COMPTIA a+
RAID 10 (1+0)
combine mirroring and striping; minimum of four drives Larger size and high speed than RAID 1, and more redundancy than RAID 0 No parity Only one drive in a mirrored set can fail.
SSL (Secure Sockets Layer)
commonly used encryption protocol that manages transmission security on the internet Can encrypt emails on a mobile device
Unified Threat Management (UTM)
comprehensive security management tool that combines multiple security tools, including firewalls, virtual private networks, intrusion detection systems, and web content filtering and anti-spam software
packet header
contains sender , receiver , and data chunk order
Network interface
converts the digital data into a signal that can be transmitted along the transmission medium .
An employee claims that they are unable to connect to the internet and has called the company's help desk for a solution . Having been assigned to this issue , you decide to first test whether or not TCP / IP is working correctly on the local computer . Which of the following is the BEST command to use for this test ?
ping 127.0.0.1 Use ping 127.0.0.1 to test the TCP / IP configuration of the local system . The special address of 127.0.0.1 is a loopback address that identifies the local host . A successful ping test to the local host identifies that TCP / IP is correctly configured .
The primary corona ( also called the main corona or the charge corona drum
prepares the photosensitive drum for writing by causing the drum to receive a negative electrostatic charge . Depending on the printer primary corona is either wires or rollers .
Capacitive touchscreen
provide multi - touch or gestures , which allow a tablet to recognize multiple finger touches at the same time .
SaaS with a simple multi - tenancy implementation .
requirements Explanation Software as a Service ( SaaS ) would deliver software applications and services to the employees either over the internet or on a local area network . In addition , providing a simple multi - tenancy implementation would allow employees to have their own resources segregated from other employees . In a fine - grain multi - tenancy solution resources are shared .
nslookup
resolves ( looks up ) the IP address of the specified hostname . This command also displays additional resolution information , such as the DNS server used for the lookup request .
mobile device management ( MDM ) tools
secure mobile devices with which allow remote management of multiple mobile devices . By using an MDM tool , an IT administrator : • Push OS updates to devices . • Test configuration settings before deploying them . • Create and enforce mobile device security policies . ● Remotely wipe mobile devices .
ping
sends an ICMP echo request / reply packet to a remote host . A response from the remote host indicates that both hosts are correctly configured and a connection exists between them . Using ping -t performs a continuous connection test ( press Ctrl + C to stop sending the ping requests ) .
SMTP
sends email from a mail client to a mail server .
POP3
server is also used by a mail client to retrieve messages from a mail server , but it requires that the messages be deleted from the server after they've been downloaded .
Port 548
AFP (Apple Filing Protocol)
Which of the following statements are true ? ( Select two . )
64 - bit processors use the x86-64 instruction set also referred to as x64 ) . 32 - bit processors use only the IA - 32 instruction set ( also referred to as x86 ) .
VDI
A VDI ( virtualization desktop infrastructure ) is designed to be the end user's main computer system , which can be accessed from something like a tablet or thin client . In addition , a VDI can be hosted by cloud service provider
WINS
A WINS server address is only needed if you have older Windows clients on multiple networks .
User Datagram Protocol ( UDP )
A company has built a video streaming service that supplies training videos . Quickly transmitting customers is more important than guaranteed delivery . Which of the following Transport layer IP suite protocols is MOST likely used for this ?
Full - array WLED
Able to dim specific regions of the screen .
Full-array WLED
Able to dim specific regions of the screen.
Which of the following accurately describe a Type 2 hypervisor ? ( Select two . )
Acts as a software application . Can run on any OS .
Address resolution protocol ARP
Address Resolution Protocol ( ARP ) is used to match a device's IP address to its MAC address . Some network devices , such as switches , will build tables to match MAC addresses with IP addresses in order to always know where to send packets to . When a host wants to send some data , it uses ARP to send a broadcast message out on the network , requesting that the host with a specific IP address respond with its MAC address . When the sending host gets the response , it can then match up the MAC address and IP address .
Bluetooth
Allows electronic devices like cell phones and computers to exchange data over short distances using radio waves
Ports 20 and 21
An administrator configures a server to run the TCP / IP suite protocol that allows users to download files contained in specific directories on the server and also protects access to those files by requiring user authentication . Which of the following TCP / IP port numbers allow this protocol to work properly ? ( Select two . ) The TCP / IP suite protocol that allows users to download files from a server and protects access to the files by requiring user authentication to access specific directories on the server is FTP . FTP uses ports 20 and 21
App scanner
An app scanner can test a mobile app for security flaws . This is the best option in this scenario .
PoE+
A method of delivering more current (25.5 watts) than PoE does to devices using Ethernet connection cables. Usually used for biometric scanners, tablets
Distributed Control System (DCS)
A network of field devices in a closed loop system that are distributed throughout the physical system to monitor many aspects of the system. Contains PLCs, SCADA, controller, and HMI
Domain Name System ( DNS )
A technician has configured a client computer's network interface with server addresses to which the client will send requests for translating fully qualified domain names ( FQDNS ) to IP addresses and IP addresses to FQDNs . Which of the following TCP / IP suite protocols is used by the client to perform the request and also used by a server to respond to those requests ? It associates readily recognizable domain names to numerical IP addresses .
net use
A user has a problem accessing several shared folders on the network . After determining that the issue is not from his computer's IP configuration , you suspect that the shared folders are not currently connected . Which of the following commands will MOST
143
A user is configuring an email client application and decides to use a TCP / IP suite protocol that stores all messages on the email server so that they can be synchronized across a laptop , a smartphone , and a web email client . In addition , this protocol stores the email messages on the email server until the user explicitly deletes them . Which of the following TCP / IP port numbers will the client application typically access while using this protocol to contact the email server ? The TCP / IP suite protocol that stores email messages on a server so that they can be synchronized across multiple devices is Internet Message Access Protocol ( IMAP ) . IMAP typically uses which port?
A technician is tasked with replacing a Wi - Fi antenna in a laptop computer . Which of the following places is the antenna MOST likely to be located in ?
Around the laptop's bezel A Wi - Fi antenna performs best when placed in an elevated location . For most laptops this is around the display within the lid .
In - plane switching ( IPS )
has a high response rate . This is your best choice for touchscreen displays .
RGB-LED displays
have an array of special LEDs that are able to emit red- green-and blue light- resulting in superior color accuracy. The most expensive type of backlighting technology
UNC format
is \\ Servername \ Sharename . Use \\ Home1 \ Pictures to access the shared folder .
An endpoint management server
is a way to keep track of various devices while ensuring that software is secure . Many companies that need small IT department overhead use this option .
tracert
is similar to the ping utility in that it tests connectivity between devices . However , tracert also shows the routers in the path between the two devices . Responses from each hop on the route are measured three times to provide an accurate representation of how long the packet takes to reach and return from the specific host
Server Message Block ( SMB
is used by Windows systems to access shared resources over the network .
KVM
keyboard , video , mouse ) switch would allow you to control all three computers with one keyboard one monitor , and one mouse The KVM switch has multiple input groups , and each group accepts keyboard , video , and mouse connections from a single computer . A single output group connects to the shared input / output devices Buttons on the KVM switch or keyboard shortcut combinations allow you to toggle the input / output devices between computers
XML
markup language
EKG ( fingertip electrocadiogram ) or CGM ( continuous glucose monitoring
medical devices utilize Bluetooth or Wi - Fi technology to communicate with a mobile phone
SNMP
monitors network traffic .
The intrusion prevention packets system ( IPS)
monitors the all the network traffic , looking for anything out of the ordinary. When malicious or suspicious packets are detected, the IPS blocks the packets and notifies the network security team.
Displays current connections and incoming and outgoing connections .
netstat
AppleTalk
over IP is the protocol used to allow older AppleTalk computers to use IP for internetwork communication .
Internal DNS servers
such as one on your company network , can be configured with a list of valid sites . This means that you can allow or deny access to certain sites . The CA on the server will operate using the same authority as on a public site and will give the user a certificate warning if they try to visit their version of an untrusted site .
NTP
synchronizes all network computer clocks .
Automatic Private IP Addressing (APIPA)
the event that a DCHP server is not available , Windows workstations can use APIPA to automatically provide themselves with an IP address . The default address range used by APIPA is 169.254.0.1 to 169.254.255.254 . Of the options presented , only 169.254.1.26 falls within this range .
IPX
the protocol suite used by legacy NetWare servers
su - command
the system will switch you to the root user and require you to enter the root password . You will then be able to perform tasks that require root user administrative privileges . After completing these tasks , you should log out as the root user and return to the standard user account .
Plasma displays backlighting .
use millions of small cells that contain electrically charged ionized gases that do not need backlighting .
DHCP
used by clients to request an IP address and by a server to offer an IP address .
SMB
used for shared access to files and miscellaneous communications between hosts on a network . This protocol also provides an authenticated inter - process communication mechanism .
Digitizer
used in a tablet PC to receive input . Input is written onto the pad with a stylus pen , and those motions are transferred into data that is processed by the system .
SNMP
used in network management systems to monitor network - attached devices for conditions that warrant administrative attention .
SMTP
used to route electronic mail through the internetwork . Email applications provide the interface to communicate with SMTP or mail servers .
A low earth orbit satellite (LEO)
• Is closer to the Earth than a GEO . • Orbits at a distance of about 1200 miles above the Earth . Is simpler and cheaper to make than a GEO . • Provides fast , accurate communication and service . • Has a limited coverage area . More satellites are required to cover the same area as a GEO satellite covers .
You are running Windows 10 on your computer . You want to decrease the time it takes to write data to your drives . To do this , you have decided to create a Windows software RAID system using a striped volume . Before you create the striped volume , which action MUST you take ?
Convert basic disks to dynamic disks .
You want to implement name resolution on the Linux workstations in your company . Which protocol should you use to do this ?
DNS You can use DNS name resolution for Linux workstations ( as well as for most other operating systems ) .
port 53
DNS uses port?
RAID
Datais split evenly between two or more disks. Large size and the fastest speed. No Redundancy If one drive fails, this results in array failure.
Which function does a motherboard's chipset perform ?
Facilitates communication between the processor , memory , and peripheral devices .
South bridge
Houses the PCI bus controllers and communicates with the super I / O controller
HTML , or markup
HyperText Markup Language is the markup language used to create web content .
uses port 143 .
IMAP
Port 143
IMAP (Internet Message Access Protocol)
Which of the following protocols establish a secure connection and encrypt data for a VPN ? ( Select three . )
IPsec L2TP PPTP
laas
Infrastructure as a Service ( laaS ) delivers infrastructure to the client , such as processing , storage , networks , and virtualized environments . The client deploys and runs software without purchasing servers , data center space , or network equipment .
You have a notebook computer with a built - in wireless network card . One day , the network card stops working . Because the network card is integrated onto the motherboard , you do not want to replace the entire motherboard . What can you use to connect the wireless network ? ( Select two . )
Insert an ExpressCard wireless network card . Insert a wireless USB network card .
Which of the following BEST describes the overall purpose of virtualization ?
The ability to install and run multiple operating systems on a single physical machine .
default gateway address
The default gateway address must be on the same subnet as the IP address for the host.
Default gateway
The default gateway value is used to send packets to other subnets. If the value is incorrect, the packets will not be sent to the correct router.
You have used EFS to encrypt a directory of highly sensitive company files on your hard drive . You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are travelling to an industry conference . What is the result of copying the file to the thumb drive ?
The file will no longer be encrypted . Explanation Because EFS does not work on FAT32 or eFAT , copying an encrypted file from your NTFS volume to a thumb drive EFS encryption is only a feature of the NTFS file system , and thumb drives are normally formatted with FAT32 . means that the file will no longer be encrypted .
TCP 3 way hand shake
The first host sends a SYN packet asking to create a new session The receiving host replies with SYN-ACK packet acknowledging that the session can be created The first host replies with the ACK packet, which then opens the session
You are troubleshooting a malfunctioning notebook computer system . The user has indicated that the LCD screen suddenly became dark and difficult to read while they were downloading a large file through the wireless network while the system was plugged in at their desk . You have checked the system and determined that the backlight stopped working . Which of the following are the MOST likely causes ? ( Select two . )
The inverter in the LCD assembly has malfunctioned . The cold cathode fluorescent lamp ( CCFL ) has burned out and needs to be replaced .
WLED
The least expensive , thinnest , and most widely used type of LCD .
WLED -White LED
The least expensive, thinnest, and most widely used type of LCD.
LDAP
Lightweight Directory Access Protocol ( LDAP ) allows access to information about network resources stored in a directory server .
LDAP )
Lightweight Directory Access Protocol is used to access information stored in a server's directory service .
Print queue
Location on the hard disk that holds print jobs waiting to be processed
Which of the following help to improve the security of sensitive information on your mobile device if it is lost or stolen ? ( Select three )
Locator applications A screen lock Remote wipe
Several of your employees are experiencing limited connectivity issues when trying to access some websites on the internet from their workstations . However , they can access the local company network without any problems . You have already tried using the ip and ipconfig commands to determine that the websites can be reached and that the IP information on the workstations is configured properly . You know that the connection to your internet service provider is working properly as well . What should you do next ?
Make sure that the DNS server is functioning properly .
You are updating the operating system on your iPad . Your iPad is connected to your computer , and you are using iTunes to install the update . Which of the following BEST describes what would happen to your iPad if you disconnect it before the operating system update is complete ?
The operating system could become corrupted .
Router
The router is an advanced networking device that connects two networks together . When network traffic needs to leave the internal network , it is sent to the router and then forwarded onto its destination . All external traffic flows through the router .
What are the disadvantages of plasma display technology ? ( Select two . )
They generate much more heat than other display types . The gasses inside the cells are sensitive to air pressure fluctuations .
E - reader
This type of mobile devices uses E Ink technology .
You have just finished upgrading the 250 - watt power supply in your desktop computer to a 450 - watt power supply Now the BIOS does not recognize one of the hard disk drives in the system during POST . Which of the following troubleshooting steps is the BEST to try first ?
Make sure that the hard disk is connected to the power supply .
Which of the following is the generally accepted rule for manually setting the initial and maximum paging file size ?
One and a half times the size of the physical RAM for the initial size and three times for the maximum size .
A user needs to copy a file from an NTFS partition to a FAT32 partition . The file has NTFS permissions and the Read only ( R ) and Encryption attributes . Which of the following will be true when the file is copied ?
Only the R attribute is retained on the file . do not remain with the file . Moving NTFS files to a partition to a FAT32 partition , attributes unavailable under FAT32 The FAT32 file system only supports the following attributes : R , H , S , and A. When you copy files from an NTFS non - NTFS partition removes the permissions .
OLED
Organic light - emitting diode ( OLED ) displays don't require a backlight . While this means that they do not perform as well as LCD displays in lighted areas , they have a much better contrast ratio with deeper blacks .OLED also has a very high refresh rate.
uses port 110 .
POP3
port 110
POP3 email clients
port 110
POP3 uses port
While sorting through a box of cables in your storage room , you find one that matches the configuration shown in the image . Which of the following BEST describes the type of cable configuration and the purpose for which it would be used ?
Patch ( or straight - though ) cable configuration used to connect computers to network devices such as switches and hubs
ping
Performs a continuous connection test when used with the -t option .
A technician is installing a network - enabled smart home control system in a SOHO Which of the following configurations is MOST likely required on the SOHO router in order to access the system from the internet ?
Port forwarding
Two major concerns for IoT devices
Privacy Hacking
CCFL
Produces better colors than WLED ( consumes more energy ) .
Mobile VPN
Provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks.
RAID 3
RAID striped set with dedicated parity (byte level) Data is split between three or more disks. High speeds for sequential read/write operations. Poor performance for multiple simultaneous instructions. A single drive failure will rebuild.
Which of the following is true about RFI ?
RFI is caused by nearby devices , such as cordless phones or microwave ovens .
You need to connect the satellite television signal to your HD 4K flat screen TV using a coaxial cable . Which of the following is the BEST type of coaxial cable to use ?
RG - 6
RGB - LED displays green , and blue
RGB - LED displays are available on modern LCD displays . They have an array of special LEDs that are able to emit red , green , and blue light , resulting in superior color accuracy . They are the most expensive type of backlighting technology .
Your older notebook LCD display often goes dim or sometimes blank . Which of the following would be the BEST first step to resolve this issue
Replace the CCFL inverter . If the display on your older notebook often dims or goes blank , it is probably an indication that your LCD screen is using a CCFL inverter to backlight the LCD display . The CCFL inverter needs to be replaced . Replacing the inverter is much less expensive than replacing the LCD display .
You are building one of your customers a home theater PC ( HTPC ) to connect to an HDTV and high - definition audio system . The customer is going to be playing mostly Blu - ray movies on the system . Which of the following features should the sound card include ? ( Select two . )
S / PDIF output Dolby Digital , DTS support , or SDDS support
Port 22
SSH uses port?
Which of the following protocols can encrypt emails on a mobile device ?
SSL Secure Sockets Layer , can encrypt emails on a mobile device .
S / MIME
Secure / Multipurpose Internet Mail Extensions ) is a protocol that is used to encrypt emails . S / MIME allows the sender to digitally sign and encrypt emails . An encrypted email server encrypts emails between the server and an email client , but the encrypted email server stores the emails in an unencrypted form . A proper certificate must be used to encrypt and decrypt S / MIME emails .
SFTP )
Secure File Transfer Protocol is used to securely transfer files between hosts .
Which of the following statements are true regarding administrative shares ? ( Select two . )
To connect to an administrative share , you must use the UNC path . By default , Windows automatically creates an administrative share for every volume . Because administrative shares are not visible when browsing the network , you must use the UNC path to connect to an administrative share . Only members of the Administrators group can access default administrative shares Adding a $ sign ( not a ! ) to the end of a share name creates an administrative share .
You are looking at a TRS connector on Which device MOST likely uses this connector ?
Speaker
RGB - LED
Superior accuracy ( most expensive type of backlighting technology ) .
Nickel Cadmium ( NiCad )
Takes up the most physical space . Tolerating deep discharges over long periods Higher energy density, lighter and more compact than lead-acid batteries Lower self-discharge rate than NiMH Extremely toxic Heat excessively and go into thermal runaway and self destruct if not equipped with internal charging cut off
Port 23
Telnet uses port?
Tethering
Transforms a smartphone or Internet-capable tablet into a portable communications device that shares its Internet access with other computers and devices wirelessly
TFTP
Trivial File Transfer Protocol ( TFTP ) also enables file transfer but does not support user authentication .
POP3 and IMAP
both email protocols used by mail clients to retrieve email from a mail server . However , they can't be used to send mail from the client to the server .
Cat 6a
cable is designed to be less susceptible to electromagnetic interference ( EMI ) than Cat 6 . Network performance can be greatly diminished by higher - than - average EMI .
Plenum - rated Cat 6a
cables can transfer data at 10 Gbps and can be placed in plenum spaces used for ventilation .
port 21
FTP uses port
Contrast ratio
Contrast ratio identifies the relative difference between white and black . A higher contrast ratio means a better screen .
You need to install a 32 - bit application on a 64 - bit version of Windows 11. In which default directory will the application be installed
% systemdrive % \ Program Files ( x86 )
CCFL (cold cathode fluorescent lamp)
-Higher voltage and power needed -Uses a power inverter for DC to AC -Added thickness to the display -No longer a common backlight -Used in older laptops -If display stops working, look closely (use a flashlight) to still see information on the screen -Inverter or whole display will need to be replaced
TCP
1. The first host sends a SYN packet asking to create a new session 2. The receiving host replies with a SYN - ACK packet acknowledging that the session can be created . 3. The first host replies with the ACK packet , which then opens the session .
MicroDIMM
172 - pin DIMM that is often used in laptops
BitLocker
BitLocker is designed to protect files against offline access only
POP3 and IMAP
Both can be used to retrieve email messages from an email server
North Bridge
Controls communication between the CPU memory and high - speed graphics bus .
lithium ion battery
Cannot be over charged Suffers from swelling and catching fire
A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible . This happens most often when one person in the office streams video from the internet . Which of the following configuration changes on the SOHO router is MOST likely to improve the VoIP performance ?
Change QoS settings to give VoIP traffic more priority .
You have purchased an LED monitor and connected it to the DVI - I port on your computer using a DVI - D cable . You configure the screen resolution to 1440 x 900 with 32 - bit color . The display on the screen seems to be pixilated . Which of the following solutions is MOST likely to fix this problem ?
Change the screen resolution to the native resolution of the monitor .
Dynamic Host Configuration Protocol ( DHCP )
Clients use DHCP to request an IP address , and servers use DHCP to provide an IP address .
Configure the SOHO router for NAT .
Configure NAT to translate the private IP addresses on the local network to public IP addresses on the internet . Doing this will most likely restore internet connectivity in this scenario .
You have a folder that you would like members of your development team to access . You want to restrict network and local access to only specific users . All other users must not be able to view or modify the files in the folder . Which of the following would be the BEST actions for you to take next ? ( Select two . )
Configure both share and NTFS permissions . Place the files on an NTFS partition .
Flash memory
Contains firmware that is used to configure motherboard settings and initialize devices
RAID 5
Disk striping with parity. RAID-5 uses three or more disks and provides fault tolerance. Large size, fast speed, and redundancy. The total array size is reduced by parity. A single drive failure will rebuild.
You want to connect your workstation to a large , high - definition screen that is over 30 feet away from the workstation for displaying a video presentation with sound . Which of the following ports will BEST support the transmission distance between the workstation and the display before the signal starts degrading ?
DisplayPort can carry high - quality digital video and audio signals up to 35 feet without degrading the signal .
What are the benefits of installing integration services ( IS ) on a Hyper - V Windows virtual machine ? ( Select two . )
Dramatically improves performance by installing Hyper - V aware drivers . the virtual Lets you cut and paste between the virtual machine and host .
After creating an FEK ( file encryption key ) for a file , what does EFS do next to add a greater level of security for the file
EFS encrypts the FEK by creating a key pair ( private and public ) . After creating an FEK for the file , EFS then encrypts the FEK through asymmetric encryption by creating a private key and a public key .
Since it has no moving parts , a CPU will usually work properly for several years . Which of the following is a common factor that might cause a CPU to fail prematurely ?
Electrostatic discharge ( ESD )
802.11ac
Explanation The microwave oven interferes with wireless signals that operate at 2.4 GHz . The 802.11ac standard is the best choice . It operates at 5.0 GHz and has a maximum speed of 2.6 Gbps .
FTP
File Transfer Protocol ( FTP ) . It enables file transfers and supports user authentication .
port 80
HTTP uses port
port 80 .
HTTP uses port?
Heated bed in 3D Printing
Helps control the cooling process and prevents issues like poor adhesion to the bed, poor adhesion between layers, and warping from uneven or early cooling
Which of the following correctly describe the most common format for expressing addresses ? ( Select two . )
Hexadecimal numbers 32 numbers , grouped using colons
Which of the following factors significantly determine the number of virtual machines that a host can accommodate ? ( Select two . )
Installation of integration services ( IS ) on the virtual machine . What has been allocated by the Hyper - V manager .
Why are plasma displays smaller than 32 inches not typically sold ?
It's too cost - prohibitive to manufacture plasma screens under 32 inches .
Network share
Jane an employee in the human resources department , has created several important PDF documents on her computer that all office managers in her building must read . She would like to make locating these files simple and maintain them as little as possible . It is important that no other users are permitted to view these documents . As the IT technician for your company , Jane has asked you to make this possible . Which of the following would MOST likely fulfill Jane's request ?
A technician must press a cable connector's locking tab to remove a faulty fiber optic network cable . The cable connector is designed with two connector ends . Which of the following fiber connector types is the cable using
LC
LCD display with IPS panel .
LCD displays with IPS panels have the best color reproduction quality and viewing angles among LCDs .
Port 389
LDAP (Lightweight Directory Access Protocol) uses port?
You have just received an order for various system components that you placed several weeks ago . One of the components is labeled as SO - DIMM memory . Which of the following was this memory MOST likely purchased for ?
Laptop computers
ip or ifconfig
What would you enter at the Command Prompt on a Linux system to display the IP addresses and subnet masks that are assigned to each network interface ?
RAID 1
Mirroring Two or more drives have identical data on them. A single drive failure will not result in loss. Speed and size is limited by the slowest and smallest disk. Only one drive is needed for recovery.
NiMH battery
More common than Ni-Cd because they have higher energy density. Most expensive of Nickel batteries High durability - resistant to extreme temperatures and conditions Low discharge rate and can be recharged multiple times Can suffer from memory effect; if they are not fully discharged and recharged regularly, the battery capacity can decrease over time
Mini - PCI
Most internal wireless network cards in laptops connect using a mini - PCI interface .
uses port 123 .
NTP
LMHOSTS files Internet Protocol
NetBIOS name resolution ( LMHOSTS files or WINS ) is typically used on Windows - based networks . The LMHOSTS file is a local text file that maps Internet Protocol ( IP ) addresses to the NetBIOS names of remote servers you communicate with over the TCP / IP protocol .
NNTP
Network News Transfer Protocol is an internet application protocol used primarily for reading and posting Usenet articles .
Port 123
Network Time Protocol uses port?
SSH
Secure Shell ( SSH ) allows users to securely access a remote computer system's console prompt .
While creating a virtual machine , you decide to set it up to use an external network . What else do you need to do to enable the eternal network configuration ?
Select a NIC using the virtual switch manager .
ping
Sends an ICMP echo request reply packet to a remote host .
Port 445
Server Message Block (SMB) Common Internet File System (CIFS) Directly over TCP
SMB
Server Message Block is used by Windows systems to access shared resources over the network .
Port 427
Service Location Protocol (SLP)
You recently upgraded a client's older workstation to Windows 11. The client has called to complain that the interface is very slow . For example , after clicking on the Start button , the Start menu slowly appears on the screen . Which of the following will MOST likely fix this problem without requiring a hardware upgrade ?
Set the visual effects for best performance .
Make sure that the DNS server is functioning properly .
Several of your employees are experiencing limited connectivity issues when trying to access some websites on the internet from their workstations . However , they can access the local company network without any problems . You have already tried using the ip and ipconfig commands to determine that the websites can be reached and that the IP information on the workstations is configured properly . You know that the connection to your internet service provider is working properly as well . What should you do next ?
SMTP ) communicate
Simple Mail Transfer Protocol ( SMTP ) is used to route electronic mail through the internetwork . Email applications provide the interface to communicate with SMTP or mail servers .
SNMP
Simple Network Management Protocol ( SNMP ) is used to remotely monitor and manage network devices and hosts .
Print spooler
Software process that captures print jobs from applications .
Print server
Software process that sends print jobs to the print device .
Identify the proxy server name and port number in Internet Options .
Two employees are unable to access any websites on the internet , but they can still access servers on the local network , including those residing on other subnets . Other employees are not experiencing the same problem . Which of the following actions would BEST resolve this issue ?
community cloud party .
Two main characteristics of a community cloud is that it is Commonly hosted externally by a third party . Designed to be shared by several organizations
A help desk technician determines that a user's issue is caused by a corrupt file on their computer . Which of the following would be the FASTEST way to transfer a good file to the computer ?
Use the C $ administrative share to copy the file .
NFC (Near Field Communication)
Used in credit cards, smartphones, and tickets to facilitate close-range communication Used to emulate cryptographic smart card functionalities
LDAP (Lightweight Directory Access Protocol)
Used to access and maintain distributed directory information services
SNMP (Simple Network Management Protocol)
Used to monitor network devices on IP networks and modifies settings to change network devices' behavior
Hotspot
Used to obtain wireless internet access using a WLAN
SMTP (Simple Mail Transfer Protocol)
Used to send and retrieve emails between email servers but typically used by client email applications to send emails to an email server
hub
Uses Ethernet cables to connect devices together Hubs broadcast data to connected devices It relies on the client devices to determine if the packets are meant for them or not This excess network traffic can cause collisions and security issues
Near Field Communication , or NFC
Uses the 13.56 MHz frequency and has a very short range. In order for devices to communicate, they have to be within two inches of each other . NFC chips are being used for applications such as chips use encryption algorithms to secure the connection , but constantly emit a signal and use a much slower passports and credit cards to contain all the information about the passport holder or the credit card account . NFC transmission speed than other wireless technologies .
Your Windows 11 system powers on , but there is no image on your display You have already checked to make sure that the monitor is connected properly to the computer , is plugged in , and is turned . Which of the following is the BEST next step you should take to try to resolve the issue
Verify that the BIOS / UEFI is configured to use the correct video adapter
Vertical alignment ( VA )
Vertical alignment ( VA ) produces a truer black and offers a wider viewing angle . However , this often suffers from distortion when transitioning colors .
Which of the following is simulated is created through a paging file on the hard drive ?
Virtual memory
Wireless internet service provider ( WISP )
WISP is similar to satellite internet . However , instead of antennas directed to a satellite in orbit , they are pointed at a large antenna on land . The antennas use radio signals ( typically microwaves ) to transmit and receive data . WISP provides a high - speed internet connection , such as fiber internet . WISP : ● Is installed in a central location . ● Uses a single , large antenna to provide connections for all subscribers in an area . ● Requires a direct line of site between two fixed antennas . • Provides internet access without cables or lines connecting to each subscriber's location . . Can provide internet to remote areas by installing a single antenna .
ipconfig / flushdns
When you see the DNS server address , you realize that this information needs to be updated . Earlier in the day , you implemented a new DNS server with a new IP address . The workstation will update this information in 24 hours . Which command can you enter at the command line to update the DNS server information right away ?
bash
Which command would you enter at the shell prompt to start a new Bourne - Again Shell ( Bash ) session ?
The chip that controls the PCI bus .
Which of the following BEST describes the purpose of the north bridge chipset ?
Ribbon cable
Which of the following connects the internal laptop keyboard to the laptop's system board ?
LCD , LED
Which of the following display technologies require backlighting ? ( Select two . ) Edge - lit white LED ( EL - WLED or WLED ) displays use white LEDs along one edge ( usually the top ) of the LCD and a light diffuser to backlight the screen . Modern LCDs use an array of LEDs ( light - emitting diodes ) to backlight the screen .
LCD projector
Which of the following display technologies suffer from motion blur ?
The hard drive's form factor
Which of the following hard drive standards is of MOST concern when selecting a replacement that is compatible with the laptop ? For laptops , the hard drive's form factor is very important . Most laptop's use either the 1.8 inch or 2.5 inch form factor standard .
Subnet mask
Which of the following identifies both the host computer and the network to which it belongs ?
Modern LCDs use LEDs ( light - emitting diodes ) to backlight the screen .
Which of the following is true of modern LCD monitors in regards to backlighting ?
hosts file , DNS
Which of the following mechanisms would BEST allow you to resolve a hostname to its associated IP address ? ( Select two . ) You can use the Domain Name System ( DNS ) to get the IP address from a given hostname . You can also use the local hosts file to map hostnames to IP addresses . On Windows systems , this file is located in \ Windows \ system32 \ driversletcl .
POP3
Which of the following protocols do email clients use to download messages from a remote mail server ? It's part of the IP protocol suite and is used to retrieve email from a remote server to a local client over a network connection .
➡NetBIOS
Which of the following protocols is non - routable and requires another protocol to enable internetwork communications ? non - routable protocol . It is often combined with IPX or IP to enable internetwork communications . It's used in earlier versions of Windows but is rarely used today because nearly every operating system supports IP .
IMAP
Which of the following protocols is used by an email client to retrieve messages from an email server , giving users the option to keep mail messages on the server ? allows a mail server to keep a copy of a user's messages on the server after they're downloaded to the mail client .
EFS
Which of the following security solutions would prevent you from reading a file that you did not create ? EFS is a Windows file encryption option that encrypts individual files so that only the user who created the file can open it . Decryption is automatic when the file owner opens it . Other users cannot open the encrypted file unless specifically authorized .
Peer - to peer
Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer ?
3389
Which port must be opened on the firewall of a Windows system so that a Remote Desktop connection can be established
netstat
Which utility can you use to view a computer's current connections , active sessions , and ports ?
802.11n
You are designing a wireless network for a client . Your client needs the network to support a data rate of at least 150 Mbps . In addition , the client already has a wireless telephone system installed that operates 2.4 GHz . Which 802.11 standard works BEST in this situation ?
DLP projector
You are in charge of putting together the display design for a new conference center at your organization . The conference center will be in a large auditorium with 500 or more seats . Which following technologies will provide a large display for such a group and also provide very high resolutions
ipconfig / flushdns
You are the computer specialist for a small business . Your company server is named FS1 and has an IP address of 10.0.0.2 . The hardware in your company server has started to experience intermittent failures , so you transfer the shares on the server to a spare server and take the main server offline . The spare server has an IP address of 10.0.0.3 . You edit the existing A record for FS1 on your company's DNS server and redirect the hostname to the spare server's IP address of 10.0.0.3 . Afterward , most users are able to access the shares on the spare server by hostname , but several users cannot . Instead , they see an error message indicating that the FS1 server cannot be found . Enter the command you can run from Command Prompt on these workstations that will allow them to access the shares on FS1 without performing a full restart .
Forward lookup zone
You are the network administrator for a small consulting firm . The firm has recently rolled out a new intranet site , and you are responsible for configuring the DNS . You are able to connect to the intranet site by using the IP address , but you cannot connect by using the hostname . Which of the following do you need to configure to access the site with the hostname ?
ipconfig / all
You are troubleshooting network connectivity issues on a Windows workstation . Which command would you use to view the network adapter's MAC address
You have decided to use BitLocker as your whole disk encryption solution for the hard drive on your laptop . The laptop includes a TPM chip What happens if you store the startup key required to unlock the hard drive in the TPM chip ?
You can boot the hard drive without providing the startup key .
OLED
You have recently purchased a new , foldable smart phone . Which of the following types of mobile device display technologies is MOST likely being used for the foldable display ?
Notebook hard drives and SSD drives are typically 2.5 " .
You need to replace the hard disk in your laptop computer . Which of the following hard drive sizes should you choose for the laptop ?
ipconfig / all
You need to view detailed IP configuration information on your Windows workstation . In addition to the IP address , subnet mask , and default gateway configuration , you need to see the network card's MAC address and the addresses of the DHCP and DNS servers the workstation is communicating with Which command would you enter at the command line to see this detailed information ?
man cat
You want to know more about the usage , command syntax , and options available with the Linux cat command . What would you enter at the Command Prompt to display this information about the cat command ?
shutdown -h +10 message
You would like to completely shut down a system 10 minutes after notifying all users of your intent . Which of the following commands should you enter at the shell prompt ?
What are the mesh protocols that are used most often for IoT devices?
Z-wave Zigbee
lithium ion battery
a battery that produces electrical current in the form of motion of lithium ions from the anode to the cathode Takes up the least physical space Suffers from swelling and catching fire Cannot be over charged Expensive Provides largest energy density for weight Suffers capacity deterioration after one year
DMD
a small chip that contains millions of tiny mirrors that can redirect light inside of DLP projectors .
Trusted Platform Module ( TPM )
a special hardware chip included on a computer's motherboard that contains software ( within the firmware ) that generates and stores cryptographic keys .
IMAP
allows a mail server to keep a copy of a user's messages on the server after they're downloaded to the mail client
SMTP
allows a user to send email to a server , but it can't be used to retrieve messages from the server .
SSH to computer
allows network services to communicate securely over an unsecure network ( for example , secure remote login to computer systems by users ) .
Coaxial cabling has
an inner conductor that is a solid wire made of copper or copper - coated tin . The outer mesh conductor , or shield , is made of aluminum or tin - coated copper . A PVC plastic insulator surrounds the inner conductor and insulates the signal from the mesh conductor .
Domain Name System ( DNS )
associates readily recognizable domain names to numerical IP addresses .
You manage the two folders listed below on your computer . C : \ Confidential • D : \ PublicReports The C : \ drive is formatted with NTFS , and the D : \ drive is formatted with FAT32 . On the C : \ Confidential folder , you edit the properties for the following two files and assign the Deny Read permission to the Users group : • Reports.doc • Costs.doc You then take the following actions . You : • Move Reports.doc from C : \ Confidential to D : \ PublicReports . • Copy Costs.doc from C : \ Confidential to D : \ PublicReports . Which of the following BEST describes what happens to the permissions for both files as they are created in the D : \ PublicReports folder ?
created in the Permissions are removed from both files . Permissions will be removed from both files . Moving or copying files to a non - NTFS partition removes all permissions ( FAT32 does not support NTFS permissions ) .
/ proc
directory is dynamically created whenever you access it . / proc contains the devices file , which lists all the hardware devices that are configured on the system . / proc also contains the cpuinfo file , with information about the processor installed on the system , and the dma file , which contains a list of DMA channel assignments .
ipconfig
displays IP configuration information for network adapters
netstat
displays the following IP - related statistics : • Current connections • Incoming and outgoing connections Active sessions, ports, and sockets The local routing table
Plasma
displays use millions of small cells that contain electrically charged ionized gasses . The cells light up when electrically charged and do not need any backlighting .
Your computer has a single NTFS partition that is used for the C : drive with the folders below • C : \ Confidential ● C : \ PublicReports You configure NTFS permissions on the C : \ Confidential folder and deny the Read permission to the Users group . For the C : \ PublicReports folder , you allow the Full Control permission for the Users group . You have not configured any permissions other than the defaults on any other folders or files . You take the following actions . You : • Move Reports.doc from C : \ Confidential to C : \ PublicReports . • Copy Costs.doc from C : \ Confidential to C : \ PublicReports . Which of the following BEST describes the permission the members of the Users group will have for the two files in the C : \ PublicReports folder ?
files in Allow Full Control for both . Users will have Allow Full Control for both files in the C : \ PublicReports folder . When you move or copy files to an NTFS partition , the files inherit the permissions configured for the parent folders . If you had configured explicit permissions for the files , the moved file would retain the explicit permissions . Copying files to new folders or partitions removes any existing permissions so that only inherited permissions apply .
Cellular networking uses the cellular phone infrastructure for internet access .
• Mobile phones with digital data plans use cellular signals to connect to the internet • Devices can connect to a cellular internet connection in a variety of ways : o Many smart phones use a technique known as tethering to provide cellular internet to another device . Tethering typically requires you to connect the smart phone using a USB cable. . o A mobile hotspot is a cellular device that provides internet access by creating a small Wi - Fi network to which multiple devices can connect . Most smart phones have built - in mobile hotspot functionality . o Some mobile devices ( e.g. , notebook computers and tablets ) have integrated cellular antennas . o USB cellular adapters can connect to most mobile devices to provide cellular access .
Plasma displays disadvantages
• Plasma displays consume two to three times as much power as LCDs . • Plasma displays suffer from a problem known as image retention ( IR ) . Static images that are displayed for a even when the display is turned off . If the static image is displayed for too long , screen burn - in can occur , and long time cause the phosphors to overheat , which creates a temporary shadow of the image that is visible the shadow image will be permanent .
Plasma displays advantages
• Plasma displays usually show colors more accurately than LCD displays . . Because no backlighting is used , plasma displays have high contrast and can produce true black ( displays that use backlighting can only display very dark grey ) . • Plasma displays have almost no motion blur due to the speed of the gas reaction and the way they draw frames . Because of this , most plasma displays do not specify response times .
Common symptoms of a malware infection include the following :
• Slow computer performance • Internet connectivity issues Operating system lockups • Windows update failures • Renamed system files ● Disappearing files • Changed file permissions • Access denied errors
A geostationary satellite GEO
• Uses a transmitter with an antenna ( dish ) directed skywards to a satellite . ● Requires line of sight to the satellite . Dish placement is crucial . Is affected by mild atmospheric and weather conditions . Fog , rain , or snow can disrupt service . • Can have a long delay time ( latency ) between requests and downloads . • Can be a portable solution for cars or trucks with an attached satellite dish . • Provides nearly 100 % global coverage .