Biggest Set

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What type of interface is typically used for internal wireless networking cards in laptops?

Mini-PCI

Which type of interface is typically used for internal wireless networking cards in laptops?

Mini-PCI

What protocol does an email client use to download messages from a remote mail server?

POP3

Which of the following protocols do e-mail clients use to download messages from a remote mail server?

POP3

What does an ISP do?

Provides IP addresses to computers and organizations connected to the internet.

Windows Explorer

Provides a graphical user interface for viewing and managing the file system.

What is a DNS CNAME record?

Provides aliases to hosts that already have a host record.

What does nbstat -c do?

Shows the IP address to NetBIOS name mapping table (name cache).

What does netstat -r do?

Shows the routing table of the localhost.

What is a characteristic of extended partitions?

They are subdivided into logical drives

Which of the following utilities checks the disk for bad clusters? a. fdisk b. format c. chkdsk d. defrag

chkdsk

Memory Slot

Area on motherboard used to install RAM

What is the maximum data transfer rate of an IEEE 1394a device?

400 mbps

Service Location Protocol (SLP)

427

HTTP over SSL (HTTPS)

443

Server Message Block (SMB/CIFS) directly over TCP

445

Which memory rating identifies the fastest memory?

DDR3-2000

RFI

Interference on radio channels used by wireless networking devices

EMI

Interference that affects wired networking signals

Which motherboard form factor allows for low-consumption power supplies?

Mini-ITX

Which expansion slot is best for high-end dedicated video cards?

PCIe x16

What does netstat -a do?

Shows detailed information for active connections.

What does arp -a do?

Shows the IP address to MAC address mapping table (address cache).

What are looback plugs used for?

Testing ports by returning output signals as input.

You have a CD-RW drive that advertises speeds of 32x/12x/48x. What is the read speed of the drive?

48x

Expansion Slot

Area on motherboard used to install video cards, network cards, and sound cards

What should you do (if possible) before updating the UEFI firmware?

-Connect the computer to a UPS -Backup existing UEFI settings.

Which of the following functions does an ATX power supply perform?

-Converts AC to DC -Aids in Thermal Management

You need to install a 32-bit application on a 64-bit version of Windows. Where is the default directory where the application will be installed?

%systemdrive%/Progra, Files (x86)

You need to install a 32-bit application on a 32-bit version of Windows. Where is the default directory where the application will be installed?

%systemdrive%/Program Files.

You need to install a 32-bit application on a 64-bit version of Windows 7. Where is the default directory where the application will be installed?

%systemdrive%\Program Files (x86)

Which of the following accurately describes case fans?

-Create a pressurized system inside the case. -Pull cool air from the front and blow hot air out the back.

Assuming the same operating frequency, what are the advantages of DDR3 over DDR2?

-DDR3 doubles the data transfer rate of DDR2 -DDR3 uses less power than DDR2

Assuming the same operating frequency, what are the advantages of DDR4 over DDR3?

-DDR4 doubles the data transfer rate of DDR3. -DDR4 uses less power than DDR3.

Which of the following devices typically use a microUSB connector?

-Digital cameras -Smartphones

Which of the following IP address ranges is reserved for Automatic Private IP Addressing?

169.254.0.2 - 169.254.255.254

What IPs make up the APIPA address range?

169.254.x.x

You need to install a 32-bit application on a 32-bit application on a 32-bit version of Windows 10. In which default directory will the application be installed?

%systemdrive%\Program files

Where are fonts stored on a Windows 7 system?

%systemroot%\Fonts\

Which aspect ratio applies to displays with resolutions of 1680 x 1050 and 1920 x 1200?

16:10

You have responded to a call from a customer who is having problems with his computer. After troubleshooting the problem , you discover the switch on the power strip was off. After switching it on, all of the components and their functionality return to normal. Which of the following is the best way to explain what the problem was to the customer?

"I found this power strip in the off position. Now that it's on, it looks like everything is working. It appears as though that was the problem. Can you confirm that the problem has been resolved?"

You need to see the temporary files on a machine running Windows 7. Which directory holds the user temporary files, and which environment variable stores the temporary directory path?

%tmp% C:\Users\username\AppData\Local\Temp

How many volts should the red wire on a Molex connector provide?

+5 volts

What is the number structure of an IPv6 address?

- 32 hexadecimal numbers - 8 quartets

Which of the following is true of online software activation?

- Before running a newly installed application, the user must activate their license online on the software vendor's website. - With personal software licenses, the limit is usually 1-3 online activation. - Persistent activation may require the license to be continuously re-activated online at a preconfigured interval

Which if the following are true for the IS-IS routing protocol?

- Divides large networks into areas - Supports IPv6 routing

Which of the following routing protocols are classified as a link state routing protocols?

- IS-IS - OSPF

Which two of the following tasks do routers perform?

- Maintain information about paths through an internetwork. - Route data based on logical network addresses

Which of the following protocols provide gateway redundancy?

- VRRP - HSRP - GLBP

Which of the following motherboard connectors typically connect directly to the motherboard?

-24-pin motherboard power -4-pin CPU power

Which of the following voltages are provided by an ATX power supply

-3.3 -12 -5

Which of the following statements are true?

-32-bit processors use only IA-32 instruction set (also reffered to as x86) -64-bit processors use the x86-64 instruction set (also reffered to as x64)

You have a motherboard that uses a 24-pin ATX connector. Which types of power supply could you use with this motherboard?

-A power supply with a 20-pin ATX and a +4 pin connector -A power supply with a 24-pin ATX connector only.

Which of the following features should you look for when selecting a vacuum cleaner for your cleaning kit?

-A vaccum cleaner that blows as well as vacuums -Non-static generating

To prevent ESD when replacing internal computer components, you attach an anti-static wrist strap you your wrist. Where should the other end be fastened?

-Anti-Static mat -Metal area on the computer case

You have just finished upgrading the CPU in your desktop system. After running the system for about 10 minutes, the system locks up and automatically restarts. Which should you do first to troubleshoot the problem?

-Check the CPU fan power -Make sure the heat sink is properly mounted has thermal.

You have just finished upgrading the CPU in your desktop system. After running the system for about 15 minutes, the system spontaneously shuts down. What should you do first to troubleshoot the problem?

-Check the CPU fan power. -Check the thermal shutdown threshold in the BIOS.

You have purchased a new plug-and-play sound card that uses a PCI slot. What should you do before installing the device in your windows system?

-Check the HCL to make sure the device is compatible with the version of windows running on your system. -Download the latest driver from the manufacturer's Web site.

You have an existing system that has a single DDR3 memory module installed. You would like to add more memory to three remaining empty memory slots. What should you do to make sure you get the right memory for the system?

-Check the motherboard documentation to find which modules are supported. -Purchase additional modules that are the same as what is currently installed.

Besides protecting a computer from under-voltages, a typical UPS also performs which other actions?

-Conditions the power signal -Protects from over-voltages

You want to be able to watch and record live TV on your computer. Your computer already has a video card, so you want to purchase an additional card that provides TV tuner input capabilities. Which of the following should be part of the configuration process?

-Connect the TV input to the tuner card using coaxial cable and F-type connectors. -Purchase a card that supports ATSC.

A customer wants to add an additional video card to her computer so she can play the latest computer games. Which of the following statements are true of a multi-GPU configuration?

-For the best performance, both video cards should be identical. -The motherboard should support either SLI or crossfire.

You need to replace the power supply in your home desktop computer. As you choose the replacement power supply, which of the following specifications are the most likely to affect your choices?

-Form Factor -Output Wattage -Processor Connector

As a PC technician, what are the best actions to take if you are late to an appointment?

-Give a realistic time frame for your arrival -Contact the customer and apologize

Which of the following connectors are part of the system case and connect to header pins on the motherboard?

-HDD LED activity -Power switch

Which of the following terms describe a PC card that you can insert and remove without rebooting the computer?

-Hot-Swappable

Match the video card types on the left with the appropriate characteristics on the right. Each video card type is used more than once.

-Installed in an expansion slot on the motherboard: Dedicated video cards -Have a GPU and a dedicated high-speed video memory bank: Dedicated video cards -Are more powerful and more expensive: Dedicated video cards -GPU is integrated with another hardware component such as a motherboard or CPU: Integrated video cards -Shares system memory for graphic processing: Integrated video cards: Integrated Video cards -Are much cheaper and less powerful: Integrated video cards

Which of the following will ensure optimal system cooling?

-Keep the ambient temperature below 80F -Bundle cables together and secure unused cables to the case. -Leave space between the case and any walls or obstructions.

What is a DB-15 connector on a sound card typically used for?

-MIDI port -Joystick

You have just upgraded the CPU on your computer. You consulted the motherboard documentation to make sure the CPU is compatible with the motherboard. You turned the system on and it locks up shortly after startup. Which steps should you take first?

-Make sure the CPU is seated and oriented properly, and locked into the socket. -Look for something that could be causing the new CPU to overheat.

An employee submitted a support ticket stating that her computer will not turn on. Which of the following troubleshooting steps should take first?

-Make sure the surge protector is turned on. -Make sure the power cord is plugged into the wall.

which of the the following features are typically available through TRS ports on a sound card?

-Microphone in -Speaker out

You are in the process of configuring a new computer. The motherboard has six memory slots and supports triple-channel memory. You install two memory modules. when you boot the computer, the BIOS recognizes both modules, but the memory only runs in dual-channel mode. What should you do?

-Move the modules to the correct motherboard slots. -Install a third, identical memory module.

Which of the following form factors does not have expansion slots on the motherboard, but instead uses a riser card for expansion cards?

-NLX

You need to replace the power supply in your home desktop computer. Which of the following specifications are the most likely to affect your power supply choice?

-Output Wattage -Type and number of connectors -Form Factor

Lately your computer is spontaneously shutting down after only a few minutes of use. What is most likely cause?

-Overheated CPU. -Cooling fans clogged with dust.

What components use the 4-pin peripheral power connector?

-PATA CD-ROM -IDE hard drives -Case fans

What type of software-generated problems can indicate that a software bug is causing a memory error?

-Page fault -General-protection fault -Exception error

Which of the following devices use the 4-pin peripheral (Molex) connector?

-Pata CD-ROM -Case fan

Which of the following should be handled with caution due to high operating temperatures?

-Printing head in a dot matrix printer -components within a laser printer

Which of the following devices are most susceptible to problems associated with ESD?

-Processor -Memory

You are in the process of building a new computer. You would like to configure your computer to use SLI to improve performance when playing your favorite game. Which of the following will be part of the configuration process?

-Purchase a motherboard with two (or more) PCIe x16 slots. -Connect at least one monitor to the graphics card. -Purchase two graphics cards with SLI and similar specifications.

Your company has decided to hire a full-time video editor. You have been asked to find a system with the level of display quality needed by someone who will be working with video all day. Which of the following video card specifications will have the greatest impact on display quality?

-Refresh rate -Resolution

You are building one of your customers a home theater PC (HTPC) to connect to an HDTV and high-definition audio system. The customer is going to be playing mostly Blu-ray movies on the system. Which of the following features should the sound card include?

-S/PDIF -Dolby Digital, DTS support, or SDDS supprt

Which of the following are improvements over BIOS that are provided by the UEFI?

-Supports 64-bit firmware device drivers -Supports drives larger that 2.2 TB -Faster startup times

You are installing an updated driver for a hardware device on your system. A dialog box displays indicating that Microsoft has digitally signed the driver you are installing. What benefits does driver signing provide? (Select two.)

-The driver file has not been altered -The driver has been tested by Microsoft

Which of the following are true regarding a dual-channel memory bandwidth configuration?

-The memory controller must support dual-channels. -Bandwidth is increased by 5-15%.

There are critical times when memory problems often manifest themselves. Match the critical times on the left with the corresponding descriptions on the right of the causes of the memory problems.

-This can require more money and can cause problems if there is not enough memory at this time: Software installation -Memory is not properly seated, missing, or the motherboard is defective: First boot of a new computer. -Incompletely or improperly doing this can cause errors that appear to be memory related: Hardware installation or removal. -the memory is not compatible and was not installed and configured properly: Memory upgrade.

You need to connect a monitor that provides an HDMI port and a VGA port to a video adapater in a PC system that uses a DVI-D connector. Which option would provide the best display quality at the lowest cost?

-Use an adapter to connect the monitor HDMI port to the DVI-D connector on the PC.

Match the cooling system types on the left with the appropriate characteristics and uses on the right. Each cooling system type can be used one, more than once, or not at all.

-Used for cooling high-end video cards: Active heat sink -Used for cooling high-end gaming computers: Liquid cooling -Has a fan attached to the heat sink: Active heat sink -Used for cooling CPU's: Active heat sink -Exhausts hot air out of the back of the case: Power supply -Used for cooling memory modules: Passive heat sink. -USed for cooling high-performance systems: liquid cooling -Has no fan attached to the heat sink: Passive Heat sink

Which of the following is most helpful in keeping a computer cool?

-Vacuum dust from the system regularly -Verify that cooling fans are not circulating air in the wrong directions.

A customer has brought a computer in to be repaired. He said he thinks that the sound card has stopped working because no audio is produced when music, video, or DVD's are played. Which troubleshooting step should you take first?

-Verify that the volume isn't muted. -Verify that the speakers are plugged into the correct jack and are powered on.

What are two major disadvantages to overclocking the CPU?

-Voided warranty -Increased heat output

Which of the following are common tools used to physically clean the inside of a computer?

-compressed air -natural bristle brush

Which of the following are safety benefits associated with encasing cables that run across the floor?

-reduces tripping accidents -Prevents wear

You have been using the same computer for several years. To improve performance, you decide to upgrade the processor. You check the motherboard documentation and purchase the fastest processor supported by the motherboard. However, when you try to start the computer it beeps regularly and nothing is displayed on the screen. What should you do?

-reinstall the old processor in the new motherboard. -flash the UEFI firmware.

Which of the following files extension types can be run from the command prompt?

.com .bat .exe

Which of the following file extensions indicated a Windows system file?

.dll .vxd

On a Linux system, what is the name of the directory where you will find a text file called devices that contains information about the devices that are configured on the system?

/proc

Which option used with the copy command makes sure that all copied files are written correctly after they have been copied?

/v

You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?

/y

Connected Interface

0

Static Route

1

Which aspect ratio applies to displays with resolutions of 1280 x 720 and 1920 x 1080?

16:9

EIGRP External Route

170

Match the Windows version on the left with the appropriate system requirements or features on the right. Each Windows version may be used only once.

1 GHz processor (support for PAE, NX, and SSE2 not required) - Windows 7 800 MHz processor - Windows Vista Metro design interface - Windows 8/8.1 2 GB RAM for a 64-bit system - Windows 10

What IP range makes up class A?

1 to 126

Which of the following IP addresses belong to the Class A network 114.0.0.0? (select three.) Tip: Assume the network is indicated by the default portion of the IP address

1) 114.0.0.15 2) 114.122.66.12 3) 114.58.12.0

Which of the following describes an IPv6 address? (select two)

1) 128-bit address 2) Eight hexadecimal quartets

Which of the following are valid IPv6 addresses? (select two)

1) 141:0:0:0:15:0:0:1 2) 6384:1319:7700:7631:446A:5511:8940:2552

Which of the following are not valid IP addresses? (select three)

1) 145.8.260.7 2) 257.0.122.55 3) 45.22.156.256

Which of the following IP addresses have a default subnet mask of 255.255.0.0 (select three)

1) 168.16.5.1 2) 129.0.0.1 3) 191.168.2.15

Which of the following IP addresses are Class B addresses? (select three)

1) 192.0.0.0 2) 190.65.2.0 3) 132.12.0.0

You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (select three)

1) 192.168.12.253 2) 192.18.188.67 3) 10.0.12.15

Which of the following is a valid IP address? (select two)

1) 2.2.2.2 2) 172.16.1.26

Which of the following IP addresses are Class C addresses? (select three)

1) 223.16.5.0 2) 222.55.0.0 3) 192.15.5.55

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (select two)

1) 802.11g 2) 802.11a

Which of the following methods can you use to connect your printer to an Ethernet network? (select two)

1) Add an Ethernet network card to your printer 2) Connect your printer to an external print server device that is connected to the network

What type of cabling can be used for an Ethernet 100Base-T (100 Mbps) network? (select two)

1) Cat 6 UTP 2) Cat 5 UTP

What type of cabling could be used for an Ethernet 100BaseT (100 Mbps) network? (select two)

1) Cat 6 UTP 2) Cat 5 UTP

Which of the following are advantages of using a domain to manage a network? (select two)

1) Centralized administration 2) Scalability

You've just installed a wireless access point (AP) for your organization's network. You know that the radio signals used by the AP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. What can you do to protect the wireless network? (select two)

1) Configure the AP to filter out unauthorized MAC addresses 2) Disable DHCP on the AP

Which mechanisms could you use to resolve a hostname into its associated IP address? (select two)

1) DNS 2) hosts file

Which of the following are features of Basic Rate ISDN (BRI)? (select three)

1) Dial-up connection 2) Two data channels 3) One control channel

A customer has called an indicated that he thinks his neighbor is connecting to his wireless access point (AP) to use his high-speed Internet connection. Which of the following will help resolve this issue? (select two)

1) Disable SSID broadcast on the AP 2) Implement WPA2

Which of the following terms describes a group of computers and users that utilize centralized resources, administration, and security settings? (select two)

1) Domain 2) Directory

You've just set up a color laser printer on a customer's Windows workstation. You've connected it to the workstation using a USB cable and have loaded the appropriate drivers. What should you do next? (select two)

1) Edit the printer properties to configure paper tray and other device-specific settings 2) Verify that it is working correctly by printing a test page

You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do? (select two)

1) Enable the Erase Data option 2) Disable the Simple Passcode Option

You are configuring an ADSL connection. Which of the following will be part of the configuration? (select two)

1) Filters of splitters 2) RJ-11 connectors

Which protocols are used on the Internet to transmit Web pages from Web browsers running on client workstations? (select two)

1) HTTP 2) HTTPS

Which of the following correctly describe the most common format for expressing IPv6 addresses? (select two)

1) Hexadecimal numbers 2) 32 numbers, grouped using colons

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (select two)

1) Immunity to electromagnetic interference 2) Greater cable distances without a repeater

Which of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true? (select two)

1) It can deliver a DNS server address in addition to the host IP address 2) A workstation must request addressing information from a DHCP server

Which of the following statements accurately describes how a modem works? (select two)

1) It demodulates analog data from a telephone network into digital PC data 2) It modulates digital data from the PC into analog data and transmits it on a telephone network

Which of the following are characteristics of coaxial network cable? (select two)

1) It uses two concentric metallic conductors 2) It has a conductor made from copper in the center of the cable

You have a workstation runnning Windows 7, 64-bit edition. A local printer connected to a USB port is shared so that other users can print to that printer. Users running the 32-bit versions of Windows report that they can't install the driver for the shares printer. Users running a 64-bit version of Windows do not have any problems. What could you do to fix this problem? (select two)

1) Manually install the correct driver on each computer that is having a problem 2) On your computer, add the X86 drivers

Which of the following locations will contribute the greatest amount of interference for a wireless access point? (select two)

1) Near backup generators 2) Near cordless phones

Which tool in Windows would you use to browse all networks and shared folders to which a user has access? (select three)

1) Network 2) Computer 3) Windows Explorer

You are troubleshooting network connections on a Windows workstation and you want to view a list of connections on the computer. How can you do this? (select two)

1) On the Start menu, click Control panel, then click Network and Internet 2) On the Start menu, right-click Network and select Properties

Which of the following are characteristics of the 802.11g wireless standard? (select three)

1) Operates in the 2.4 GHz range 2) Maximum bandwidth of 54 Mbps 3) Backwards compatible with 802.11b devices

Which of the following are printer languages? (select three)

1) PCL 2) PostScript 3) Escape codes

Which of the following are printer languages? (Select Three)

1) PCL 2) PostScript 3) Escape codes

Which of the following terms refers to a network resource sharing model that uses access to control lists saved on each computer? (select two)

1) Peer-to-peer 2) Workgroup

Which printer management components would you use to view the port used by a printer? (select two)

1) Print server properties 2) Printer properties

What mechanisms can implement DHCP relay?

1) RFC 1542 Compliant Router 2) DHCP Relay Agent

Which of the following are used to connect a cable modem to the Internet connection? (select two)

1) RG-6 coaxial cable 2) F-type connectors

Which of the following is true of a network using the 10Base-T standard? (select two)

1) The maximum cable distance is 100 meters 2) The network operates at ten megabits per second

Which of the following is true of a network using the 1000Base-T standard? (select two)

1) The network uses copper UTP cables 2) The network operates at one gigabit per second

Which of the following components are found in dot matrix printers? (select two)

1) Tractor feed 2) Platen

A customer has called to complain that the colors in photos she has printed on the color inkjet printer your store sold her don't match the colors in the originals. Assuming the customer is using a Windows workstation, what should you do to resolve the issue? (select two)

1) Use the Color Management tab of the printer device to adjust the driver's color settings 2) Download and install the latest printer drivers

You've just set up a color laser printer on a customer's Windows workstation. You've connected it to the workstation using a USB cable and have loaded the appropriate drivers. What should you do next? (Select two.)

1) Verify that it is working correctly by printing a test page. 2) Edit the printer properties to configure paper tray and other device-specific settings.

Which of the following are security protocols for wireless networks? (select two)

1) WEP 2) WPA

You have a motherboard with 4 built-in SATA connectors. What is the maximum number of SATA devices you can connect to the motherboard using the integrated ports?

4 Explanation You can connect one SATA device per port. If you have 4 port, you can connect 4 devices.

Which of the following methods can be used to connect a printer to a network? (Select two.)

1)Plug an Ethernet cable into the network port in the printer. 2)Connect your printer to an external print server device that is connected to the network.

Which printer management components would you use to view the port used by a printer? (Select two.)

1)Print Properties 2)Print Server Properties

A customer has called to complain that the colors in photos she has printed on the color inkjet printer your store sold her don't match the colors in the originals. Assuming the customer is using a Windows workstation, what should you do to resolve the issue? (Select two.)

1)Use the Color Management tab of the printer driver to adjust the driver's color settings. 2) Download and install the latest printer drivers

What is the range of the first octet of Class A addresses?

1-126

Procedure

1. Click on the iPad to access iOS. 2. Click on Settings. 3. Click on Mail, Contacts, Calendars. 4. Click on Maggie Brown Mail, Calendars, Notes. 5. Under GMAIL, click on the Account [email protected]. 6. Click Advanced. 7. Under Incoming Settings Select Use SSL. 8. Click on Account to go back. 9. Click on Done to go back. 10. Click on Wi-Fi. 11. Under Choose a Network select CorpNet. 12. Under Password Enter @CorpNetWeRSecure!&. 13. Click Join. 14. Click Done. 15. Click Check Answer. 16. View Lab Report.

What are three types of software-generated problems that can indicate that a software bug is causing a memory error?

1. General-protection fault 2. Exception error 3. Page fault

List the steps the user needs to follow to add more disk space to a Storage Space in Windows 10.

1. Install a new storage device to the system. 2. Add free space on that device to a storage pool. 3. Allocate space to an existing storage space.

What are three characteristics of a dedicated video card?

1. Installed in an expansion slot on the motherboard 2. Has a GPU and a dedicated, high-speed video memory bank 3. Is more powerful but also more expensive

What are three characteristics of an integrated video card?

1. Integrated the GPU with another hardware component 2. Share system memory for graphic processing 3. Cheap and less powerful

You have just finished installing a new SATA hard disk in your computer. Now your SATA DVD drive won't work. What should you do first?

1. Make sure that the DVD SATA cable is connected. 2. Make sure that the DVD power cable is connected.

When troubleshooting the power supply what should you check before opening the computer?

1. Make sure the power cord is plugged into the wall 2. verify any surge protectors are plugged in and in the on position 3. Make sure the power supply's switch is in the on position

Why would you use static IP addressing? Three reasons

1. The network has a small number of hosts 2. The network will not change or grow. 3. You have some hosts that must always use the same IP address

Match the USB connector types on the left with the image labels on the right.

1. USB 2.0 Type-B 2.. microUSB 3. Mini USB 4. USB 3.0 Micro B

Match the USB connector types on the left with the image labels on the right.

1. USB 3.0 Type-A 2. USB 3.0 MIcro-B 3. USB 3.0 Type-B 4. USB 2.0 Type-A

What is the maximum cable length for the IEEE 1394 standard?

4.5 meters

What is the maximum data transfer rate of an IEEE 1394a device?

400 Mbps

Match each of the motherboard components on the left with the appropriate description on the right.

1.Maintains an accurate system time and date, even when the power is off.-CMOS battery 2. Allows additional features and capalities to be added to the motherboard.-Expansion slots 3.Houses the PCI bus controllers and communicates with the super I/O controller.-Southbridge 4. Contains firmware that is used to configure motherboard settings and initialize devices. -Flash memory 5. Controllers communication between the CPU, memory, and high-speed graphics bus.

Private IP address ranges

10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255

You have a computer that is connected to the internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Three answers)

10.0.12.15 192.168.12.253 172.18.188.67

IGRP

100

Your network follows the 1000Base-T specifications for Gigabit Ethernet. What is the maximum cable segment length allowed?

100 meters

Your network follows the 1000Base-T specifications for Gigabit Ethernet. What is the maximum cable segment length allowed?

100 meters Explanation Gigabit Ethernet using twisted pair cables (either Cat5e or Cat 6) has a maximum cable segment length of 100 meters. Tip: All Ethernet networks that use twisted pair cable (Ethernet, Fast Ethernet, and Gigabit Ethernet) have a distance limitation of 100 meters.

Which type of fiber optic cable supports 10 Gigabit Ethernet with a maximum segment length of up to 40 km?

10GBaseER single-mode Explanation 10GBaseER ("extended reach") is a port type for single mode fiber optic cable that supports 10 Gigabit Ethernet with segment lengths up to 40 km. 10GBaseLR ("long reach") is a port type for single-mode fiber optic cable that supports 10 Gigabit Ethernet with segment lengths up to 10 km. 10GBaseSR ("short range") is a port type for multimode fiber optic cable that supports 10 Gigabit Ethernet with segment lengths up to 300 meters. 10GBaseT twisted pair Category 7 is a copper cable that supports 10 Gigabit Ethernet with segment lengths up to 100 meters.

What is the maximum speed of 802.11b?

11 Mbps

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

11 Mbps

OSPF

110

Which of the following IP addresses belong to the Class A network 114.0.0.0? (Tip: Assume the network is indicated by the default Class A portion of the IP address.)

114.0.0.15 114.122.66.12 114.58.12.0 Explanation With a Class A network, the first octet indicates the network address. All hosts on the network must have the same value in the first octet (114).

RIP

120

What is the loopback address?

127.0.0.1

You have a small home network that uses 192.168.1.0 with the default subnet mask for the network address. The default gateway address in 192.168.1.254, and the router is providing DHCP on the network. The Wrk2 computer has been assigned the IP address of 192. 168.1..55. Which of the following is considered the loopback for the Wrk2 computer?

127.0.0.1 Explanation 127.0.0.1 is the loopback address for any device. This special address means "this host."If you ping the loopback address, the TCP/IP configuration will be tested. A successful test means that TCP/IP is correctly configured on the host. 192.168.1.55 is the current IP address assigned to the host. You can ping this address, but the address is not considered the loopback address. also, to pong the host's IP address, you must first know the address. Pinging the loopback address always tests the current host regardless of its current IP address. 192.168.1.255 is the broadcast address for the network meaning äny host"on the network.

What IP range makes up class B?

128 to 191

What is the range of the first octet of Class B addresses?

128-191

Which of the following are true of the SXGA screen resolution?

1280 x 1024 5:4 aspect ratio Explanation A SXGA (super extended) display has a resolution of 1280 x 1024 and an aspect ratio of 5:4. VGA has a resolution of 1024 x 768, and UXGA has a resolution of 1600 x 1200. Widescreen aspect ratios include "W" in the name. For example, WUXGA has a 16: 10 aspect ratio (resolution of 1920 x 1200).

Which IEEE version supports peer-to-peer transmission of data?

1394.3

Which of the following IP addresses is a valid IP address for a host on a public network?

142.15.6.1

Internet Message Access Protocol (IMAP)

143

What is the maximum distance of 802.11a?

150 feet

Which of the following IP addresses have a default subnet mask of 255.255.0.0?

168.16.5.1 129.0.0.1 191.168.2.15 Explanation IP addresses are divided into classes. The most common of these are classes A, B, and C. Each address class has a different default subnet mask. To identify the class of an IP address, look at its first octet. Class A networks use a default subnet mask of 255.0.0.0 and have 9-126 as their first octet. Class B networks use a default subnet mask of 255.255.255.0 and have 192-223 as their first octet. In this question, the IP addresses that fall in the Class B IP address range are 191.168.2.15, 129.0.0.1, and 168.16.5.1.

Which of the following is not one of the ranges of IP addresses defines in RFC 1918 that are commonly used behind a NAT server?

169.254.0.1 - 169.254.255.254

Which of the following IP address ranges is reserved for Automatic Private IP Addressing?

169.254.0.1 - 169.254.255.254 Explanation The Internet Assigned Numbers Authority (IANA) has reserved 169.254.0.1 through 169.254.255.254 for Automatic Private IP Addressing (APIPA). APIPA also sets the subnet mask on the network to 255.255.0.0.

What is the range known as the Automatic Private IP Addressing Range (APIPA)?

169.254.0.1-169.254.255.254

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?

169.254.0.1-169.254.255.254

Which of the following is a valid IP address?

172. 16.1.26 2.2.2.2 Explanation A valid IPv4 address consists of 4 8-bit (1 byte) numbers separated by periods. For example, 10.0.0.65. Because they are 8 bits long, these numbers are frequently called octets. Even though we typically express these numbers using decimal notation, it's important to remember that these numbers are binary numbers. The lowest value one of these numbers can have is 00000000. The decimal equivalent for this number is simply 0. The highest value one these numbers can take is 11111111. The decimal equivalent of this number is 255. Therefore, in decimal notation, each octet must contain a number between 0 and 255 inclusively.

What IP range makes up class C?

192 to 223

What is the range of the first octet of class C addresses?

192 to 223

What radio frequency does the 802.11g standard operate?

2.4 GHz to 2.4835 GHz

You need to replace the hard disk in your laptop computer. What hard drive size would you likely choose for the laptop?

2.5"

Used by notebook computers. The notch is further off center. Used for DDR2 and DDR3 memory

200-pin SODIMM

Consider the following output from a dig command run on a Linux system. ; <<>> DiG 8 .2 <<>> westsimlll.com ;;res options :init recurs defnam dnsrch ;;got answer : ;;->>HEADER<< -opcode :QUERY , status : NOERROR , id :4 ;;flags : qr rd ra ; QUERY :l , ANSWER :l , AUTHORITY :2, ADDITIONAL :0 ;;QUERY SECTION : ;; westsimlll.com , type= A , class= IN ;;ANSWER SECTION : westsimlll .com . 7h33m IN A 76 .141 .43 .129 ;;AUTHORITY SECTION : westsimlll .com . 7h33m INNS dnsl .deriatctlll .com. westsimlll.com. 7h33m INNS dns2.de riatct222.com . ;;Total query time : 78 msec ;;FROM: localhost .localdomain to SERVER :default -- 202 .64 .49 .150 ;;WHEN: Tue Feb 16 23 :21 :24 2005 ;;MSG SIZE sent : 30 rcvd :l03 What is the IP address of the DNS server that performed this name resolution? A. 202.64.49.150 B. 76.141.43.129 C. 192.168.1.100 D. 16.23.21.24

202.64.49.150

Secure Shell (SSH)

22

Which of the following IP addresses are Class C addresses?

222.55.0.0 223.16.5.0 192.15.5.55 Explanation The following are Class C addresses: 192.15.5.55, 222.55.0.0, and 223,16.5.0. The first octet of Class C addresses is in the range of 192 to 223. The first octet of Class A addresses range from 1-126. The first octet of Class B addresses range from 128-191.

What IP range makes up class D?

224 to 239

What is the maximum distance of 802.11n?

230 feet

What IP range makes up class E?

240 to 255

What is the default subnet mask for the IP address 203.111.3.3?

255.255.255.0

You have been asked to implement a RAID 5 solution for an engineer's desktop workstation. What is the minimim number of hard disks that can be used to configure RAID 5

3

You have been asked to implement a RAID 5 solution for an engineer's desktop workstation. What is the minimum number of hard disks can be used to configure RAID 5?

3 Explanation A RAID 5 array stripes data and parity information across multiple hard disks. To complete a RAID 5 array, a minimum of three hard disks is required. A RAID 0 and RAID 1 can both be implemented with a minimum of two hard disks.

You have a computer that has four DDR2 memory slots. Currently there are two 512 MB memory modules installed. You check the motherboard documentation and find that the system has a 4GB memory limitation. You want to add as much memory as possible without replacing the existing modules. What is the maximum total amount of RAM that can be installed in this system?

3 GB

Which tool would you use to grab and lift small objects?

3 prong holder

What is the maximum speed of 802.11n?

300 Mbps

What is the maximum distance of 802.11b?

300 feet

What is the maximum distance of 802.11g?

300 feet

ESD

3000 volts or more must occur before you can feel it but can damage computer components with as little as 300 volts.

What is the approximate bus speed of DDR2 memory rated at PC2-5300?

333 MHz

You've enabled Remote Desktop on a Windows workstation. Which port must be opened in the server's firewall to allow remote clients to access the desktop?

3389

How many primary partitions can a basic hard disk have?

4

You have been asked to implement a RAID 10 solution for a video editor's desktop workstation. What is the minimum number of hard disks that can be used to configure RAID 10?

4 Explanation A RAID 10 array nests a mirrored array within a striped array. To create a RAID 10 array, a minimum of four hard disks is required (two for the mirrored array and two more to stripe the mirror).

You have a CD-RW drive that advertises speeds of 32x/12x/48x. What is the read speed of the drive?

48x Explanation The read speed is 48x. When multiple numbers are listed together, the first number is the record speed, the second number is the rewrite speed, and the last number is the read speed. If the drive does not perform rewrite functions, the middle number will be omitted.

Which aspect ratio applies to displays with resolutions of 800 x 600 and 1600 x 1200?

4:3

A SCSI hard disk drive has three jumpers that are used to set the SCSI ID. shunts have been placed on the first and third jumpers. What SCSI ID has been assigned to this device?

5

EIGRP Summary Route

5

What is the maximum data transfer speed for USB 3.0 devices?

5 Gbps

What voltages are provided by an ATX power supply?

5, 3.3, and 12 volts DC

What is the theoretical capacity of a DDR4 standard system memory module?

512 GB

You've just installed the DNS service on a Windows server. Which port must be opened in the server's firewall to allow clients to access the service?

53

You've just installed the DNS service on a Windows server. Which port must be opened in the server's firewall to allow clients to access the service?

53 Explanation The DNS service runs on port 53 by default. Port 110 is used by the POP3 protocol. Port 143 is used by the IMAP protocol. Port 123 is used by the NTP protocol.

What is the maximum speed of 802.11a?

54 Mbps

What is the maximum speed of 802.11g?

54 Mbps

Apple Filing Protocol (AFP)

548

Which of the following printers would produce the highest print quality?

600 DPI

How many devices does a single IEEE 1394 bus support?

63

You want to build a new system that supports 6GB of memory. Which of the following will be the most important consideration when building the computer?

64-bit processor

You have been tasked with designing a workstation that will run VMware Workstation virtualization software. It will be used by a software engineer to run virtual machines for application development and testing. Which criteria should be included in your design for this system?

64-bit processor with 8 cores RAM configured to run in a quad-channel mode

Hypertext Transfer Protocol (HTTP)

80

Which wireless standard operates at up to 54 Mbps to a maximum of 150 feet?

802.11a

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in the situation?

802.11n

EIGRP Internal Route

90

What is an IPv6 IP address?

A 128-bit address listed as eight 16-bit hexadecimal sections

What is DHCP ACK?

A DCHP frame sent out to acknowledge a clients request for and acceptance of an IP address. When sent an IP is configured on the client.

Your laser printer prints a vertical black line on every page. You change the toner cartridge but the problem does not go away. What is the most likely problem?

A corona wire is dirty

What is DHCP Offer?

A advertisement sent out by a DHCP server to respond to a Discover request, which contains an available IP address.

What is the difference between a classful and a classless address?

A classful address keeps the default subnet address. A classless address uses a custom subnet mask.

Your laser printer prints a vertical black line on every page. You changed the toner cartridge but the problem does not go away. What is the most likely problem?

A corona wire is dirty.

What is DHCP Discover?

A frame sent out to identify DHCP servers on a network.

What is DHCP request?

A frame that a client sends to a DHCP server to accept an offered address.

What is a DHCP lease?

A lease determines the length of time a client can use an IP address leased through DHCP.

What is a ZIF socket?

A special socket for inserting and securing a processor

Which of the following is the best definition for a LAN?

A network in a small geographic area, like in an office

Which of the following is the best definition for a LAN?

A network in a small geographic area, like in an office. Explanation A LAN is a network in a small geographic area, like in an office. A WAN is a network whose computers and servers are geographically far apart but still connected. A PAN (personal area network) is the interconnection of components, such as laptops, mobile devices, printers, mice, keyboards, and other Bluetooth equipped devices, using some form of wireless technology within a personal range (typically 10 meters or less). A VPN is the extension of a private network over a shared or public network such as the Internet.

What is a DHCP scope?

A range of IP addresses that a DHCP server can assign to hosts.

Which of the following are true of Libraries?

A single folder can be added to multiple Libraries. Each Library can contain multiple folders from different files system locations.

During the POST, you receive a message stating: Keyboard not present. Present F1 to continue. What are the most likely causes of this error message?

A stuck key on the keyboard. A poor keyboard connection Explanation If the keyboard is not detected during the POST, the keyboard is probably not attached to the computer correctly. Check that the keyboard is securely connected to the keyboard port. While a bad keyboard will also result in this error, you should first check the keyboard connection to the computer before replacing the keyboard. This error is also commonly caused by a stuck key on the keyboard.

Driver

A type of computer program that enables the operating system to interact with hardware devices.

What is Anycast?

A unicast address assigns the same prefix to more than one interface. packages are routed to the nearest interface having that address.

What is DHCP relay?

A way to forward DHCP requests to separate subnets, in the case that a DHCP server does not exist on a clients subnet.

Which expansion buses are most commonly used for video?

AGP and VESA

Which mobile device architecture is used by Apple iPad devices running the iOS operating system?

ARM Explanation Most tablet devices, such as the iPad, use theARM architecture. ARM is more power-efficient and less expensive to manufacture than x86. Android also runs primarily on ARM. The x86 architecture is used on some tablet PCs. It is compatible with standard x86 PC hardware and software, which allows the device to run operating systems such as Windows. Some newer versions of Android can also run on the x86 architecture. x86-64 and Intel64 are architectures used in desktop and notebook PCs.

A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address?

ARP

A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address?

ARP Explanation Hosts use the Address Resolution Protocol (ARP) to discover the hardware address of a host.

You need to purchase a case that meets the following criteria: -Compatible with most form factors -At least two external and internal bays -Good balance of size and space Which case type should you purchase?

ATX mid-tower

Which of the following tools would you use to vieq the MAC addresses associated with IP addresses that the local workstation has contacted recently?

Arp

Which TCP/IP utility gives you the following output? Interface:192.168.1.111

Arp -a

In preparation to use your laptop on the airplane as you travel to a conference, you disconnected the USB mouse. However, after removing the external mouse, the cursor drifts consistently to the left side of the screen while using the built-in trackpad and mouse buttons. What should you do?

Access the BIOS/UEFI configuration and disable the USB pointer option. Explanation This issue is frequently seen in notebook systems where both the internal trackpad and an external mouse interface (such as USB or even PS/2) are enabled at the same time in the BIOS/UEFI configuration. Essentially, the two mouse interfaces contend with each other for control of the cursor. This problem can be fixed by disabling the external mouse option in the BIOS/UEFI configuration. If that doesn't work, then you can try updating the trackpad drivers or even replacing the trackpad.

which partition type identified the partition as one that holds the boot loader program used to start the OS?

Active

Which partition type identifies the partition as one that holds the boot loader program used to start the operating system?

Active Explanation The active partition identifies which partition holds the boot loader code. When the system starts, it looks in the volume boot record (VBR) of the active partition to identify the location of the boot loader code. The system partition is the partition that holds the operating system files. This might be the same as the active partition, but can be different. A primary partition is a partition type on a basic disk. An active partition must be a primary partition, but there can be additional non-active primary partitions on a disk. An extended partition is a partition type that is subdivided into logical drives. The extended partition cannot be the active partition.

Which of the following types of SCSI termination uses voltage regulators in conjunction with resistors to terminate the SCSI bus?

Active Termination

What thermal solution is used by components that generate more heat, such as CPUs, high-end video cards, and some motherboard chipsets with integrated graphics?

Active heat sink

If you want to boot from a hard drive, what must it have?

Active partition

If you want to boot from a hard drive, what must it have?

Active partition Explanation The active partition contains the boot sector, which is required to load an operating system. An extended partition is a partition type on a basic disk. An extended partition can exist, but is not required to boot.

Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection?

Ad hoc

You have a computer with an onboard LAN adapter. The LAN adapter has failed and you are unable to connect the computer to the network. What should you do?

Add a network card using a PCI slot. Explanation In this case, you should install a network adapter in a PCI slot. Your computer would then use the new network adapter instead of the one integrated on the motherboard. While installing the new card, you should disable the onboard LAN adapter to prevent it from showing in Device Manager. Replacing the motherboard is too expensive when compared to installing a new expansion card. AGP slots are used for video cards, not network cards. Clearing the CMOS settings erases the configuration information but does not fix the LAN adapter that is not functioning.

you want to uprade your Windows 7 Professional computer wot Windows 10 Professional. You begin by checking the hardware and discover it has 1 GB of RAM, a 2.0 GHz dual-core processor, a 128 GB solid state drive, and a video adapter with 128 MB RAM and DirectX 9 support. You want to install the 64-bit version of Windows 10. What should you do?

Add more memory

Consider the virtual memory configuration for the Windows 10 system shown in the exhibit. Given that this Windows 10 system has 16 BG of system RAM and three hard disks installed, which configuration change could you make to the paging file to increase system performance?

Add paging files to the E: and F: volumes.

You have a 64-bit Windows 7 workstation with three shared printers. You want to add drivers for 32-bit versions of the operating system. Which method would you choose to add the drivers with the least amount of effort?

Add the drivers to your print server in Print Management

What does the following command do? attrib +s +r -a myfile.dll

Adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute to the file myfile.dll

You want to restrict the hours that the QA Printer is available from Windows. Which tab on the Printer Properties page would you click so you can restrict the hours the printer is available?

Advanced

Which tool would you use to configure the paging file location and size on a Windows system?

Advanced System Settings in Control Panel.

You want to restrict the hours that the QA Printer is available from Windows. Which tab on the Printer Properties page would you click so you can restrict the hours the printer is available?

Advanced Tab

I/O Connectors

Area on back of motherboard that provides connectors to plug PS/2, USB, Serial, Parallel, Ethernet, Modem, and/or Firewire devices

CPU Socket

Area on motherboard that is used to install a processor

You need to configure File History to automatically delete any stored snapshots that are older than 1 month. Click the option you would use in Control Panel to do this

Advanced settings

What is the name of the set of features that improves the visual appearance of Windows? these features include, but are not limited to, the following: -glass effects -window animations -flip 3d -snap -shake

Aero

Mesh Topology - Physical

All hosts are interconnected to each other allowing signal to take any path desired to reach its destination.

You have a computer with a pentium 4 CPU and two PC-2400 DDR modules. The motherboard has room for two additional memory modules, and you'd like to install two PC-4000 modules. Which of the following statements is true?

All memory will operate at 300 MHz.

Which of the following is a characteristic of static routing when compared to dynamic routing?

All routers must be manually updated on the router

What is the purpose of cache memory?

Allows a processor to access data more quickly

What is the purpose of cache memory?

Allows a processor to access data more quickly.

Shared key wireless authentication

Allows a wireless network card to connect using a password

Open wireless authentication

Allows a wireless network card to connect without requiring a password.

Interface

Allows users to interact with the computer using a command line or clicking on graphics and symbols.

What does CIDR do?

Allows you to use only part of an octet for a network address. (Called VLSM)

After working without problems for a couple of years, your computer has begun to lock up. You suspect that it is a thermal issue but you can't find any component that is not functioning correctly. You have not replaced the CPU or installed any new devices. The CPU cooling fan and the power supply fan are working properly. The lock-ups are happening with increasing frequency. Which of the following is a common condition that might explain these symptoms?

An accumulation of dust has gradually built up.

Device manufacturers are countless

Android

Open source and most popular mobile device operating system.

Android

Which of the following protects a computer system from electrostatic discharge?

Anti-static wrist wrap

A company executive has just ought a new Android mobile device. She wants you to help her make sure it is protected from malware threats. What options are available and important to use to protect Android devices? (Select two)

App reviews and rating will help you choose an effective anti-virus app Anti-virus apps are available for purchase from Android app stores

While on a service call at a customer site, you are discussing the problem with the customer when your cell phone rings. You check the caller ID, and you see the call is related to parts you ordered for another customer. What is the most professional way to handle the situation?

Ask the customer if they mind if you take the call, and then step into the hallway to briefly talk on the phone.

One of your users suspects that the battery in their notebook computer is failing. You test it by using a known good power adapter to plug it in long enough to receive a full charge. The battery reads that it is fully charged in Windows. You then disconnect the laptop from its power source and wait to see how long the battery lasts. The batter dies after only about 15 minutes. What should you do to resolve the problem?

Assume the battery is failing and replace it

Which of the following are optical storage devices?

BD CD DVD Explanation Optical storage devices use lasers for both reading and writing information. The following are all optical storage devices: CD (Compact Disc) DVD (Digital Video Disc or Digital Versatile Disc) BD (Blu-ray Disc) HDDS (Hard Disk Drives) are magnetic storage devices. A flash device stores information using programmable, non-volatile flash memory. USB flash drive, SSDs (Solid state Drives), and SDHC memory cards are flash devices.

Which Blu-ray standard defines rewritable disks?

BD-RE

Which Blu-ray standard defines rewritable disks?

BD-RE Explanation BD-RE is the Blu-ray standard which defines rewritable disks. BD-ROM is the read-only standard and BD-R is the recordable standard. R/RW is used to designate rewritable CD and DVD discs, not Blu-ray discs.

Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions?

BGP

Which of the following components is an example of firmware?

BIOS/UEFI

What protocols can you use to assign IP addresses and othe rconfiguration information to hosts automatically?

BOOTP and DHCP

To improve system performance, you have configured a motherboard to run with a higher multiplier that what the CPU is specified to use. Since doing this, the system has become unstable and crashes frequently. What should you do to restore system stability?

Back off on the overclocking settings until the system runs in a stable manner.

You have a computer where a removable disk drive has been formatted with NTFS. You want to drive to use FAT32 to be compatible with more operating systems. The drive is currently configured using drive letter D:. What should you do?

Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.

You need to protect the user data on a Windows 10 system. Which tools could you use to do this?

Backup and Restore File history

You have a computer where a removable disk drive has been formatted w/ NTFS. You want the drive to use FAT32 to be compatible with more OS. The drive is currently configured using drive letter D:. What should you do?

Backup the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.

A portion of the hard disk that cannot be used.

Bad sector

Which of the following is a rating of the amount of data that can be sent over a network in a period of time?

Bandwidth

Which of the following is a rating of the amount of data that can be sent over a network in a period of time?

Bandwidth Explanation The network bandwidth is a rating of how much data can be sent over a network. Broadband is a signaling scheme that divides a single network media into multiple transmission channels. Latency measures the delay between transmission and reception of network data. Jitter measures how much variation occurs in a network''s latency measurement over time.

Which of the following devices would you add to a computer if you need to take inventory at all retail store by scanning the UPC symbols on products?

Bar code reader

What would you enter at the command prompt to start a new Bourne-again shell (bash) session?

Bash

What are 2 disk types that Windows supports?

Basic / Dynamic

Only support volumes made up of contiguous disk space.

Basic Disks

Supported by all operating systems.

Basic Disks

Use primary and extended.

Basic Disks

Explanation

Basic disks include the following characteristics: Use primary and extended partitions. Supported by all operating systems. Only support volumes made up of contiguous disk space. Dynamic disks include the following characteristics: Support up to 128 volumes. Support volumes that use discontiguous disk space. Store partitioning information in a hidden database on all such disks in the system.

Where should the thermal paste go when installing a processor?

Between the heat sink and CPU

Uses blue laser light which has a shorter wavelength, which allows data to be packed more tightly on the disc.

Blu-ray Disc (BD)

Was originally developed for high definition video (expanded content on movie discs), but can also be used for data storage.

Blu-ray Disc (BD)

One day while trying to start your Windows 10 system, you see the following error displayed: "Could not read from the selected boot disk. Check boot path and disk hardware". What would most likely fix the problem?

Boot into the recovery environment and run the bootrec /rebuildbcd comman

One day while trying to start your Windows 10 system, you see the following error displayed: Could not read from the selected boot disk. Check boot path and disk hardware.

Boot into the recovery environment and run the bootrec/rebuildbcd command. Explanation This error message is generated when the system cannot find the partition specified in the BCD database where the operating system files are located. For example, the database might be pointing to the C: drive for the operating system files, but that drive does not exist. To fix this problem, boot into the recovery environment and then run the bootrec/rebuildbcd command to rebuild the boot loader database with a list of valid operating system locations. You will not be able to boot into Safe Mode because the operating system files have not yet been loaded. The fixmbr and bootcfg commands were used on older versions of Windows.

Can be used to connect wireless clients to wired clients on the same network.

Bridge

Which type of printer heats the ink in its print head to print?

Bubble Jet (Inkjet)

Which type of printer heats the ink in its print head to print?

Bubble jet (inkjet)

What type of RAM might slow system performance because it holds memory addresses or data to improve stability on systems with more than 1 GB of RAM before it is transferred to the memory controller/

Buffered

Which of the following topologies connects all devices to a trunk cable?

Bus

Six months age, you purchased a new laptop. Since then, you have noticed that the battery life has been steadily going down. When it was new, a full charge lasted about 3 hours. Now you are lucky to get 2 hours before the battery charge level drops below 5%. What should be your first step to correct this problem?

Calibrate the battery. Explanation If your battery seems to be losing the ability to hold a charge, or if the power drops shortly after starting to use it, you might need to recalibrate the battery. Over time, the power meter gets out of sync with the actual power that is left in the battery. Calibration resets the power meter so that the percentages are a more accurate reflection of the remaining charge. It is common for batteries to lose their ability to hold a charge over time. However, most batteries last between 1-3 years. You should only replace the battery after you determine that calibration will not correct the problem. You cannot replace the power meter chip in a battery; in fact, you should never disassemble a battery. Cleaning the contacts will have no effect.

You replace the print cartridge on an inkjet printer. What should you do next?

Calibrate the printer

You have a friend who is offering to sell the monitor and video card from his gaming system along with several PC games. The games have fast moving graphics, and you want to be able to play them on your own home system. The monitor he is selling is an LCD TN with a 144 Hz refresh rate. The video card he is selling supports a max refresh rate of 144 HZ. You want to buy the games, but you have a couple of other choices when it comes to the monitor and the video card. The monitor in your current system has a 60 Hz refresh rate. The video card has a max refresh rate of 75 Hz. This configuration has always worked fine for watching videos. You're also looking at new 60 Hz LCD IPS monitors and several high end video cards with max refresh rates of up to 240 Hz. Which of the following options will allow you to play the games on your home system with the best gaming experience possible?

Buy your friend's games, monitor, and video card. Swap out both your video card and monitor. Explanation The LCD TN monitor with the 144 Hz refresh rate along with the video card with a max refresh rate of 144 Hz will give you the best gaming experience compared to the other options. Remember that in order to achieve a specific refresh rate, the following components must all support the same maximum refresh rate: Display device. Video card. Display cable Fast moving graphic applications, such as games, perform best with a refresh rate of 120 Hz or higher, which is covered by this option. Also, LCD TN panel monitors have a much faster response time, which makes them superior for gaming when compared to LCD IPS panel monitors. The newer video card with a max refresh rate of 240 Hz has some advantages over the older card, but not in combination with the LCD IPS panel monitor. Either option where you keep the 60 Hz monitor, or the 75 Hz card, or both will limit the performance of your system to the rate of the slowest component, which will not be sufficient for the fast moving graphics in the games.

Which of the following is a valid MAC address?

C0-34-FF-15-01-8E

Which of the following is a valid MAC address?

C0-34-FF-15-01-8E Explanation A MAC or hardware address is a unique identifier hard coded on every network adapter card. A valid MAC addresss has a total of 12 hexadecimal numbers. Hexadecimal numbers contain the numbers 0 to 9 and the letters A to F. Valid values in a MAC address range anywhere from 00 to FF. Note that one of the answers would be a valid MAC address except it uses a G value, which is beyond the range of a hexadecimal number.

Where system root is the C: drive, what is the path to the system files that hold user profiles in Windows 10?

C:\Users\username

Which file system path is the default location for system files in Windows 10?

C:\Windows

What is the file location for host files on a windows system?

C:\Windows\system32\drivers\etc\

You are a PC technician for a national computer retailer. A business customer asks you to build a three custom computers to be used by employees at a branch office: -CAD / CAM Design Workstation -Home Theater PC -Virtualization Workstation

CAD / CAM Design Workstation -6 GB GDDR5 PCIe video adapter -32 GB PC4-21300 DDR4 ECC RAM -1 TB SATA HD Home Theater PC -HDMI output -Compact form factor -5.1 channel surround sound adapter -TV tuner adapter Virtualization Workstation -32 GB PC4-21300 DDR4 RAM -4 TB SATA HD -Integrated Video adapter

With a memory module read request, there is a delay between the time of the data request and the time the data is available for output from the memory module. What is this delay called?

CAS Latency

Which of the following is a general term for the program that holds system information related to the starting of a computer?

CMOS

Which of the following components is necessary to keep the real-time clock running?

CMOS battery

To which of the following objects should thermal paste be applied?

CPU

What is the correct order for installing a processor for proper cooling?

CPU, thermal paste, heat sink, fan

You replaced the print cartridge on an inkjet printer. What should you do next?

Calibrate the printer

Your motherboard has sockets for 184-pin DIMM RAM. Which type of RAM should you install?

DDR

32bit processor

Can access a maximum of 4GB of RAM

The IEEE 1394 (Firewire) standard is often compared to USB. Each standard has unique features

Capable of isochronous data transmissions: IEEE 1394 Provides up to 9 W of power via a 5 V wire: USB Provides up to 60 W of power via a 12 V wire: IEEE 1394 Capable of asynchronous data transmissions: USB Supports peer-to=peer transfers: IEEE 1394

A user reports that they are unable to access their Firmware drive after moving the PC from beneath the desk to the top of the desk. What is the most likely cause of this problem?

Card is not properly seated.

UTP Cable Types

Cat 3, Cat 5, Cat5e, Cat6, Cat 6a

What type of cabling can be used for an Ethernet 100Base-T (100 Mbps) network?

Category 5e UTP Category 5 UTP Explanation Ethernet 100Base-T uses category 5 and 5e cabling. Cat 3 is designed for use with 10 megabit Ethernet or 16 megabit token ring. Coaxial cabling is used with 10Base2 or 10Base5 Ethernet.

You have purchased an LED monitor and connected it to the DVI-I port on your computer using a DVI-D cable. You configure the screen resolution to 1440 x 900 with 32-bit colour. The display on the screen seems to be pixilated. What should you do to correct the problem?

Change the screen resolution to the native resolution of the monitor. Explanation LED and LCD monitors have a native display resolution. You should set the resolution of the video board to the native resolution of the monitor (whatever it might be). While it might be possible to set the resolution other than the native resolution, the images on the display will be distorted or pixelated. DVI-D and DVI-I cables are compatible-- both carry digital output to the monitor. DVI-A cables are incompatible with DVI-D or DVI-I hardware because they use an analogue signal. Changing the colour depth increases the number of colours that the monitor displays.

You have purchased a 1600 x 1200 LCD monitor and connected it to the DVI-I port on your computer using a DVI-D cable. You configure the screen resolution at 1280 x 1024 with 24-bit colour. The display output seems to be fuzzy and stretched. What should you do to correct the problem?

Change the screen resolution to the native resolution of the monitor. Explanation LCD monitors have a native display resolution. The native display of this monitor is 1600 x 1200. While it might be possible to set the resolution lower than the native display, you should use the native display setting for the clearest picture. Using a DVI-D cable is the same as using a DVI-I cable-- both will give you digital output. Using a DVI-A cable (if it will work on the monitor) could result in lower quality images as you will be using an analogue signal. Increasing the colour depth increases the number of colours that the monitor displays.

You've just finished installing a wireless access point from a client. Which action best protects the access point from unauthorized configuration settings?

Changing the administrative password

Which of the following disk maintenance utilities optimizes the performance of your hard drive by verifying the file system integrity of a hard disk and fixing the errors it detects?

Check Disk Explanation Check Disk is a utility that verifies the file system integrity of a hard disk. Check Disk detects disk integrity errors and fixes them. Disk Defragmenter optimizes the performance of your hard drive by joining fragments of files that are in different locations on your hard drive into a single location. The more information that is on the drive the more time it will take to defragment the drive. Disk Cleanup helps manage disks by locating and disposing of files that can be safely removed from the disk. Disk Management is a tool for viewing, modifying, and creating partitions.

Explanation

Check Disk detects disk integrity errors and fixes them. Errors that can be checked and fixed by Check Disk include: Lost clusters are a series of used clusters on the hard disk drive that are not associated with a specific file. A cross-linked file occurs when two files claim the same cluster. Check Disk will identify cross-linked files and correct their cluster associations. Orphaned files are files that exist on the hard drive but which are not associated with a directory in the index. Normally Check Disk can re-associate the file with the correct directory. A bad sector is a portion of the hard disk that cannot be used. Bad sectors are marked so that they are no longer used. Any used bad sectors are redirected to another sector.

You want to make sure that you always have the latest patches installed on you workstation for an order entry application created by DataComLink corporation. What should you do?

Check the DataComLink Website regularly for patches and updates to the software. Configure the application to automatically download and install updates as they are released.

A dot matrix printer is printing faintly after replacing the print head. What should you do?

Check the gap between the printer head and the paper

You would like to install Windows on a computer that previously had another operating system installed on it, but you are not sure if the audio card is compatible. The installed audio card is SoundMax D1371 (PCI) card. What should you do?

Check the manufacturer website for compatibility information.

You have just installed a new USB card reader in your windows computer. Every time you perform a certain action using the card reader, you get an error message that you've never seen before. What should you do first?

Check the manufacturer's website for the information about the error.

A customer complains that a recently purchased monitor no longer displays a picture. You verify that the monitor is powered on and that the video cable is securely fastened to the video port. Which of the following actions should you take next?

Check the monitor's brightness and contrast settings using the controls on the monitor. Explanation It's not uncommon for a monitor's brightness or contrast controls to be accidentally turned down. Check the brightness and contrast on the monitor to see if it has any effect on the problem. When troubleshooting, be sure to check the obvious things first before taking more serious actions, such as returning the monitor to the manufacturer. Moving the video card or reloading the video driver is unlikely to resolve the customer's problem in this scenario.

You recently purchased a new sound card and installed it in a free PCI slot in your computer. You plug in your old speakers, but don't get any sound. You have checked all cable connections and they secure. You have also ensured that the speaker volume is appropriately adjusted and isn't muted. What should you do next?

Check the vendor's Web site for an updated driver.

A user has called to complain that he can't connect to your organization's wireless network from his laptop. You know that the wireless signal is strong in his location. What should you do?

Check to see if the wireless adapter is turned off

What does ping do?

Checks connections.

You want to configure your Windows 10 workstation such tha tit can get Windows updates directly from other Windows 10 systems on the network that have already downloaded them from Microsoft.

Choose how updates are delivered

You want to upgrade all memory in your system with the fastest memory available. Which of the following should you choose?

Choose the type of memory that is supported by your motherboard.

What is stateless auto configuration?

Client sets Interface ID automatically, gets subnet prefix and default gateway from the RA message, and obtains everything else from the DHCP server.

What is DHCP stateless auto configuration?

Clients automatically generate the interface ID and learn the subnet prefix and default gateway through NDP.

You're working on a Mac computer that has an issue with a non-responsive application. You need to stop the application using the Force Quit feature. Which of the following keyboard shortcuts can be used to access the force quit feature?

Command+option+escape

Disc surface made up of lands and pits. Reflective light used to interpret the data.

Compact Disc (CD)

First developed to store digital music. Later, was adapted to store digital computer data.

Compact Disc (CD)

Explanation

Compact Discs (CDs) were first developed store digital music. Later, the CD technology was adapted to store digital computer data. Data is stored on a CD's disc surface in a series of lands and pits. Reflective light is used to interpret the data on the disc. Digital Versatile Disc (DVD) is an optical media standard that can be used to store large amounts of different types of data ( computer, data, video, audio). Single-sided discs can hold about 4.7 GB of data. Dual-layer discs can hold up to 8.5 GB of data. A red laser causes a crystal to form which creates the reflective and non-reflective areas on the bottom of the DVD-RW disc. Blu-ray Disc (BD) was originally developed for high definition video (and expanded content on movie discs), but can also be used for data storage. Blu-ray uses a blue laser instead of the red laser used with CDs and DVDs. The blue laser light has a shorter wavelength, which allows data to be packed more tightly on the disc.

Blackout

Complete power failure

Where is Disk Management located within Windows?

Computer Management

Where is Disk Management located within Windows 7?

Computer Management Explanation Within Windows 7, Disk Management is found under Storage in Computer Management. Within Windows 10, Disk Management is found in the list of utilities that appear when you right-click the Start Menu.

Application

Computer program designed for end users

Boot Errors

Computer that beeps or displays error messages prior to loading operating system.

Power Issues

Computer that exhibits one of several behaviors: Unexpectedly shuts down, continuously reboots itself, or does not turn on at all.

What are DHCP server options?

Configurations that apply to all scopes.

System Restore is currently disabled for all volumes on a Windows 10 system. You need to enable System Protection for the C: volume.

Configure

Your company has decided to temporarily partner with a third party organization for an upcoming project. This requires your company's network and the third-party's network to be connected via dedicated WAN connection. As you prepare for the connection, you encounter a problem. The two networks need to be able to exchange routing information, but they use different routing protocols. The third-party organization use RIP, and your network uses OSPF.

Configure a border router to use route redistribution

You've just purchased 10 new notebook systems for your users. You are concerned that users will leave the systems on for long periods of time, which could result in display burn-in. What should you do to prevent this from happening?

Configure a screen saver on each system. Explanation Burn-in can happen when the same image is displayed on the screen for an extended period of time. The best way to prevent this from happening is to configure a screen saver on each system. Configuring the systems to automatically power off after 5 minutes of inactivity will also prevent burn-in, but will also make them very inconvenient to use. Increasing hardware acceleration settings will not prevent burn in from occurring. Installing a software utility on each system that is designed to fix stuck pixels can be used to repair a burnt-in display, but it will not prevent it from happening in the first place.

If a printer is connected directly to a Windows workstation, what can be done to allow other workstations on the same network to send print jobs to this printer?

Configure the printer to be a shared printer

If a printer is connected directly to a Windows workstation, what can be done to allow other workstations on the same network to send print jobs to this printer?

Configure the printer to be a shared printer.

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stole, destroyed, or there is a natural disaster?

Configure your device to remotely backup important data to the Cloud.

What is ISATAP Tunneling?

Configured between individual hosts and a router. Used over a private IPv4 network. Requires a special dual stack. Automatically generates link local addresses.

Which type of network medium is used by an Integrated Services Digital Network (ISDN) adapter?

Copper telephone wire

Which of the following memory ratings identifies the fastest memory?

DDR3-1600

If a notebook computer is exhibiting symptoms that seem to indicate a malfunctioning keyboard, what troubleshooting steps can you take to determine if the keyboard needs to be replaced?

Connect an external keyboard. Check for special keyboard features that could be enabled that may cause some keys to perform alternate tasks. Explanation Check to see if the user has inadvertently set a special notebook keyboard feature that alters the way certain keys work. For example, setting the NumLock feature may cause part of the keyboard to emulate 10-key functionality. IF no special features have been set, you can connect an external keyboard to see if the malfunctiong keyboard symptoms go away. If they do, the laptop keyboard needs to be replaced. None of the other troubleshooting options could be used to determine what is wrong with a notebook keyboard.

You have just replaced the motherboard in your computer. Your computer starts, but the hard disk light does not come on while the system is booting? What should you do?

Connect the hard disk LED to the motherboard.

You just replaced the motherboard in your computer. Now your computer will not start. You press the power button on the system case, but nothing happens; there are no sounds or lights. What should you do?

Connect the power button to the motherboard.

Which of the following methods can be used to connect a printer to a network?

Connect your printer to an external print server device that is connected to the network or Plug an Ethernet cable into the network port in the printer

UDP

Connection that does not require acknowledgements.. As such, data is delivered much more quickly but some packets may not arrive intact.

Cable Connection

Connection that provides high speed transmission over TV lines.

Cellular Connection

Connection that provides high speed transmission over cell phone towers.

DSL Connection

Connection that provides high speed transmission over existing phone lines.

Satellite Connection

Connection that provides limited high speed connections through a dish pointed in the sky

TCP

Connection that requires acknowledgement of each packet it receives in order to ensure that the data is delivered reliably.

Dial-up Connection

Connection that uses a modem connected to a phone line to connect to the internet. Older technology with limited transfer rates up to 56Kbps.

Crossover Cable

Connects computers directly to another computer or a switch/hub to another switch/hub.

Patch or Straight Through Cable

Connects computers to a hub or switch. Connects a hub or switch to a router.

Start Menu

Contains all applications and programs that are divided by a separator line into two sections: "pinned" and most frequently used programs. Also contains icons for quick access to important features and folders such as Computer, Documents, Pictures, Help and Support, Search, and Control Panel.

Desktop

Contains icons that represent a subset of programs, files, applications, and file systems that can be accessed on computer.

Notification Area

Contains icons that represent applications and processes that are running behind the scenes on your computer.

Taskbar

Contains icons that represent each program and application currently running.

Control Panel

Contains various utilities that change how a computer looks and behaves.

Which of the following terms describes the difference between white and black in an LCD monitor?

Contrast ratio Explanation The contrast ratio identifies the relative difference between white and black. A higher contrast ratio means a better screen. Pitch is the distance between pixels. Resolution is the number of pixels in the display. Brightness is a measure of the intensity of the light coming from the display. The aspect ratio is the ratio of the width and the height.

You want to configure Power Plans on your Windows 7 laptop computer. Which of the following can do this? (2)

Control Panel> system security > power options // Notification area, double-click the battery icon. Click more power options.

You have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network?

Convergence

What functions do power supplies provide? Name three

Convert AC power to DC power Provide internal components with 3.3 V, 5 V, or 12 V of DC power Aid in thermal management

The power cord for the laptop has a block on it. What does this block do?

Converts Ac power to DC power

You recently purchased a new computer running Windows 7 for your company's graphic designer. The graphic designer needs his design fonts removed from his old Windows 2000 computer and placed on his new computer. Assuming the default directories were used during installation for both systems, which action is correct?

Copy the fonts from C:\Winnt\Fonts to C:\Windows\Fonts.

Your computer has a single hard disk w/ a single volume used by the C:/ drive. You have previously upgraded the disk to a dynamic disk. The disk has run out of disk space. You need to add more space to the C:/ volume. You add a new hard disk to the computer. What should you do to add space to the C:/ drive?

Create a mount point using space on the second disk

Your computer has a single hard disk with a single volume used by the C: / drive. You have previously upgraded to disk to a dynamic disk. The disk has run out of disk space. You need to add more space to the C: / volume. You add a new hard disk to the computer. What should you do to add space to the C:/ drive?

Create a mount point using space on the second disk. Explanation A mount point is an empty folder on the existing volume that points to another partition. Data saved to the folder is physically saved on the referenced partition. Extending a volume adds space to the volume. Extending a volume using space on a different disk creates a spanned volume. You cannot extend the system volume using space on a second disk. A striped volume uses two equal portions on two disks. You can create a new striped volume, but you cannot stripe an existing volume.

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 7. Your organization relies on a particular application, which worked correctly in earlier versions of Windows, but now does not run in Windows 7. You have checked the application vendor's website, but there is no update available. What should you try next to run the application?

Create a virtual computer that runs Windows XP. Run the virtual computer each time the application runs. Run the application in compatibility mode.

A user reports that she can't turn her computer on. After some investigation, you find the power supply is malfunctioning. What should you do next?

Create an action plan.

You have a Windows XP system with a single hard disk configured as a basic disk w/ a single partition formatted with FAT32. The disk is running out of free space and you need to add additional space to it. You install a new hard drive and start Disk Management. What are required tasks to add space to the existing volume?

Create an empty folder on the C: drive // Run the convert command.

What is multicasting?

Creates a logical group of hosts.

You need to attach an RJ-45 connector to the end of a Cat 6 UTP cable. Which tool should you use?

Crimper

Occurs when two files claim the same cluster.

Cross-linked file.

What type of cable configuration is shown here and what is it used for?

Crossover cable configuration. Used to connect computers directly to one another for networking. Explanation This is a crossover cable configuration. Using this, computers can connect directly to one another. The easiest way to create a crossover cable is to arrange the wires in the first connector using the T568A standard and arrage the wires in the second connector using the T568B standard.

What does a VGA connector look like?

D-shaped with 15 pins

How many pins are on a VGA connector?

D-shaped with 15 pins Explanation A VGA/SVGA monitor uses a high-density (three-row) female DB-15 connector on the computer. Some printers use a Mini Centronics connector, which also has 36-pins. A 6-pin mini-DIN (PS/2 connector) is for keyboard and mouse. DB-9 (serial) connector is for specialized input devices.

Which component is responsible for converting digital audio into sound that can be played on speakers?

DAC

You suspect that the power supply in your desktop PC is failing. You want to use a multimeter to test the power supply. Which multimeter setting should you use?

DC volts

Which service can you use on your network to automatically assign IP addresses to hosts and to help prevent the same address from being assigned to two different hosts?

DHCP

Which of the following are terms used to identify memory modules?

DIMM

Which of the following is typically used for large data backups of servers?

DLT tape Explanation DLT tape systems are used primarily for backups. The large storage capacity of these systems make them ideal for server backups. CD-R and DVD-R do not provide sufficient storage capacity for server backups. RAID is a data protection method that preserves data on hard disks if one disk in a set fails. It is not considered a back mechanism.

Conduits used by high-speed devices to bypass the CPU and communicate directly with RAM

DMA (Direct Memory Access)

You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this?

DNS

You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this?

DNS Explanation You can use DNS name resolution for Linux workstations for Linux workstations (as well as for most other operating systems). NetBIOS name resolution (LMHOSTS files or WINS) is typically used on Windows-based networks. The Lmhosts file is a local text file that maps Internet Protocol (IP) addresses to NetBIOS names of remote servers with which you want to communicate over the TCP/IP protocol. A WINS server address is only needed if your have older Windows clients on multiple networks. Network Time Protocol (NTP) is a means of transmitting time signals over a computer network. Simple Mail Transfer Protocol (SMTP) is used to route electronic mail through the Internetwork. E-mail applicatons provide the interface to communicate with SMTP or mail servers.

What is the technology that protects the intellectual property rights of publishers and restricts the use of copyrighted works to those who have paid the necessary licensing fees?

DRM

What are 3 optical storage devices?

DVD, BD, CD

Which of the following video card connectors provides digital video output?

DVI-D HDMI Explanation High- Definition Multimedia Interface (HDMI) is a digital video and audio connector used for high-definition digital audio and video. A DVI-D (digital video-digital) connection provides digital output. A DVI-I (digital video-integrated) connection also provides digital output as it sends both a digital and an analogue signal. Most video cards have DVI-I ports that allow you to connect both digital and analogue monitors. A DVI-A (digital video-analogue) connection is used only for analogue video signals, and will be found on cables but rarely (if ever a video card itself). A composite video connection on a video card provides analogue, video-only TV output in a single channel. S-video (separate-video. V/C. or S-VHS) supply analogue, video-only TV output in two channels. An HDTV connector supplies analogue, video-only TV output in three separate channels.

You have a computer with three hard disks. A RAID 0 volume uses space on Disk 1 and Disk 2. A RAID volume uses space on Disk 2 and Disk 3. Disk 2 fails. Which of the following is true?

Data on the RAID 1 volume is accessible; data on the RAID 0 volume is not.

You have a computer with three hard disks. A RAID 0 volume uses space on Disk 1 and Disk 2. A RAID 1 volume uses space on Disk 2 and Disk 3. Disk 2 fails. Which of the following is true?

Data on the RAID 1 volume is accessible; data on the RAID 0 volume is not. Explanation In this scenario, Disk 2 is shared between both volumes. If Disk 2 fails, the RAID 1 is still accessible because RAID 1 (mirrored) volumes can sustain a loss of a single disk. The data on the RAID 0 volume is not accessible. RAID 0 uses striping, which distributes the data evenly between multiple disks. If a single disk fails, the entire volume is lost.

Windows 10 features a storage solution called Storage Spaces. What is the name of the Storage Spaces feature that allows to allocate space for redundant information using options that include two-way mirroring, three-way mirroring, and parity?

Data resiliency Explanation Storage spaces can include data resiliency. Choosing an option that provides resiliency requires you to allocate space for redundant information. The options for storage spaces data resiliency include: Simple, which does not provide redundancy. This option simply adds space from the storage pool to the storage space. When you select the Simple option, all of the data in the storage space is lost if one of the drives fails. Two-way mirror requires at least two storage devices. The data is written to two devices. Two-way mirror requires twice as such device space as the amount of storage allocated to the storage space. This option protects you from a single storage device failure. Three-way mirror requires at least five storage devices. The data is written to three storage devices. This option provides redundancy for the data if two storage devices fail at one time. Parity requires that you have at least three storage devices. This option uses parity information to reconstruct data if one of the storage devices fails. Parity uses less space for redundancy that the mirror options, but performance is not as good as the mirror options if a device failure occurs. Parity requires only 50 percent more redundancy space than storage space.

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configuration values would you most likely need to change?

Default Gateway

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. What configuration value would you most likely need to change?

Default gateway

Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks?

Default gatway

Users have been experiencing periodic system lockups that generate the same error message. After checking Microsoft's Web site, you find that a hotfix is available to address the issue. What should you do next?

Deploy the hotfix on a test computer.

You've just installed a new video card in a user's Windows workstation. However, when you power the system on, the screen is displayed in 16 colours at 640 x 480 resolution. Which of the following will resolve this problem?

Download and install the latest driver from the video card manufacturer's website. Explanation You should download the latest video driver from the manufacturer's Website. Because Windows didn't have the right driver, it used a generic VGA or SVGA driver instead.

On a Windows 10 system, which Task Manager tab would you use to adjust the priority given to a specific program?

Details

On a Windows 10 system, which Task Manager tab would you use to adjust the priority given to a specific program?

Details.

A user reports that he can't send print jobs to a specific printer. You go to the user's computer and reproduce the problem. What should you do next?

Determine if anything has changed.

A user reports that he cannot access several network files. After some investigation, you determine that the problem is with a network server. What should you do next?

Determine if escalation is needed.

Which component in a laser printer applies toner to the drum, causing the toner to stick to the charged areas on the drum?

Developing Roller

Which component in a laser printer applies toner to the drum, causing the toner to stick to the charged areas on the drum?

Developing roller

Which component in a laser printer applies toner to the drum, causing the toner to stick to the charges areas on the drum?

Developing roller

As a member of the help desk administration team you've been assigned to update the driver for the network adapter that is installed on most of the machines in your department. You have a copy of the latest driver on a USB flash drive. Which Windows utility will allow you to maually update this new driver?

Device Manager

Which system utility would you use to troubleshoot hardware devices, examine and control the resources used by specific devices, and install updated device drivers?

Device Manager

You have a legacy non-Plug-and-Play device that must be installed under Windows. What interface do you use to manage the configuration of this device after it has been installed?

Device Manager

Which system utility would you use to troubleshoot hardware devices, examine and control the resources used by specific devices, and install updated device drivers?

Device Manager Explanation Use Device Manager to troubleshoot hardware devices, examine and control the resources used by specific devices, and install updated device drivers. System Restore takes periodic snapshots, called restore points, of the system configuration. Network acts as a built-in network browser showing all networks and shared folders to which the user has access. The Notification Area displays icons that represent the application and processes that are running behind the scenes on your computer such as audio volume, security programs, and connectivity to the network. It also displays the time and date. The Control Panel contains various utilities that change how a computer looks and behaves.

Power Supply Tester

Device for testing various connector types for output voltage

Multimeter

Device for testing various electrical properties.

Cable Tester

Device for verifying that a network can carry a signal from one end to the other, and that all wires within the connector are in their correct position.

Network Adapter

Device responsible for creating and receiving transmission signals sent onto the network.

Uninterruptible Power Supply

Device that constantly provides battery power to another device when there is a complete power loss.

Surge Protector

Device that protects against over-voltages

Standby Power Supply

Device that switches adds power when an under-voltage occurs.

Bridge

Device used to connect two different network segments together. This device allows one network to send information to other known subnets on the same network.

Router

Device used to connect two different network segments together. This device allows one network to send information to other unknown networks that exist on the internet.

Switch

Device used to provide a central connection point for multiple devices on the same network. When a signal is received, this device only sends the signal to the destination device.

Hub

Device used to provide a central connection point for multiple devices on the same network. When a signal is received, this device sends the signal out to all other ports.

Loopback Plug

Device used to test network communications by redirecting a signal from the transmit port on a device to the receive port on the same device.

You have just set up a new laser printer for the company president on her Windows workstation. You have installed the printer and the drivers, What should you do next?

Edit the printer properties to configure device-specific settings

Consider the following output from a dig command run on a Linux system. ; <<>> DiG 8 .2 <<>> westsimlll.com ;;res options :init recurs defnam dnsrch ;;got answer : ;;->>HEADER<< -opcode :QUERY , status : NOERROR , id :4 ;;flags : qr rd ra ; QUERY :l , ANSWER :l , AUTHORITY :2, ADDITIONAL :0 ;;QUERY SECTION : ;; westsimlll.com , type= A , class= IN ;;ANSWER SECTION : westsimlll .com . 7h33m IN A 76 .141 .43 .129 ;;AUTHORITY SECTION : westsimlll .com . 7h33m INNS dnsl .deriatctlll .com. westsimlll.com. 7h33m INNS dns2.de riatct222.com . ;;Total query time : 78 msec ;;FROM: localhost .localdomain to SERVER :default -- 202 .64 .49 .150 ;;WHEN: Tue Feb 16 23 :21 :24 2005 ;;MSG SIZE sent : 30 rcvd :l03 which of the following utilities produced this output?

Dig

A red laser causes a crystal to form which creates the reflective and non-reflective areas on the bottom of the disc.

Digital Versatile Disc (DVD)

Single-sided discs can hold about 4.7 GB of data. Dual-layer discs can hold up to 8.5 GB of data.

Digital Versatile Disc (DVD)

What input device uses a stylus?

Digitizer

Which of the following measures will make your wireless network less visible to the casual attacker performing war driving?

Disable SSID broadcast

You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do?

Disable the Simple Passcode option Enable the Erase Data option. Explanation To use a complex alpha-numeric passcode, you must disable the Simple Passcode option under Settings>General. To cause all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times, you must enable the Erase Data option located in the same screen. The Require Passcode option is enabled automatically regardless of what type of passcode you have configured. The Restrictions option is used to restrict access to specific apps. There're no Complex Passcode and Wipe Drive options on an iPad.

When you print from your laser printer, the paper contains faint images from previous printouts. Which components should you check?

Discharge lamp Rubber scraper

When you print from your laser printer, the paper contains faint images from previous printouts. Which components should you check?

Discharge lamp or rubber scarper

Which of the following disk maintenance utilities will locate and dispose of files that can be safely removed from the disk?

Disk Cleanup Explanation Disk Cleanup helps manage disks by locating and disposing of files that can be safely removed from the disk. Disk Defragmenter optimizes the performance of your hard drive by joining fragments of files that are in different locations on your hard drive into a single location. Check Disk is a utility that verifies the file system integrity of a hard disk. Disk Management is a tool for viewing, modifying, and creating partitions.

Which of the following disk maintenance utilities optimizes the performance of your hard drive by joining parts of files that are in different locations on your hard drive into a single location?

Disk Defragmenter Explanation Disk Defragmenter optimizes the performance of your hard drive by joining fragments of files that are in different locations on your hard drive into a single location. The more information that is on the drive the more time it will take to defragment the drive. Disk Cleanup helps manage disks by locating and disposing of files that can be safely removed from the disk. Check Disk is a utility that verifies the file system integrity of a hard disk. Disk Management is a tool for viewing, modifying, and creating partitions.

Which tool would you use to create and delete partitions or hard drives?

Disk Management

You have physically installed a new hard disk drive in your computer and configured the disk in the BIOS using the CMOS setup program. You try to access the hard disk drive in Windows Explorer, but the drive is not displayed. Which utility will you most likely use to solve the problem?

Disk Management Explanation After physically installing a hard disk drive and configuring it in the CMOS, you need to partition the disk and format it with a file system using Disk Management. You can use the format command to format the disk, but it has to be partitioned first. The chkdsk command is used to scan the surface of a disk and locate bad sectors or other disk problems. The sfc command is used to verify the integrity of your Windows system files.

Which tool would you use to create and delete partitions on hard drives?

Disk Management Explanation Use Disk Management to view, modify, and create partitions. Use Device Manager to update drivers and manage device-specific settings. Use the Services console to start and stop processes that run in the background. Use Explorer to view the contents of a volume, or to format a drive.

Which installation method is best for large numbers of computers that share the same hardware configuration?

Disk image Network installation

Which of the following is a command line utility that can be used to create, format, and manage partitions and volumes?

DiskPart Explanation DiskPart is the command line utility you can use to create, format, and manage partitions, and volumes. Disk Management is the graphical utlity you would use to do the same partition and volume creation, formatting, and management tasks you can do with DiskPart. DiskMan does not exist. Format is a command line utility used for formatting disks for use with Windows. CHDSK is used to find and fix errors on disks, volumes, and files.

Which of the following statements are true about the DisplayPort interface for connecting video monitors to computers?

DisplayPort can send both video and audio signals over the same cable. DisplayPort uses a lower voltage than DVI or HDMI. Explanation DisplayPort is an alternative to an HDMI connector. DisplayPort uses a different signal format than DVI or HDMI. However, DisplayPort supports sending DVI or HDMI signals over the same port using a simple adapter. DisplayPort uses a digital-only signal. To connect a VGA monitor to a DisplayPort, you will need a special active converter that reformats the signal for analogue devices. Like HDMI, DisplayPort can send audio signals over the same cable (if audio is supported by the video and monitor). DisplayPort uses lower voltage than DVI and HDMI.

You have a computer running Windows 10 Home and need to access the contents of a flash drive. The flash drive has been formatted with the exFAT file system. You want to read the flash drive on your computer as quickly as possible with the least amount of effort. What should you do?

Do nothing. Windows 10 can natively access ex FAT file systems. Explanation exFAT is supported in Windows Vista SP1 and later. While you can use convert exe to change the file system from FAT32 to NTFS you cannot change it from exFAT to FAT32.

You have a computer running Windows 7 Home Premium and need to access the contents of a flash drive. The flash drive has been formatted with the exFAT file system. You want to read the flash drive on your computer as quickly as possible with the least amount of effort. What should you do?

Do nothing. Windows 7 can natively access exFAT file systems.

Which of the follwoing Mac features is used to launch apps, switch between running apps, access the Trash, and also to access specific folders.

Dock

Which of the following terms describes a group of computers and users that utilize centralized resources, administration, and security settings?

Domain Directory Explanation A domain and a directory both identify a group of computers that utilize centralized resources, administration, and security settings. For example, Active Directory is a service that provides a centralized database of resources for a domain. A Local Area Network (LAN) is a network in a small geographic area, like in an office. A peer-to-peer network is a decentralize network where each host has its own user accounts and shared network resources. A peer-to-peer network does not utilize centralized resources, administration, and security settings. A workgroup is an example of a peer-to-peer network. In a workgroup, each computer controls access to its own resources. Security controls on each computer identify who can have access to the computer's resources.

Which of the following printer types is considered an impact printer?

Dot matrix

Which type of printer has the poorest print quality because the image is created using fairly large dots?

Dot matrix

Which type of printer uses an inked ribbon?

Dot matrix

Which type of printer uses pins striking the ink ribbons to transfer the ink?

Dot matrix printer

You have just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. After installation, the system frequently crashes when you try to access the new device. What should you do?

Download and install the latest driver from the manufacturer's Website. Explanation The first thing to try would be to download and install the latest driver for the device from the manufacturer's website. You would use the Add Hardware wizard to configure legacy (non Plug and Play) devices. Reinstalling or replacing the device should only be done after performing other troubleshooting tasks.

You've just installed a new video card in a employee's Window workstation. When you power the system on and load the OS, everything on the screens looks enlarged and pixelated. You try to change the resolution, but the only available option is 640x480.

Download and install the latest driver from the video card manufacture's website.

You have just installed a new device in your Windows system. After installation, you can't use the device. You check Device Manager and find an icon for the device with a yellow exclamation mark over it. What should you do?

Download the latest driver from the manufacturer's Website. Explanation The first thing to try would be to obtain the latest driver for the device. In this scenario, Windows detected the device, a suitable driver for it. Use the Add Legacy Hardware wizard to install legacy (non Plug and Play) devices. An icon with a black down-arrow over it indicates a disabled device. Replacing the device should only be done after performing other troubleshooting tasks.

You recently installed a fiber-optic network board in an expansion slot in your system's motherboard. You no longer need to use the integrated UTP network board that is integrated in the motherboard. Click the option you would use in the properties of the integrated network adapter in Device Manager to disable it.

Driver Explanation You can disable a device in Device Manager by accessing its properties and then selecting Disable on the Driver tab. You set device-specific settings on the Advanced tab. For example, you can use this tab to set the network adapter's speed and duplex configuration. The Details tab displays extended information about the device. The Resources tab is used to view the hardware resources used by the device.

A router is connected to a network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route on router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?

Drop the packet

Which power supply feature helps prevent circuit overloads by balancing the current flow?

Dual rail

You want to install Windows on a mirrored disk array. You run the motherboard disk configuration utility and create the RAID 1 array, then configure the system to boot from the Windows installation disc. The installation starts but does not detect the RAID array. What should you do?

During the install, browse to and select the appropriate driver for your RAID controller when prompted where you want to install Windows.

You want to connect your small company network to the Internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. What type of NAT should you implement?

Dynamic

Which disk types does Windows support?

Dynamic Basic Explanation Windows supports basic and dynamic disks. When you install Windows, your hard disks are automatically initialized as basic. You can convert them to dynamic disks after Windows is installed. You can use both basic and dynamic disks on the same computer system, but a volume consisting of multiple disks, such as a mirrored volume, must use only one type of disk. Primary and extended are terms that describe partition types on basic disks.

Support up to 128 volumes.

Dynamic Disks

Support volumes that use discontiguous disk space.

Dynamic Disks

Store partitioning information in a hidden database on all such disks in the system.

Dynamic Disks.

which of the following is an error detection technique that can also correct the error?

ECC

Which of the following components is a non-volatile memory technology for saving system when the computer is powered off?

EEPROM chips

Which of the following protocols is classified as a balanced hybrid routing protocol?

EIGRP

You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the unshielded twisted pair patch cable runs 75 feet from the wall outlet, passes through the ceiling and over several florescent light fixtures before reaching the client system. What may be the cause of the connectivity problem?

EMI interference

Peer-to-Peer Network

Each host is in charge of configuring access to resources.

The PCI sound card in your computer stopped working. You decided to use the motherboard's integrated sound until you can replace the PCI sound card. After removing the PCI sound card and powering on the computer, you have no sound and the built-in sound card does not show up in Device Manager. Which should you do to solve the issue?

Edit the CMOS settings and enable the onboard sound .

You have just set up a new laser printer for the company president on her Windows workstation. You have installed the printer and the drivers, what should you do next?

Edit the printer properties to configure device-specific settings

You want to set the encryption attribute for the C:\payroll.xls file. What should you do?

Edit the properties of the file in Windows Explorer

A user sends a print job to a network printer and it prints page after page of random characters. He calls the Help Desk and a Technician discovers that somehow the wrong printer driver had been loaded on the user's workstation. The technician loads the correct driver, verifies that the system works correctly, and documents the resolution. What else should she do?

Educate the user as to how the problem was resolved and verify that they are satisfied with the results.

Which of the following describes the most likely cause of this error?

Either no memory is installed or the memory was not detected.

Since it has no moving parts, a CPU will usually work properly for several years. Which of the following is a common factor that might cause a CPU to fail prematurely?

Electrostatic discharge (ESD)

You have just purchased a new laptop with built in wireless., BT and infrared capabilities provided by a mini-PCIe card. When you boot into Windows, you do not see a Bluetooth adapter listed in Device Manager. What should you do first?

Enable Bluetooth in the BIOS

You have just purchased a new laptop with built-in 802.11 wireless and Bluetooth capabilities. When you boot into Windows, you do not see a Bluetooth adapter listed in Device Manager. What should you do first?

Enable Bluetooth in the BIOS/UEFI configuration

You have configured a remote access server to accept dial-up connections for remote access clients. Remote clients are able to connect successfully and access resources on the remote access server. However, the remote clients are not able to connect to other devices located on the same subnet where the remote access server is located. What action would likely correct the problem?

Enable proxy arp on the LAN connection for the remote access server

A user complains that his USB scanner no longer works. You check Device Manager and see an icon with a black down arrow on it. What should you do?

Enable the device in Device Manager Explanation An icon with a black down arrow through it in Device Manager means that the device is disabled. Simply re-enable the device. An icon with an exclamation mark identifies a device with a problem. Many times this can be fixed by updating the driver, although you might need to replace the device if it no longer works properly.

NFC

Enables communication between two devices that are in very close proximity to each other (only a few inches apart at the most). Generally used for contactless payments.

What is tunneling?

Encapsulating IPv6 packets within IPv4 packets for transmission.

Which of the following features is supplied by WPA2 on a wireless network?

Encryption

You want to use Hibernation on your Windows notebook. What does it need to have?

Enough free hard drive space

What is your top priority when responding to emergencies and hazardous situations?

Ensure the safety of people in the area.

ipconfig /flushdns

Enter the command you can run from the command prompt on these workstations that will allow them to acces the shares on FS1 without performing a full restart

What is the recommended size of the paging file under normal circumstances on a Windows 10 system with 8 GB of RAM installed?

Equal to the amount of physical RAM.

Which of the following are printer languages?

Escape Codes, PostScript, PCL

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

Ethernet

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

Ethernet Explanation Ethernet is a wired local area network (LAN) standard. Most laptops and desktop computers have built-in Ethernet network ports. Bluetooth is a wireless standard that allows the creation of short-range Personal Area Networks (PAN). Token Ring and ArcNet are older wired network standards that are nearly obsolete and not commonly used in a modern LAN 802.11n is a wireless standard used in local area networks.

Which of the following devices allows network communications to be transmitted over existing AC power lines?

Ethernet over Power Explanation An Ethernet over Power device allows for network communications to be transmitted over existing AC power lines. An Ethernet over Power device is plugged in to one AC power outlet, and a second Ethernet over Power device is connected to the same AC circuit. These devices multiplex the AC copper power lines to transmit digital network signals at a frequency higher than the AC electrical power already on the circuit.

Explanation

Ethernet uses a variety of connectivity devices, including the following: A hub provides a central connection for multiple media, segments on the same subnet. When a hub receives a signal, it is repeated out to all other ports. Hubs operate in half-duplex mode, meaning devices can either send or receive data at any given time. A switch provides a central connection for multiple media segments on the same subnet. When a switch receives a signal, it forwards that signal only to the port where the destination device is connected. Switches operate in full-duplex mode meaning devices can send and receive data at the same time because transmission paths are dedicated to only the communicating devices. A router connects two network segments that have different subnet addresses. Routers use the IP address within a packet to move packets between networks. A bridge connects two segments within the same subnet that use different media types. For example, use a bridge to connect wireless clients to wired clients on the same network.

POST Card

Expansion board that is used to troubleshoot a computer that doesn't start up correctly.

A user asks you to perform a task that you do not know how to do and is not in the scope of your job duties. What is the best way to respond?

Explain to the user that his is not a task you can perform, but you will do your best to contact someone who can perform the task.

You are removing screws within a computer, but several have fallen into places you can't reach. Which tool would help retrieve the small screws?

Extension magnet

You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use?

F-Type Explanation Use an F-type connector for broadband cable connections that use coaxial cable. Use a BNC connector for 10Base-2 Ethernet networks. Use an RJ-11 connector for modem connections to a phone line. Use an RJ-45 connector for an Ethernet network that uses twisted pair cable. Use ST and SC connectors for fiber optic cables.

You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use?

F-type

You have just signed up for a broadband home Internet services that uses coaxial cable. Which connector type will you most likely use?

F-type

You have a computer running Windows 7. You need to format a 64 GB flash drive as a single volume. You want the drive to support quick removal, and minimize memory and processor use when reading and writing to the drive. Which file system should you choose?

FAT64

You have a computer running Windows 7. You need to format a 64 GB flash drive as a single volume. You want to drive to support quick removal, and minimize memory and processor use when reading and writing to the drive. Which file system should you choose?

FAT64

FEC0:1319:7700:F631

FEC0:1319:7700:F631:446A:5511:CC40:25AB Which part of the example IPv6 address is the prefix

446A:5511:CC40:25AB

FEC0:1319:7700:F631:446A:5511:CC40:25AB Which part of the example IPv6 address is the interface ID

F631

FEC0:1319:7700:F631:446A:5511:CC40:25AB Which quaret in the example IPv6 is used to identify the subnet

Which of the following is a valid IPv6 address?

FEC0::AB:9007

You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?

FTP

You need to protect the user data on a Windows 8.1 system. Which tools could you use to do this?

File history

You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?

FTP Explanation You should implement the File Transfer Protocol (FTP). It enables file transfers and supports user authentication. The Trivial File Transfer Protocol (TFTP) also enables file transfer, but does not support user authentication. The Simple Mail Transfer Protocol (SMTP) is used to transfer email message from email clients to email servers. The Lightweight Directory Access Protocol is used to access information about network resources stored in a directory server. The Secure Shell Protocol (SSH) is used to securely access the console prompt of a remote computer system. The Simple Network Management Protocol (SNMP) is used to remotely monitor and manage network devices and hosts.

Which of the following objects is installed between the system case and the motherboard's back I/O ports?

Face plate

Chipset

Facilitates communication between processor, memory, and other devices by providing a northbridge and a southbridge

You're troubleshooting a malfunctioning LED display on a notebook computer system. an external monitor correctly displays the output from the notebook. Which of the following could be the cause?

Failed backlight

You're troubleshooting a malfunctioning LED display on a notebook computer system. An external monitor correctly displays the output from the notebook. Which of the following could be the cause?

Failed backlight Explanation In this case, the LEd backlight has failed. The backlight provides illumination to the display. Because the output displays fine on the external monitor, you know the problem is not related to the video card. LED backlights use DC power, eliminating the need for an inverter. A CCFL is one of the backlight methods (LED being the other), and uses an inverter to provide AC power to the backlight.

Lately you hear a clicking noise when reading or writing data from the hard disk. What is the most likely cause of the clicking?

Failing hard drive Explanation A clicking noise when reading or writing data from the hard disk is an early sign of a failing drive. As a precaution, you should move data from the drive as soon as possible in this case. An overheated CPU or bad power supply will cause a spontaneous reboot, not a clicking. A system notification would indicate whether there is a failed drive, as it would not allow reading or writing. A failed UPS (or failed battery in the UPS) would result in a complete loss of power to the computer if the outlet (or wall) power was lost.

Utility

Feature or program included with operating system that performs a system-related task.

Boot Camp

Feature that allows an Apple computer to install the Microsoft Windows OS

Which network type uses light pulses to transmit data?

Fiber optic

Which network type uses light pulses to transmit data?

Fiber optic Explanation Fiber optic networks transmit light pulses rather than electricity to communicate. Satellite networks use radio signals sent and received from a satellite. Cable networks use a cable TV connection and electric signals to send data. Wireless networks use radio waves for sending network data within a local area network.

You need to replace the video card in a laptop. What is the first step?

Find a service manual with correct disassembly procedures.

You work at the IT Help Desk in your company. An employee calls to report a problem with her workstation and a service ticket is assigned to you. You respond to the service ticket immediately and arrive at the employee's workstation within minutes; however, when you being speaking to her, you can't understand what she is saying because she is speaking Spanish, and you do not understand Spanish. What should you do?

Find an interpreter

What does dig -x <IP> host <IP> do?

Finds the host name of queried address.

Memory is not properly seated, missing, or the motherboard is defective

First boot of a new computer

ITX

Form Factor designed for low-power or smaller computers.

BTX

Form Factor that was designed to replace the most common form factor but was never widely adopted.

What tool would you use to configure the drive to use the FAT32 file system?

Format

A router is connected to a network 192.169.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to the network 10.1.0.0/16. What will the router do with the packet.

Forward the packet to the next hop router specified by the route network 0.0.0.0

You have just purchased a used laptop and you want to configure it to hibernate when you press the power button. You edit the Power Options settings and enable hibernation, then you configure the power button to trigger hibernation. Everything works fine for several weeks. However, one day when you press the power button, the laptop does not hibernate. What should you do?

Free up disk space

Which windows component can be used to display information such as weather forecasts, time, and news headlines on the desktop.

Gadgets

You are a PC technician for a national computer retailer. A customer asks you to build three custom computers for him to use at his home office: -Gaming PC -Home Office Server -Thick Client Workstation

Gaming PC -1000 W Power Supply -1 TB SATA HD -Dual SLI 6 GB PCIe video adapters -5.1 channel surround sound adapter -Liquid CPU cooler Home Office Server -2 TB RAID 5 disk array -600 W power supply -No audio adapter -Integrated video adapter Thick Client Workstation -400 W power supply -500 GB SATA HD -512 MB PCIe video adapter -Basic desktop applications isntalled

What is the name of the Mac feature that makes these finger motions available?

Gestures

Which of the following protocols is used by an e-mail client to retrieve messages from an e-mail server and gives users the option to keep mail messages on the server?

IMAP

You have a computer with a 64-bit dual-core processor that runs the 32-bit version of Windows 7 Professional edition. You would like to upgrade to the 64-bit version of Windows 10 Professional. You want to perform the upgrade with the least amount of effort possible. Which of the following steps are required to accomplish this?

Get 64-bit drivers for all hardware Perform a clean installation

What hardware selection is most important when using a thin client?

Gigabit Ethernet adapter

You are purchasing several PC system that will be used as thin clients in a large organization. Which hardware selection criteria would be most important for this system?

Gigabit Ethernet adapter

What is a major benefit of STP over UTP?

Greater resistance to interference

What is a major benefit of STP over UTP?

Greater resistance to interference. Explanation Shielded Twisted Pair (STP) has a grounded outer copper shield around the bundle of twisted pairs around each pair. This provides added protection against EMI. Unshielded Twisted Pair (UTP) does not have a grounded outer copper shield.

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the individual wires to the connector. Which wire should be connected to pin 1?

Green with white

You are using a crimper to attach an RJ-45 connector to a Cat UTP cable. You need to use the T568A standard to connect the individual wires to the connector. Which wire should be connected to pin 1?

Green with white Explanation According to the T568A standard, the green with white wire should be connected to pin 1 in the Rj-45 connector.

Which component within a tablet device measures acceleration horizontally and vertically at the same time?

Gyroscope Explanation A gyroscope within a tablet device measures the vertical and horizontal orientation of the device. Accelerometer is also called a g-sensor. It detects the physical movements of the tablet by measuring its linear acceleration in one dimension. An attitude indicator is a type of gyroscope that is used in airplanes.

You are building an HTPC (home theater PC) that will be connected to an HDTV. You want to be able to play Blu-ray on the HTPC. Which of the following features should make sure your video card and HDTV support?

HDCP

Which IP protocol is used by Web browsers and Web servers to exchange files?

HTTP

Which IP protocol is used by Web browsers and Web servers to exchange files?

HTTP Explanation HTTP is used by Web browsers and Web servers to exchange files (such as Web pages) through the network. HTML is a data format that is used to create hypertext documents that can be viewed from multiple platforms. SSL secures messages being transmitted on the network. SMTP is used to route electronic mail through an internetwork.

Which protocols are used on the Internet to transmit Web pages from Web servers to Web browsers running on client workstations?

HTTPS HTTP Explanation The HyperText Transfer Protocol (HTTP) is used by Web servers and browsers to transmit Web pages over the internet. This is often confused with HTML or HyperText Markup Language, which is the markup language used to create Web content. XML is also a markup language. SMTP is used to route electronic mail through the internetwork. E-mail applications provide the interface to communicate with SMTP or mail servers. The Network News Transfer Protocol or NNTP is an Internet application protocol used primarily for reading and posting Usenet articles.

What storage device uses magnetic film or aluminum platters for storing data?

Hard disk

Which storage device uses magnetic film or aluminum platters for storing data?

Hard disk Explanation Hard disks use magnetic disks and platters. Optical drives such as DVD or CD-ROM drives, use a reflective surface that is read by an optical reader. Flash devices such as SD cards store information using programmable, non-volatile flash memory. DLT drives use magnetic tape.

You need a storage device that has very large storage capacity, is fast and is relatively inexpensive. Which storage device will best suit your needs?

Hard disk Explanation A hard disk has a large memory capacity, is fast, and is relatively inexpensive. Optical disks are also inexpensive, but are not as fast and do not provide the storage capacity of hard disks. USB flash drives are not as inexpensive as hard disks with equal storage capacity and are not available with the capacity as the larger hard disks. Solid State Drives (SSD) have a large memory capacity and are fast, but are much more expensive than comparable hard drives.

A thick magnetic disk made of aluminum platters. Uses read/write heads to access data stored on the platters.

Hard disk drive (HDD)

Up to several TB in storage capacity and cost per MB is cheap.

Hard disk drive (HDD)

Explanation

Hard disk drives (HDD) are thick magnetic disks made of aluminum platters, They use read/write heads to access data stored on the platters. They have up to several TB in storage capacity and their cost per MB is cheap. Solid state drive (SSD) is a flash device with storage capacity similar to a small hard drive. They are faster than other devices. They have no moving parts and last longer than other storage devices. Optical discs use lasers to read and write information that is stored in the form of pits in their reflective coating. They are ideal for storing and playing music and video. They are portable and cheap and have a long shelf life.

Incompletely or improperly doing this can cause errors that appear to be memory related

Hardware installation or removal

What do RIRs do?

Has IP authority over specific region of world, assigns blocks of addresses to ISPs.

DDR2 DIMM

Has a notch slightly closer to the middle and has 240 pins

DDR4 DIMM

Has a single notch slightly right of center. Has 288 pins

DDR3 DIMM

Has a single notch that is more off-center than the notch from DDR or DDR-2. Has 240 pins

DDR DIMM

Has a single notch, slightly off center. Has 184 pins

What is a DNS authoritative server?

Has full copy of all records for a domain.

While answering Help Desk Calls, a field customer calls and complains that he cannot print to a workgroup laser printer. Which of the follwoing should be the first question you ask?

Have You ever rebooted the chose safe mode

After arriving in a new city today, a traveling sales team member calls you stating that his wireless connection no longer work. He has checked the wireless configuration and he knows it to be correct because it was working yesterday. What should you do first?

Have him verify that the wireless card's hardware switch in the On position. Explanation Have the user verify that the wireless card's hardware switch is in the On position. Many built-in wireless cards can be turned off and on through a switch on the laptop case. Because this is a likely problem and easy to check, you should do this first before trying other solutions.

After arriving to a new city today, a traveling sales team member calls you stating that his wireless connection no longer works. He has checked the wireless configuration and he knows it to be correct because it was working yesterday. What should you do first?

Have him verify the wireless card's hardware switch is On

Indicates that the disk is turned on and can be accessed and the volume on the disk is valid and has no errors.

Healthy

You have four volumes on a basic hard disk. You convert the disk to dynamic. After the conversion, which of the following do you expect to see as the status of the fourth volume if it is valid and has no errors?

Healthy Explanation If a basic disk gets converted to dynamic, the status of all partitions on that disk would be changed to show just Healthy. There are no Primary or Logical partitions on a dynamic disk. A basic hard disk can only have 4 primary partitions. To get around this limitation on basic disks, the fourth partition is automatically configured as an extended partition that can hold logical drives. So, the fourth partition would show a status of Healthy (Logical Drive).

You have four volumes on a basic hard disk. Which of the following do you expect to see as the status of the fourth volume if it is valid and has no errors?

Healthy (Logical Drive) A basic hard disk can only 4 primary partitions. To get around this limitation on basic disks, the fourth partition is automatically configured as an extended partition that can hold logical drives. So, the fourth partition would show a status of Healthy (Logical Drive). The first three partitions would show a status of Healthy (Primary Partition). If the disk had been a dynamic disk the status would just be Healthy. If the disk gets converted from basic to dynamic, the status would be changed to show just Healthy.

A user calls to report a problem. She is trying to install an application on a Windows 10 system, but cannot. In the past, she installed applications on her Windows XP system without any issues. Her user account has always been a member of the Power Users group. What do you suspect is causing the installation issue?

Her group membership denies program installation on the operating system.

You want to use your Windows workstation to browse the web sites on the Internet. You use a broadband DSL connection to access the Internet. Which network protocol must be installed on your workstation to do this?

IP

You are a PC technician for a national computer retailer. You are asked to build each of the systems listed on the right. You need to use the most appropriate hardware components to ensure that each of these systems will fulfill its intended role.

Home Office Server -2 TB RAID 5 disk array -600W power supply -No audio adapter -Integrated video adapter Gaming PC -1000W power supply -1 TB SATA HD -Dual SLI 6GB PCIe -Video adapters -5.1 channel surround sound adapter -liquid CPU cooler Home Theater PC -HDMI output -Compact form factor -5.1 channel surround sound adapter -TV tuner adapter Virtualization Workstation -AMD 12-core, 4 GHz CPU -4 TB SATA HD -32 GB DDR4 RAM -Hardware-assisted virtualization Thin Client Workstation -Intel Celeron dual-core, 2.7 Ghz CPU -500 GB SATA HD -2GB DDR3 RAM -Few or no applications installed Audio/Video Editing Workstation -Intel Core i7 six-core, 3.4 GHz CPU -2 TB SSD SATA HD -16 GB DDR4 RAM -High-end audio adapter with speaker system -High-end video adapter with dual displays

Click View Lab and use tracert command from the IT administrator workstation (named ITAdmin) to answer the following question. Below are the IP addresses of the hops in the path between ITAdmin and the external DNS server on the Internet which has an IP address of 163.128.80.93. Drag the IP address listed on the left, to the hops to the right.

Hop 1: Default gateway for ITAdmin - 192.186.0.5 Hop 2: CorpNet Main Router - 198.28.56.1 Hop 3: Network Security Appliance - 65.86.24.136 Hop 4: ISP Internet Router - 65.86.1.1 Destination: External DNS Server - 163.128.80.93

Your desktop workstation system uses a SCSI bus to connect storage devices. The SCSI host adapter is assigned an ID of 7, the SCSI hard disk is assigned to an ID of 5, the SCSI tape drive is assigned an ID of 3, and the SCSI DVD drive is assigned an ID of 0. Which device has the highest priority on the SCSI bus?

Host adapter

DHCP

Host contacts a server to obtain IP addressing and other configuration information.

Which mechanisms could you use to resolve a hostname into its associated IP address?

Host file and DNS

APIPA

Host is automatically configured by OS if it cannot obtain IP addressing and other configuration information automatically.

Static

Host is manually configured for IP addressing and other configuration information.

Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis?

Hotfix

Click the View Lab button and use the tracert command to identify the devices in the path between the IT Admin workstation and a remote computer on the Internet which has an IP address of 216.48.8.6.

How many routers are in the path between ITAdmin and the remote computer? 6 What is the default gateway address for ITAdmin?192.168.0.5 What is the IP address of the lat router int he path between ITAdmin and the remote computer? 73.44.216.14

Connects segments on the same subnet. Repeats signals out to all other ports.

Hub

Operates in half-duplex mode, meaning devices can either send or receive data at any given time.

Hub

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?

Hub

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?

Hub Explanation A hub and a repeater send receive signals out all other ports. These devices do not example the frame or the packet contents. A switch or a bridge use the MAC address in a frame for forwarding decisions. A router uses the IP address in a packet for forwarding decisions.

Which term describes the layer of software that resides between the virtual operating system and the physical hardware it is running on in a virtualization enviroment?

Hypervisor

Allows two devices in a computer to send information to each other

I/O address

Each device in a computer must have its own

I/O address

Most devices that you install in a system require little to no configuration; they simply work after you plug them in. This is because devices are automatically assigned the system resources needed for the device to begin functioning What are the three types of system resources that are usually automatically assigned?

I/O address, IRQ, DMA channel

Which tool would be the best choice to remove and replace the motherboard BIOS chip?

IC extractor

What does IGMP do?

IDs groups members and forwards multicast packets to the segments where group members reside.

Which of the following standards provides for data transfer rates up to 800 mbps with a maximum cable length of 100 meters?

IEEE 1394b

You have a private network connected to the internet. Your routers will not share routing information about your private network with Internet routers. Which of the following best describes the type of routing protocol you would use?

IGP

You want to use your Windows workstation to browse the web sites on the Internet. You use a broadband DSL connection to access the Internet. Which network protocol must be installed on your workstation to do this?

IP Explanation The IP is the protocol of the Internet. If you want to use the Internet, your computer must have the IP protocol installed and configured. The Serial Line Internet Protocol (SLIP) is a mostly obsolete encapsulated of the Internet Protocol designed to work over serial ports and modem connections. The Point-to-Point Protocol (PPP) is also commonly used with modem connections. IPX/SPX is the protocol suite used on legacy NetWare networks. NetBIOS is the term used to describe the combination of two protocols: NetBEUI and NetBIOS. NetBIOS was used in early Windows networks. Because NetBIOS is a non-routable protocol, it was often combined with TCP/IP or IPX/SPX to enable internetwork communications.

Automatic Private IP Addressing (APIPA)

IP address 169.254.0.1 What is this special IP configuration called

The method used by different system devices to interact with the CPU

IRQ (Interrupt Request)

Allows a device to request processing time from the CPU

IRQ (Interrupting Request)

Which of the following network technologies is packaged as part of a BRI plan?

ISDN

What is a DNS MX record?

Identifies servers that can deliver mail.

You are responsible for managing client workstations for your company. A frantic user calls you one morning exclaiming that "nothing is working" What should you do first in the troubleshooting strategy?

Identify the problem

Why is it important to have your mobile device charger plugged in while it is receiving an operating system update?

If the battery dies during the update, the operating system could become corrupted

Under which of the following circumstances might you implement BGP on your company network and share routes with Internet routers?

If the network is connected to the Internet using multiple ISPs

If a printer is not Wi-Fi capable, how can it be set up to provide the most reliable wireless printing?

If the printer is Ethernet capable, it can be connected to the network through a wireless router

If a printer is not Wi-Fi capable, how can it be set up to provide the most reliable wireless printing?

If the printer is Ethernet capable, it can be connected to the network through a wireless router.

You are updating the operating system on your iPad. Your iPad is connected to your computer and you are using iTunes to install the update. What would happen to your iPad if you disconnect it before the operating system update is complete?

If you disconnect during the update, the operating system could become corrupted.

You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. she accidentally left a report open next to her computer which states that a friend of yours in accounting will be submitted for review if their poor work performance continues. What should you do?

Ignore the paper and tell no one of its contents

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling?

Immunity to electromagnetic interference. Greater cable distances without a repeater. Explanation Compared to other types of cabling, fiber optic cabling allows greater cable distances without a repeater and is immune to electromagnetic interference. However,installation costs more and takes longer. In addition, fiber optic cabling is much less flexible than other cabling.

You have been asked to recommend a printer that will be used in a travel agency. The printer will be used to print airline tickets. Each ticket has 4 pages, and the same information must show up on all four pages with a single pass of the printer. Which printer type would you recommend?

Impact

You have been asked to recommend a printer that will be used in a travel agency. The printer will be used to print airline tickets. Each ticket has four pages (multi-part, carbon-based forms), and the same information must show up on all four pages with a single pass of the printer. Which printer type would you recommend?

Impact

You have been asked to recommend a printer that will be used in a travel agency. The printer will be used to print airline tickets. Each ticket have four pages (multi-part, carbon-based forms), and the same information must show up on all four pages with a single pass of the printer. Which printer type would you recommend?

Impact

Procedure

Important: When accessing the Drive Bays and Motherboard make sure that the computer is turned off. 1. Click on Drive Bays. 2. Install three Hard Drives, Internal, SATA. 3. Click on Power Supply. 4. Select the 15-pin SATA connector and provide power to the three Hard Drives. 5. Click the Cable. 6. Select the SATA Cable Three Times. Remember that there are Partial Connections. 7. Click on Motherboard. 8. Connect the other end of the SATA cables to the SATA connectors on the Motherboard. 9. Click Front. 10. Turn on the computer and press Delete to enter the BIOS. 11. Click on System Configuration. 12. Click on SATA Operation. 13. Select RAID On. 14. Click Apply. 15. Click Exit. 16. Press Ctrl+I to the RAID Configuration. 17. Press 1 to Create RAID volume. 18. Leave the name as Volume 0. 19. Press Tab to go to the RAID Level. 20. Use the Arrow Buttons to Select RAID 5, which provides both fault tolerance and improved performance. 21. Leave Disks, Stripe Size, and Capacity. 22. Press Enter to create the Specified volume. 23. When the warning: ALL DATA ON SELECTED DISKS WILL BE LOST are you sure you want to create this volume> (Y/N) press Y for Yes. 24. Check the Disk Volume Information. 25. Press Done.

You want to make a printer on a Windows workstation available only between certain hours. Which path would you use to edit this setting?

In Devices and Printers, right-click the printer object and select Printer Properties. Use the Advanced Tab

You have implemented a regular backup schedule for your Windows server, backing up all data every weekend with incremental backups every other night. Your company has decided against storing backup tapes at an offsite location. Where would be the next best place to keep your backup tapes?

In a fireproof, locked safe

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?

In a locked fireproof safe

You need to place a wireless access point in your two-story building? While trying to avoid interference, which of the following is the best location for the access point?

In the top floor

You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder. What should you do?

Include the D:\Reports folder in the Library.

Your laptop has an Express card /54 slot.( What shape can cards? What kind of cards fit?)

Includes cards which are rectangular-shaped. // You can use an ExpressCard/34 card of ExpressCard/54 card in the laptop

When you try to read a particular DVD-R disc, you receive an error message. Other discs work fine. Which of the following are the most likely problems? (2)

Incorrect disc format / dirty of scratched disc

What error can happen with incompatible memory installation?

Incorrect memory count

Your monitor is displaying images using strange colours. Which of the following is a solution to this problem?

Increase the colour depth. Explanation To solve colour shift problem, you need to increase the colour depth. The colour depth controls the number of colours that can be displayed on the screen at a time. The actual colours that are used on the screen is determined by the colour palette. The number of colours in the palette is dtermined by the colour depth. If the colour depth is low (such as 256 or 16,000), colours unavailable in the palette are shifted to the closest available colour. The screen resolution determines the size of the display area. Modern video adapters typically have more than enough memory to display the full colour palette.

Audio Sampling Rate

Increases sound quality by providing a more accurate representation of sound.

Audio Channels

Increases sound quality by sending different signals to different speakers

You need to find a file that you saved on your computer. You will have to search for it because you don't remember which directory it was saved in. Which windows feature improves the speed of file searches on your computer?

Indexing service

Spotlight

Indexing utility that can perform system-wide searches to locate folders, files, apps, and Internet results.

Which of the following is not an advantage of SSDs over HDDs?

Inexpensive Explanation Solid State Drives (SDDs) are generally more expensive than hard disk drives (HDDs). Some advantages of SSDs over HDDs include the following: They are faster They have no moving parts so they last longer. They have lower power consumption. They are less susceptible to physical damage (from dropping) and immune from magnetic fields. They are smaller and lighter.

Your computer currently runs Windows 10 Professional edition. You want to create a RAID 10 array using four newly-installed SATA disks. When you go to Disk Management, the option to create the RAID 10 array is not available. What should you do?

Install an add-on RAID controller. Explanation Windows 10 desktop operating systems support creating RAID 0 and RAID 1 arrays in Disk Management, but do not support configuring RAID 5 or RAID 10. To use RAID 10 on a client computer, you will need to use a RAID controller installed into an expansion slot or integrated into the motherboard.

Shows while a disk is being converted from a basic disk to a dynamic disk.

Initializing

You have a notebook computer with a built-in wireless network card. One day it stops working. Because the network card is integrated onto the motherboard, you do not want to replace the entire motherboard. What can you use to connect to the wireless network? (2)

Insert a wireless USB network card // Insert an ExpressCard wireless network card

You are working as a desktop technician for a small company. You recently bought a new desktop computer with 6 GB RAM and a video card with 512 MB of memory. You want to install Windows 10 on this system. You need to use the edition of Windows 10 that will use the full 6 GB of available RAM. What should you do?

Install Windows 10 64-bit Enterprise edition.

You need to install Windows 10 on a new computer system that uses a SATA SSD device to store data. What should you do to complete this installation?

Install Windows in the same way you would a system that uses a standard hard disk drive.

You have installed a new computer with a quad-core 64-bit processor, 6 GB of memory, and a PCIe video card with 512 MB of memory. After installing the operating system, you see less than 4 GB of memory showing as available in windows, what should you do?

Install a 64-bit version of the operating system.

If you wanted to use RAID 5 or RAID 10 on a Windows 10 client computer, what would you need to do?

Install a RAID controller into an expansion slot

What do you do if the motherboard does not have a Serial ATA connector?

Install a Serial ATA host adapter in an expansion slot.

A manager wants you to install a Serial ATA hard drive into his computer, but the motherboard does not have a Serial ATA connector. What should you do?

Install a Serial ATA host adapter in an expansion slot. Explanation To add a feature to a computer, add an expansion card in a free bus slot. In this case, you could add a Serial ATA host adapter in a free PCI slot.

Which actions allow you to access the Internet on your laptop via a cellular network?

Install a cellular USB adapter in a open port on the laptop

What action will allow you to access the Internet on your laptop via a cellular network?

Install a cellular USB adapter in an open port on the laptop

You're troubleshooting an older laser printer that is creating 'accordion jams' where the paper is crumpled as it exits the printer moving into the output tray. What can you do to fix this problem?

Install a maintenance kit

A user has created a complex spreadsheet on her workstation containing many graphs and charts. She sent the documents to an older network laser printer that is shared by everyone in her department. When she picked up the output only the top half of each page was printed and the bottom half was blank. What should you do?

Install additional memory in the printer

A user has created a complex spreadsheet on her workstation containing many graphs and charts. She sent the document to an older network laser printer that is shared by everyone in her department. When she picked up the output only the top half of each page was printed and the bottom half was blank. What should you do?

Install additional memory in the printer.

Your computer currently runs Windows 7 Enterprise edition. You want to create a RAID5 array using the newly-installed SATA disks. When you go to Disk Management, the option to create the RAID5 array is not available. what should you do?

Install an add-on RAID controller

Your computer currently runs Windows 7 Enterprise edition. You want to create a RAID 5 array using three newly-installed SATA disks. When you go to Disk Management, the option to create the RAID 5 array is not available. What should you do?

Install an add-on RAID controller Explanation Windows 7 desktop operating systems support creating RAID 0 and RAID 1 arrays in Disk Management, bu do not support configuring RAID 5. To use RAID 5 on a client computer, you will need to use a RAID controller installed in an expansion slot or integrated in the motherboard.

Your supervisor recently purchased 100 desktop computer systems and 100 new Windows 10 licenses for your organization's Accounting department. She received a single Windows 10 installation disc with the licenses.

Install one system and image it to the other systems. Use a network installation.

You are setting up a small network in your office with one Windows server and 50 Windows workstation. You want to spend as little time as possible configuring the workstations with IP addressing information. What should you do?

Install the DHCP service on your server

You have a computer with a dual core 64-bit processor that uses the x86-x64 instruction set. You want to install the 32-bit application on the computer. What should you do?

Install the application normally

You have a computer with a dual core 64-bit processor that uses the x86-x64 instruction set. You want to install the 32-bit application on the computer. What should you do?

Install the application normally.

You have an existing computer running Windows 7 Enterprise. You want to configure a RAID 1 array in the computer. You install two new SATA drives, then use the RAID controller integrated in the motherboard to define a RAID 1 array using them. When you boot the computer, Windows does not show the logical RAID drive. What should you do?

Install the drivers for the RAID controller.

You have an existing computer running Windows 7 Enterprise. You want to configure a RAID1 array in the computer. You install two new SATA drives, then use the RAID controller integrated in the motherboard to define a RAID1 array using them. When you boot the computer, Windows does not show the logical RAID drive.

Install the drivers for the RAID controller.

You have an existing computer running Windows 7 Enterprise. You want to configure a RAID 1 array in the computer. You install two new SATA drives, then use the RAID controller integrated in the motherboard to define a RAID 1 array using them. When you boot the computer, Windows does not show the logical RAID drive. What should you do?

Install the drivers for the RAID controller. Explanation You must install the RAID driver so that Windows recognizes arrays created by the motherboard RAID utility. Without the driver, Windows will not be able to see the logical drive defined by the array. When you define the array, you configure the BIOS to use RAID as the SATA type. If you had not completed this step, you would not be able to run the RAID configuration utility,. Use AHCI to configure SATA drives to support hot-swapping.

Which of the following actions taken on a Windows workstation will directly improve system security?

Install the latest updates.

You need to connect a new USB scanner to the USB port on your computer. What should you do?

Install the scanner drivers, then connect a scanner drivers, then connect the scanner to the USB port and complete the Add a Device wizard when it pops up.

you are the network administrator for a small company. You purchase eight copies of Windows at a local retail outlet. You install Windows successfully on eight computers in the office. A month later you start receiving calls from those who have used those copies of Windows saying that they are no longer able to log on to their computers. What should you do?

Instruct the employees to activate their Windows installation.

Software

Instructions or data that are stored electronically, either on a hard drive or a special chip.

Don is an accountant in the Finance department. For the last several months he has been testing an online accounting program. After speaking with his manager, don received permission to download a streamlined version of the software which requires a local installation. after downloading, Don tried to install the application, but the operating system will not allow it. Out of frustration, he called the Help Desk. The Help Desk personnel came to Don's machine and installed the application without issue. Which of the following is the most likely reason Don could not install the application?

Insufficient permissions

Don is an accountant in the Finance department, and for the last several months has been testing an online account program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. After downloading, Don tries to install the application on his Windows 10 workstation, but the operating system does not allow it. Out of frustration, he calls the Help Desk. The Help Desk personnel comes to Don's machine and installs the application without issue. Which of the following is the most likely reason Don could not install the application?

Insufficient permissions.

Match each CPU socket on the left with appropriate CPU it is designed to support on the right. Each socket can be matched up with more than one CPU.

Intel Core 2 duo: 775 AMD Athlon 64 X2: AM2+ Intel Core i7: 1366 AMD A-series APU: FM1 Intel Pentium D: 775 Athlon 64 FX: 940 intel Xeon 1366 AMD Phenom: AM2+

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While she normally works from her office, today she is trying to access the wireless network from a conference room which is across the hall and next to the elevator. What is the most likely cause of her connectivity problem?

Interference is affecting the wireless signal

Which TCP/IP utility gives you the following output? Ethernet adapter Local Area Connection:

Ipconfig

You have been called in to troubleshoot a connectivity problem on a newly installed Windows Server 2003 system.The system is operating satisfactorily and is able to communicate with other systems on the local network.However it is unable to access any systems on other segments of the corporate network. You suspect that the default gateway parameter for the system has not been configured,or may be configured incorrectly.Which of the following utilities are you most likely to use to view the default gateway information for the system?

Ipconfig

Which of the following best describes how a switch functions?

It connects multiple cable segments (or devices), and forwards frames to the appropriate segment

Which of the following best describes how a switch functions?

It connects multiple cable segments (or devices), and forwards frames to the appropriate segment. Explanation Switches have multiple ports and can connect multiple segments or devices. The switch forwards frames to the appropriate port. They function similarly to a hub, except instead of sending packets to all ports, switches send packets only to the destination computer's port.

Which of the following statements accurately describes how a modem works?

It demodulates analogue data from a telephone network into digital PC data. It modulates digital data from the PC into analogue data and transmits it on a telephone network. Explanation Modem is shorthand for modulator/demodulator. Its job is to convert (or modulate) digital data from a PC into analogue telephone signals and transmit them through a telephone network. It also receives analogue data from the telephone network and converts (or demodulates) it into digital PC data.

What is the purpose of an MSDS

It documents how to safely handle and dispose of hazardous materials.

Which of the following are characteristics of coaxial network cable?

It has a conductor made from copper in the center of the cable. It uses two concentric metallic conductors. Explanation Coaxial cable is composed of a central copper conductor surrounded by an insulator which is then surrounded by a second metallic mesh conductor. The name coaxial is derived from the fact that both of these conductors share a common axis. Twisted-pair cables are twisted around each other to reduce the effects of Electromagnetic Interference (EMI) and crosstalk. Fiber optic cables have a plastic or glass center, known as the core. Only fiber optic cables are totally immune to Electromagnetic Interference (EMI), because light pulses, instead of electrical signals, represent the data.

Which of the following is true of the Guest user account on a Windows system?

It is disabled by default.

What is a DB-15 connector on a sound card typically used for?

Joystick and MIDI port

You have three computers in your office. You would like to reduce the time it takes to move from one computer to the next, and you would like to use only one keyboard, one monitor, and one mouse for all three computers. Which device will allow this type of setup?

KVM

Dock

Main taskbar in Mac OS

You want to update your Windows 7 system to Windows 10. You want to keep your personal settings intact and complete the upgrade as quickly as possible. You purchase and upgrade version of Windows and perform an in-place upgrade. What should you do next?

Make sure that all installed applications run correctly.

Which of the following are steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus?

Keep the operating system up to date. Lock the screen with some form of authentication. Explanation Keeping the operating systems up to date with the latest updates and patches will help because they often contain fixes for known security issues. Configure the screen lock to require some sot of authentication to physically access your device. A remote backup is an essential disaster recovery solution but will not prevent hacker exploitation or virus infection. Having your device always in your possession, it can still be hacked and infected by a virus if not protected. Anti-virus apps for Android devices will protect your device but you should do some research to make sure you get the most effective one. Turning off locations services does not improve your device's security and it will make it harder to find your device if you lose it.

Which of the following is the name of the core of the operating system that is loaded into memory when the system boots up? This part of the operating system is responsible for -Controlling security -managing the file system -Providing a platform for applications to run on

Kernal

What are 2 characteristics of the ExpressCard/54 form factor?

L shape // 34mm wide at the connector

You are putting together a system for a graphic artist and need to make sure you get a display that meets her needs. The display needs to have very good colour reproduction quality and viewing angles. The display needs to run cool and be power efficient. Which type of display is most likely to meet these needs?

LCD display with IPS panel Explanation LCD displays with IPS panels have the best colour representation quality and viewing angles among LCDs. TN panels have imperfect colour representation due to the fact that only 6-bits per colour can be displayed and have poor viewing angles. LCDs with IPS panels use far less power and run much cooler than plasma displays. They are more expensive than LCDs with TN panels but are still more affordable than OLED displays.

You are putting together a gaming system and need to make sure you get a display that meets your needs. The display needs to have a very good response time, and you would prefer that it be affordable and power efficient. Which type of display is most likely to meet these needs?

LCD display with TN panel. Explanation LCD displays with TN panels are the most common technology used by LCDs. TN panels have very good response times (1-5 ms) and refresh rates (60-144 Hz), so they are great for PC gaming. They are more affordable and have faster response times than LCDs with IPS panels, use far less power than a plasma display, and far more affordable than OLED displays.

Which of the following is true of modern LCD monitors regarding backlighting?

LEDs are used to backlight the screen. Explanation Modern LCDS use LEDs (light-emitting diodes) to backlight the screen. Older LCD monitors use cold cathode fluorescent lamps (CCFLs) for backlighting. Plasma displays use millions of small cells that contain electrically charged ionized gases and don't need backlighting. RGB-LED displays are available on modern LCD displays; they gave an array of special LEDs that are able to emit red, green, and blue light, resulting in superior colour accuracy but as the most expensive type of backlighting technology.

Internet

Large, world-wide, public network.

Which type of printer uses a drum, plastic toner, and fuser to create a printed page?

Laser

Which type of printer uses lasers and electrical charges to transfer images to paper?

Laser

Which type of printer uses the drum, plastic toner, and fuser to create a printed page?

Laser

Which device type should typically not be plugged into a protected outlet on a UPS unit?

Laser Printer

A new laptop was delivered to your home and left on the porch while you were at work. It is very cold outside, and you don't know how long it has been there. You unpack the computer and would like to know if it is working properly. What should you do?

Let the computer warm up to room temperature before turning it on.

Which of the following is a symptom of a dirty drum or roller in a laser printer?

Lines or splotches repeated at regular intervals on the print job

Which of the following is a symptom of a dirty drum or roller in a laser printer?

Lines or splotches repeated at regular intervals on the print job.

What thermal solution is used when air cooling isn't sufficient and is composed of tubes, cooling plates, a reservoir, and a radiator?

Liquid-based cooling

What battery type offers the greatest storage capacity in the smallest amount of space?

Lithium Ion

After installing two memory modules, you power on the system to check for errors. You find that the BIOS program recognizes only on of the memory modules. What should you do first?

Make sure that both modules are seated properly in their slots.

You are configuring a new system and want to use RAID 0 array for the operating system using SATA disks and the RAID functionality built into the motherboard. Which of the following actions will you take as part of the configuration?

Load the RAID drivers during operating system installation

You are configuring a new system and want to use a RAID 0 array for the operating system using SATA disks and the RAID functionality built into the motherboard. Which of the following actions will you take as part of the configuration?

Load the RAID drivers during operating system installation. Explanation If using an onboard RAID controller with SATA drives, edit the CMOS settings and identify the drive type as RAID. This tells the system to load the onboard BIOS for accessing the connected drive. If you want to install the operating system on a RAID array, you will need to manually load the controller driver so that Windows can see the RAID array.

A network in a small geographic area that typically uses wires to connect systems together.

Local Area Network (LAN)

A set of subnets connected to each other, typically by wires, using at least one router.

Local Area Network (LAN)

Which aspects of virtual memory can you configure on a Windows workstation?

Location of the paging file. Maximum size of the paging file.

Which of the following will improve the security of sensitive information on your device if it is lost or stolen?

Locator applications. Remote wipe. A screen lock. Explanation Being able to do a remote wipe of your device will keep sensitive information from falling into the wrong hands if your mobile device is lost or stolen. Having a screen lock will help keep casual users from getting access to your device, but determined hackers can find ways around a screen lock. Locator applications might help you find your device, before a determined hacker does, if you misplace it. Keeping the operating systems up to date with the latest updates and patches will not protect your device if it falls into a determined hacker''s possession. A remote backup is an essential disaster recovery solution but will not prevent hacker exploitation or virus infection. Being up to date and having anti-malware apps, for Android devices, will note protect your device in a determined hacker's possession.

of the following choices, which action could be most physically harmful to you?

Looking into the end of a fiber optic cable

A printer is behaving erratically and you suspect a faulty parallel port. Which tool can you use to test the parallel port?

Loopback plug

Which of the following could be detrimental while flashing the BIOS?

Loss of power

A series of used clusters on the hard disk drive that are not associated with a specific file.

Lost clusters.

What is an advantage of the exFAT file system over NTFS?

Lower memory and processor resource use

Which of the following is an advantage of the exFAT file system over NTFS?

Lower memory and processor resource use

Which of the following features on a wireless network allows or rejects client connections based on the hardware address?

MAC address filtering

Which port on a sound card should you connect a non-amplified microphone to?

MIc In

Terminal

Mac OS command line interface utility

You have just finished installing a new SATA hard disk in your computer. Now your SATA DVD drive won't work. What should you do first?

Make sure that the DVD SATA cable is connected. Make sure that the DVD power cable is connected. Explanation The first thing to check would be the simple and obvious things. Make sure that the cable connecting the DVD drive is secure. It is possible that during the installation of the hard disk that the cable might have come loose. All of the other choices would involve significantly more work. Master and Slave settings are not used on SATA devices. Moving the DVD drive to another system might make it start working, but you should verify the current configuration before trying that. Replacing the DVD drive should only be done after you verify that it is not working correctly.

A user complains that his notebook display has started to go dim intermittently. You suspect the backlight might need to be replaced but you want to verify that the backlight is failing before you replace it. What should you check before replacing the backlight?

Make sure that the dimming isn't being caused by a power saving method that has been configured to conserve notebook power. Explanation It is possible that the configuration of the power saving method has been changed and is dimming the screen earlier than the user is accustomed to. You should first check to see if the power saving method is working as configured.

You have just finished upgrading the 250 W power supply in your desktop computer to a 450 W power supply. Now the BIOS doesn't recognize one of the hard disk drives in the system during POST. What should you do?

Make sure that the hard disk is connected to the power supply. Explanation Because you have just made a system change, you should check items related to the change you have made. In this case, check to make sure that power connectors are plugged in.

panicked user comes to you at the support desk and asks you to come to his office because his notebook has no power. He's positive that his battery has completely failed because he came in this morning and there is no power at all to his laptop. He left it plugged in on his desk all night but it will not turn on. He has an important presentation to make in a couple of hours and insists that you bring a replacement battery. What troubleshooting steps should you do before replacing the battery?

Make sure the DC cord from the power adapter is plugged firmly into the notebook power connector. Make sure the AC cord is securely plugged into both the wall outlet and the power adapter. Explanation When a computer will not turn on, the first troubleshooting steps are always to make sure it is plugged in. In the case of a notebook computer there are two cords that have to be plugged in: - The AC cord that plugs into the wall outlet and the power adapter. - The DC cord form the power adapter that plugs into the notebook power connector. If these cords are plugged in securely, but not providing power, the next step is to replace it with a known good power adapter.

You have just finished installing a new hard disk in your computer. Now the DVD drive won't work. What should you do first?

Make sure the DVD drive cables are connected

You are trying to connect a new USB device to your computer. You install the driver, then connect the device to an open USB port. The device does not work. What should you do first?

Make sure the USB device is plugged in properly. Explanation The first thing to check would be if the USB device is plugged in properly. If that doesn't correct the problem, you might try a different USB cable before doing more extensive troubleshooting. You should only replace the device or install a new USB controller card after verifying where the problem lies. For example, if you try the device on another computer and it still doesn't work, you might assume that the device is defective. If the device works on a different computer, then the USB ports on the first computer might be defective.

You recently upgraded the process in your laptop computer to a faster processor. The computer runs, but after using it for several minutes, it shuts down unexpectedly. Which of the following should you do first?

Make sure the case fans are plugged in.

You have just finished upgrading the power supply in your desktop computer. Now the hard disk will not work. What should you do first?

Make sure the power connectors on the hard disk are plugged in all of the way. Explanation Because you have just a made a system change, you should check items related to the change you have made. In this case, check to make sure that power connectors are plugged in.

If a notebook computer with an integrated wireless network adapter shows that there is no wireless network connection, what should you check first?

Make sure the switch that turns the wireless network card on and off is in the on position. Explanation The quickest and easiest solution should be checked first. With wireless network cards on notebook computers, if the network card switch has been turned off, turning it back on is the easiest solution to try.

Which printer permission would you assign to a user so that she can pause the printer?

Manage this Printer

Which printer permission would you assign to a user so that she can pause the printer?

Manage this printer

What does IANA do?

Manages the assignment of IPs over the internet.

have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks? .

Manually reconfigure the default route to point to the new next hop router

What is a DNS PTR record?

Maps an IP address to a hostname.

What is a DNS A record?

Maps an IPv4 DNS hostname to an IP address.

What is a DNS AAAA record?

Maps an IPv6 DNS hostname to an IP address.

You want to add a second processor to your dual-processor system. Which of the following should you do?

Match the speed of the new processor with the speed of the existing processor.

A customer needs to use several application. Currently, the computer cannot keep all the necessary application open at the same time. Which of the following components should you consider upgrading?

Memory

You have just a built new system from scratch. You turn the computer on but the system boot fails and sounds a beep code. What might be the issue?

Memory not installed or not detected.

The memory is not compatible and was not installed and configured properly

Memory upgrade

You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network typologies provide redundancy for a failed link?

Mesh

You have implemented an ad-hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?

Mesh

You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs?

Mesh

You have implemented an ad-hoc wireless network that doesn't employ a wireless access pint. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of networks?

Mesh Explanation This type of network uses a physical mesh topology. There's no central connecting point. any host can communicate directly with any other host on the network. A mesh network, such as this one, is usually impractical on a wired network. Each host would have to have a separate, dedicated network interface and cable for each host on the network. However, a mesh topology can be implemented with relative ease on a wireless network due to the lack of wires.

You have a network that uses a logical bus topology. How do messages travel through the network?

Messages are broadcast to all devices connected to the network

You have a network that uses a logical bus topology. How do messages travel through the network?

Messages are broadcast to all devices connected to the network. Explanation Messages sent using a physical bus topology are broadcast to all devices in the network. The device in the middle of the star (typically a hub), receives the message and forwards it on to all other devices.

What is unicasting?

Messages are sent to a specific host address.

You have a network that uses a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reach the destination device. Explanation In a logical ring topology, messages travel to each device in turn. If the message is not intended for that device, the message is forwarded to the next device on the network.

You have a network that uses a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reached the destination device

When multiple routes to a destination exist, what is used to select the best possible route?

Metric

A network that is typically owned and managed by a city as a public utility.

Metropolitan Area Network (MAN)

A network that covers an area as small as a few city blocks to as large as an entire city.

Metropolitan Area Network (MAN).

You want to build a computer that can stand upright on a desk and takes up the least amount of space possible. Which type should you select?

Micro-ATX slim tower

What are laptop memory modules (SODIMM and UniDIMM) sometimes called?

MicroDIMMs

What type of USB 2.0 connector is shown here.

MicroUSB

BIOS

Miniature application stored on motherboard to test hardware prior to loading operating system. Cannot be easily modified.

User Access Control

Minimizes the dangers of unwanted actions or unintended software installations

You manage a network of multiple subnets connected to the Internet. A user reports that she can't access the Internet. You investigate the problem and find that she can access all hosts on the private network, but no hosts on the Internet. Which of the following is likely the cause of the problem?

Missing default route on a router

You manage a network with multiple subnets connected to the Internet. A user reports that she can't access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on the subnet, however the computer does access other computers on other subnets as well as the Internet. Which of the following is most likely the cause of the problem?

Missing route on the default gateway router.

You have an executive user who keeps sensitive information about the company on a company-owned mobile device. You want to be prepared to keep company information secure if he loses this device or if it gets stolen. Which of the following solutions should you use?

Mobile device management software that performs remote wipes. Mobile device management software that does full device encryption. Explanation If a mobile device with sensitive information gets lost, the best protection you can have is that the device is fully encrypted and the ability to remotely wipe, or delete all the data from, the device's data storage.

To access the Internet through the Publicly Switched Telephone Network (PSTN), what kind of connectivity device must you use?

Modem

Line Conditioner

Modifies the power signal to remove noise and create a smooth alternating current

Which of the following characteristics accurately describe passive heat sinks?

More reliable than active heat sinks.

ATX

Most common form factor used by computers

You are in the process of configuring a new computer. The motherboard has four memory slots and supports dual-channel memory. You install two memory modules. When you boot the computer, the BIOS recognizes both modules, but the memory is not configured to run in dual-channel mode. What should you do?

Move the modules to the correct motherboard slots.

Which tool can you use to view (but not modify) hardware and configuration information for your computer?

Msinfo32

Which feature allows a tablet to recognize multiple finger touches at the same time?

Multi-touch Explanation Most tablet devices use a capacitive touch screen interface, meaning that it requires conductive material, such as your finger tip, for input. Capacitive touch screen provide multi-touch capabilities, which allows the tablet to recognize multiple finger touches at the same time. Gyroscopes and accelerometers are used to detect acceleration of the device. Most modern tablets do not use resistive touch screens, which aren't able to provide multi-touch capabilities.

What tool will help you troubleshoot a laptop that doesn't power on and the battery isn't charging?

Multimeter

Which tool would you use to measure electrical properties such as voltage, amps. and resistance?

Multimeter

At distance of under 2 km, delivers data rates up to 1 Gbps.

Multimode

Cable lengths are limited in distance

Multimode

Data transfers through the core using more than one light rays.

Multimode

A medical center wants to upgrade their network backbone to 10 Gigabit Ethernet (10 Gbps) so they can perform daily backups of large amounts of data to the secure on site storage area network (SAN) without bogging down the network. Some of the backbone segments will have to reach between buildings that are close to 300 meters apart. Which of the following cable types will support 10 Gigabit Ethernet at the necessary segments lengths while keeping costs as low as possible?

Multimode fibre optic Explanation Multimode fiber optic cable is the only option that meets all the requirements. It supports 10 Gigabit Ethernet speeds with maximum segment lengths up to 300 meters. Single-mode fiber optic cable can also support to 10 Gigabit Ethernet speeds and the segment lengths that are needed, but the cable and the connection equipment is more expensive than multimode fiber optic cable and connection equipment. Twisted pair Category 6 and 7 cable can support 10 Gigabit Ethernet speeds but the maximum segment length is 100 meters -- not long enough for this scenario.

Mission control is a desktop and windows management utility that is used to access several Mac OS features. Which of the following are Mac features accessed through mission control

Multiple desktops all windows dashboard

Multi processor

Multiple processors installed on a single motherboard

Multicore

Multiple processors within a single processor package

Which of the following is an advantage of connecting a printer to a network?

Multiple users can print to the same printer

Which of the following is an advantage of connecting a printer to a network?

Multiple users can print to the same printer.

Which of the following is a mobile technology that can be used to store and transmit encrypted information for purposes such as making payments from a mobile device?

NFC chips Explanation Near field communications (NFC) chips are a wireless mobile technology that can be embedded in credit cards and smartphones for transmitting financial information when making payments. For example, many point of sale devices can read information from NFC chips. NFC chips can also be used in passports to contain identity information.

What form factor does not have expansion slots on the motherboard, but instead uses a riser card for expansion cards?

NLX

What is required to control access to the file system using file and folder permissions on a Windows-based computer?

NTFS-formatted partition

What is required to control access to the file system using file and folder permissions on a Windows-based computer?

NTFS-formatted partition Explanation File permissions are only available under Windows for files on a partition formatted with NTFS, not FAT32. The Encrypting File Service (EFS) with Windows encrypts individual files. The Ext4 file system is used on Linux systems.

You administer a NetBIOS-based network that uses the TCP/IP protocol.You are trying to troubleshoot a computer that is unable t ocontact a server by its Net BIOS name.Which command can you use to check the connection?

Nbstat

Which TCP/IP utility gives you the following output? Local Area Connection: Node IpAddress:

Nbstat -c

What command do you use to help troubleshoot NetBiOS name resolution problems?

Nbtstat

What is the least secure place to locate the access point when creating a wireless network?

Near a window

Which of the following protocols is non-routable and requires another protocol to enable internetwork communications?

NetBOIS

Examine the following output: Active Connections Which of the following utilities produced this output?

Netstat

What command-line tool displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics?

Netstat

Which TCP/IP utility gives you the following output? Active Connections

Netstat -a

Which TCP/IP utility gives you the following output? Route Table Interface List

Netstat -r

Which command displays network activity statistics for TCP,UDP, and IP?

Netstat -s

Which tool would you use in Windows Vista/7 to manage network connections?

Network and Sharing Center

Which network component connects a device to the transmission media and allows it to send and receive messages?

Network interface card

Which network component connects a device to the transmission media and allows it to send and receive messages?

Network interface card Explanation The network interface card (NIC) allows a device to send and receive messages over the transmission media.

MAN

Network that can cover a few city blocks or even an entire metropolitan city.

WLAN

Network that uses radio signals to connect systems together

PAN

Network used for communicating between personal devices such as laptops, printers, headsets, and smartphones

LAN

Network used in a small geographic area that typically uses wires to connect systems together.

WAN

Network used to form an internetwork from geographically isolated groups of hosts.

What battery type has the greatest need to be completely drained before being recharged?

Ni-Cad

You have a DVD-ROM disc with no label and you want to know if it has any important files on it. You insert the DVD-ROM into your optical media drive, then you double-click the drive letter for the optical drive to see the contents of the disc. If the DVD-ROM is not a valid disc, which error message will you see?

No Media Explanation The No Media status shows for an optical or removable media drive that does not contain a valid disc. A Foreign disk is a dynamic disk that was created in one system and moved to another system. The Unreadable status indicates a hardware failure, I/O errors, or other corruption but might also be caused by a delay in reading the disk in Disk Management. The Missing status shows when a dynamic disk has failed.

Which of the following are advantages of solid state storage compared to hard drives?

No moving parts. Lower power requirements Explanation Solid state drives have the following advantages when compare to hard disk drives: They have lower power consumption. They have no moving parts (and hence less prone to failure) They are faster They are less susceptible to physical damage (from dropping) They are smaller and lighter. They are smaller and lighter. They use standard SATA disk interfaces. The storage capacity for SSDs is small in comparison to HDDs. SSDs are several times more expensive than comparable HDDs.

You need to back up user data on a Windows 8.1 system. The computer has an SSD drive (C:) and a hard disk drive (D:) installed. The SSD drive contains both the Windows operating system and user profile data. You plan to do the following: •Use backup and restore to backup user data •Run the backup automatically every night at 1am •Store the backups in the D:\Backups folder •Include a system image in each backup Will the configuration work?

No, Windows 8.1 does not include the backup and restore utility. File history must be used instead

Client-Server Network

One host is in charge of configuring access to resources for all hosts

You need to backup user data on a Windows 10 system. The computer has a single SSD storage device installed that contains both the Windows operating system (in C:\Windows) and user profile data (in C:\Users). You plan to do the following: •Use backup and restore to backup uer data •Run the backup automatically every night at 11pm •Store the backups in the C:\Backups folder •Include a system image in each backup Will this configuration work?

No, backups created with Backup and Restore can't be stored on the same drive containing the information being backed up.

You need to protect user data on a Windows 8.1 system. The computer has a single SSD drive (C:) installed. The SSD drive contains both the Windows operating system and user profile data. You plan to do the following: •Use filehistory to protect user data •configure snapshots to be automatically taken every 30 minutes •store the backups in the C:\FileHistory folder •Include the files in the C:\WidgetProject folder in the backup process. Will this configuration work?

No, backups created with File History must be stored on a drive other than the one containing the information being backed up

A user called her organization's Help Desk to request help with connecting to a network server. The help desk technician came to her desk to resolved the issue. Once there, the technician used the user's telephone to call his girlfriend. The call lasted the entire time the technician was at the user's desk. Did the technician handle the request correctly?

No, the technician should not have used to user's telephone for a personal call.

A user called the Help Desk because he's having trouble downloading new messages from the company's email server. The help desk technician told him to open a command prompt and try to ping the email server. The technician also told him to check his SMTP and POP3 server IP addresses. Did the Help Desk technician hand this request correctly?

No, the technician used jargon that the user probably didn't understand.

When you load a partition management utility on a workstation running an OEM version of Windows 8.1, you notice that there is a hidden partition located at the beginning of the workstation's hard drive. You decide to delete it to free up space on the drive. Should you do this?

No, this is the system's recovery partition.

To protect user data on a Windows 7 system, you've configured System Restore to automatically create restore points for the C:\ volume. Given that your user profile data is stored in the default directory (C:\Users), will this strategy adequately protect your users' data?

No, you need to create a backup of your user data as well.

To protect your Windows 10 system, you've used System Restore to automatically protect your system using restore points. You've also configured File History to protect your user's data files. Will this configuration adequately protect your system in the even of a hard disk failure?

No, you need to create an image of your Windows system as well.

To protect your Windows 7 system, you've used System Restore to automatically protect your system using restore points. You've also used backup and restore in control panel to configure a nightly backup of your user's data files. Will this adequately protect your system in the event of a hard disk failure?

No, you need to create an image of your Windows system as well.

To protect a Windows 8.1 system, you've configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?

No, you need to enable File History.

Can an APIPA host communicate with other networks?

No.

What method does an eMMC card use for storing data?

Non-volatile memory chips. Explanation Flash devices store information using programmable, non-volatile flash memory. Common flash devices are eMMC, SD, SSD, MiniSD, MicroSD, memory sticks, and USB thumb drives. DLT drives use magnetic tape. Hard disks use magnetic disks and platters. Optical drives use a reflective surface and optical readers.

Which of the following expansion buses are most commonly used for video cards in modern computer systems?

PCI Express

Which expansion bus is best for high-speed, high-resolution, three-dimensional graphics?

PCIe

You have a disk in your system that is displayed in the Disk Management utility as shown in the image below. The disk icon includes a red arrow that is pointing down. Which of the following would you expect to see in the space where the red outline is, as the status of this disk?

Not Initialized Explanation When Disk Management shows a disk icon that includes a red arrow that is pointing down, it indicates that the disk is Not Initialized. The disk status would say Initializing if the disk is being converted from a basic disk to a dynamic disk. A Foreign disk is a dynamic disk that was created in one system and moved to another system. The Unreadable status indicates a hardware failure, I/O errors, or other corruption but might also be caused by a delay in reading the disk in Disk Management.

Which of the following components requires special disposal procedures to comply with environmental guidelines?

Notebook battery

Which of the following will most likely contain SODIMM memory?

Notebook computers

You are testing the power supply in a PC system by measuring the voltage available on the 4-pin molex connector. The voltage on the red wire is +5.1 volts. What should you do?

Nothing, the power supply is working normally

You are testing the power supply in a PC system by measuring the Voltage available on the 4-Pin Molex connector. The voltage on the red wire is a +5.1 volts. What should you do?

Nothing, the power supply is working normally.

What command do you use to find the IP addresses of a particular computer using DNS lookup?

Nslookup

Christian has enabled Boot Logging from the Advanced Startup Options menu of his Windows 10 workstation. Which file would he examine to see a list of drivers loaded during the startup process?

Ntbtlog.txt

Display Resolution

Number of pixels displayed on screen

Display Refresh Rate

Number of times pixels are redrawn on display in one second

Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)?

OSPF

Which of the following routing protocols uses related link cost as the metric?

OSPF

Which of the following best describes OSPF?

OSPF is a classless link-state routing protocol

What are the main differences between the OSPF and IS-IS routing protocols?

OSPF requires an area 0, while IS-IS does not

Device manufacturers are constantly finding bugs, vulnerabilities, or better ways for their devices to communicate with the operating system. Because of this, what should you do before you install a new device?

Obtain the latest driver from the manufacturer's website before installing the device.

Shows when a dynamic disk has been removed or turned off.

Offline

NLX

Old form factor used for slim computers. Expansion slots are inserted into a daughterboard (detachable riser card) that is vertical.

When configuring an ADSL installation, where should you to install the DSL filters?

On connections leading to an analog phone

You're configuring devices on a SCSI bus. You've installed a SCSI adapter in an expansion slot. You've connected an external SCSI tape drive to the external port connector on the adapter,. You've connected two hard SCSI hard disk drives (sd0 and sd1) to two of the middle connectors on the internal SCSI ribbon cable. The end connector on the internal SCSI ribbon cable is connected to a SCSI DVD drive. Where should termination be enabled on this bus? (2)

On the DVD drive / On the external tape drive

You have a computer with a single hard disk configured as a basic disk with a single partition formatted with FAT32. The computer runs Windows XP professional. The disk has run out of space. You need to add space to the disk. You install a new hard drive and start Disk Management. What is a required task to add space to the existing volume?

On the new hard disk, create a new partition without a drive letter.

You have a computer with a single hard disk configured as a basic disk with a single partition formatted with NTFS. The computer runs Windows 7 Enterprise. The disk has run out of space. You need to add space to the disk. You install a new hard drive and start Disk Management. Which of the following is a required task to add space to the existing volume?

On the new hard disk, create a new partition without a drive letter. Explanation Because this is the system volume, the only way to add space to the volume using space on the new disk is to create a mount point. A mount point is an empty folder on the existing volume that points to another partition. Data saved to the folder is physically saved on the referenced partition. To create a mount point: Create an empty folder on the existing volume. Create a partition on the new disk without a drive letter. Mount the partition to the empty folder on the existing volume. You cannot extend the volume to another disk because the volume is the system volume. You cannot extend the system volume even if it is on a dynamic disk. You can create mount points on basic or dynamic volumes.

You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the paging file?

On the system volume

You work for a large, multinational organization that has an extensive global network that is interconnected using WAN links and routers. Lately, users in one location have complained that they are unable to access resources stored on a server named FS23 in an South American branch office. To troubleshoot the issue, you have done the following: - Verified that the server is up and running - Verified that the various routers in between the two locations are up and running You suspect that perhaps one of the routers between the two locations may be dropping packets. To test this theory, you enter ping FS23 -f -l -1500 command on your workstation. The ping command returns the following: "Packet needs to be fragmented but DF set" What does this mean?

One of the intermediate routers is an MTU black hole

How many scopes can exist per network segment?

One.

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality. What is the name of this model?

Open Source

Which of the following is the term used for a set of programs that acts as an interference between the applications that are running on a computer and the computer's hardware?

Operating system

Which of the following components can be updated by the Windows Update service?

Operating system and critical driver files.

Ideal for music and video. Portable and cheap with a long shelf life.

Optical disc

Uses lasers to read and write information stored in the form of pits in their reflective coating.

Optical disc

Files that exist on the hard drive but which are not associated with a directory in the index.

Orphaned files.

Spike

Over-voltage that lasts milliseconds

Surge

Over-voltage that lasts seconds

Lately your computer is spontaneously rebooting and freezing. What is the most likely cause?

Overheated CPU.

Which of the following would most likely cause random system lockups?

Overheated processor

Which of the following associates a port number with a host on a private network?

PAT

Which expansion bus is most commonly used for devices such as sound cards, modems, and network cards?

PCI

Which of the following expansion buses is most commonly used for devices such as sound cards, modems, and network cards?

PCI

Which of the following expansion buses is most commonly used for devices suh as sound cars, modems, and network cards?

PCI

Which of the following protocol do e-mail clients use to download messages from a remote mail server?

POP3 Explanation The POP3 protocol is part of the IP protocol suite and used to retrieve e-mail from a remote server to a local client over a network connection. SNMP is a protocol used to monitor network traffic. SMTP is an IP protocol used to send e-mail. FTP is used to transfer files.

What is the name for the routine that tests the motherboard, memory, disk controllers, video, keyboard and other system hardware?

POST

What is broadcasting?

Packet is sent to all hosts.

Which of the following problems is common for dot matrix printers?

Paper scraps are caught in the feed mechanism

Which of the following is common for dot matrix printers?

Paper scraps are caught in the feed mechanism.

Which of the following problems is common for dot matrix printers?

Paper scraps are caught in the feet mechanism

What is a common problem for dot matrix printers?

Paper scraps caught in the feed mechanism

What type of cable is D-shaped, has 25 pins, and would connect to a dot matrix printer?

Parallel port

Allows you to reconstruct data if one of the storage devices fails.

Parity

Requires that you have at least three storage devices.

Parity

What is an error detection technique that can detect errors with only one bit?

Parity

Which of the following is an error detection technique that can detect errors with only one bit?

Parity

What error usually indicates a failing module or discrepancy between new and old memory?

Parity Interrupt

What sort of thermal solution might you find on memory modules?

Passive heat sink

Which of the following thermal solutions might you find on memory modules?

Passive heat sink.

Keychain

Password management utility

What type of network describes a workgroup?

Peer-to-peer network

A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and decide to schedule the repair for later that afternoon. Up to this point, which step have you forgotten in your troubleshooting process?

Perform a backup

You manage a Windows system. You want to view information about your computer including the CPU utilization information about disk I/O operations. Which tools could you use to do this?

Performance Monitor Task Manager

A small network used for connecting devices, such as a notebook computer, a wireless headset, a wireless-printer, and a smartphone.

Personal Area Network (PAN).

Which type of printer uses pressure, not heat, to apply ink?

Piezoelectric Printer

Which TCP/IP utility gives you the following output? Reply from 192.168.1.168

Ping

You work in an office that uses NetWare servers and Windows NT 4.0 servers.The network uses both the TCP/IP and IPX/SPX protocols. You are sitting at a workstation that uses Windows 95 OSR2.An application you are using is unable to contact Windows NT server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?

Ping

Which pins on the 24-pin motherboard connector coming from the power supply can be shunted to turn the power supply on?

Pins 16 and 17 Pins 15 and 16

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

Place access points above where most clients are

You are installing networking cable in the air space between the ceiling and the roof of a building. Which type of cabling should you use?

Plenum

You are installing networking cable in the air space between the ceiling and the roof of a building. Which type of cabling should you use?

Plenum Explanation Plenum cable is fire resistant and non-toxic, making it optimal for wiring above ceiling tiles. PVC cable cannot be used to wire above ceilings because it is toxic when burned. Both STP and fiber optic cables can be rated for plenum areas, but are not in themselves fire resistant.

You're troubleshooting a malfunctioning notebook computer. Nothing appears on the LED display when the system is powered on. What is the first thing you should do?

Plug in an external monitor. Explanation If the built-in monitor isn't working, connect an external monitor to the laptop. If the display appears on an external monitor but not the built-in display, the problem could be a malfunctioning LED assembly or it could be due to the display output being redirected to the external monitor port using the Fn key. If you don't get a display on the internal or external monitor, you can assume that there is a problem with the video card. Repairing the video card typically means replacing the motherboard. You should calibrate the battery if your battery seems to be losing the ability to hold a charge or if the power drops shortly after starting to use it.

Which of the following tasks would you complete as part of a SATA installation?

Plug the 15-pin power connector into the SATA drive. Explanation SATA devices use a special 15-pin power connector that supplies 3.3, 5, and 12 volts. Using the 4-pin Molex connector for a SATA device requires an adapter cable. The master setting only applies to IDE drives, and is used to determine the active controller with multiple devices on the same cable channel. Device IDs are used with SCSI devices, not SATA devices. Low-level formatting is done at the factory by the drive manufacturer.

Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host?

Port Forwarding

Subnet

Portion of a larger network with a common network address while maintaining unique host addresses..

Which of the following devices can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher)?

Power over Ethernet Explanation Power over Ethernet (PoE) technology can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher). Power is usually supplied by a PoE-enabled Ethernet switch. PoE is commonly used to power network devices that are located where physical access to a power outlet may not be available. For example, a PoE-enabled surveillance camera mounted on a tall-pole can be powered via its Ethernet cabling.

ATX Power Connector

Power plug that connects to motherboard

4pin and 8pin Power Connector

Power plug that provides additional power to CPUs

6pin Power Connector

Power plug that provides additional power to newer video cards

Mini-Molex Power Connector (also known as a BERG connector)

Power plug that provides power to floppy drives.

SATA Power Connector

Power plug that provides power to newer hard drives and optical drives

Molex Power Connector

Power plug that provides power to older hard drives and optical drives

Which of the following components convert AC to DC

Power supply

Which of the following tools is specifically designed to test the DC voltage on a hard disk drive power connector?

Power supply tester

A user needs to use her laptop to give a presentation using a video card projector. She called asking you how to switch the display to the external monitor port on her laptop. What should you tell her?

Press the Fn key along w/ the function key on the keyboard w/ a monitor on it

A user needs to use her laptop to give a presentation using a video projector. She called asking you how to switch the display to the external monitor port on her laptop. What should you tell her?

Press the Fn key along with the function key on the notebook keyboard with a monitor on it.

You need to protect the user data on a Windows 7 system. Which tools could you use to do this?

Previous Versions Backup and Restore

Which component in a laser printer prepares the photosensitive drum for writing by causing it to receive a negative electrostatic charge?

Primary Corona

Which component in a laser printer prepares the photosensitive drum for writing by causing it to receive a negative electrostatic charge?

Primary corona

You have added two new hard disks to a Windows computer. The disks are configured as basic disks. Which of the following could be configured on these disks?

Primary partitions Extended partitions with logical drives. Explanation Basic disks use primary and extended partitions. Each physical disk can have up to four primary partitions, or three primary partitions and one extended partition. Logical drives are defined within an extended partition. The extended partition can be divided into multiple logical drives. Dynamic disks support volumes that use discontiguous disk space. Simple volumes contain disk space from a single hard disk (both contiguous or discontiguous space). Spanned volumes contain disk space from multiple hard disks, grouped together into a single logical volume. Striped volumes use equal partition sizes on two disks to create a volume. Data is divided and saved to each disk.

You have added two new hard disks to a Windows computer. The disks are configured as basic disks. Which of the following could be configured on these disks? (2)

Primary partitions / Extended partitions with logical drives

Which printer management components would you use to view the drivers used by a printer?

Print Properties

What is the software that allows the computer to communicate with the printer?

Print driver

Which of the following allows a computer to communicate with a printer?

Print driver

What is the portion of the hard drive where print jobs are stored before going to the printer?

Print queue

Which term refers to the portion of the HDD where print jobs are stored before going to the print device?

Print queue

Which of the following virtual printing options allows you to convert a Word document into .jpg file?

Print to Image

Which of the following virtual printing options allows you to convert a Word document into a .jpg file?

Print to Image

You replaced the ink cartridges in a color inkjet printer. Users are now complaining that print quality has degraded, lines are fuzzy, and the colored areas in images are are starting or stopping before they should.

Printer Cartridge Calibration

Which of the following allows a computer to communicate with a printer?

Printer Driver

You replaced the ink cartridges in a color inkjet printer. Users are now complaining that print quality has degraded, lines are fuzzy, and the colored areas in images are starting or stopping before they should.

Printer cartridge calibration

Which printer management component would you use to view the drivers used by a printer?

Printer properties

Which printer management components would you use to view the port used by a printer?

Printer properties or Print server properties

You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the internet. From your work office, you try to access your home computer using it's IP address, but are unable to communicate with the server. You are able to connect to other hosts on the Internet. Why can't you access the server?

Private addresses are not accessible through the internet

Intranet

Private network that only provides services to hosts connected on the private network.

Extranet

Private network that provides services to hosts that are considered trusted external users.

Virtualization

Process of adding multiple operating systems that can run simultaneously on a single physical machine

Overclocking

Process of modifying processor to maximize performance beyond its designed specification.

Throttling

Process of modifying processor to minimize power consumption and heat output by lowering its speed

While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer?

Process. Details.

HTTP

Protocol used by web browsers and web servers.

FTP

Protocol used for transmitting files using security through usernames and passwords.

IMAP

Protocol used to allow users to access email through websites.

SSH

Protocol used to control remote systems through a command prompt with a secure transmission.

Telnet

Protocol used to control remote systems through a command prompt without using very secure transmissions.

RDP

Protocol used to control remote systems through a graphical interface.

HTTPS

Protocol used to exchange web pages in a secure manner

DNS

Protocol used to provide address / name resolution.

POP3

Protocol used to receive/retrieve emails using specific applications.

SMTP

Protocol used to send emails through the internet using specific applications.

Match each computing definition on the left with the appropirate characteristic on the right. Each characteristic may be used once, more than once, or not at all.

Provides resources to a single organization - Private cloud Combines public, private, and community cloud resources from different service providers - Hybrid cloud Designed to be shared by several organizations - Community cloud Provides computing resources that are accessible by the general public - Public cloud Keeps one organization data separate and secure from any other organization using the same service provider - Private cloud

Your computer has an IP address of 161.13.5.15. Your computer is on a

Public Network

You need to connect the end of a Cat 6 UTP cable to a 110 punch down block. Which tool should you use?

Punchdown tool

You need to connect the end of a Cat UTP cable to a 100 punch down block. Which tool should you use?

Punchdown tool

You have a workstation running a 64-bit versions of Widows 8.1 Professional that you would like to upgrade to Windows 10 Professional. You want to perform the upgrade with the least amount of effort and cost.

Purchase a 64-bit upgrade version of Windows 10; perform an in-place upgrade.

You have a workstation running Windows Vista Business edition that you would like to upgrade to Windows 10 Enterprise edition. You want to perform the upgrade with the least amount of effort and cost. What should you do?

Purchase a full version of Windows 10; perform a custom installation.

You are in the process of building a new computer. You would like to configure your computer to use Crossfire to improve performance when playing your favorite game. Which of the following will be part of the configuration process?

Purchase two identical video cards.

What do you do if you need to remove a disc out of the DVD drive when the power is turned off?

Push an unbent paper clip into the hole on the front of the drive.

What does dig <hostname> host <hostname> do?

Queries a host. Default searched for A records, but this can be changed by using flags.

What does nslookup <host> do?

Queries the IP address of a host.

What does dig @IP do?

Queries the root server at the IP for the domains host records.

You have a file which you would like other users to see, but not modify. Which file attribute should you use?

R

What drive configurations uses striping w/out fault tolerance?

RAID 0

Which RAID configuration level provides increased using only two disks?

RAID 0 Explanation RAID 0 (striping) uses two or more disks and provides an increase in performance but not fault tolerance. RAID 1 (mirroring) uses two disks to provide fault tolerance but not an increase in performance. RAID 5 uses a minimum of three disks and provides both fault tolerance and an increase in read performance.

Which of the following drive configurations uses striping without fault tolerance?

RAID 0 Explanation RAID 0 uses disk striping and offers no fault tolerance. Disk striping breaks data into units and stores the units across a series of disks by reading and writing to all disks simultaneously. A failure of one disk in the set means all data is lost. This is the fastest of all RAID types. RAID 5 also uses disk striping, but provides fault tolerance for a single disk failure. RAID 1 provides fault tolerance but does not use striping. An expanded volume set is a volume that spans more than one hard drive. An expanded volume set also offers no fault tolerance, yet does not use striping.

Which RAID configuration level provides increased performance using only 2 disks?

RAID 0 (striping)

What RAID arrays does Windows 10 desktop operating system support?

RAID 0 and RAID 1

You are purchasing a PC system that will be used as a file and print server in a small business. Which hardware selection criteria would be most important for this ssytem?

RAID 1+0 array 64-bit multi-core processor

You are purchasing a PC system that will be used as a file and print server in a small business. Which hardware selection criteria would be most important for this system?

RAID 1+0 array and a 64-bit multi-core processor

Which of the following drive configuration uses striping with parity for fault tolerance?

RAID 5 Explanation RAID 5 also uses disk striping, but provides fault tolerance for a single disk failure. Disk striping breaks data into units and stores the units across a series of disks by reading and writing to all disks simultaneously. RAID 0 uses disk striping and offers no fault tolerance. A failure of one disk in the set means all data is lost. RAID 1 provides fault tolerance but does not use striping. A RAID 10 array nests a mirrored array within a striped array.

What is an advantage of RAID 5 over RAID 1?

RAID 5 improves performance over RAID 1

What is an advantage of RAID 5 over RAID 1?

RAID 5 improves performance over RAID 1. Explanation RAID provides both fault tolerance and improved performance RAID (mirroring) provides only fault tolerance with no performance benefit. Both RAID 5 and RAID 1 can only sustain a loss of one disk in the set. Use multiple disk controllers to provide redundancy for the disk controller.

What RAID arrays does Windows 10 not support?

RAID 5 or RAID 10

What are the most important criteria for virtual machines?

RAM and CPU

Coaxial Cable Types

RG-59 and RG-6

Which of the following protocols has a limit of 15 hops between any two networks?

RIP

What is the main difference between RIP and RIP2?

RIP uses classful protocol, while RIP2 is classless protocol

Which kind of connector do you use to connect a modem to a standard telephone line?

RJ-11

Which type of connector do you use to connect a modem to a standard telephone line?

RJ-11

Which kind of connector do you use to connect a modem to a standard telephone line?

RJ-11 Explanation A standard telephone line connector is an RJ-11. RJ-45 jacks are used for Ethernet twisted pair cables. Video cards and monitors with a built-in TV tuner have an F-type video connector. RG-58 is used for 10 BAse2 Ethernet networking (also called Thinnet).

Which connector is used with unshielded twisted pair (UTP) cable?

RJ-45

Which connector is used with unshielded twisted pair (UTP) cable?

RJ-45 Explanation An RJ-45 connector is used with unshielded twisted pair (UTP) cable. BNC and AUI are used with coaxial cables. DIX is an Ethernet protocol.

While using the touchpad, you notice that the mouse is not responding very well, making it difficult to move the mouse around the screen correctly. How can you fix this problem?

Re calibrate the touchpad?

You have a computer system with a dual-core processor. You would like to upgrade to a quad-core processor, but you don't want to replace the motherboard. Which of the following should you do first?

Read the motherboard documentation to identify which processors are supported.

You have a computer system with an Intel Core i3 processor that operates at 3.7 GHz. You would like to upgrade to a faster processor, but you don't want to replace the motherboard. Which of the following should you do first?

Read the motherboard documentation to identify which processors are supported.

You're troubleshooting a notebook system that uses a digitizer pad and stylus for user input. The user has complained that the digitizer pad registers stylus taps about 1 inch to the right of where the tap actually occurred. How can you fix this problem?

Recalibrate the digitizer Explanation To fix this problem, you need to recalibrate the digitizer pad. Over time, digitizer pads on notebooks can develop drift. This can be fixed by running a recalibration program, usually included with the pad.

While using the touchpad, you notice that the mouse is not responding very well, making it difficult to correctly move the mouse around the screen. How can you fix this problem

Recalibrate the touchpad

You recently replaced a malfunctioning video card on your laptop. After reassembling the laptop, everything works well except for the wireless network connection. The wireless adapter functioned correctly before you replaced the video card. What would most likely resolve this problem?

Reconnect the antenna connections in the bezel

You recently replaced a malfunctioning video card on your laptop. After reassembling the laptop, everything works well except for the wireless network connection. The wireless adapter functioned correctly before you replaced the video card. What would most likely resolve this problem?

Reconnect the antenna connections. Explanation The wireless connection is affected by the internal antenna. after replacing a video card or LCD screen, be sure to reconnect the antenna leads when reassembling. Because the wireless connection functioned correctly before you replaced the video card, you know the network card works fine and should not need replacement. A USB-compatible wireless network device would provide a new connection, but does not necessarily resolve the problem. Because all of the other components function correctly, removing and reconnecting the battery would not resolve the internal Internet connection.

Memory Frequency

Refers to the speed at which information is transferred between the processor and system memory

Memory Capacity

Refers to the storage provided by a memory module

Your Windows 8.1 system has experienced a serious failure. You decide to use the advanced recovery options provided by the operating system to bring the system back to a unstable state. During the recovery process, you want to preserve as much data as possible including apps purchased from the Microsoft Store as well as your user's data files. Which option should you use?

Refresh Your PC

What error occurs when parts of the registry are written to faulty sections of RAM?

Registry errors

Even if you perform regular backups, what must be done to ensure that they are protected against data loss?

Regularly test restoration procedures

You have just installed several devices at once to a computer, but now the computer fails to boot properly. What should you do?

Remove all of the newly added devices and install them one at a time. Explanation When installing, you should always install one device at a time. In that way, if a problem occurs after installing the new device, you know that the new device has caused the problem. Swapping components at this point might not help as you have not yet identified the component that is most likely causing the problem.

You have been told to replace the hard drive on a laptop computer that has a drive bay accessible from the outside of the computer. Which of the following should you do after powering down the system? (2)

Remove the battery // Unplug the AC Power

You have a system that has been overheating. Which of the following actions will not help to keep the system cool?

Remove the case side panal

You want to upgrade the memory modules in a notebook computer. What are the most common ways to access the memory module slots? (2)

Remove the keyboard // Open a panel on the bottom of the notebook

Which of the following actions is not recommended for keeping your computer cool?

Remove unused expansion card slot covers.

You have a system that has been overheating and shutting off. Which of the following actions will not help to keep the system cool?

Removing the side panel from case.

On a Windows 10, using Storage Spaces eliminates the need for which of the following tasks?

Repartitioning drives. Resizing volumes. Explanation Storage spaces eliminates the need for such tasks as: Repartitioning drives. Resizing volumes. Backing up data in order to repartition.

Your computer has one single core processor installed. The motherboard supports processors with up to four cores. You want to upgrade your computer to a quad-core system. Which of the following will be part of your configuration?

Replace the existing processor.

A user calls to complain that her computer is behaving erratically. Some days it functions correctly, other days it crashes frequently. Sometimes, the system won't boot at all. You open the system case and notice the following -Two of the mounting screws are missing from the system hard disk drive. -The system uses memory modules from several different manufacturers with mismatched capacities. -Several capacitors on the motherboard are bulged and have a brown liquid oozing from them. -The chassis fan on the front of the case is oriented to blow air into the system.

Replace the motherboard.

A departmental manager complains that print jobs are not being printed on the private laser printer in her office. The printer connects directly to her workstation with a USB cable. When you inspect the printer, you see no output displayed on the printer's LCD control panel. You notice that the printer's power switch is set to the ON position and that the printer is plugged into the wall outlet. What should you do ?

Replace the printer's power supply.

A departmental manager complains that print jobs are not being printed on the private laser printer in her office. The printer connects directly to her workstation with a USB cable. When you inspect the printer, you see no output displayed on the printer's LCD control panel. You notice that the printer's power switch is set to the ON position and that the printer is plugged into the wall outlet. What should you do?

Replace the printer's power supply.

Your system crashes at various times, sometimes on startup, sometimes when running a software application, sometime when a certain group of applications is running. You suspect a malfunctioning CPU but none of the common issues seem to be present. You have not configured overclocking. There is no overheating. The CPU is seated correctly and locked into its socket. What can you do that definitively determine if the CPU is causing the system crashes?

Replace the suspect CPU with a known good CPU of the same make and model.

You test installing a second CPU. You remove the terminating resistor from the second CPU slot, insert the CPU and perform your testing. Upon conclusion of the test you remove the second CPU and find that your system no longer boots up properly. How can you correct this situation?

Replace the terminating resistor in the slot that was occupied by the second CPU.

What is multicast?

Represents a dynamic group of hosts.

What is unicast?

Represents a single interface.

What method does an SDHC card use for storing data?

Reprogammable memory Explanation Flash devices store information using programmable, non-volatile flash memory. Common flash devices are MMC, SD, SDHC, and XD memory cards as well as USB thumb drives. DLT drivers use magnetic tape. Hard disks and floppy disks use magnetic disks and platters. Optical drives use a reflective surface and optical readers.

64bit processor

Requires an operating system and application that were written to take advantage of processing

You have just installed a maintenance kit in your laser printer. What should you do next?

Reset the page count

You installed a new toner cartridge in a company-owned laser printer and did some maintenance tasks you noticed that needed to be done. What should you do next?

Reset the page count

You have just purchased a new computer that runs Windows 10. You would like to transfer all of the applications and user data from your old computer running Windows Vista to the new computer. How can you do this with the least amount of effort?

Run Windows Easy Transfer on the old computer and the new computer. Reinstall any applications.

Match the utility on the left with the corresponding descriptions on the right. Each utility may be used once, more than once, or not at all.

Resolves (look up) the IP address of the specified hostname -nslookup Tests connectivity between devices and shows the routers in the path between the two devices -tracert Sends an ICMP echo request/reply packet to a remote host -ping Displays current connections and incoming and outgoing connections -netstat A few simple replies to this request from the remote host indicates that a connection exists between sender and receiver -ping Displays active sessions, ports, sockets and the local routing table -netstat When used with the -t option, performs a continuous connection test -ping Ping sends an ICMP echo request/reply packet to a remote host. A response from the remote host indicates that both hosts are correctly configured and a connection exists between them. Using ping -t performs a continuous connection test (press Ctrl+C to stop sending the ping requests). nslook up resolves (looks up) the IP address of the specifies hostname. It also displays additional name resolution information, such as the DNS server used for the lookup request. netstat displays the following IP-related statistics: -Current connections -Incoming and outgoing connections -Active sessions, ports, and sockets -The local routing table

A file you have been working on for several days was corrupted when you shut your Windows 7 system down uncleanly. You want to restore a previous version of the file, overwriting the existing file that has been corrupted.

Restore

An internal laptop keyboard is generally connected to the laptop's system board using a:

Ribbon cable

How do you set file attributes?

Right-click the file, then select Properties. Use the attrib command

In which of the following topologies does each device on the network act as a repeater, sending the signals to the next device?

Ring

Which of the following topologies connects each device to a neighboring device?

Ring

For a special project, you have been asked to recommend the lowest profile desktop computers available. You are attempting to put together the specifications for these machines. Which of the following types of cards are attached to the motherboard to allow expansion cards to plug into them instead of the motherboard.

Riser

Which of the following commands would display the output shown here? Route Table Interface List Active Routes: Network destination, netmask, gateway, interface, metric

Route Print

Which process reduces the size of the routing table by advertising a single route as the destination for a group of contiguous subnets?

Route summarization

Connects two network segments that have different subnet addresses.

Router

Uses the IP address within a packet to move packets between networks.

Router

You have a computer that currently has Windows Vista installed. You want to upgrade the system to Windows 10. You want to retain as much of the application, user profile, and user data as possible. You want to perform the upgrade with the least amount of effort possible. What should you do?

Run Scanstate in Windows Vista. Perform a clean (custom) installation of Windows 10 on the existing hard drive. Boot into Windows 10 and re-install all applications. Run Loadstate.

What protocol is used to monitor network traffic?

SNMP

You have just purchased a new computer that runs Windows 7. You would like to transfer all of the applications and user data from your old computer running Windows XP to the new computer. How can you do this with the least amount of effort?

Run Windows Easy Transfer on the old computer and the new computer. Reinstall any applications.

You have just installed a new hardware device, upgraded the driver, and installed the custom software that came with the device. Now you can't get the device to work. What should you do first?

Run any diagnostic software that came with the device. Explanation As a first step, run any diagnostic software that came with the device. Using an older driver, like one that came on the installation CD, will rarely correct a problem. In addition, you should only try this and the other solutions after performing the self-test and trying the obvious fixes.

You have a custom database application that your company has been using for several years. The application worked correctly when your organization used Windows XP systems. Recently, you purchased new Windows 10 systems for you sales team members. Each user is a member of the Users group on the local systems. you install the custom application successfully. When the sales employees log on and try to run the application, the program splash screen loads, but then seems to hang. What should you do first?

Run the application as Administrator.

You have a Windows 10 system that was recently upgraded from Windows 7. One of the installed applications worked fine under Windows 7, but now does not run in Windows 10. you have check the application vendor's website but there is no update available. What should you try next to run the application?

Run the application in compatibility mode.

You have a Windows 7 computer that was recently upgraded from Windows XP. An installed application worked fine in Windows XP, but now does not run in Windows 7. You have checked the application vendor's website, but there is no update available. Which options should you try to run the application?

Run the application in compatibility mode. Run the application in XP mode.

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly in earlier versions of Windows, but now does not run in Windows 10. You have checked the application vendor's website, but there is no update available. What should you try next to run the application?

Run the application in compatibility mode. Create a virtual machine that runs an older version of Windows. Run the application within the virtual machine.

You want to purchase a motherboard that has integrated sound with digital audio output. Which port would you likely find on the motherboard faceplate that indicates digital audio support?

S/PDIF

What is the most common disk interface used for optical drives on home and office computers?

SATA

What type of interface is most commonly used for internal hard disks in notebook systems?

SATA

Which of the following is the most common disk interface used for optical drives on home and office computers?

SATA Explanation Most modern computer systems use SATA optical drives. At one time, IDE/EIDE (ATAPI) optical drives were the most common type of optical drives implemented but this has changed. SCSI was also used at one time but has fallen out of favour for optical drives. In the early 1990's some sound cards provided a proprietary internal connector for ealy CD-ROM drives, but these are now obsolete. Likewise, parallel ports were used in the early 1990's optical drives, but these are also now obsolete.

Which interface is primarily used for internal hard drives in modern desktop PC systems?

SATA Explanation SATA is primarily used for internal hard drives in modern desktop PC systems. PATA (also called EIDE, IDE, and ATAPI) is a parallel ATA interface and was the most common interface used for hard disks and CD/DVD drives in the past, but not in modern PC systems, USB and Firewire are interface standards for connecting various external devices, including external hard drives. SCSI is commonly used for server storage, but is rarely used for hard disks in modern desktop systems.

Which generation of SATA storage devices does the following? Supports up to 6 Gbps data transfer rates. Addresses solid state drives.

SATA3 Explanation SATA3 support up to 6Gbps (600 MBps). It mainly addresses solid state drives with SATA (hard disk drives are not capable of sending data at this rate). SATA1 is the original SATA standard. It provided for 1.5 Gbps (150 MBps) data transfer. SATA2 supports up to 3 Gbps (300 MBps). eSATA is a subset of other standards specifically for externally connected devices. eSATAp (also known as Power over eSATA or Power eSATA) is meant to replace eSATA. It combines the functionality of an eSATA and a USB port with a source of power in a single connector.

You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share?

SMB

What is an IP protocol used to send e-mail?

SMTP

What protocol is used to send e-mail messages from a mail client to a mail server?

SMTP

What protocol is used to send e-mail messages from a mail client to a mail server?

SMTP Explanation SMTP sends e-mail from a mail client to a mail server. FTP provides a generic method of transferring files. SNMP is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention. POP3 and IMAP are both e-mail; protocols used by mail clients to retrieve e-mail from a mail server; however they can't be used to send mail from the client to the server. The Trivial File Transfer Protocol (TFTP) is used for network file transfers.

What is the name of the utility, which is similar to Telnet, that you can use to establish a secure remote server management session?

SSH Similar to Telnet, the SSH utility is used for remote server management; however, SSH encrypts all communications and is much more secure.

Which of the following is used on a wireless network to identify the network name?

SSID

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should you select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

Good documentation will:

Save you time and money in troubleshooting problems.

What is the role of the CMOS in a modern computer?

Saves information about system devices.

Which of the following are advantages of using a domain to manage a network?

Scalability Centralized administration. Explanation A domain is an example of client/server networking where shared resources reside on special computers called servers. Other computers, called clients, connect to the server to access resources. Security controls on the server identify which clients can have resource access. Advantages of client/server networks include: - Scalability - Centralized administration. - Centralized network services and resources. Setup with little or no configuration is a characteristic of a peer-to-peer network as is decentralized administration. -

Which component in a laser printer charges the paper to attract toner?

Secondary corona

Lab Report

Secure IMAP network communications and authenticate to CorpNet Wi-Fi. - Enable SSL for IMAP communications. - Use port 993. - Connect to CorpNet Wi-Fi. Explanation Complete the following steps: 1. Set the email account to use SSL and the secure port 993. - Click Settings. - Click Mail, Contacts, Calendars and click the Maggie Brown account. - Click the [email protected] email address. - Click Advanced. -Enable SSL. - Verify the Server Port is set to 993. - Click Account. - Click Done. 2. Connect to CorpNet Wi-Fi. - Click Wi-Fi. - Click CorpNet. - In the password field, enter @CorpNetWeRSecure!& and click Join.

An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?

Send the frame out ports 2-8

An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?

Send the frame out ports 2-8. Explanation Because the switch does not know the port that is used to reach the destination device, it will send the frame out all ports except for the port on which the frame was received. After the switch learns the port that is used to reach the destination device, it will send the frame out only that port.

What is the default gateway value used for?

Sending packets to other subnets. If the value is incorrect, then the packets will not be sent to the correct router

A user is trying to log into Windows on her notebook computer. She enters the correct password for her user account, but the system won;t let her authenticate, claiming the wrong password has been entered. What's causing the problem?

She has turned Num Lock on causing numbers to be sent from the keyboard instead of letters. Explanation The most likely cause of this user's problem is that the Num Lock key sequence for the notebook system has been pressed causing the keyboard to send numbers in the place of letters. Turning Num Lock off should fix the problem. When Intruder Detection is enabled, no logon attempts will be allowed, even if the correct password is used.

Aero

Set of features that improves the visual appearance of Windows

You have purchased an LED monitor and connected it to the HDMI port on your computer using an HDMI cable, You configure the screen resolution to 1280 x 1024 with 32-bit colour. The geometry of the images displayed on the screen appear to be distorted. What should you do to correct the problem?

Set the display resolution to the native resolution of the monitor. Explanation LED and LCD monitors have a native display resolution. You should set the resolution of the video board to the native resolution of the monitor (whatever it might be). While it might be possible to set the resolution other than the native resolution, the images on the display will be distorted or pixilated. Changing connection types will not correct an incorrectly set display resolution, nor will increasing the hardware acceleration or installing an updated driver.

You have purchased an LED monitor and connected it to the HDMI port on your computer using an HDMI cable. You configure the screen resolution to 1280 x 768 with 32-bit colour. The images displayed on the screen appear to be overly large. What should you do to correct the problem?

Set the display resolution to the native resolution of the monitor. Explanation LED and LCD monitors have a native display resolution. You should set the resolution of the video board to the native resolution of the monitor (whatever it might be). In this scenario, the display resolution has been set to a resolution that is much smaller than the native resolution, causing the images on the display to appear over-sized. Changing connection types will not correct an incorrectly set display resolution, nor will increasing the hardware acceleration or installing an updated driver.

You've just purchased an external SCSI hard drive for your desktop workstation. What should you do before you connect it to the system?.

Set the drive's SCSI ID

You recently upgraded a client's older workstation from Windows 7 to Windows 10. The client has called to complain that the interface is very slow. For example, after clicking on the Start button, the Start Menu slowly appears on the screen. How can you fix this problem without upgrading the hardware itself?

Set the visual effects for best performance. Explanation You need to adjust the visual effects for best performance. This will disable animation, shading, and fading effects used by Windows. Doing so reduces the load on the older hardware used in the client's systems and should increase the performance of the user interface. However, the best resolution to this problem would be to install a newer video adapter in the system. Changing the resolution setting changes the size of text and windows in relation to the screen. Changing the colour depth affects the number of colours that can be displayed at one time. Increasing the video acceleration settings increases the amount of processing done by the video card instead of the CPU.

You are the PC technician for a company. You received the following email from an employee: My email doesn't work. I keep getting email sent back to me, and I can't find any of my old emails. I don't think that the email program has ever workd well. When you arrive at the user's desk, you ask him to show you how they usually go about their email tasks. You quickly determine that the problem is not with the program, but that the user needs to be tranined on how to use the program. You have several important work tasks that need to be completed by the end of the day, and this is not high on your priority list.

Set up a time where you can sit down with the employee and show him how to complete common tasks.

What does nslookup do?

Sets in interactive mode.

CMOS

Settings that can change how a computer acts prior to loading operating system. Can be easily modified.

After arriving at work, you turn on your computer to begin your day. Instantly, you see smoke and smell a strange odor coming from the computer. What should you do?

Shit off the system immediately

What does netstat -s do?

Shows TCP/IP statistics.

What does netstat do?

Shows active connections.

You want to set up a Windows system to also be able to boot to Linux. To be able to dual boot, the system needs a partition on which to install Linux. You don't have an extra hard disk that can be used for the Linux partition. The existing disk has no unpartitioned space available, but it has about 300 GB of free space. Which disk management operation can you perform on the disk to use some of the free space for the Linux partition?

Shrink the primary partition Explanation You can decrease the space used by primary partitions and logical drives by shrinking them into adjacent, contiguous space on the same disk. For example, if you discover that you need an additional partition but do not have additional disk, you shrink the existing partition from the end of the volume to create new unallocated space that can then be used for a new partition.

Bus Topology - Physical

Signal travels from one host to other hosts in a straight line. Requires a special device called a terminator at both ends.

Ring Topology - Physical

Signal travels in a circle. Each host repeats the signal to the next host until it reaches its destination.

Star Topology - Physical

Signal travels through a hub or switch and is redistributed to the proper host.

Does not provide redundancy

Simple

At distance up to 3 km, delivers data rates up to 10 Gbps.

Single mode

Cable lengths can extend a great distance.

Single mode

The core diameter is around 10 microns.

Single mode

Explanation

Single mode fiber optic cable has the following characteristics: Data transfers through the core using a single light ray (the ray is also called a mode) The core diameter is around 10 microns. At distances up to 3 km, single mode delivers data rates up to 10 Gbps. Cable lengths can extend a great distance. Multimode fiber optic cable has the following characteristcs: Data transfers through the core using multiple light rays. The core diameter is around 50 to 100 microns. At distances of under 2kn, multimode delivers data rates up to 1 Gbps. Cable lengths are limited in distance. Fiber optic cable does not have a "dual mode" type.

Which of the following statements is true regarding single- and double- sided memory?

Single sided memory uses half of the memory modules as double- sided memory of the same capacity.

What optical media has the greatest storage capacity?

Single-layer, single sided Blu-ray disck

Which optical media has the greatest storage capacity?

Single-layer, single-sided Blu-ray disc. Explanation A Blu-ray disc has the greatest storage capacity of optical media. A single-sided Blu-ray disc holds up to 25 GB of data. Dual-layer or double-sided discs double the storage capacity. Experimental 20 layer Blu-ray discs hold up to 500 GB. Single-layer, single-sided DVDs hold about 4.7 GB. A dual-layer or double-sided DVD can hold up to 8.5 GB; a dual-layer, double-sided DVD can hold up to 17 GB.

This can require more memory and can cause problems if there is not enough memory at this time

Software installation

A flash device and storage capacity similar to a small hard drive.

Solid state drive (SSD)

Faster than other devices. No moving parts. Last longer than other storage devices.

Solid state drive (SSD)

Which of the following best describes the use of Libraries in Windows?

Special folders that group files and folders, possibly stored in both local and network locations, into a single logical folder.

Gestures

Specific finger motions that are used to perform a specific function.

What is the effect on your system when you run Disk Defragmenter?

Speeds up disk I/O performance

One method of preventing routing loops is to not send information about a route back to the router from which the information came. What is this technique called?

Split horizon

You are in the process of installing a motherboard in a system case. Which of the following objects should you place between the motherboard and the system case?

Standoffs

Which of the following topologies connects each network device to a central hub?

Star

You have a small network that uses a hub to connect multiple devices. What physical topology is used?

Star

Which of the following topologies connects each network device to a central hub?

Star Explanation Star topologies connect each device on the network to a central hub.

Match each Windows version on the left with its associated features on the right. Each Windows version can be used once, more than once, or not at all.

Start Screen similar to the Windows Phone - Windows 8/8.1 Enhanced Aero features including Snap, Shake, and Peek - Windows 7 Windows Sidebar - Windows Vista Metro design interface - Windows 8/8.1 Free upgrade available - Windows 10 Introduced the Libraries feature - Windows 7 Microsoft Edge web browser - Windows 10

What is the difference between DHCP stateful and stateless modes?

Stateful provides and assigns everything, then tracks the state of the client. Stateless lets the client auto configure, providing only a DNS address.

You are the network administrator for a small company that implements NAT to access the Internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 additional registered IP addresses to support these new servers but you don't want the public access these servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these 5 servers?

Static

You have a small network at home that is connected to the internet. On your home network you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow internet hosts to contact the server to browse a personal web site. What should you use to allow access?

Static NAT

On a Windows 10 workstation, you want to use the Storage Spaces feature to create a logical drive. Which of the following components are used to configure Storage Spaces?

Storage devices, which are physical drives such as SATA drives or external drives. Pools of storage, which are logically created from free space on storage devices. Storage spaces, which are logically defined units created from a pool of storage. Explanation Storage spaces are composed of three components: Devices are the hard disks or other types of storage from which storage pools are created. You can use a variety of devices such as SATA drives and external drives to create storage pools. Pools of storage are created from the available disk space. A pool is a logical concept composed of the free space available on the specified storage devices. Storage spaces define logical units of space created from a pool. One or more storage spaces can be created from the pool. To the Windows system and the user, storage spaces appear as disks with typical drive letters (e.g., E: drive, F: drive). Parity, thin provisioning, and data resiliency are benefits of Storage Spaces.

Explanation

Storage spaces can include data resiliency. Choosing an option that provides resiliency requires you to allocate space for redundant information. The options for storage spaces data resiliency include: Simple which does not provide redundancy. This option simply adds space from the storage pool to the storage space. When you select the Simple option, all of the data in the storage space is lost if one of the drives fails. Two-way mirror requires at least two storage devices. The data is written to two devices. Two-way mirror requires twice as much device space as the amount of storage allocated to the storage space. This option protects you from a single storage device failure. Three-way mirror requires at least five storage devices. The data is written to three storage devices. This option provides redundancy for the data if two storage devices fail at one time. Parity requires that you have at least three storage devices. This option uses parity information to reconstruct data if one of the storage devices fails. Parity uses less space for redundancy than the mirror options, but performance is not as good as the mirror options if a device failure occurs. Parity require only 50 percent more redundancy space than storage space.

You have configured your Windows systems to automatically backup user data every night at midnight. You also take a system image backup once a month. What else should you do to ensure that you are protected against data loss?

Store a copy of all backups off site Regularly test restoration procedures

Which of the following applications is more likely to justify the investment in Category 6 cable?

Streaming video

WPA

Strong wireless authentication method used to connect to a network

What is a generic term for cooling used by both active and passive cooling systems?

Surface area dissipation

Which of the following devices help protect against temporary, above-normal voltages?

Surge protector

Which ACPI power states retains the contents in RAM, but turn all components off?

Suspend

Connects segments on the same subnet. Forwards signals to only the port connected to the destination device.

Switch

Operate in full-duplex mode, meaning devices can both send and receive data at the same time.

Switch

What device is used to create a physical star topology?

Switch

Which of the following LAN devices receives a signal on one port, and the forwards that signal only to the port where the destination device is connected?

Switch

What device is used to create a physical star topology?

Switch Explanation A physical star topology uses a switch or a hub. Routers are used to connect multiple subnets together. A repeater regenerates a network signal so that it can be transmitted for longer distances.

Which of the following LAN devices receives a signal on one port, and forwards that signal only to the port where the destination device is connected?

Switch Explanation A switch offers guaranteed bandwidth to each port; unlike a hub which shares bandwidth among all the network ports.

System Restore has been enabled for all volumes on a Windows 7 system. Recently, a new network driver was installed on the system. However, the driver code contained bugs and now your network board no longer functions. You are unable to access the Internet to download an older version of the driver. You need to revert the system to a prior restore point that was taken before the driver was installed.

System Restore

You need to configure when Windows checks for and downloads updates from Microsoft's update servers on a Windows 7 system. Which option in Control Panel should you use to do this?

System and Security

You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless. What do you need to connect the wireless network using WPA?

TKIP encryption and a preshared key

As you troubleshoot a problem during a customer appointment, you discover the problem is directly related to the customer's actions. How should you best address the situation?

Tactfully explain the problem without accusing or judging the customer.

Which of the following are magnetic storage devices?

Tape drive Hard disk Explanation The following are magnetic storage devices: A hard disk is a thick magnetic disk encases in a thicker protective shell. A tape drive (also called a digital linear tape or DLT drive) stores data on magnetic tapes similar to audio cassette tapes. Optical discs such as CDs and DVDs use lasers for both reading and writing information. Flash devices store information using programmable, non-volatile flash memory. Solid state drives are flash devices with a storage capacity similar to a small hard drive.

One of the programs that launch automatically at startup is causing your Windows 10 workstation to lock up. You have examined the Startup folder, and the problem application is not present. Which Windows utility should you use to prevent the program from starting automatically?

Task Manager

Which of the following tools can you use to start the Print Spooler service if it is currently stopped?

Task Manager Services console Net start

Which Windows tool lets you perform automatic backups at regular times (Such as on specific days at specific times)?

Task Scheduler

Which tool lets you automatically start an application or run a script based on triggers?

Task Scheduler

You have an application that you would like to run every Monday a 3 p.m. on your Windows workstation. Which tool would you use to configure the application to run automatically?

Task Scheduler

You have an application that you would like to run every Monday at 3 p.m. on your Windows workstation. Which tool would you use to configure the application to run automatically?

Task Scheduler

You have an application that you would like to run every Monday at 3 p.m. on your Windows workstation. Which tool would you use to configure the application to run automatically?

Task Scheduler

Lab Report

Task Summary Install three hard drives. Set the SATA Operation mode in the BIOS to RAID. Create a RAID 5 array with three disks. Configure three drives in the array. Configure the RAID array as RAID 5. Use a total capacity on the disks. Explanation To complete this lab: Create a RAID 5 array to provide both fault tolerance and increased performance. A RAID 0 array increases performance only, while a RAID 1 array provides only fault tolerance. Install three disks to create RAID 5 array. A RAID 5 array requires a minimum of three disks. Complete the following steps: 1. On the computer, switch to the drive bays view. 2. On the Shelf, expand the Hard Drives category. 3. Drag a hard drive to a free 3.5" drive bay. 4. Repeat step 3 to add additional hard drives are required by the scenario. 5. To connect the hard drives to the motherboard, on the Shelf, expand the Cables category. 6. Select a cable. In the Selected Component window, drag a connector end to the hard drive. 7. Repeat step 6 to connect cable to additional hard drives. 8. On the computer, switch to the motherboard view. 9. In the Partial Connections list for the computer, select a SATA cable. 10. In the Selected Component window, drag the unconnected cable end to the motherboard SATA connector. 11. Repeat steps 9 and 10 to connect additional SATA cables to the motherboard. 12. To connect the power cables, select the power supply. 13. On the computer, switch to the Drive Bays view. 14. In the Selected Component window, drag a SATA power connector to a hard drive. 15. Repeat step 14 to connect power to the other drive (s). 16. Switch to the front view of the computer. 17. Turn on the computer. 18 As the computer, press the Delete key to enter the BIOS setup program. 19. To configure the SATA drive mode, open System Configuration in the drop-down menu on the left. 20. Select SATA Operation. 21. Select RAID On and click Apply. 22. Select Exit to restart the system. 23. As the system boots, after the BIOS loads the RAID controller will load. Press Ctrl + I when you see the message on the screen. 24. Select Create RAID Volume and press Enter. 25. Press Enter. 26. Use the up and down arrow keys to define the RAID Level. 27. Press Enter. 28. Use the up and down arrow keys to define the stripe size. 29. Press Enter. 30. Press Enter to accept the default capacity and continue. 31. Press Enter. 32. When prompted, press Y. 33. Press Esc, then Y to restart.

An employee demands that she needs more RAM for her computer in order to complete her work tasks, but you know that her department isn't budgeted for new equipment. Your supervisor is the only one that has the authority to allocate department funds. How should you respond?

Tell the employee that she isn't currently budgeted for equipment upgrades, but that you will let your supervisor know about the request so it can be properly determined if new RAM can be acquired.

Which of the following utilities would you use to do the following? -Establish a remote server management session -Send unecncrypted (clear text) transmissions to the remote server - Use mostly to manage specialized industrial and scientific devices

Telnet The Telnet utilities is used to do the following: -Establish a remote server management session -Send unecncrypted (clear text) transmissions to the remote server - Use mostly to manage specialized industrial and scientific devices SSH is similar to Telnet. It is used for remote server management; however, SSH ecrypts all communications and is much more secure. PuTTY, xterm, and RUMBA are all terminal emulators.

Which of the following tools allow for remote management of servers?

Telnet SSH Both Telnet and SSH are tools for remote management of servers. However, you should avoid using Telnet as it sends all data, including authentication information, clear text on the network. POP3 is for retrieveing e-mail from a remote server, and FTP is for transferring files. LDAP is a protocol used to access information about network resources from directory service.

A user reports that her monitor has stopped working. While troubleshooting the issue, you discover a bad video card in the system. You replace the card and connect the monitor cable to the card. What should you do next in your troubleshooting strategy?

Test the solution

What does the /a switch used with the copy command indicate?

That the files is an ASCII text file

When you boot the computer, it hangs after asking you for the current time and date. What is the most likely problem.

The CMOS battery has failed.

A user reports that they are unable to access their Firewire drive after moving the PC from beneath the desk to the top of the desk. What is the most likely cause of this problem?

The Firewire cable is loose. Explanation In moving the computer, it is likely that one of the connectors on the Firewire cable came loose and is no longer properly seated. None of the other options would have been affected in just moving the computer. FireWire does not use IRQs for configuration. Simply moving the computer such a short distance would not require adding an external power supply if it wasn't needed before. Moving the computer does not change drivers used for devices.

Explanation

The Healthy or Online status indicates that the disk is turned on and can be accessed. The volume on the disk is valid and has no errors. The Initializing process shows while a disk is being converted from a basic disk to a dynamic disk. After the conversion, the status for the volume changes to Healthy. The Unavailable status indicates that errors have occurred on physical or dynamic disks. The Missing status shows when a dynamic disk has been removed or turned off.

You're TS a malfunctioning notebook computer system. The user has indicated that the screen suddenly became dark and difficult to read while he was downloading a lard file through his wireless network card while the system was plugged in at this desk. You've checked the system and determined that the backlight has stopped working. Which of the following could be the cause? (2)

The Inverter in the LCD assembly has malfunctioned. // The cold cathode fluorescent lamp has burned out and needs to be replaced.

You're troubleshooting a malfunctioning notebook computer system. The user has indicated that the screen is always dark and difficult to read even while the system is plugged into a wall outlet. You checked the system and determined that the backlight isn't working. Which of the following could be the cause?

The LCD cutoff switch is stuck in the Off position. Explanation It's possible that the notebook's LCD cutoff switch is stuck in the off position. The cutoff switch is used to shut off the backlight (and sometimes the video display itself) when the notebook lid is closed. Press and release the cutoff switch to determine if this is actually the problem. Because the problem exists when plugged in, you know the problem is not related to the battery.

Storage

The act of saving or maintaining data.

What is true about primary partitions?

The active partition must be a primary partition

Which of the following is true about primary partitions?

The active partition must be a primary partition. Explanation A primary partition is a partition type used on basic disks. The active partition must be a primary partition. Each physical disk can have up to four primary partitions, or three primary partitions and one extended partition. Logical drives are defined within an extended partition.

Explanation

The aspect ratio is the proportion between the width and height of a resolution. Aspect ratios are used by both display devices and video content. The following are the three most commonly used aspect ratios: 4:3 is used primarily by analogue TV broadcasts and older flat-panel and CRT displays. Typical resolutions include 800 x 600 and 1600 x 1200. 16:9 is a widescreen aspect ratio used by HDTVs, computer displays, and most production films. Typical resolutions include 1280 x 720 and 1920 x 1080. 16:10 is a widescreen aspect ratio used exclusively by computer display devices. Typical resolutions include 1680 x 1050 and 1920 x 1200.

Which of the following best describes an IP address class?

The class defines the default network address portion of the IP address

A user on your network has been moved to another office down the hall. After the move she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the case of the problem?

The client system has moved too far away from the access point

What is a DHCP Fully Qualified Domain Name (FQDN)?

The complete domain name.

What does occasional beeping from the UPS mean?

The computer is running on the UPS batter power.

Kernel

The core of the operating system that is loaded into memory when the system boots up.

You just created a snapshot of a virtual machine while it was running. What information is saved in the snapshot?

The current contents of the virtual machine's RAM. The current contents of the virtual machine's CPU registers.

Explanation

The default ports match with the following protocols: Port 22: Secure Shell (SSH) Port 80: Hypertext Transfer Protocol (HTTP) Port 443: HTTP over SSL (HTTPS) Port 445: Server Message Block (SMB/CIFS) directly over TCP. Port 143: Internet Message Access Protocol (IMAP) Port 427: Service Location )SLP) Port 548: Apple Filing Protocol

You have installed a device in your system and have run the Add a device wizard from Control Panel. Under what circumstance would it be appropriate to continue with the wizard if the device was not discovered?

The device does not support plug and play.

You plug a USB 2.0 external storage device into a USB 3.0 port on your computer. Which of the following statements is true regarding the device?

The device will work, but will only transfer at USB 2.0 speeds.

You're TS a malfunctioning notebook computer. Nothing appears on the LCD display when the system is powered on. When you connect an external monitor to the system, the Windows desktop is displayed properly on the monitor. What could be causing this problem? (2)

The display output has been redirected to the external monitor port using the Fn key.// The LCD assembly is malfunctioning

What is the Prefix of an IPv6 address?

The first 64 bits of the address.

What information does the next hop entry in a routing table identify?

The first router in the path to the destination network.

Processing

The flow of data through a series of procedures as defined by a set of instructions.

Explanation

The following mobile device operating systems are commonly available with the following feature highlights: Android - Is open source, the leader in mobile device operating systems. - Google Play Store has the most mobile apps. - Android manufacturers are countless, including Samsung, Song, HTC, LG, Motorola, etc. iOS - Is closed source, second in mobile device operating systems. - Close competitot to Google in AppStore mobile app count. iOS devices or iPhones are solely designed and developed by Apple. Windows - Is closed source, far behind Android and iOS in mobile device operating system popularity. - Windows Store has fewest mobile apps. - Microsoft Mobiles (formerly Nokia) are the leading Windows Phone providers. Though Samsung and HTC have launched Windows phone devices in the past. Google is not a mobile device operating system; Google uses the Android operating system.

Hardware

The physical components that compose a computer system or network.

Explanation

The following network types are defined by the geographical area they cover: Personal Area Network (PAN): A very small network used for communicating between personal devices. For example, a PAN may include a notebook computer, a wireless headset, a wireless printer, and a smartphone. A PAN is limited in range to only a few feet. Local Area Network (LAN): A network in a small geographic area, like an office. A LAN typically uses wires to connect systems together. For example, a LAN is usually a set of subnets connected to each other using routers to connect the subnets. Wireless Local Area Network (WLAN): A network that covers an area that is roughly the same size as a standard LAN. However, it uses radio signals instead of wires to connect systems together. Metropolitan Area Network (MAN): A network that covers an area as small as a few city blocks to as large as an entire metropolitan city. MANs are typically owned and managed by a city as a public utility. Wide Area Network (WAN): A group of LANs that are geographically isolated, but are connected to form a large internetwork.

Your iPad is configured to do remote backups everyday to iCloud. What conditions are required for the iCloud backup to take place. (Select three)

The iPad has to be plugged into a power source The iPad has to have an Internet connection The iPad screen has to be locked

What is crosstalk?

The interference caused by overlapping signals when cables are run in close proximity to each other

What is the Interface ID of an IPv6 address?

The last 64 bits of the address. Usually generated automatically rather than assigned.

What is a DHCP Top-level domain (TDL) domain?

The last part of a domain name.

When you try to boot your computer, it hangs after POST. When you access the UEFI setup program, yo see that the date is several years behind and the time is set to 12:01 am.

The motherboard battery has failed.

Input

The movement of data or commands to the internal computer hardware.

Which of the following is true of a network using the 1000Base-T standard?

The network uses copper UTP cables. The network operates at one gigabit per second. Explanation The 1000Base-T standard for Ethernet uses copper UTP cables (Cat5e or higher) and operates at 1000 Mbps (or 1 Gbps). With the exception of 10GBase designations, the number in Ethernet standards is based on megabits per second. Ethernet specifications with F, L, S, or E use fiber optic cables.

You have an Ethernet network using the 10Base-T standard. Network devices are connected together using hubs. Which of the following is true?

The network uses half-duplex communications

You are servicing a client's computer that has been randomly restarting. You decide to test the power supply using a multi meter. You connect the positive lead to the yellow wire on one of the Molex connectors. Which action should you take based on the mult imeter reading?

The power supply is failing and should be replaced.

Networking

The practice of connecting two or more computers in order to transfer data.

What is DHCP static partial assignment?

The prefix is statically assigned, ad the interface ID is derived from the MAC

What is attenuation?

The process of signal degradation as it passes through network media

Output

The process of the computer presenting, displaying, or otherwise giving data.

Which of the following are true regarding the recovery partition on a Windows system?

The recovery partition can be used to restore the system to its original state when it shipped from the manufacturer.

What is a DHCP . domain?

The root domain. A fully qualified domain name.

You are installing a satellite connection so your home office can connect to the Internet. Which of the following statement is true?

The satellite dish must be pointed in the correct direction for communicating with the satellite

Your system volume is running out of disk space. You need to extend the system volume to give it more space. Which of the following conditions must be met to extend the system volume?

The system volume must be formatted with NTFS. The disk must have contiguous free space on the same disk. Explanation The system volume can only be extended using contiguous free space on the same disk. This is the same for both basic and dynamic disks. Any volume can only be extended if it is unformatted or formatted with NTFS. The system volume can be on either a basic or dynamic disk. The system volume cannot be extended or spanned to non-contiguous space or to space on another disk.

Which of the following would be a good reason to NOT recommend a solid ink printer?

The user has a surplus of toner cartridges and would like a printer that can be used with these

Which of the following would be a good reason to not recommend a solid ink printer?

The user has a surplus of toner cartridges and would like a printer that can be used with these

Which of the following would be a good reason to not recommend a solid ink printer?

The user has a surplus of toner cartridges and would like a printer that can be used with these.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the break room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor

A user receives printouts consisting of several pages of seemingly random characters every time he prints to a network printer. The printer seems to work fine for all other users. What is the most likely cause of the problem?

The user is using an incorrect printer driver

Match the virtualization implementations on the left with the appropriate characteristics on the right. Each type of implementation may be used once, more than once, or not at all.

The virtual machine completely simulates a physical computer system - Full virtualization Operating systems do not need modification to run within virtual machines. - Full virtualization Only some of the components of a virtual machine are virtualized. - Partial virtualization Guest operating systems directly access hardware resources in the hypervisor host system. - Paravirtualization

Which of the following situations is more likely to justify the investment in Category 6a cable instead of Category 6?

The work area has a lot of electromagnetic interference (EMI). Explanation Category 6a cable is designed to be less susceptible to electromagnetic interference (EMI) than Category 6. Network performance can be greatly diminished by higher than average EMI. When cable is run under the floor, it must be Plenum insulated to be fire resistand and non-toxic, but doesn't need to be Cat6. Streaming video doesn't justify the extra cost of Category 6a cable when Category 6 cand handle the same bandwidth.

Which type of printer applies heat to the ink in print head nozzles causing the ink to boil and expel itself from the nozzle?

Thermal inkjet

Which type of printer boils the ink in its print head to print?

Thermal inkjet (bubble jet)

Which of the following is true of the way many large digital media vendors are using Digital Rights Management technology?

They are moving away from DRM because of several key shortcomings in the technology. They are adopting alternatives to DRM such as encouraged customers to not illegally share digital files.

Which of the following is a characteristic of extended partitions?

They are subdivided into logical drives. Explanation An extended partition is subdivided into logical drives. You cannot format an extended partition, you can only format the logical drives within the partition. You can have only a single extended partition per disk. The extended partition cannot be set as active, and therefore cannot be used to boot the computer. Use a primary partition to set the partition as active, boot the computer, or to create multiple partitions per disk.

Which of the following is true of most newer SATA drives?

They can be added to or removed from a system without shutting down the computer.

Protects your data if two storage devices fail at one time.

Three-way mirror

Requires at least five storage devices

Three-way mirror

Which of the following processor features is used to dynamically reduce power consumption based on current operating conditions?

Throttling

What is the primary purpose of gateway redundancy?

To overcome a single point of failure on the next hop router

Why should backup media be stored offsite?

To prevent the same disaster from affecting both the system as well as its associated backup media.

Which of the following are good reasons to enable NAT?

To translate between Internet IP addresses and the IP addresses on your private network

Your company relocated you to their United Kingdom office in London. You brought your personal computer with you and are in the process of setting it up. Your computer was previously configured to receive 110 V AC, but the electricity in London uses 230 V AC. Which of the following would allow your computer to run on 230 V AC?

Toggle the Voltage switch on the power supply to the different voltage.

You need to trace the route that a Cat 6 UTP cable takes through the ceiling and walls of your building. Which tool should you use?

Tone Probe

You need to trace the route a Cat 6 UTP cable takes through the ceiling and walls of your building. Which tool should you use?

Tone probe

You're responsible for ordering consumables for your organization's printers. These printers are heavily utilized by your users who demand the utmost in reliability. Which of the following would be the best option when ordering new toner for these printers?

Toner Cartridges recommended by the printer manufacturer.

You're responsible for ordering consumables for your organization's printers. These printers are heavily utilized by your users who demand the utmost in reliability. Which of the following would be the best option when ordering new toner for these printers?

Toner cartridges recommended by the printer manufacturer

You're responsible for ordering consumables for your organization's printers. These printers are heavily utilized by your users who demand the utmost in reliability. Which of the following would be the best option when ordering new toner for these printers?

Toner cartridges recommended by the the printer manufacturer

IPConfig

Tool that displays network card information including IP Address, Subnet Mask, DNS, and Default Gateway

tracert

Tool that sends a packet to another device by forwarding the packet to all intermediaries along the way while measuring the time required for each hop to complete.

Ping

Tool that sends a packet to another device in order to test connectivity and determine the amount of time required for a packet to reach its destination and return to its origin.

netstat

Tool used to determine all current connections

nslookup

Tool used to determine the IP address of a specific hostname.

Physical Topology

Topology used to describe the way a network is wired

Logical Topology

Topology used to describe the way messages are sent

What type of peripheral device is typically found on a notebook computer and allows the user to control the cursor with a finger?

Touch pad

Which of the following is considered an input devices?

Touchscreen

While working on a Linux server, you are unable to connect to Windows Server 2003 system across the Internet.You are able to ping the default gateway on your own network, so you suspect that the problem lies outside of the local network. Which utility would you use to track the route a packet takes as it crosses the network?

Traceroute

Which component in a laser printer charges the paper to attract toner?

Transfer Roller

You have a laser printer that has worked fine until today. Now whenever anything is printed, only blank pages come out. Which part are you most likely to replace?

Transfer corona

Which component in a laser printer charges the paper to attract toner

Transfer roller

Document the Solution and Process

Troubleshooting step that provides you with a record of the problem and steps taken to resolve problem.

Create an Action Plan

Troubleshooting step used to address the most likely problem and ensure that side effects are taken into consideration prior to implementing changes.

Identify Possible Causes

Troubleshooting step used to check for simple, obvious and common problems first.

Identify the Problem

Troubleshooting step used to identify problem description, error messages or recreate problem.

Back up the System

Troubleshooting step used to protect against unintentional data loss caused by making changes.

What is a manually configured tunnel?

Tunnel endpoints are configured at point-to-point connections between routers. Requires dual stack.

What is Teredo Tunneling?

Tunnels between individual hosts.

Protects you from a single storage device failure

Two-way mirror

Requires at least two storage devices.

Two-way mirror

What 3 cards can be placed in a Type III PC Card slot? (3)

Type I, II, and III

Parity RAM

Type of RAM that checks for common kinds of internal corruption but does not fix it

Error Correcting Code

Type of RAM that detects and fixes common kinds of internal corruption

What type of USB 3.0 connector is shown here?

Type-A

DRAM

Typically used as main system memory on a computer and is relatively inexpensive.

SRAM

Typically used in cache memory such as CPU cache, hard disk cache, and cache in networking devices. This memory is relatively expensive.

You are a software developer and you are creating a multimedia streaming application. Data will be streamed from your streaming server to streaming clients over IP networks. Which transport protocol should your application use to send data between the clients and the server?

UDP

What technology was designed to replace the BIOS and is a firmware solution for controlling the startup process and loading the computer operating system into memory?

UEFI

Which connector is most commonly used by modern printers to connect to a desktop PC system?

USB

Which connector is most commonly used to connect printers to desktop PC systems?

USB

Which is the most common interface for peripheral devices?

USB

You would like to add additional hard disk storage to your notebook computer. Which of the following connection types are you most likely to use?

USB

Which of the following standards provides for data transfer rates up to 480 Mbps with a maximum cable length of 5 meters?

USB 2.0

You just purchased an iPad tablet device. You want to synchronize your photos, music, email, and contacts from your Windows 7 PC to the device. How can you connect the device to the PC?

USB cable Wi-Fi wireless connection Explanation An iPad can be connected to a Windows 7 PC in three different ways: - USB cable. -Wi-Fi wireless connection. - Bluetooth wireless connection. The iPad does not support wired Ethernet connections, serial connections, or Firewire connections.

For which type of device will you typically install the driver before you connect the device to your system?

USB devices

You have two computers: ComputerA is running Windows Vista and ComputerB is running Windows 10. You need to transfer user profile information and data files from ComputerA to ComputerB. Which tools could you use to do this?

USMT Windows Easy Transfer

Your computer currently uses a 5,400 RPM hard disk. You want to improve your computer's overall performance by optimizing your hard disk performance. Which of the following would be the most effective means for optimizing your hard disk performance?

Upgrade to a 10,000 RPM hard disk. Upgrade your hard disk interface to SATA 3. Explanation Upgrading to a 10,000 RPM hard disk and upgrading to a SATA 3 disk interface are the two most effective steps you can take to improve your computer's overall performance. The 7,200 RPM hard disk is not the fastest hard disk option. At 600 Mbps, the SATA 3 disk interface is twice as fast as the SATA 2 interface. Although hard disk drives are not capable of sending data at the full Mbps they can go faster than the SATA 2 interface allows. Implementing RAID 0 does improve hard disk performance, but it requires a minimum of two disks. Adding another hard disk while keeping your current 5,400 RPM disk would not improve your hard disk performance as much as upgrading to 10,000 RPM hard disk with a SATA 3 disk interface.

You have just finished installing Windows on a system that contains four physical hard disk. The installation process has created system volume and a C: volume on the first disk (Disk 0). The installation process also initialized the second disk (Disk 1) and the third disk (Disk 2) but did not create any volumes on these disks. Which of the following would you expect to see as the status of Disk 1 and Disk 2?

Unallocated Explanation A disk that has been initialized will show as Unallocated if no volumes have been created. The Healthy or Online status indicates that the disk is turned on and can be accessed. The volume on the disk is valid and has no errors. The Formatting status is shown for volumes during the formatting process. After formatting, the status for the volume changes to Healthy. The Initializing process shows while a disk is being converted from a basic disk to a dynamic disk. After the conversion, the status for the volume changes to Healthy. The Unavailable status indicates that errors have occurred on physical or dynamic disks. The Unreadable status indicates a hardware failure, I/O errors, or other corruption but might also be caused by a delay in reading the disk in Disk Management.

You have been asked to install Windows 7 on 10 different computers for a new branch office you company is setting up. The computers have been purchased from different companies and have different hardware. Which methods should you use to reduce the installation time and the effort you need to spend?

Unattended

Indicates that errors have occurred on physical or dynamic disks.

Unavailable

Sag

Under-voltage that lasts milliseconds

Brownout

Under-voltage that lasts seconds

Which of the following is an upgrade of the SODIMM standard?

UniDIMM

IPv4 Address

Unique decimal identifier used to identify a specific host and the network to which it belongs.

MAC Address

Unique hexadecimal identifier on every network card. This address identifies the exact network card that sent out a packet.

IPv6 Address

Unique hexadecimal identifier used to identify a specific host and the network to which it belongs.

What should you do if you cannot turn off a laptop?

Unplug the AC power and remove the battery

You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You check the motherboard documentation and purchase the fastest processor supported by the motherboard. However, When you start the computer, it beeps regularly and nothing is displayed on the screen and it doesn't start. What should you do first?

Update the UEFI firmware.

You recently installed a small office home office wireless router. To avoid security holes and bugs, what should you do to the route?

Update the firmware

What is DHCPv6?

Updated DHCP for IPv6. Operates in stateful and stateless mode.

You have an extra disk on your system that has three primary partitions and an extended partition with two logical drives. You want to convert the partitions to simple volumes, preferably without losing any data. What should you do?

Upgrade the disk to a dynamic disk

You have an extra disk on your system that has three primary partitions and an extended partition with two logical drives. You want to convert the partitions to simple volumes, preferably without losing any data. What should you do?

Upgrade the disk to a dynamic disk. Explanation When you upgrade a basic disk to a dynamic disk, existing partitions are converted to simple volumes. You can convert the disk without deleting partitions or losing any data. Use the convert command to change the file system from FAT32 to NTFS. The partition table type (either MBR or GPT) does not affect the partition or volume type.

You have a desktop computer that uses a 250 watt power supply. You recently added a 4-disk RAID 10 array to the system and now it spontaneously shuts down. What should you do?

Upgrade to a power supply that provides more watts.

You are preparing for an installation of 64-bit Windows 10 on a computer that is currently running a 64-bit version of Windows 7. You perform a hardware inventory on the computer and not the following: -Processor = 2.0 GHz -Free Hard Drive Space = 200 GB -RAM = 1 GB -DVD drive = 18x -100 Mbps NIC You need to prepare this computer to ensure that it meets the minimum hardware requirements of Windows 7. What should you do?

Upgrade to at least 2 GB of RAM.

What situation would most likely require a system BIOS update?

Upgrading a processor

A user installs a new graphics application on her Windows system. During the installation process, the application prompts the user to load a custom video driver that has been optimized for the application. She does so and then completes the installation. Several days later, the user reports that her display doesn't seem to be working properly under some conditions. To fix the problem, you need to reload the old video driver. How could you accomplish this?

Use Device Manager to roll back the video driver. Revert the system to a restore point prior to installing video driver. Explanation To roll back to a previous driver, access Device Manager and then use the Roll Back Driver option available in the video driver's properties. You may need to boot the system into Safe Mode first if the problem is serious enough to make the display difficult to see. Alternatively, you could also revert the system to a prior restore point that was created before the problematic driver was installed. You should not disable the driver in this situation. The Last Known Good configuration boot option is only available on Windows 7 and earlier systems. Even if it were available, it would not work in this scenario because the system has been rebooted and the user has logged in since the change was made. Running a startup repair would not correct a problem with an erratic video driver.

You have an application that processes videos used in your online business, which requires a significant amount of processor time. You want to make sure that the application receives adequate access to the CPU, even if you open other applications. How can you adjust the amount of attention given to that application?

Use Task Manager to modify the process priority.

You have an application that renders videos used in your online business. You want to make sure that the application continues to receive adequate attention from the system CPU, even if you open other applications. How can you adjust the amount of attention given to that application?

Use Task Manager to modify the process priority.

You have been recently hired to manage a network for a small company. Prior to your arrival, the entire network was migrated from IPv4 to IPv6. Each of the two functional groups within the organization has its own network segment that is separated from the other with a router. All network segments within the organization use a /64 prefix, including the point to point backbone segment that connects the two routers. You are concerned that Neighbor Discovery (ND) issues could occur between the two routers on the backbone segment. Which strategy could you employ to help prevent these issues from occurring?

Use a /127 prefix on the backbone segment

You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure Broadcast traffic sent by an accounting computer is only received by other accounting computers, and you want to implement ACLs to control traffic sent to accounting computers through the network. What should you do?

Use a router to configure a subnet for the accounting computers.

You're conducting scheduled maintenance on a laser printer. You notice that there is a build-up of excess toner inside the interior of the printer. Which of the following is the proper way to remove it?

Use an anti-static vacuum

You've conducting scheduled maintenance on a laser printer. You notice that there is a build-up of excess toner inside the interior of the printer. What is the proper way to remove it?

Use an anti-static vacuum

You are building a new computer from both new and used parts. The video card is a PCIe Video card that requires an 8-pin power connector. However, your power supply doesn't have an 8-pin PCIe power connector. Which solution would be the least expensive option for your system?

Use and adapter cable to connect two 4-pin molex connectors to the 8-pin PCIe connector.

You want to combine storage space from two different hard disks into a single logical storage unit on your Windows computer. What should you do?

Use dynamic disks and a spanned volume

You want to combine storage space from two different hard disks into a single logical storage unit on your Windows computer. What should you do?

Use dynamic disks and a spanned volume. Explanation To use multiple disks in a single logical storage unit, upgrade all disks to dynamic disks. Create a spanned volume. A simple volume contains storage space from a single disk. Use basic disks to create primary and extended partitions. Partitions cannot include storage space from multiple disks.

The sales engineers in your organization use virtual machines to model deployments in the lab prior to actually implementing them in your customers' physical environments. You are concerned that malicious insider could gain access to the sensitive data on these virtual machines. What should you do?

Use file and folder permissions to restrict access to the virtual hard disk files. Disable the USB ports on the hypervisor hardware.

A customer has called to complain that the colors in photos she has printed on the color inkjet printer your store sold her don't match the colors in the originals. Assuming the customer is using a Windows workstation, what should you do to resolve the issue?

Use the Color Management tab of the printer driver to calibrate the drivers color settings or download and install the latest printer drivers

A user in sales cannot get his laptop to display through a projector. He sees the screen output on the built-in display, but the video is not being seen on the projector. What should you do first?

Use the Fn key to redirect display to the external video port. Explanation Toggle the display setting with the Fn key. Most laptops offer several display choices, such as: PC screen only, Second screen only, Duplicate (both screen), and Extend (both screens). The most likely culprit in this scenario is that the display has been toggled to PC screen only, so choosing either of the other two settings should allow the user to see the display on the projector. Upgrading the video card, replacing the display, or checking the backlight settings are not necessary as the video shows properly on the internal display.

A user recently used her notebook to make a presentation that required her to display her screen from a projector in the conference room. She is now back at her desk, her notebook is still on, but the display is blank. What should you do first to restore the display>

Use the Fn keys to toggle the display output to the laptop monitor. Explanation The first step to try to restore the display is to use the Fn keys to toggle the display output to the laptop monitor. It is very likely that the Fn keys were used to toggle the display output to the projector for the presentation and then not toggled back to the laptop monitor. Rebooting the computer will probably restore the default display output, but is not the best first solution to try. The other steps might become necessary is some cases, but only after the easiest and likeliest solutions are tried.

You manage the desktop computers at your company. You are in charge of 100 computers, all of which run Windows 7. You want to upgrade all computers to Windows 10. You want to gather the necessary information as quickly as possible. What should you do?

Use the Microsoft Assessment and Planning Toolkit (MAP).

You decide to upgrade your PC with a faster processor. To do this, you ordered a new motherboard over the Internet that supports the processor you want to use. When it arrives, you discover that the motherboard uses the Mini-ATX form factor. Your current case is an ATX mid-tower with a standard ATX motherboard inside. What should you do?

Use the Mini-ATX motherboard in the ATX case.

You recently purchased a copy of Windows 10 from a retail store. However, the system you want to install Windows on doesn't have an optical drive. What is the best option to install Windows in this scenario?

Use the Windows 7 USB/DVD Download Tool to copy the installation files to a USB flash drive.

For the past several days, the print jobs from the ink jet printer are missing colors and leaving gaps. What should you do to resolve the problem?

Use the automatic cleaning feature

For the past several days, the print jobs form the inkjet printer are missing colors and leaving gaps. What should you do to resolve the problem?

Use the automatic print head cleaning feature

For the past several days, the print jobs from the inkjet printer are missing colors and leaving gaps. What should you do to resolve the problem?

Use the automatic print head cleaning feature

How can you reformat a drive from FAT32 to NTFS w/out losing the existing data?

Use the convert command at a command prompt

how can you reformat a drive from FAT32 to NTFS without losing the existing data?

Use the convert command at a command prompt

You have a hard disk that is formatted with the FAT32 file system. You would like to implement file and folder permissions on the Design folder that apply when files are accessed both locally and remotely. What should you do?

Use the convert command to convert from FAT32 to NTFS, then configure NTFS permissions.

Used in notebook computers. Notch is slightly off center. Used by SDRAM, DDR, and DDR2 memory

Used in notebook computers. Notch is slightly off center. Used by SDRAM, DDR, and DDR2 memory

UniDIMM

Used in notebook computers. The notch is positioned farther off center. Supports both DDR3 and DDR4 memory

Match the peripheral devices on the left with the descriptions or examples on the right. Each peripheral device may be used once, more than once, or not at all.

Used to scan hardware which contains an embedded microchip for authentication:: Smart card reader Used to capture some type pf analog signal and convert it into digital data: Digitize Can be stand-alone devices or integrated with other peripherals, such as keyboard: smart card reader Used to scan users' unique physical features and use them to verify their identity.: Biometric Scanner Graphics tablets mostly used by graphic artists to capture hand-drawn images: Digitizer Fingerprint Scanner: Biometric Scanner Most Commonly used in retail environments at checkout stands.: bar code reader

Match each IEEE 1394 connector type on the left with the appropriate description on the right.

Used with FireWire 400 devices and provides power via a 12 V wire: 6-pin connector Used with fireware 400 devices that must be self-powered: 4-pin connector Used with FireWire 800 devices that are most commonly found on apple computers: 9-pin connector

You manage over 100 desktop computers, all currently running Windows Vista. You recently purchased replacement computers that have Windows 10 pre-installed. You want to move user data and settings from the old computers to the new computers. Which tool should you use?

User State Migration Tool

Which component of windows prompts the user for credentials or permission to minimize the dangers of unintended software installations?

User account control (UAC)

On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?

Users with the correct WEP key

Infrared (IR)

Uses invisible light for communication and requires direct line-of-sight. Operates best in short distances at speeds up to 4Mbps.

Bluetooth

Uses radio waves for communication between devices up to a maximum distance of 100m and a maximum of 24Mbps. Generally used by keyboards, mice, smartphones, and headphones.

System Preferences

Utility used to change settings of Mac OS

You are trying to help a co-worker order a UPS for each PC in her remote office location. What rating is used to specify the size of a UPS?

VA

What is a DHCP reservation?

When a DHCP server assigns a specific address to a specific host.

You've just set up a color laser printer on a customer's Windows workstation. You've connected it to the workstation using a USB cable and have loaded the appropriate drivers. What should you do next?

Verify that it is working correctly by printing a test page, or Edit the printer properties to configure paper tray and other device-specific settings

A user has called to complain that her computer won't boot. It stops on the system startup screen right after the memory has been tested and displays a 301 keyboard error.

Verify that no keys are being pressed down during POST

One of your users has called to complain about her notebook computer. She reports that it displayed a message indicating that the battery was low, then it shut down by itself even though it was plugged into a wall outlet. What should you check first?

Verify that the AC adapter light is lit when plugged into the wall outlet.

You're about to begin an upgrade of a Windows 7 workstation to Windows 10. What should you do before beginning?

Verify that the computer meets the minimum requirements. Create a system backup of the hard drive prior to running the upgrade.

Which of the following paper types should NOT be used in inkjet printers?

Very glossy paper

You want to purchase a home theater computer system. Which hardware selection criteria would be most improtant for this system?

Video card with HDMI output HTPC form factor

What is the purpose of the dxdiag tool?

View information related to DirectX operation.

Recently, a Windows 10 update was automatically downloaded and installed on your Windows 10 system. However, after installing the update, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again.

View your update history

Which of the following is another name for the paging file?

Virtual Memory.

Which term refers to a software implementation of a computer system that executes programs like a physical machine?

Virtual machine

You own a custom PC retail store. A small business client asks you to build three workstations for her organization: -Virtualization Workstation -Video Editing Workstation -Thin Client PC

Virtualization Work Station -AMD 12-core, 4 GHZ CPU -4 TB SATA HD -32 GB DDR4 RAM -HAV Video Editing Workstation -Intel Core i7 six-core, 3.4 GHZ CPU -2 TB SSD SATA HD -16 GB DDR4 RAM -Video capture card Thin Client PC -Intel Celeron dual-core, 2.7 GHz CPU -500 GB SATA HD -2 GB DDR3 RAM -Few or no applications installed

Which of the following protocols carry phone calls over an IP-based network?

VoIP

Which of the following items are likely to be displayed in the notification Area of a computer running the windows operating system?

Volume control The current time

You need to add security for your wireless network. You would like to use the most secure method. What method should you implement?

WPA2

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

What is the difference between UXGA and WUXGA displays?

WUXGA has a widescreen aspect ratio

What is the difference between UXGA and WUXGA displays?

WUXGA has a widescreen aspect ratio. Explanation WUXGA uses a widescreen (16:10) aspect ratio. The aspect ratio describes the relative width and height of the screen. Though the screen for a WUGXA screen is larger in size, technically the resolution is similar to UXGA but it is adjusted for the wider aspect ratio. The contrast ratio is a description of the relative difference between white and black, and is independent of the screen resolution. All LCD monitors are capable of using the entire screen for displaying images.

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effect possible.

Wait for convergence to take place

You have a desktop computer that you want to upgrade. You add several internal components and external components. You realize that you need to ensure that your power supply can support all of the new devices. which power supply rating is used to determine this?

Watt Training

WEP

Weak wireless authentication method used to connect to a network

Which type of mobile device are fitness tracker wrist bands, smartwatches, smartglasses, and virtual reality headsets.

Wearable devices Explanation Wearable devices are a type of mobile device meant to be worn somewhere on the body. These devices range from being as simple as a fitness tracker wrist band to as complex as smartglasses or virtual reality headsers. Most wearable devices are designed to interface with another device. For example, a smartwatch by itself has a limited set of functionality: however, smartwatches are designed to connect to smartphones using Bluetooth. Doing this unlocks additional functionality, such as reading texts or answering phone calls through the smartwatch.

Explore the current BIOS settings to find the answers to the following questions.

What brand of processor is installed? -Intel How much memory is installed in the computer? -4096 What is the BIOS version number? -1610 How many hard drives are installed? -3 What is the staus of the integrated NIC? -Enabled Which drive is configured as first in the boot sequence? -Diskette Drive

Applications for mobile devices fall into two categories; some have been reviewed, approved, and signed with a certificate by the app service while some have not.

What category do apps fall into if they have been signed with a certificate? Trusted What category do apps fall into if they have not been reviewed, approved, and signed with a certificate? Untrusted Explanation Apps that have been reviewed, approved, and signed with a certificate by the app service are referred to as trusted apps. Apps that have not been reviewed, approved, or signed with a certificate by the app service are referred to as untrusted apps. Untrusted apps might be safe but it is risky to install them and most devices won't allow them to be installed by default.

How do switches and bridges learn where devices are located on a network?

When a frame enters a port, the source MAC address is copied from the frame header

How do switches and bridges learn where devices are located on a network?

When a frame enters a port, the source MAC address is copied from the frame header. Explanation Bridges and switches learn addresses by copying the MAC address of the source device and placing it into the MAC address table. The port number which the frame entered is also recorded in the table and associated with the source MAC address. The switch or the bridge cannot record the destination MAC address because it does not know the port that is used to reach the destination device. Bridges and switches operate at Layer 2 and do not use IP addresses (which exist at Layer 3).

What is a DHCP exclusion?

When a specific address is specified to not be assigned to clients.

Under what conditions should you choose exFAT over FAT32 or NTFS? (Select 2)

When creating a volume over 32 GB in size When formatting removable flash devices.

Under what 2 conditions should you choose exFAT over FAT32 or NTFS?

When formatting removable flash devices / when creating a volume over 32 GB in size

Why would you recommend a dye sublimation printer?

When print jobs are detailed photographic reproductions

Why would you recommend a dye sublimation printer?

When print jobs are detailed photographic reproductions.

Under what condition should you choose exFAT over FAT32 or NTFS?

When storing files larger than 4GB in size. When formatting removable flash devices.

What is a dual stack?

When the IPv6 and IPv4 protocol stacks run at the same time on a host.

What is stateful auto configuration?

When the client gets everything from the DHCP server.

What is 6-to-4 tunneling? And 4-to-6 tunneling?

When tunnel endpoints are automatically configured between devices. Requires dual stack. First number is encapsulated. Second number encapsulates.

When do you need to upgrade the system BIOS?

Whenever a BIOS update provides functionally that is not currently supported but that is required by the operating system or hardware.

DNS Hosts file

Which Mechanisms could you use to resolve a hostname into its associated IP address

DHCP

Which Service can you use on your network to automatically assign IP addresses to hosts and help prevent the same address from being assigned to two different hosts?

Default gateway

Which TCP/IP configuration parameter identifies the router that used to reach hosts on remote networks

6384:1319:7700:7631:446A:5511:8940:2552 141:0:0:0:15:0:0:1

Which of the following are valid IPv6 addresses

FEC0::AB:9007

Which of the following are valid IPv6 addresses

32 numbers, groouped using colons Hexadecimal Numbers

Which of the following correctly describes the most common format expressing IPv6 addresses

128-bit address Eight hexadecimal quartets

Which of the following describe an IPv6 address

The last quartet in the IPv6 address Prefix

Which of the following describes the part of the IPv6 address that identifies the subnet address

The last 4 quartets of an IPv6 address The last 64 bits of an IPv6 address

Which of the following identifies the Interface ID component of an IPv6 address

The first 4 quartets of an IPv6 address The first 64 bits of an IPv6 address

Which of the following identifies the prefix component of an IPv6 address

It can deliver a DNS server address in addition to the host IP address A workstation must request addressing information from DHCP server

Which of the following statements about the DCHP are true

Network and Sharing Center

Which tool would you use in Windows Vista/7 to manage network connections

The workstation was unable to contract the DHCP server

Why did the workstation receive this type of configuration

What command do you use to check the disk for lost clusters or cross-linked files?

chkdsk

A group of networks that are geographically isolated, but are connected to form a large internetwork.

Wide Area Network (WAN)

What does the rd command do when used with the /q switch?

Will not prompt you to confirm deletions

Closed source and second least popular mobile device operating system.

Windows

Device manufacturers include Microsoft, Samsung, and HTC.

Windows

Which operating system(s) include the following features? -Cloud storage -continuum -microsoft store -microsoft edge

Windows 10

You remove a hard disk from a Windows 7 system and put it in another system and put in another system that is running Windows 98. You are unable to read the disk. What is most likely the problem?

Windows 98 does not support NTFS

Which windows tools would you use to browse the file system on drive

Windows explorer computer file explorer

Similar to a standard LAN, but uses radio signals instead of wires to connect systems together.

Wireless Local Area Network (WLAN)

Which of the following is true when the DHCP setting is disabled in a wireless network?

Wireless clients must use a static IP address within the correct IP address range to connect to the network

802.11b

Wireless communication that uses 2.4GHz frequency, transmits at 11Mbps at a maximum distance of 150 ft (medium range).

802.11g

Wireless communication that uses 2.4GHz frequency, transmits at 54Mbps at a maximum distance of 150 ft (medium range).

802.11a

Wireless communication that uses 5GHz frequency, transmits at 54Mbps at a maximum distance of 100 ft (short range).

802.11n

Wireless communication that uses either the 2.4GHz or 5GHz frequencies, transmits at 600Mbps at a maximum distance of 300 ft (long range).

802.11ac

Wireless communication that uses the 5GHz frequency, transmits at 1.3Gbps at a maximum distance of 200 ft (medium to long range).

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer?

Workgroup Peer-to-peer Explanation Access to shared resources are controlled separately on each computer in the workgroup or peer-to-peer models. For example, each computer in a peer-to-peer network maintains its own set of user accounts. A domain is a collection of computers that share a common security database. Access is controlled by maintaining access control lists in a centralized directory. The client/server model places shared resources on a server. Resources are accessed by clients.

You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them. What is the most likely cause of the problem?

Wrong print drive

You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them. What is the most likely cause of the problem?

Wrong print drive.

You currently use the Thunderbird email client on your desktop PC. You use it to connect to an email server provided by a service provider using the IMAP and SMTP protocols. You recently purchased an iPad and want to configure its Mail app to connect to your email server. Can you do this?

Yes, you can configure the Mail app on an iPad to connect to an email server using the IMAP and SMTP protocols. Explanation Yes, you can configure the mail app on an iPad to connect to any e-mail server reachable over the network using the IMAP or POP3 and SMTP protocols. It also supports server connections that are secured using Secure Sockets Layer (SSL) security. It can also connect to mail accounts hosted by large service providers, such as Gmail.

In which of the following situations would restoring from a backup be the best option?

You accidentally deleted several important e-mails and need to restore them. You need to restore several word processing files that were accidentally deleted from your Documents folder.

Install the DHCP service on your server

You are setting up a small network in your office with one Windows server and 50 Windows workstations. What should you do?

Which of the following situations is most likely to require a system BIOS update?

You are upgrading a processor

On the main network printer, another user's print job has stalled. You try to delete the job, but you can't. What is the reason why you can't delete the print job?

You do not have the Manage documents permission

Static IP Addressing

You have a host on your network that provides a service that requires the server to always use a specific IP address. Which IP addressing method can you use to manually assign the specific IP address?

Alternate IP Configuration

You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP address from the DHCP server so you configure it to obtain IP and DNS information automatically. When he's working from home, the laptop must use IP and DNS information that connects with his home Network

You're formatting a newly-installed hard disk with Disk Management and are at the point where you need to select the type of file system to be used. What scenario would require selecting the FAT32 file system?

You need the disk to be backwards-compatible with older versions of Windows

You're formatting a newly-installed hard disk with Disk Management and are at the point where you need to select the type of file system to be used. Which of the following scenarios would require selecting the FAT32 file system?

You need the disk to be backwards-compatible with older versions of Windows.

You are talking with a customer support technician on the telephone. The technician recommends downloading a particular driver from Internet. When you try to connect to the Internet using your modem, you can't What is the problem?

You need to hang up

In which of the following situations would restoring from a system image be the best option?

You need to restore a Windows system after a catastrophic hard drive failure.

Given that you are using a Windows 10 system, in which of the following situations would reverting to a System Restore point be the best option?

You recently installed a new application and now the system behaves erratically.

In which of the following situations would driver rollback be the best tool to use?

You recently installed a new video driver and now the system behaves erratically. Explanation Driver Rollback would be best suited to a situation where you've installed a misbehaving driver and need to revert to an older version of the driver. Driver Rollback preserves the old driver every time you install a newer driver. Therefore, you could use Driver Rollback to uninstall the current driver and restore the previous version.

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a "paper license" and a single key for updating 10 users. Since this is an enterprise paper license there is no mechanism that enforces a limit to the number of times the key can be used so you decide to go ahead and update all 20 users. What are the possible consequences of this decision?

You risk losing your job. You expose your company to litigation by violating the software license agreement.

Which of the following statements about cleaning monitors and display devices is true?

You should clean the monitor while it is powered off with a lint-free cloth.

You have a computer currently running Windows 7. Which of the following reasons would justify performing a clean installation of Windows 10 on the system instead of an upgrade?

You want to dual boot both operating systems.

Scenario

You work as the IT Administrator for a small corporate network. The receptionist, Maggie Brown, uses an iPad to manage employee schedules and messages. Her email settings on the device are configured to communicate with an IMAP mail server over insecure port 143. Also, you have just deployed a new wireless access point called CorpNet and Maggie needs to connect using the new password. 1. Your fist task is to use the Mail, Contacts, Calendars configuration option to go to Maggie Brown's email account settings and change the advanced configuration to Use SSL to securely communicate with the IMAP server over server port 993. 2. Your second task is to connect Maggies to the new CorpNet wireless access point through the Wi-Fi configuration. Type in the password, @CorpNetWeRSecure!& for the new Wi-Fi connection.

What utility checks the disk for bad clusters?

chkdsk

Scenario

You work part-time at a computer repair store. You are in the process of constructing a new system. You would like to install the operating system on a RAID array that provides both fault tolerance and improved performance (RAID 5: Striping with distributed parity). Your task in this lab is to: - Add the minimum number of disks to the computer to create the RAID array that meets the scenario requirements. Do not remove extra disks from the Shelf. - Connect all disks to the motherboard and provide power for the disks. - Boot the computer and configure a RAID array using the motherboard RAID configuration utility. - Choose the RAID level based on the scenario requirements. - Configure the array to use all of the disk space on the installed disks.

Which of the following conditions would prevent you from using GUID Partition Table (GPT) when setting up a disk drive?

You're updating the drive to boot Windows 7 on a computer that uses traditional BIOS. Explanation If you need the drive to boot Windows and the computer uses traditional BIOS (not UEFI), you need to set up the drive with MBR. A GPT drive can: Be basic or dynamic. Set up to boot 64-bit Windows 7 on a UEFI-based computer. Be used to create up to 128 partitions.

While using a Windows 8.1 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into Safe Mode and use System Restore to revert the system to point in time before the malware infection occurred. Given this information, which of the following are true?

Your user files were not affected when the system was reverted to the restore point. You must reinstall any applications that were installed after the restore point was taken.

What utility would you use to correct cross-linked clusters within the file system on a Windows workstation?

chkdsk

You're using a Linux distribution that uses Debian Package Manager (dpkg) for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

apt-get install httpd

Which of the following utilities checks the disk for bad clusters?

chkdsk

What type of authentication would require a user fingerprint or face recognition to get past the screen lock on a mobile device and get access to the device?

biometric Explanation A biometric authentication system attempts to identify a person based on metrics, or a mathematical representation, of the subject's biological attributes such as a fingerprint or a face recognition.

Which of the following utilities would you use to correct cross-linked clusters within the file system on a windows Workstation? a. chkdsk b. fdisk c. attrib d. DiskScan

chkdsk

You are installing a high-end PCIe x16 video card in a new computer. The video card has connectors for two displays. The card also has dual fans to cool the unit. Which of the following will be part of the installation.

connect a 6- or 8-pin power connector to the video card.

What command do you use to convert a drive formatted with FAT32 to NTFS?

convert

What utility would you use to realign the file structure on the disk to optimize performance?

defrag

Which of the following Windows command line utilities would you use to realign the file structure on the disk to optimize performance?

defrag Explanation Use the defrag command to place files in contiguous order on the disk and thus realign the file structure to optimize performance. Use chkdsk to search the system for lost allocation units and corrupted files. The fdisk utility can be used on older versions of Windows to create and delete partitions. You can use Disk Management to access the properties of a volume and then run the Defragmentation graphical utility from there.

You are troubleshooting a network connectivity issue on a Unix system. You are able to connect to remote systems by using their IP address, but unable to connect using the hostname. You check the TCP/IP configuration, and note that a DNS server IP address is configured. You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Choose two .) A. traceroute B. tracert C. dig D. nslookup

dig nslookup

You need to perform a reverse lookup of the 10.0.0.1 IP address. Which command can you use to accomplish this? (Select two. Each response is a complete solution.) A. nbtstat -a 10.0.0.3 B. ipconfig /dnslookup 10.0.0.3 C. dig -x 10.0.0.3 D. nslookup 10.0.0.3 E. arp 10.0.0.3

dig -x 10.0.0.3 nslookup 10.0.0.3

You have a computer running Windows 7 Home Premium and need to access the contents of a flash drive. The flash drive has been formatted with the exFAT file system. You want to read the flash drive on your computer as quickly as possible with the last amount of effort. What should you do?

do nothing. Windows 7 can natively access exFAT file systems

Which SATA storage device standard does the following? Integrates data and device power into a single cable. Uses a connector and port that are neither L-shaped nor rectangular.

eSATAp Explanation eSATAp (also known as Power over eSATA or Power eSATA) is meant to replace eSATA. It combines the functionality of an eSATA and a USB port with a source of power in a single connectors. It integrates data and device power into a single cable, and the connector and port are neither L-shaped nor rectangular. SATA1 is the original SATA standard. It provided for 1.5 Gbps (150 MBps) data transfer. SATA2 supports up to 3 Gbps (300 MBps). SATA 3 support up to 6 Gbps (600 MBps). It mainly addresses solid state drives with SATA (hard disk drives are not capable of sending data at this rate). eSATA is a subset of other standard specifically for externally connected devices.

What command do you use on older versions of Windows to create partitions?

fdisk

You have a hard disk that has a single primary partition and has been assigned D: as the drive letter. Which tool would you use to configure the drive to use the FAT32 file system?

format

You have physically installed a new hard disk drive into your computer, configured the disk in the BIOS using the CMOS setup program, and partitioned the disk. You try to access the hard disk drive in Windows Explorer, but can an error message. Which utility will you most likely use to solve the problem?

format

After installing a new SSD drive in your system, you determine that TRIM functionality has not been enabled on the drive by the Windows operating system. You need to manually turn TRIM on. Given that the volume on the drive has been assigned to drive letter of E:, which command should you use at the command prompt to do this?

fsutil behaviour set DisableDeleteNotify 0 Explanation If it is disabled, you can manually enable TRIM on an SSD drive by entering fsutil behaviour set DisableDeleteNotify 0. The fsutil behaviour query DisableDeleteNotify can be used to detect whether TRIM is enabled, but it doesn't actually turn it on. The chk e: /R command will check the E: drive for bad sectors and try to recover readable data. The bootrec /rebuildbcd command is used to rebuild the boot configuration data.

Lab

https://i.imgur.com/tLcNKZk.png

Closed source and second most popular mobile device operating system.

iOS

Devices solely designed and developed by Apple.

iOS

What utility can you use from the command line on a Linux system (or Mac OS) to see a list of the installed network interfaces, along with their current status and configuration?

ifconfig

What would you enter at the command prompt on a linux system to display the IP addresses and the subnet masks assigned to each network interface on a linux system?

ifconfig

Which of the following utilities can you use from the command line on a Linux system to see a list of the installed network interfaces, along with their current status and configuration?

ifconfig ifconfig is used on Linux (and Mac OS) systems to display the installed network interfaces, their current status, and the current configuration settings for each interface, including the MAC address, IP address, broadcast address, and subnet address. ipconfig is used on Windows systems to view the installed network interfaces and their IP address, subnet mask, and default gateway configuration. netstat is used on a Windows system to display IP-related statistics. netconfig, iflookup and netinfo are not the names of real networking utilities.

A user reports that he can't browse to a specific Web site on the Internet. From his computer, you find that a ping test to the Web server succeeds. A trace route test shows that 17 hops to the destination Web server. What is the most likely cause of the problem?

incorrect DNS server address

You are a PC technician for a company. An employee needs you to install some software on his computer over his lunch break. When you log onto the computer, you notice the employee's desktop has so many shortcuts and files that you can even see the desktop background. Which of the following actions should you take?

install the software and leave the employee's computer exactly how you found it.

You need to view detailed IP configuration information on Windows workstation. In addition to the IP address, subnet mask, and default gateway configuration, you need to know see the network card's MAC address and the addresses of the DHCP and DNS servers the workstation is communicating with. What command would you enter at the command line to see this detailed information? When you see the address of the DNS server, you realize that this information needs to be updated. Earlier in the day, you implemented a new DNS server with a new IP address. The workstation will update this information in 24 hours. What command can you enter at the command line to update the DNS server information right away?

ipconfig /all ipconfig /flushdns Use ipconfig /all to view detailed configuration information including the MAC address and the DHCP and DNS servers the workstation is communicating with. Use ipconfig /flushdns to flush (or remove) all the entries in the workstation's current DNS cache. If the IP address of a network server is changed, your local cache will contain the old IP address until the cache is updated (every 24 hours) or the flushdns option is used.

What would you enter at the command prompt on a linux system to display a list of files and sub directories that exist within the present working directory?

ls

You want to know more about usage, command syntax, and the options available with Linux ifconfig command. what would you enter at the command prompt to display this information about ifconfig?

man ifconfig

Which of the following is the most common method for removing RAM from a motherboard.

move the tabs holding the ram out of the way; pull straight up to remove the RAM.

What command do you use to configure Windows startup options?

msconfig

What is used on a Windows system to display IP-related statistics?

netstat

Which command lets you delete subdirectories in addition to files in the current directory?

rd /s

Which utility would you use to view current connections and active sessions and ports on a computer?

netstat Netstat shows IP-related statistics including: -Incoming and outgoing connections -Active sessions, port, and sockets -The local routing table Ipconfig displays IP configuration information for network adapters. Use ipconfig to view IP address, subnet mask, and dfault gateway configuration. Nslookup resolves (looks up) the IP address, subnet mask, and default gateway configuration. Nslookup resolves (looks up) the IP address of a host name. Ping sends an ICMP echo request/reply packet to a remote host. A response from the remote host indicates that both hosts are correctly configured and a connection exists between them.

Your computer is sharing information with remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection?

netstat checks the status of a TCP connection

Examine the following output : Server : helicuplar.xct.takro.net Address : 209.53.4.130 Name : westsim.com Address : 64.78.193.84 Which of the following utilities produced this output? A. nslookup B. tracert C. ipconfig D. netstat

nslookup

Mary calls to tell you that she can't connect to an intranet server called WebSrvl. From her computer, you ping the server's IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem? A. tracert B. nslookup C. nbtstat D. netstat E. arp

nslookup

To improve system performance, you have configured a motherboard to run with a higher multiplier than what the CPU is specified to use.

overclocking

You have an AMD processor and an Intel processor, both of which have the same speed rating. Which of the following statements is true about the relative performance of both processors?

performance will depend on other factors such as cache and other features.

What is an extra button or knob on a laptop keyboard that moves the mouse cursor?

point stick

Which command would you use to display a simple list of all processes running on a Linux distribution that uses either RPM or dpkg for package management?

ps -e

What would you enter at the command prompt on a linux system to display the working directory?

pwd

Which of the following utilities would you use to view the routing table?

route

What is the purpose of the small cable that connects an IDE optical drive to the sound card?

sends CD audio from the optical drive to the sound card

You are logged in as a user with limited system privileges. You are the Linux system administrator and you have the password to the root user account. Wehn you need to switch to root user to perform administrative tasks, what command would enter at the command prompt?

su -

A user reports that he is unable to access data on an external hard drive. You investigate the problem and determine that the USB cable connection to the hard drive is damaged. You replace the cable. What should you do next?

test the solution

What is the biggest advantage of 64-bit processors over 32-bit processors?

the ability to use over 4 GB of memory.

While troubleshooting a problem on a Linux system, you run a utility that generates the following output: 5 s3232.gw.Seat,someisp.net (63.201.72.9) ms 38.713 ms 39.085 ms

traceroute

What command provides information on each step in the route a packet takes to reach a remote host?

tracert

Which TCP/IP utility gives you the following output?

tracert

Which TCP/IP utility gives you the following output? 2 14 ms <10 ms 14 ms Loopback0.GWI.SLT1.ALTER.NET [137.39.2.123] 3 14 ms <10 ms 13 ms 122.at-6-0-0.XR1.SLT4.ALTER.NET [152.63.91.86] 4 <10 ms 14 ms <10 ms 0.so-0-1-0.TL1.SLT4.ALTER.NET [152.63.1.210] 5 41 ms 41 ms 41 ms 0.so-7-0-0.TL1.PQR3.ALTER.NET [152.63.32.41] 6 42 ms 41 ms 41 ms 0.so.6-0-0.XL1.SEA1.ALTER.NET [152.63.38.82] 7 41 ms 41 ms 41 ms PQS6-0.GW11.SEA1.ALTER.NET [152.63.107.17]

tracert

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. The office has two Windows 2000 servers, two UNIX severs, one Windows NT server, 90 Windows 98 clients, 40 Windows 2000 Professional clients, and five Macintosh clients. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is not working properly?

tracert

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is not working properly?

tracert

Your motherboard has two memory slots and supports a maximum of 8 GB or RAM. After installing two 4 GB modules and booting your system, you find that windows only recognizes 3.5 GB of Ram. What should you do?

upgrade to a 64-bit version of Windows.

Your Windows 7 client systems are joined to the WestSim.com domain. You need to verify that these clients are configured to get time from the correct time provider. Which commands can you use to do this?

w32tm /query /source. w32tm /query /status.

Your Windows 7 client systems are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for the appropriate time zone.

w32tm /tz

Which command would you use to copy all files in a directory, including all subdirectories (as well as empty ones)?

xcopy /e

You're using a Linux distribution that uses RPM for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

yum install httpd

You're using a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation withing the Internet repositories configured on this system?

yum list available

You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed?

yum list intalled httpd


Kaugnay na mga set ng pag-aaral

Primerica Life Insurance Exam Chapter 5

View Set

A-Level Geography: Glaciation Keywords

View Set

Unit 5: Big Data AP Practice Questions

View Set

PSYC 317 Crisis Intervention Ch. 3-4

View Set

California Real Estate Salesperson Course

View Set

Fundamentals of Nursing - Chapter 8: Communication (Taylor Foundations 9th Edition)

View Set

Social Studies:ch.6 review: Early Years of the Republic

View Set