Buffered memory would not impact your new ECC memory cards' memory checking capability.

Anna is an account rep for a financial firm and has submitted a ticket in the company ticketing system to resolve an issue with a high-profile customer's account. The account is frequently losing important financial transactions. She has filled out the following information on the ticket: Customer's name and contact information Relevant problem information After waiting three days, the ticket is assigned to a tier-two support operator and set to an in-progress status. In addition, the operator sends the ticket back to Anna with a request for information about her work computer. She is frustrated because a resolution to the issue is not being addressed. SOLUTION: Anna decides to set a severity level to indicate the high priority of the issue and then sends information back to the operator about her computer, which includes the application experiencing the problem, the device's network ID, and the operating system. Does this action help resolve the ticketing system issue?

YES By setting a severity level, the support operator can quickly determine the time sensitivity of the issue and make priority adjustments. In addition, providing the correct detailed information about the work computer (including network ID, operating system, and application) is important for the operator to determine whether the problem is with the computer, network, or application.

Which of the following statements about cleaning LCD monitors and display devices is true? Monitors are best cleaned while powered on in order to observe the effectiveness of your cleaning. Most new monitors are self-cleaning and should not be cleaned using external methods. An LCD monitor is best cleaned using a lint rag and glass cleaner. You should power off your monitor and clean it with a lint-free dry cloth.

You should power off your monitor and clean it with a lint-free dry cloth. In general, an LCD monitor is best cleaned using a dry cloth with the monitor turned off. Cleaning cloths should always be lint-free. Cleaning a monitor or display device with the unit powered on often hides places on the screen that need cleaning (such as spots or smears). Always avoid using cloths with lint and glass cleaner. The glass cleaner can cause damage to the monitor's surface. While many newer monitors do have certain automatic calibration features, self-cleaning is not one of them.


Conjuntos de estudio relacionados

EDE 3223: Test 1: Middle School Development & Diversity

View Set

Research: Demographic basics and generational cohorts

View Set

study review ela text structures

View Set

Chapter 49 PrepU: Hepatic Disorders

View Set