CompTIA A+ 220-1101 Core 1 Study Flashcards 2
Listen to exam instructions You are currently learning about networking devices and have just learned about MAC addresses. You look up your device's MAC address, and it comes back as 00-B0-D0-06-BC-AC. Which portion of this MAC address can tell you who the manufacturer is? - BC-AC - 00-B0-D0 - 00-B0 - 06-BC-AC
00-B0-D0
Which data transmission rate is defined by the IEEE 802.11b wireless standard? - 150 Mbps - 54 Mbps - 2 Mbps - 11 Mbps - 10 Mbps
11 Mbps
A user is configuring an email client application and decides to use a TCP/IP suite protocol that stores all messages on the email server so that they can be synchronized across a laptop, a smartphone, and a web email client. In addition, this protocol stores the email messages on the email server until the user explicitly deletes them. Which of the following TCP/IP port numbers will the client application typically access while using this protocol to contact the email server? - 21 - 80 - 110 - 143
143 (IMAP)
In the IP address 192.168.1.52 with the subnet mask 255.255.255.0, which portion represents the network ID? - 52 - 192.168 - 192.168.1 - 192
192.168.1
Which frequencies does Zigbee operate on? - 500 MHz - 1.4 GHz - 2.4 GHz - 908.42 MHz
2.4 GHz
What is the maximum distance between hops that is allowed by a Z-Wave device on a mesh network? - 60 feet - 250 feet - 200 feet - 80 feet
250 feet
Which of the following is the maximum range of the Bluetooth 2.0 specification? - 10 meters - 240 meters - 60 meters - 30 meters
30 meters
You are a junior network technician for a small consulting firm. You have recently learned about IP addressing and run the ipconfig command on your local computer. The output from the command is: IPv4 Address..... 192.168.0.52 Subnet Mask..255.255.255.0 Default Gateway..192.168.0.1 Which of the following is the host ID? - 192.168.0.1 - 52 - 255.255.255 - 192.168.0
52
Which wireless standard can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz? - 802.11a - 802.11b - 802.11n - 802.11g
802.11a
Which protocol is being used when sending the broadcast message to match the MAC address to the IP address? - ICMP - HTTP - IP - ARP
ARP (Address Resolution Protocol)
Which type of resource offers the following advantages? -Flexibility of access -Ease of use -Self-service resource provisioning- -API availability -Service metering -Ability to try out software applications
Cloud
Your employer wants a system that guarantees that all components will work together with minimal configuration and setup. Time is of the essence in getting this new system ready. Which of the following would BEST meet your employer's needs? - HMI - DCS - PLC - SCADA
DCS (Distributed control system)
Which email authentication technology performs all of the tasks listed below? Verifies the email sender. Tells the recipient what to do if no authentication method passes. Allows the recipient to tell the sender about messages that pass or fail authentication. - SPF - DMARC - ICMP - DKIM
DMARC
What is a base-10 numbering system also known as? - Binary - Decimal - ARP - Hexadecimal
Decimal
Rachel, an employee in the support department, wants to run a virtual machine on her computer to troubleshoot customer issues. Which of the following must she complete before virtualization will work on her computer? - Install additional memory. - Install an extra hard disk that the new virtual machine will run on. - Enable virtualization support in the BIOS settings. - Enable virtualization support in the BIOS settings.
Enable virtualization support in the BIOS settings.
Which of the following keeps track of various network devices while ensuring that the software is secure? - Syslog server - All-in-one security appliance - Firewall - Endpoint management server
Endpoint management server
You are assembling components in a network rack and need a device that connects three network segments. Which of the following devices will meet your networking needs? - Wireless controller - Ethernet patch panel - Ethernet router - Ethernet switch
Ethernet router
Which of the following is a valid IPv6 address? - FEC0:9087:AB04:9900:7GA2:7788:CEDF:349A - FEC0::AB:9007 - FEC0:AB98::A7::9845:4567 - FEC0:AB04:899A - 199.12.254.11
FEC0::AB:9007
You are the network administrator for a small consulting firm. The firm has recently rolled out a new intranet site, and you are responsible for configuring the DNS. You are able to connect to the intranet site by using the IP address, but you cannot connect by using the hostname. Which of the following do you need to configure to access the site with the hostname? - Forward lookup zone - Dynamic DNS - CNAME record - Reverse lookup zone
Forward lookup zone
As a network administrator for your company, you want to set up a network device that manages traffic leaving and entering your network from the outside. Which of the following would BEST meet your requirements? - Content filter - VPN - Reverse proxy server - Forward proxy server
Forward proxy server
Which of the following is a disadvantage of using a UTM? - Is more expensive than using separate security appliances. - Requires a separate endpoint management server. - Does not include a spam filter. - Has a single point of failure.
Has a single point of failure.
Which of the following protocols is often combined with TCP to send data across the internet? - FTP - IP - ICMP - UDP
IP
Which of the following UTM appliances monitors all network traffic and blocks malicious traffic while notifying the network security team? - Anti-malware - Firewall - IPS - NAT
IPS (intrusion prevention system)
You were recently hired by a small startup company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the company's current size but would also be able to scale as the company grows. The service needs to provide adequate storage as well as additional computing power. Which cloud service model would BEST fit these requirements? - PaaS - DaaS - SaaS - IaaS
IaaS
Which of the following LCD display technologies is the BEST choice for use on touchscreen displays? - Twisted nematic (TN) - In-plane switching (IPS) - Vertical alignment (VA) - Touch screen digitizer (TSD)
In-plane switching (IPS)
One of your customers has a long range wireless network that connects two company office buildings together. The buildings are several hundred yards apart. You have licensed a frequency range of 3.65 GHz to transmit signals between the buildings. However, the wireless connection is not performing ideally, and it sometimes drops connections. Which of the following is the BEST immediate solution to try to resolve this issue? - License a different frequency range. - Try using an unlicensed 801.11 frequency standard. - Try using a dual-band access point. - Increase the power to the access points.
Increase the power to the access points.
You would like to control internet access based on user, time of day, and websites visited. Which of the following actions would BEST meet your criteria? - Configure internet zones using Internet Options. - Configure each system's Local Security Policy to add access restrictions based on time of day and content. - Enable Windows Firewall on each system. Add or remove exceptions to control access based on time of day and content. - Configure a packet-filtering firewall. Add rules to allow or deny access based on time of day and content. - Install a proxy server. Allow internet access only through the proxy server.
Install a proxy server. Allow internet access only through the proxy server.
What does the term cloud mean when referring to cloud computing? - It is the name of an operating system that anyone can use to design, build, and provide cloud services. - It is a metaphor for a data storage service with an ever-growing capacity, like storm clouds. - It is a metaphor for the internet based on the basic cloud drawing used to represent a telephone network. - It refers to the virtual hardware that cloud computing is built on.
It is a metaphor for the internet based on the basic cloud drawing used to represent a telephone network.
Which of the following display technologies suffer from motion blur? - LCD projector - DLP projector - Plasma - OLED
LCD projector
Which of the following is a disadvantage of using a Lithium Ion (Li-Ion) battery over a Nickel Metal Hydride (NiMH) battery? - Li-Ion batteries take up more physical space than NiMH batteries. - Li-Ion batteries are more heat-sensitive than NiMH batteries. - Li-Ion batteries have a shorter lifespan than NiMH batteries. - Li-Ion batteries develop a memory, while NiMH batteries do not.
Li-Ion batteries have a shorter lifespan than NiMH batteries.
Your workstation is unable to communicate with any other computer on the network. Which of the following tools should you use to test the network card's abilities to send and receive signals? - Multimeter - ping command - Loopback plug - Cable tester
Loopback plug
Which type of wireless technology increases bandwidth for a home wireless network by using multiple antennae for both the transmitter and receiver? - Channel bonding - Radio waves - MIMO - Long-range
MIMO (multiple-input, multiple-output)
Which network protocol do controller systems use to communicate with each other? - Modbus - ARP - ICMP - HTTP
Modbus
Which of the following protocols is non-routable and requires another protocol to enable internetwork communications? - IPX - AppleTalk over IP - IP - NetBIOS
NetBIOS
Which of the following network components is responsible for converting digital data into a signal that can be transmitted? - Switch - Network interface - Transmission medium - Protocol
Network interface
Which of the following expansion buses uses a point-to-point dedicated connection and provides a serial full-duplex method of transmission? - PCI - PCIe - PCI-X - AGP - VESA local bus
PCIe
Which pin on the power supply connector connects to the power good wire on the motherboard in order to indicate an appropriate action for the motherboard if the power disappears, quickly reappears, or does not appear at all? - Pin 8 - Pin 8 - Pin 2 - Pin 6
Pin 8
The processor you have just purchased has a series of pins in an array on the underside of the processor package. You notice that the pins insert into corresponding receptacles within the processor socket on the motherboard. Which type of socket is this processor configured to use? - Zero insertion force (ZIF) - Ball grid array (BGA) - Land grid array (LGA) - Pin grid array (PGA)
Pin grid array (PGA)
When playing videos games or watching movies on your workstation, the screen sometimes freezes and displays strange colors. You suspect that your video card is causing the issues. What is the BEST solution to resolve your display issues? - Update the video card driver. - Replace the video card. - Check the video card fan. - Check the video card connectors.
Replace the video card.
Which device is responsible for forwarding traffic in between networks? - Network interface - Router - Switch - Access point
Router
Which of the following is a specialized controller that you can use to remotely manage all your network devices? - SSH - PoE - SDN - VLAN
SDN (Software-defined networking)
Which protocol is used to send email messages from a mail client to a mail server? - POP3 - IMAP - FTP - SMTP - SNMP
SMTP
A host on your network provides a service that requires the server to always use the same IP address. Which IP addressing method can you use to manually assign the specific IP address? - Link-local addressing - APIPA IP addressing - Static IP addressing - Alternate IP configuration - Dynamic IP addressing
Static IP addressing
Which of the following LAN devices receives a signal on one port and forwards that signal only to the port where the destination device is connected? - Network adapter - Switch - Hub - Router
Switch
Your laser printer prints a vertical black line on every page. You change the toner cartridge, but the problem does not go away. What is the MOST likely problem? - The corona wire is dirty. - The fuser assembly is damaged. - The photosensitive drum is wearing out. - The paper is poor quality.
The corona wire is dirty.
Oliver, a user in your company, is using an Inkjet printer. After using this printer for several months, he notices that streaks are beginning to appear on his printed pages. Oliver has asked you to fix this issue. Which of the following is MOST likely causing Oliver's printer to malfunction? - The imaging drum is probably at end of life. - The printer's heads are out of position and need to be aligned. - The fusing unit is too hot, causing some of the ink from the previous job to remain on the unit. - The mirror in the printer is dusty and needs to be cleaned.
The printer's heads are out of position and need to be aligned.
A laptop that you previously purchased was shipped with SO-DIMM memory to accommodate the laptop's form factor. You would now like to upgrade the memory. Which of the following is an upgrade to the SO-DIMM standard? - SODIMM2 - UniDIMM - DDR3 - DDR4
UniDIMM
You are working as a junior security technician for a consulting firm. One of your clients is upgrading their network infrastructure. The client needs a new firewall and intrusion prevention system installed. They also want to be able to block employees from visiting certain types of websites. The client also needs a VPN. Which of the following internet appliances should you install? - Unified Threat Management - Proxy server - Spam gateway - Load balancer
Unified Threat Management
You work in the computer repair department of a large retail outlet. A customer comes in with a workstation that randomly shuts down. You suspect that the power supply is failing. What should you do first to troubleshoot the issue? - Use a cable tester to check the power supply's connections. - Use a multimeter to test the power supply's electrical properties. - Use a power supply tester on the power supply. - Use a known good spare to swap with the existing power supply.
Use a known good spare to swap with the existing power supply.
A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which of the following Transport layer IP suite protocols is MOST likely used for this service? - Transport Layer Protocol (TCP) - User Datagram Protocol (UDP) - Internet Control Message Protocol (ICMP) - File Transfer Protocol (FTP)
User Datagram Protocol (UDP)
Which of the following load balancer algorithms takes each server's active connections and processing power into consideration? - Round robin - Least connections - Weighted round robin - Weighted least connections
Weighted least connections
You want to create a software RAID 1 array on your Windows 11 workstation using Disk 1 and Disk 2. What do you need to do with Disk 1 and Disk 2 before configuring them for a RAID 1 array? - Convert the disks from dynamic to basic. - Convert the disks from basic to dynamic. - Verify that both disks are the same size. - Format both disks with the same file system.
Convert the disks from basic to dynamic.
Which of the following is an inherent vulnerability of embedded devices? - Unknown environments - Open systems - Vulnerable to malware - Known environments
Unknown environments
As an IT technician for your company, you are in the process of setting up several servers in your network. During the process, one of the servers was misconfigured and is having trouble synchronizing information with the other servers. Which of the following is the BEST next step? - Implement the fix. - Identify what has changed. - Determine the appropriate fix. - Gather information. - Create a hypothesis.
Gather information.
Your system crashes at various times. It happens sometimes on startup, sometimes when running a software application, and sometimes when a certain group of applications is running. You suspect a malfunctioning CPU, but none of the common issues seem to be present. You have not configured overclocking. There is no overheating. The CPU is seated correctly and locked into its socket. What is the BEST step you can take to determine if the CPU is causing the system crashes? - Throttle the processor to reduce the operating frequency and minimize power consumption. - Replace the suspect CPU with a known good CPU of the same make and model. - Switch to a comparable CPU from a different manufacturer. - Downgrade to a CPU that has fewer cores and is less demanding on your system resources.
Replace the suspect CPU with a known good CPU of the same make and model.
Your company cloud service currently provides data storage, processing, and network connectivity that hosts several services and applications used by your employees. You want to transition to a cloud service that provides many of these services and applications natively without the IT department needing to constantly maintain and update the services and applications. In addition, the IT department wants to make sure that the cloud service provides employees with resources that are segregated from other employees. Which of the following cloud service solutions meets these requirements? - SaaS with a simple multi-tenancy implementation. - SaaS with a fine-grain multi-tenancy implementation. - PaaS with a simple multi-tenancy implementation. - PaaS with a fine-grain multi-tenancy implementation.
SaaS with a simple multi-tenancy implementation.
In preparation to use your laptop on an airplane as you travel to a conference, you disconnected the external USB mouse. However, you notice that the cursor drifts consistently to the left side of the screen while using the built-in trackpad and mouse buttons on the notebook. Which of the following actions will MOST likely stop the mouse from drifting? - Disable the trackpad in Control Panel. - Update the trackpad drivers. - Buy a new external mouse. - Enable Airplane Mode.
Update the trackpad drivers.
How do switches and bridges learn where devices are located on a network? - When a data packet enters a port, the destination MAC address is copied from the data packet header. - When a data packet enters a port, the destination IP address is copied from the data packet header. - When a data packet enters a port, the source MAC address is copied from the data packet header. - When a data packet enters a port, the source IP address is copied from the data packet header.
When a data packet enters a port, the source MAC address is copied from the data packet header.