CompTIA Core 1 Study Test Dumb

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following DC voltages are not found within a printer when the laser printer converts AC power into DC power for use?

-24 VDC The DCPS (DC Power Supply/Source) of a laser printer is used to convert high voltage AC into lower voltage DC for the printer. The DCPS converts 115VAC or 220VAC power into +5 VDC and -5 VDC for use by the printer's logic board, and +24 VDC to power the motors that feed the paper through the printing path in the last printer.

Your laptop currently has a 128 GB SSD installed and currently running out of internal storage space. You want to upgrade the workstation with more internal storage to store additional videos, photos, and backups. Still, you don't want to sacrifice data access speed for increased storage. Which of the following is the BEST storage solution to store more data while maintaining fast data access speeds?

1 TB SSD Since you need an internal storage solution, you cannot use a NAS or SAN (since these are both network storage solutions). Instead, you have to select from the SSD or the HDD. In this question, we are primarily worried about the storage's speed being installed and not the storage size. Therefore, we should choose the 1 TB SSD (solid-state drive) over the 3 TB HDD (hard disk drive) due to its faster speeds.

Which of the following is an example of a valid IPv4 address?

192.168.1.254 An IPv4 address consists of 32 bits. IPv4 addresses are written in dotted octet notation, such as 192.168.1.254. MAC addresses are written as a series of 12 hexadecimal digits, such as 00:AB:FA:B1:07:34. IPv6 addresses are written as a series of up to 32 hexadecimal digits but can be summarized using a :: symbol. The ::1 is the IPv6 address for the localhost. The other option, 192:168:1:55 is not a valid address since it uses : instead of a . in between the octets.

Your desktop computer is currently running out of internal storage space. You want to upgrade the workstation with more internal storage to store additional videos, photos, and backups. Which of the following is the BEST storage solution to avoid having to expand again next year while still meeting your need to store more data?

3 TB HDD Since you need an internal storage solution, you cannot use a NAS or SAN (since these are both network storage solutions). Instead, you have to select from the SSD or the HDD. In this question, we are primarily worried about the size of the storage being installed and not the storage speed. Therefore, we should choose the 3 TB HDD (hard disk drive) over the 1 TB SSD (solid-state drive) due to its larger size.

Which of the following types of USB connections can support up to 4.5 watts of power per connected device?

3.0 USB 3.0 can support providing up to 4.5 watts of power per connected device. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at the slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power.

Which of the following ports is used by LDAP by default?

389 The lightweight directory access protocol (LDAP) is a protocol used to access and update information in an X.500-style network resource directory. LDAP uses port 389. The service location protocol (SLP) is a protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network. This is an alternative protocol to LDAP in newer networks. SLP uses port 427. The remote desktop protocol (RDP) is a protocol used for the remote administration of a host using a graphical user interface. RDP operates over TCP port 3389. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53.

Which cellular technology is compromised of HSPA+ and EV-DO to provide higher data speeds than previous cellular data protocols?

3G 3G cellular technology is made up of two different technologies: HSPA+ and EV-DO. HSPA+ (Evolved High-Speed Packet Access) is a 3G standard used for GSM cellular networks and can support up to a theoretical download speed of 168 Mbps and a theoretical upload speed of 34 Mbps. In the real world, though, HSPA+ normally reaches speeds around 20 Mbps. EV-DO (Evolution-Data Optimized) is a 3G standard used for CDMA cellular networks and can support up to 3.1 Mbps downloads. 4G cellular technology is made up of LTE and LTA-A. Long Term Evolution (LTE) is a packet data communications specification providing an upgrade path for both GSM and CDMA2000 cellular networks. LTE has a theoretical speed of 150 Mbps and a real-world speed of around 20 Mbps. LTE Advanced (LTE-A) has a theoretical speed of 300 Mbps and a real-world speed of around 40 Mbps. 5G cellular technology is made up of three different types: low-band, mid-band, and high-band mmWave technology. Low-band 5G reaches an average speed of 55 Mbps with a theoretical speed of 150 Mbps. Mid-band 5G reaches an average speed of 150 Mbps with a theoretical speed of 1.5 Gbps. High-band 5G reaches an average speed of 3 Gbps with a theoretical speed of up to 70 Gbps.

Your desktop computer is currently running out of internal storage space. You want to upgrade the workstation with more internal storage to store additional videos, photos, and backups. Which of the following is the BEST storage solution to avoid having to expand again next year while still meeting your need to store more data?

3TB HDD Since you need an internal storage solution, you cannot use a NAS or SAN (since these are both network storage solutions). Instead, you have to select from the SSD or the HDD. In this question, we are primarily worried about the size of the storage being installed and not the storage speed. Therefore, we should choose the 3 TB HDD (hard disk drive) over the 1 TB SSD (solid-state drive) due to its larger size.

You just heard of a new ransomware attack that has been rapidly spreading across the internet that takes advantage of a vulnerability in the Windows SMB protocol. To protect your network until Microsoft releases a security update, you want to block the port for SMB at your firewall to prevent becoming a victim of this attack. Which of the following ports should you add to your blocklist?

445 Server Message Block (SMB) uses ports 139 and 445 Server Message Block (SMB) uses ports 139 and 445, and is a network file sharing protocol that runs on top of the NetBIOS architecture in Windows environments. When the WannaCry ransomware was spreading rapidly across the internet, you could help protect your organization's network by blocking ports 139 and 445 at your firewall to prevent your machines from getting infected over the internet. Network Time Protocol (NTP) uses port 123 and is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. Internet Message Access Protocol (IMAP) uses port 143 and is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. System Logging Protocol (Syslog) uses port 514 and is a way network devices can use a standard message format to communicate with a logging server. It was designed specifically to make it easy to monitor network devices. Devices can use a Syslog agent to send out notification messages under a wide range of specific conditions.

You just heard of a new ransomware attack that has been rapidly spreading across the internet that takes advantage of a vulnerability in the Windows SMB protocol. To protect your network until Microsoft releases a security update, you want to block the port for SMB at your firewall to prevent becoming a victim of this attack. Which of the following ports should you add to your blocklist?

445/SMB Server Message Block(SMB) Server Message Block (SMB) uses ports 139 and 445, and is a network file sharing protocol that runs on top of the NetBIOS architecture in Windows environments. When the WannaCry ransomware was spreading rapidly across the internet, you could help protect your organization's network by blocking ports 139 and 445 at your firewall to prevent your machines from getting infected over the internet. Network Time Protocol (NTP) uses port 123 and is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. Internet Message Access Protocol (IMAP) uses port 143 and is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. System Logging Protocol (Syslog) uses port 514 and is a way network devices can use a standard message format to communicate with a logging server. It was designed specifically to make it easy to monitor network devices. Devices can use a Syslog agent to send out notification messages under a wide range of specific conditions.

Which of the following type of hard disk drives would be installed in a low-end office desktop?

5400 rpm Hard drive performance is limited based on the number of revolutions per minute (RPM) the disk can spin. If a disk can spin faster, it can retrieve or store data on the disk quicker. For low-end office desktops, using a 5,400 rpm hard disk drive to save money is acceptable. For a high-performance gaming computer, a 15,000 rpm hard disk drive or an SSD should be used instead.

You just bought a new Virtual Reality headset to use with your computer. To ensure your computer is ready to support the new VR games, which of the following should you install?

A dedicated graphics card Virtual Reality (VR) requires a fast processor, lots of memory, and, most importantly, a dedicated graphics card. To support lag-free virtual reality and reduce headaches/eye pain, you need to ensure you have a high-end dedicated graphics card or GPU in your system.

During a disaster recovery, which of the following statements is true?

A virtual machine has less downtime than a physical server A virtual machine can usually be restored much faster than a physical server. Physical servers must be modified to fit the right drivers for the disk drives, NIC, and other necessary components whenever they must be rebuilt after a crash. Often, a new physical server will also be required to replace a faulty one, and then the right drivers are needed to ensure a smooth transition. Conversely, a virtual machine can be recreated using another instance, clone, or restoration from a backup in much less time. Therefore, the downtime associated with virtual machines and their restoral is much lower.

Your son is complaining that his smartphone is broken. He tells you that he cannot connect to the internet, nor can he make or receive phone calls and text messages. You ask him to start up the music player on his phone, and he can open it without any issues. It appears the common issue has to do with his device's network connectivity. Which of the following is MOST likely the problem with your son's phone?

Airplane mode is enabled on the device. If the smartphone is functioning properly except for applications that require network connectivity, then the issue is either a misconfiguration (like enabling airplane mode by mistake), a defective cellular radio chip, or a similar issue. The most likely cause is that your son accidentally enabled the airplane mode on the device, which will turn off the cellular radio for the smartphone and cause the network connectivity to be lost. It would help if you first verified that airplane mode is disabled and that the cellular radio is enabled. If that doesn't solve the problem, you can investigate whether it is a hardware issue (such as a broken cellular radio chip).

You want to replace an old CRT display with the type of screen that produces less voltage and is more energy-efficient. Additionally, the screen should not contain a backlight. What type of display technology should you select?

Answer: OLED, organic light-emitting diode, works without a backlight emits, emits light in response to an electric current. CRT-Ray Tube An organic light-emitting diode (OLED or organic LED) is a light-emitting diode (LED). The emissive electroluminescent layer is a film of organic compound that emits light in response to an electric current. An OLED display works without a backlight because it emits visible light. Thus, it can display deep black levels and is thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions (such as in a dark room), an OLED screen can achieve a higher contrast ratio than an LCD, regardless of whether the LCD uses cold cathode fluorescent lamps or an LED backlight. An OLED will consume around 40% of an LCD's power, displaying a primarily black image. For most images, it will consume 60-80% of the power of an LCD.

Molly enjoys playing an online MMORPG each day after work. To access the game, she simply enters the website address and logins in to begin playing. Today, she tried to access the game from her laptop at work, but she couldn't launch the game. What is most likely causing the issue?

Blocklisted by firewall The company firewall may be blocking any gaming-related websites and applications to improve security. Adding the website or a category of websites to the firewall's blocklist would prevent all corporate users from accessing the content. When using cloud-based resources, it is important that all of the right ports and protocols are allowed through the firewall.

A technician at Dion Training is troubleshooting an issue with a workstation. The technician believes that the power supply needs to be replaced based on the symptoms they observed. Which of the following symptoms did the technician likely observe to lead them to this conclusion?

Burning smell A burning smell is indicative of a bad power supply. A foul odor is indicative of a distended capacitor. The incorrect date/time on the workstation is indicative of a dead CMOS battery. Hardware failure or system instability can cause the computer to reboot continuously. The problem could be the RAM, hard drive, power supply, graphics card, or external devices. Based on the symptoms of a continuous reboot, the supervisor likely suspected the RAM as the cause of the issue.

Using the image of the motherboard above, which of the following correctly indicates the circled area?

CMOS battery The area circled indicates the CMOS battery on this motherboard. The CMOS battery is used to keep power to the BIOS configurations, such as the date and time, when the power is removed from a desktop or workstation. For the exam, it is important that you can identify the different parts of the motherboard by sight.

Using the image of the motherboard above, which of the following correctly indicates the circled area?

CPU slot The area circled indicates the CPU slot. This is where the processor is installed into the motherboard. For the exam, it is important that you can identify the different parts of the motherboard by sight.

Which of the following types of networking hardware is used to deliver broadband internet access using a hybrid fiber-coaxial (HFC) infrastructure?

Cable modem A cable modem is a type of network bridge that provides bi-directional data communication via radio frequency channels on a hybrid fiber-coaxial (HFC), radio frequency over glass (RFoG), and coaxial cable infrastructure. Cable modems are primarily used to deliver broadband internet access as cable internet, taking advantage of an HFC and RFoG network's high bandwidth. DSL is a technology used to transmit multimedia traffic at high-bit rates over twisted-pair copper wire (over ordinary telephone lines). This allows the telecommunications company to connect a user's home to the local switching center using normal telephone lines, then connect that local switching center (using a DSLAM to multiplex the connections) to the central office over a single high-speed cable (such as a fiber connection). An optical network terminal (ONT) is a device that connects fiber optics cables to other types of wiring such as Ethernet and phone lines by converting the signal from optical to electrical and vice versa. An ONT is commonly used with fiber to the house (FTTH) installations. Software-defined networking (SDN) is an approach to network management that enables dynamic, programmatically efficient network configuration to improve network performance and monitoring, making it more like cloud computing than traditional network management. Software-defined networking (SDN) uses Application Programming Interfaces (API) and compatible hardware that allows for the programming of network appliances and systems.

You are installing a new projector in a customer's home theater room. After connecting the projector and powering it on, you notice some odd debris displayed on the screen. Which of the following should you do to correct this?

Clean artifacts on the protective glass Based on the situation described, there appears to be some odd debris being displayed on the screen. This sounds like some artifacts or debris on the lens or protective glass of the projector. If this is cleaned, the image should be resolved back to a clear picture. This is the first and cheapest option to attempt. If this doesn't work, then you may need to replace the bulb since a failing bulb can create artifacts, as well.

Dion Training wants to install a network cable to run a television signal between two buildings. Which of the following cable types should it utilize?

Coaxial Cable A coaxial cable is a cable used to transmit video, communications, and audio. A coaxial or coax cable is most commonly used as a cable to connect a TV to a cable TV service. Coaxial cables are a specialized type of copper cabling that uses a copper core to carry the electrical signal while being enclosed by plastic insulation and shielding to protect the data transmission from the effects of electromagnetic interference (EMI). Plenum-rated cable has a special insulation that has low smoke and low flame characteristics. Plenum cable is mandated to be installed in any air handling space. Shielded cables contain a braided foil shield around the inner cabling to protect the data from the effects of electromagnetic interference (EMI). An optical fiber consists of an ultra-fine core of glass to carry the light signals surrounded by glass or plastic cladding, which guides the light pulses along the core, and a protective coating. The fiber optic cable is contained in a protective jacket and terminated by a connector. Fiber optic cables use light signals to carry data across a cable at extremely high bandwidths.

You just rebooted your Windows 10 workstation, and the desktop's background picture looks strange. Upon closer examination, you notice that only a few hundred unique colors are being shown in the image. Which of the following settings should you reconfigure?

Color depth Color depth is either the number of bits used to indicate the color of a single pixel in a bitmapped image or video frame buffer or the number of bits used for each color component in a single pixel. In Windows 10, you can display up to 32-bits of color depth if your monitor supports it. A larger color depth number allows more unique colors to be displayed. If you only have 4-bit color, for example, you can only have 16 colors. With an 8-bit color depth, you can see 256 colors. Normally, most Windows systems are set to 16-bit (65,536 colors), 24-bit (16.7 million colors), or 32-bit (4.2 billion colors).

What type of cloud model would allow the sharing of resources by multiple organizations to create a service that benefits all of its members?

Community Cloud A community cloud in computing is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns, whether managed internally or by a third party and hosted internally or externally. Community Cloud is a hybrid form of private cloud. They are multi-tenant platforms that enable different organizations to work on a shared platform. Community Cloud may be hosted in a data center, owned by one of the tenants, or by a third-party cloud services provider and can be either on-site or off-site. A public cloud contains services offered by third-party providers over the public Internet and is available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume. A private cloud contains services offered either over the Internet or a private internal network and only to select users instead of the general public. A hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud, and third-party public cloud services with orchestration between these platforms. This typically involves a connection from an on-premises data center to a public cloud.

Susan, a computer technician, received a complaint from a client about an issue with their laptop. Based on the symptoms observed, she believes that there is an issue with the laptop's memory. Which of the following symptoms was MOST likely observed during their troubleshooting?

Continuous reboots A bad or faulty RAM module can cause system reboots, diminished system performance, and slow loading of websites and programs. This gradual deterioration of performance, especially with memory-intensive programs, may indicate a problem with the laptop's system memory. The system memory should be tested and replaced (if needed) to allow the laptop to begin working efficiently.

Which of the following components would require you to de-solder the old part from the laptop to install and solder in a new one?

DC jack It is relatively common for the DC jack to fail over time. The DC jack can become loose over time, or the jack itself can become separated from the motherboard. Replacing a DC jack requires disassembling the laptop, de-soldering and removing the old jack, then soldering the new jack into place. Most laptop DC jacks are specific to the manufacturer and the laptop model.

You connected your laptop to a new wireless network and received an IP address automatically. Which of the following servers allowed this to occur?

DHCP Server A dynamic host configuration protocol (DHCP) serve is a server configured with a range of addresses to lease. Hosts can be allocated an IP address dynamically or be assigned a reserved IP address based on the host's MAC address. The server can also provide other configuration information, such as the location of DNS servers. A domain name system (DNS) server is a server that hosts the database of domain names and the IP addresses mapped to those names. Each DNS server is authoritative for certain domain names that their organization owns. An authentication, authorization, and accounting (AAA) server is a server use to identify (authenticate), approve (authorize), and keep track of (account for) users and their actions. AAA servers can also be classified based on the protocol they use, such as a RADIUS server or TACACS+ server. A proxy server is a server that acts as an intermediary between a client requesting a resource and the server that provides that resource. A proxy server can be used to filter content and websites from reaching an end user.

Which of the following cloud services should an organization choose in order to deliver virtual desktops to end-users over the Internet on a per-user license basis?

DaaS Desktop as a Service Desktop as a Service (DaaS) is a cloud computing offering where a service provider delivers virtual desktops to end-users over the Internet, licensed with a per-user subscription. DaaS is often combined with Virtual Desktop Infrastructure. Platform as a Service (PaaS) is a complete development and deployment environment in the cloud, with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications. Infrastructure as a Service (IaaS) is a type of cloud computing service that offers essential compute, storage, and networking resources on-demand, on a pay-as-you-go basis. Software as a Service (SaaS) allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools (such as Microsoft Office 365). SaaS provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider.

Which of the following parts is responsible for converting the analog signals created by your tapping or swiping the surface of a display to a digital signal that is understood by the underlying software?

Digitizer

As a PC Technician, you are on the road most of the day and use a laptop. When you get back to your office at the end of the day, you want to be able to quickly connect a larger external monitor, keyboard, and mouse to your laptop through a single USB port to perform additional work on the larger screen. Which type of device should you choose to provide all the functionality above?

Docking Station Port Replicator A port replicator is a device used to connect multiple peripherals to a laptop quickly. The monitor, printer, network, keyboard, and mouse are permanently plugged into the port replicator, connecting to the laptop via the USB port. A docking station provides additional capability to a laptop and further expansion of its capabilities. For example, a docking station can provide power, external monitor connections, additional storage, and even CD/DVD drives in them. A USB 4-port hub will only provide USB expansion (which doesn't support a monitor by default) and is therefore not a possible right answer to this question.

You are configuring a new client workstation on the network. Which type of IP address should you configure it with?

Dynamic A dynamic IP address should be used for client workstations and devices to ensure they are easy to configure and less prone to human error. When configuring a dynamic IP address, the DHCP server should issue the IP address, subnet mask, gateway, and DNS server's IP address to the workstation or device. A static IP address should be used for servers to ensure they are easy to find, access, and manage on the network. When configuring a static IP address, you need to include the IP address, subnet mask, gateway, and DNS server's IP address. A static IP address is used when the DHCP server is disabled and clients are configured manually to join the network properly. Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function. When a host uses an APIPA address, it can communicate with other hosts on the same network using APIPA. Still, it cannot reach other networks or communicate with hosts who have managed to obtain a valid DHCP lease. An APIPA address is also known as a link-local address.

Jason booted up a Windows 10 laptop and noticed that the icon appears very large and the image appeared blurry. What is the most LIKELY cause of these issues?

Incorrect resolution This is likely a screen resolution problem. Each LCD/LED has a native resolution that fits perfectly on the screen. If a resolution other than the native resolution is used, the screen could become squished, distorted, or have black vertical or horizontal lines filling up the excess space. For example, if the computer rebooted into Safe Mode, it will default back to 800x600 pixel resolution instead of the 16:9 ratio of 1920x1080 pixels used by modern laptops. This is also referred to as VGA mode.

You are setting up a projector and a laptop for a big presentation in the Dion Training conference room. You start up the presentation software and mirror the laptop's display to the projector. The image on the screen from the projector is flickering intermittently, but the image on the laptop's display is working with no issues. You attempt to change the laptop's resolution to a lower setting and a higher setting, but still, the projector's flickering persists. Which of the following steps should you attempt NEXT?

Ensure the display cable is securely connected to both the laptop and the projector A flickering image on a projector is a common issue that can occur if the display cable between the laptop and the projector is not connected securely. This is especially common with older-style display cables like VGA and DVI. Therefore, it is important to ensure a VGA or DVI cable is properly secured using the cable's thumbscrews to prevent flickering of the image.

Using the image above, which of the following correctly identifies the fiber optic connector shown as Connector?

F connector

Which of the following technologies can provide the precise latitude and longitude of a device's location when it is located outdoors?

GPS Location services enable the device to know its position using its internal GPS receiver or its approximate location using its cellular radio. A mobile device can use its internal GPS, cellular, Bluetooth, or Wi-Fi radios to identify its location. A GPS (global positioning system) device is used to determine a receiver's position on the Earth based on information received from 24 GPS satellites, which operate in a constellation in Medium Earth Orbit (MEO). The receiver must have a line-of-sight to four of the GPS satellites continuously to accurately determine its position on the earth (latitude, longitude, and altitude). The device's GPS receiver can provide an accurate location up to 10 meters. Cellular radios can provide an approximate location based upon the triangulation of your position between different cellular towers. Bluetooth can be used within a building to provide an accurate of the device within 3-4 meters. Wi-Fi positioning systems use the signal strength or angle of arrival of a signal to determine the device's location within 1-4 meters. The use of Bluetooth and Wi-Fi to determine the device's location is known as an internal positioning system (IPS).

Which of the following is a connection-oriented protocol that utilizes TCP?

HTTPS Hypertext Transfer Protocol (HTTP) The Internet Engineering Task Force (IETF) recognizes the TCP port number 443 as the default HTTPS protocol. It provides an encryption algorithm for exchanging information between web servers and browsers. HTTPS port 443 works by securing network traffic packets before the data transmission occurs. The transmission control protocol (TCP) is a protocol in the TCP/IP suite that operates at the transport layer to provide connection-oriented, guaranteed delivery of packets. Hosts must first establish a session to exchange data and then confirm the delivery of packets using acknowledgments when using TCP. TCP is relatively slow in comparison to UDP. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over TCP port 443. The simple network management protocol (SNMP) is a protocol for monitoring and managing network devices over UDP ports 161 and 162. A management system collates data sent by agents running on each device. The agents maintain a Management Information Base of configuration and usage data. An agent can also generate a trap, alerting the management system of some notable event (such as a printer that is out of paper). The trivial file transfer protocol (TFTP) is a protocol used to get a file from a remote host or put a file onto a remote host. TFTP is commonly used with embedded devices or systems that retrieve firmware, configuration information, or a system image during the boot process. TFTP operates over UDP port 69. The dynamic host control protocol (DHCP) is a protocol used to allocate IP addresses to a host when it joins a network. DHCP utilizes UDP ports 67 and 68.

A computer technician is building a server that will run multiple virtual machines simultaneously. Which CPU technology should be selected so that the processor can utilize two logical cores?

Hyperthreading HyperThreading (HT) is an Intel CPU architecture implemented to expose two or more logical processors to the OS to deliver performance benefits. This allows the system to run multiple cores for each operating system in a virtualized environment. Since the question asked about logical cores and not physical cores, the answer is hyperthreading and not a multi-core processor. A 32-bit CPU is a hardware item and used by low-end notebooks or thin clients. A dedicated GPU is a graphics card and would not help with running multiple virtual machines.

You have been asked to fix an old computer whose CD-ROM has stopped working. The CD-ROM drive is using a 40-pin ribbon cable, and you suspect the cable is defective. Which cable should you buy to replace the cable?

IDE An IDE (Integrated Drive Electronics) cable is an older cable interface that used to be used for the transmission of data between the motherboard and various internal devices like hard drives and CD-ROM drives. An IDE cable is a 40-pin ribbon cable that operated at relatively slow speeds (less than 50 Mbps). IDE cables were also known as PATA (Parallel ATA) cables, as opposed to SATA (Serial ATA) cables. You will rarely come across an IDE cable in use today, but if you are working on a very old computer in an office (legacy machine) then you may find one in use.

You have been asked to fix an old computer whose CD-ROM has stopped working. The CD-ROM drive is using a 40-pin ribbon cable, and you suspect the cable is defective. Which cable should you buy to replace the cable?

IDE Integrated Drive Electronics Cable An IDE (Integrated Drive Electronics) cable is an older cable interface that used to be used for the transmission of data between the motherboard and various internal devices like hard drives and CD-ROM drives. An IDE cable is a 40-pin ribbon cable that operated at relatively slow speeds (less than 50 Mbps). IDE cables were also known as PATA (Parallel ATA) cables, as opposed to SATA (Serial ATA) cables. You will rarely come across an IDE cable in use today, but if you are working on a very old computer in an office (legacy machine) then you may find one in use.

You have been asked to set up the corporate email on several mobile devices for Dion Training's employees. The employees will use their mobile devices to check their email when out of the office, but they will also need to check their email from their desktop computers. Which of the following mail protocols should you configure to allow the employees to receive their mail and maintain the read/unread status across all of their devices?

IMAP You should configure IMAP because it will leave the email on the server and allow for synchronizing the mail to all devices, including each email's read state. If you configure POP3, the mail is downloaded to the device and removed the mail from the server's mailbox by default. SMTP is used to send emails, not receive them. HTTPS is used for web browsing, not for receiving emails. The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.

You have been asked to set up the corporate email on several mobile devices for Dion Training's employees. The employees will use their mobile devices to check their email when out of the office, but they will also need to check their email from their desktop computers. Which of the following mail protocols should you configure to allow the employees to receive their mail and maintain the read/unread status across all of their devices?

IMAP Internet Message Access Protocol You should configure IMAP because it will leave the email on the server and allow for synchronizing the mail to all devices, including each email's read state. If you configure POP3, the mail is downloaded to the device and removed the mail from the server's mailbox by default. SMTP is used to send emails, not receive them. HTTPS is used for web browsing, not for receiving emails. The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.

You are trying to select the best device to install to proactively stop outside attackers from reaching your internal network. Which of the following devices would be the BEST for you to select?

IPS An intrusion prevention system (IPS) is a form of network security that detects and prevents identified threats. Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents, and capturing information about them. An IPS can block malicious network traffic, unlike an IDS, which can only log them. A proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. System Logging Protocol (Syslog) uses port 514 and is a way network devices can use a standard message format to communicate with a logging server. It was designed specifically to make it easy to monitor network devices. Devices can use a Syslog agent to send out notification messages under a wide range of specific conditions.

You work as a computer technician for a production company that travels worldwide while filming and editing music videos. Due to the nature of video editing, you will be building a video production workstation for the company that will have the maximum amount of RAM, an 8-core CPU, a dedicated GPU, and a redundant array of solid-state devices for storage. You are now determining which power supply to install in the system. What is the MOST important characteristic to consider when choosing a power supply?

Input voltage This question provides you with many details, but the key phrase in finding the answer is in the first sentence. This computer will be traveling worldwide, and the most important consideration will be the input voltage. If you choose a 120-volt power supply, it would be destroyed if plugged into a 240-volt outlet (commonly used outside the United States). Conversely, if you use a 240-volt power supply and plug it into a 120-volt outlet, it will not function due to the lower voltage. Therefore, you need to pick a power supply with dual voltage selection capability for maximum compatibility worldwide.

A network technician connects three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up, and the network technician can ping network devices in all of the office trailers. However, users are complaining that they are experiencing sporadic connectivity. What is the MOST likely cause of this issue?

Interference Microwave links require a direct line of sight (LoS) between the antennas to maintain a strong and effective link. These line-of-sight microwave link uses highly directional transmitter and receiver antennas to communicate via a narrowly focused radio beam. Since this microwave-based network is being run in a wooded area, there are likely some trees or leaves that are blocking the line of sight between the antennas. To solve this issue, they should trim the trees and branches to provide a clear light of sight or move the antennas to reestablish a clear line of sight. Latency is the time delay between when a packet is sent and received. While latency will increase with an obstructed microwave line of sight link, latency is an effect of this issue and not the cause of the issue. Throttling is the intentional slowing or speeding of an internet service by an Internet service provider to regulate network traffic and minimize bandwidth congestion. This again is not a cause of intermittent connectivity, but would instead occur if the microwave link was overutilized beyond its SLA contract limitations. Split horizon is a form of route advertisement that prohibits a router from advertising back a route to the same interface from which it learned it. This does not affect the issues experienced with the microwave line. Another way to approach this question is to use the process of elimination: throttling slows down the speed, and latency slows down speed even further. Split horizon prevents loops, so it only makes sense that interference is the correct choice since interference can cause drops in connections in many situations.

You are building a virtualization environment to host several secured Linux distributions as VMs. The VMs need to have access to the local corporate network and communicate with the host operating system, the other VMs, and the internal network clients. Still, they should not have access to the internet. Which of the following types of network connections should you configure for each VM?

Internal If you select internal, each VM can communicate between the host and the other VMs. If you select external, the VMs would have internet access. The private network connection type will create a switch that is usable only by the VMs. The VMs cannot use the switch to communicate with the host. If you select localhost, each VM could only communicate with itself.

Jason's laptop display appears to be extremely dim. He set the brightness to the highest level and attempted to adjust the control, but the image still appears extremely dim. Jason notices that if he points his smartphone's flashlight at the screen, then he can see the image better. Which of the following components on the laptop should he replace to fix this issue?

Inverter The inverter (also known as inverter board, screen inverter, or LCD inverter) is a part of the laptop's display assembly. The inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight. The digitizer is a touch-sensitive glass panel covering the LCD in a touchscreen assembly. The digitizer is used to convert touch events to digital signals that can be interpreted as different types of input. A liquid crystal display (LCD) panel is a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. The LCD panel is backlight by a cold cathode fluorescent (CCFL) bulb. A graphics processing unit (GPU) is a microprocessor used on dedicated video adapter cards or within a CPU with integrated graphics capability to handle the mathematical calculations required to create immersive and 3D graphics.

Using the image above, which of the following correctly identifies the fiber optic connector shown as Connector C?

LC connector This is an LC connector. A ST, SC, LC, or MTRJ connector is used to terminate a fiber optic cable. An LC, or Lucent connector, is a small form factor connector that combines the transmit and receive cables into a single square, snap-in connector. The F-type connector is used with coaxial cables, not fiber optic cables. An SC, or subscriber connector, is a general-purpose push/pull style connector that has a square, snap-in connector that latches with a simple push-pull motion. SC connectors are widely used in single-mode fiber optic systems. An ST, or straight tip, connector is a quick-release bayonet-style connector that has a long cylindrical connector.

What describes an IPv6 address of ::1?

Loopback In IPv6, ::1 is the loopback address. In IPv4, the loopback address is 127.0.0.1. The loopback address is used to send a test signal sent to a network destination to diagnose problems. A broadcast address is an IP address that is used to target all systems on a specific subnet network instead of single hosts. A multicast address is a logical identifier for a group of hosts in a computer network that are available to process datagrams or frames intended to be multicast for a designated network service. The address shown is not a broadcast or multicast address. A public address is routable over the internet but ::1 is a loopback address and therefore not publicly routable on the internet.

You and your friends are hanging out in a bar downtown and notice that the entire area around the bar has a great wireless network called "Downtown Metro." This wireless network was built by the city and currently covers about 5 square blocks of the downtown area. What type of network best classifies this wireless network?

MAN A metropolitan area network (MAN) is a computer network that interconnects users with computer resources in a geographic region of the size of a metropolitan or city area. This usually works by providing municipal broadband via Wi-Fi to large parts or all of a municipal area by deploying a wireless mesh network. A wireless mesh network (WMN) is a wireless network topology where all nodes, including client stations, can provide forwarding and path discovery to improve coverage and throughput compared to using just fixed access points and extenders. The typical deployment design uses hundreds of wireless access points deployed outdoors, often on poles. A local area network (LAN) is a network where all the nodes or hosts participating in the network are directly connected with cables or short-range wireless media. A personal area network (PAN) is a close-range network that is usually based on Bluetooth or NFC for communications between personal devices, such as smartphones, laptops, printers, and other peripheral devices. A wide area network (WAN) is a network that spans multiple geographic locations such as the internet. Wide area networks are often established with leased telecommunication circuits.

You work for the city's Department of Motor Vehicles (DMV). There are five DMV locations spread out across the city that you have been asked to connect with a network. You have created a list of requirements for this network, including that it must be wired and support at least 1 Gbps of bandwidth. Which of the following network types would MOST likely be used for the DMV to connect their internal networks across the city securely?

MAN Metropolitan Area Network You work for the city's Department of Motor Vehicles (DMV). There are five DMV locations spread out across the city that you have been asked to connect with a network. You have created a list of requirements for this network, including that it must be wired and support at least 1 Gbps of bandwidth. Which of the following network types would MOST likely be used for the DMV to connect their internal networks across the city securely?

Your company has recently migrated much of your data center to the cloud. Now, your boss needs a method to monitor all services used in supporting your customers to be properly billed based on their usage. Which of the following cloud computing concepts is your boss describing?

Measured Services Measured service is a term that IT professionals apply to cloud computing that references services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning. Rapid elasticity is used to describe scalable provisioning or the capability to provide scalable cloud computing services. Rapid elasticity is very critical to meet the fluctuating demands of cloud users. The downside of rapid elasticity implementations is that they can cause significant loading of the system due to the high resource number of allocation and deallocation requests. On-demand refers to the fact that a consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use.

Both Apple and Samsung have released their own version of contactless mobile payment solutions. For example, Apple Pay allows users to place their iPhone or Apple Watch within an inch of a credit card machine at a store to make a payment. Which of the following wireless technologies do these types of payment systems rely upon?

NFC NFC, or near-field communication, is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Infrared (IR) was a wireless networking standard supporting speeds up to about 4 Mbps with a direct line of sight for communications. Infrared sensors are used in mobile devices and with IR blasters to control appliances. While infrared (IR) used to be commonly used to connect wireless mice and keyboards to a laptop in the 1990s, it has fallen out of favor in the last 10-15 years since Bluetooth is more reliable and does not require a direct line of sight between the device and the laptop. Wi-Fi is the IEEE 802.11 standard for wireless networking based on spread spectrum radio transmission in the 2.4 GHz and 5 GHz bands. The standard has six main iterations (a, b, g, n, ac, and ax), describing different modulation techniques, supported distances, and data rates.

Both Apple and Samsung have released their own version of contactless mobile payment solutions. For example, Apple Pay allows users to place their iPhone or Apple Watch within an inch of a credit card machine at a store to make a payment. Which of the following wireless technologies does this type of payment system rely upon?

NFC. Near Field Communications NFC, or near-field communication, is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another.

Tamera was responding to a complaint that one of the employees is having problems with the wired network connection on their laptop. She investigated the issue to see why it will not connect to the network. Tamera looked at the indicator lights, but she doesn't see the blinking she expected to view. Instead, the light is steady. What is MOST likely the issue?

No network activity If the lights are steady on a network interface card (NIC), it indicates that there is no network activity. If it is blinking, this indicates that data is passing over the NIC to the network. Even if there were an incorrect TCP/IP configuration or intermittent connectivity, there would be blinking lights to indicate transmission attempts. Since this is a wired network connection, it cannot be a low RF signal as that is a wireless network problem.

Dion Consulting Group is working with a new laptop manufacturer. The manufacturer wants to create the thinnest and lightest laptops in the world. To do this, they need to choose the right technology for their displays. Which technology should Dion Consulting recommend to allow for the thinnest laptop displays?

OLED An OLED display works without a backlight because it emits visible light. Thus, it can display deep black levels and be thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions (such as a darker room), an OLED screen can achieve a higher contrast ratio than an LCD, regardless of whether the LCD uses cold cathode fluorescent lamps or an LED backlight. An in-plane switching (IPS) LCD panel uses technology designed to resolve the quality issues inherent in TN panel technology, including strong viewing angle dependence and low-quality color reproduction. A liquid crystal display (LCD) panel is a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. The LCD panel is backlight by a cold cathode fluorescent (CCFL) bulb. LCD panels are used on laptops and have replaced CRT monitors as the main type of computer display screen for desktops, as well. A light-emitting diode (LED) display is an LCD panel that uses a LED backlight instead of a CCFL backlight to provide its light source.

You are building a Desktop PC for a newly hired employee at Dion Training. The computer's motherboard doesn't have a wireless network adapter integrated into it, so you need to purchase an expansion card to provide this functionality. Which of the following motherboard connections will most likely be used to connect the wireless network adapter card?

PCIe x1 PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has several PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. Network adapters and Wi-Fi network cards almost exclusively rely on PCIe x1 expansion slots or a USB connection for their connectivity. Graphics cards usually rely on a PCIe x16 expansion slot. eSATA is an external SATA port used to connect an external storage device such as a hard drive. The accelerated graphics port (AGP) is a parallel expansion card standard that was originally designed for attaching a video card to a computer system to assist in the acceleration of 3D computer graphics. AGP has been replaced with PCIe due to its faster speeds.

Using the image of the motherboard above, which of the following correctly indicates the circled area?

PCIe x1 The area circled indicates the PCIe x1 slots. PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has some PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. PCIe x1 slots are usually used for external input/output devices such as network interface cards. For the exam, it is important that you can identify the different parts of the motherboard by sight.

Tim, a help desk technician, receives a call from a frantic executive who states that their company-issued smartphone was stolen during their lunch meeting with a rival company's executive. Tim quickly checks the MDM administration tool and identifies that the user's smartphone is still communicating with the MDM, and displays its location on a map. What should Tim do next to ensure the stolen device's data remains confidential and inaccessible to the thief?

Perform a remote wipe of the device To ensure the data remains confidential and is not accessed by the thief, Tim should perform a remote wipe of the device from the MDM. This will ensure any corporate data is erased before anyone accesses it. Additionally, Tim could reset the device's password, but if the thief can guess or crack the password, they would have access to the data. Identifying the smartphone's IP address is not a useful step in protecting the data on the device. Additionally, devices should be encrypted BEFORE they are lost or stolen, not after. Therefore, the option to remotely encrypt the device is provided as a wrong answer and a distractor.

Which of the following ports is used by SNMP by default?

Port 161 Simple Network Management Protocol (SNMP) Port SNMP 161 & 162 over UDP The simple network management protocol (SNMP) is a protocol for monitoring and managing network devices over UDP ports 161 and 162. A management system collates data sent by agents running on each device. The agents maintain a Management Information Base of configuration and usage data. An agent can also generate a trap, alerting the management system of some notable event. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53. The network basic input/output system (NetBIOS)/NetBIOS over TCP/IP (NetBT) is a session management protocol used to provide name registration and resolution services on legacy Microsoft networks and those using WINS. NetBIOS/NetBT operates on TCP/UDP ports 137 and 139.

Which of the following ports is used by SNMP by default?

Port 161 and 162 Simple Network management protocol over UDP The simple network management protocol (SNMP) is a protocol for monitoring and managing network devices over UDP ports 161 and 162. A management system collates data sent by agents running on each device. The agents maintain a Management Information Base of configuration and usage data. An agent can also generate a trap, alerting the management system of some notable event. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53. The network basic input/output system (NetBIOS)/NetBIOS over TCP/IP (NetBT) is a session management protocol used to provide name registration and resolution services on legacy Microsoft networks and those using WINS. NetBIOS/NetBT operates on TCP/UDP ports 137 and 139.

You are troubleshooting a workstation for a customer. The workstation will not boot. When it is powered on, an error message of "OS not found" is displayed on the screen. What is the MOST likely solution to fix this error?

Repair the GPT The "OS not found" error at boot time is an indication that the MBR (Master Boot Record) or GPT (Globally Unique ID Partition Table) is corrupted or faulty. If this occurs, you should reboot into the Windows recovery mode and use the 'bootrec /fixboot' command to fix the GPT. MBR (Master Boot Record) or GPT (Globally Unique ID Partition Table) is corrupted or faulty

Which of the following ports is used by the Service Location Protocol when organizing and locating printers, databases, and other resources in a network?

Port 427 The Service Location Protocol (SLP) is a protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network. This is an alternative protocol to LDAP in newer networks. SLP uses port 427. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443. The lightweight directory access protocol (LDAP) is a protocol used to access and update information in an X.500-style network resource directory. LDAP uses port 389. The server message block (SMB)/common internet file system (CIFS) is a protocol used for requesting files from Windows servers and delivering them to clients. SMB allows machines to share files and printers, thereby making them available for other machines to use. Samba software allows UNIX and Linux servers or NAS appliances to run SMB services for Windows clients. SMB operates on port 445.

Which of the following ports should you unblock at the firewall if your workstation cannot access http://www.diontraining.com but can access https://www.diontraining.com?

Port 80 HyperText Transfer Protocol (HTTP) is the basis for the World Wide Web. HTTP enables clients (typically web browsers) to request resources from an HTTP server. A client connects to the HTTP server using its TCP port (the default is port 80) and submits a resource request using a Uniform Resource Locator (URL). HTTPS (HTTP Secure) uses port 443. In this question, it states that the user can access HTTPS but not HTTP, indicating that port 80 is blocked. The server message block (SMB)/common internet file system (CIFS) is a protocol used for requesting files from Windows servers and delivering them to clients. SMB allows machines to share files and printers, thereby making them available for other machines to use. Samba software allows UNIX and Linux servers or NAS appliances to run SMB services for Windows clients. SMB operates on port 445. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53.

Which of the following locations are you likely to find the antenna wires located within a laptop or mobile device?

Positioned around the display panel The antenna wires for the wireless cards and cellular radios are usually routed around the screen within the casing of the laptop or mobile device. The antenna connections can be tricky to install/remove and are delicate. When updating or replacing a wireless or cellular card, the technician must be careful to reconnect the antenna wires and reinstall them in the proper location. External antennas are available only when connected to an external wireless card.

Dion Training uses a large laser printer to print documents in its office. The laser printer has recently begun creating printouts that contain a double image or ghost image appearance to them. Jason just printed out a test page: Which of the following components is most likely to cause a ghost image to appear on the printout such as the one above?

Printer Drum Double images or ghost printing occurs when an image or text is repeated more than once on a printed page. This often occurs due to an issue with the drum unit. If the drum unit is not being properly charged by the corona wire, ghost prints can become a problem with the unit.

Which of the following is a security concern with using a cloud service provider and could result in a data breach caused by data remnants?

Rapid Elasticity Rapid elasticity can be a security threat to your organization's data due to data remanences. Data remanence is the residual representation of digital data that remains even after attempts have been made to remove or erase it. So, when a cloud resource is deprovisioned and returned to the cloud service provider, it can be issued to another organization for use. If the data was not properly erased from the underlying storage, it could be exposed to the other organization. For this reason, all cloud-based storage drives should be encrypted by default to prevent data remanence from being read by others. Metered services are pre-paid, a-la-carte, pay-per-use, or committed offerings. A metered service like a database may charge its users based on the actual usage of the service resources on an hourly or monthly basis. For example, Dion Training used the AWS Lambda serverless product in some of our automation. This service charges us $0.20 for every 1 million requests processed. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. On-demand refers to the fact that a consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.

Your friend just gave you his old laptop. Whenever you turn on the laptop, though, a blank screen appears and asks you to enter an administrative password before the computer attempts to boot up. Unfortunately, your friend never gave you the password for this laptop. Which of the following actions should you take to resolve this issue and get past this password screen?

Remove the CMOS battery, wait a few minutes, reinsert the battery, then power on the laptop This blank screen asking for the administrative password appears to be a BIOS password required to be entered before the laptop is allowed to boot from the hard disk. Your best option is to clear the CMOS forcibly to remove the BIOS password from a workstation or laptop. To clear the CMOS, you must remove the CMOS battery from your computer, wait a few minutes, reinsert the CMOS battery, and then attempt to power on the computer again. This will cause the information stored in the CMOS (for example, BIOS settings and passwords) to be erased and restored to its default configuration. Removing and reinserting the laptop's battery will not reset the BIOS password. Disconnecting and reconnecting the hard drive will not reset the BIOS password.

Which of the following requirements should you consider when selecting the type of processors, storage, and RAM to utilize in a virtualization environment?

Resource requirements Before you purchase a system to use as a virtualization environment, you should look at the minimum requirements for all operating systems you intend to host as guest VMs. This will ensure you can balance the performance needed and maintain a smooth-running environment without numerous conflicts or issues.

A customer contacts the service desk because their laptop will not power on when plugged in, and the battery is dead. The service desk replaces its battery, connects it to a different power adapter, and the laptop works all day until the battery runs out. Now, the laptop won't turn on, and the battery won't charge. Which of the following do you recommend to solve this issue?

Replace the DC jack This scenario indicates that the DC jack is faulty. Since the battery was replaced and the laptop continues to work, this indicates it isn't a battery issue but is, instead, most likely a DC jack issue. The DC jack often gets broken on a laptop, and if the jack is broken, the device cannot charge or receive power from the power adapter or wall outlet.

Dion Security Group has established a Security Operations Center (SOC) that operates 24/7. They have several 65" plasma TVs at the front of the room that are used as computer displays to show open tickets. You turned off the televisions to clean the screens and noticed that the company logo is still visible in each of the screens' upper left corners. Which of the following should you do to correct this?

Replace the plasma TVs The logo in the upper left corner has been burned into the display since it is a static image. This is common with plasma displays and TVs. To fix this, you need to replace the TVs. If you plan to have a lot of static content on a display, you should use an OLED or LED display instead. If burn-in was experienced on old CRT monitors, you could run a degaussing program to erase the burn-in. Unfortunately, this will not work for plasma, LED, or OLED displays, though.

Using the image of the motherboard above, which of the following correctly indicates the circled area?

Reset jumper The area circled indicates the reset jumper on this motherboard. A reset jumper is a small plastic block with a metal connection inside. To reset the motherboard's BIOS, you would connect the jumper over this area to make an electrical connection between the two pins. For the exam, it is important that you can identify the different parts of the motherboard by sight.

Which of the following virtualization concepts refers to a VM's ability to have memory allocated for its use?

Resource pooling Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. Measured service is a term that IT professionals apply to cloud computing that references services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning. Using a synchronization app can allow the files to be stored on both the laptop and the cloud service while maintaining the latest versions in both places. This allows a user to synchronize content between all of their own devices and share their cloud storage content with other users. Multiple users can simultaneously access the content to work collaboratively, or they can access it at different times. Each user's changes are typically marked with a flag or color highlighting to indicate who made changes to what content. Virtual application streaming allows an application to be delivered to a workstation from the cloud.

Dion Training's video editing laptop has a defective keyboard. You have been asked to replace the keyboard. What type of cable should be connected to the internal laptop keyboard during your replacement?

Ribbon Cable The term ribbon cable refers to any cable with wires that run parallel on a flat plane down the length of the cable. Ribbon cables are typically used to connect internal components in laptops to save space. These laptop ribbon cables are usually hardwired into one component and connect to the motherboard or other components with a small connector clip. These can be tricky to use and you should take care not to damage the tiny plastic components that secure the clip in place.

Using the image above, which of the following correctly identifies the fiber optic connector shown as Connector?

SC connector

You have been asked to set up the corporate email on several mobile devices for Dion Training's employees. The employees will use their mobile devices to send their emails when out of the office. Which of the following mail protocols should you configure to allow the employees to send their mail?

SMTP Simple Mail Transfer Protocol/ Port 25 You should configure SMTP since it is the only protocol used to send emails. POP3 and IMAP are used to receive emails. HTTPS is used for web browsing, not for receiving emails.

Using the image above, which of the following correctly identifies the fiber optic connector shown as Connector?

ST connector

Which cloud computing concept is BEST described as focusing on the replacement of applications and programs on a customer's workstation with cloud-based resources?

SaaS Software as a Service Software as a Service (SaaS) is ca loud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions. Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center. Platform as a Service (PaaS) is a cloud computing service that enables consumers to rent fully configured systems that are set up for specific purposes. Desktop as a Service (DaaS) provides a full virtualized desktop environment from within a cloud-based service. This is also known as VDI (Virtualized Desktop Infrastructure) and is coming in large enterprise businesses focused on increasing their security and minimizing their operational expenses.

Which cloud computing concept is BEST described as focusing on the replacement of applications and programs on a customer's workstation with cloud-based resources?

SaaS Software as a Service Software as a Service (SaaS) is ca loud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs.

The speed at which the cursor moves across the screen can sometimes make it difficult to control. Which setting could be used to slow down the cursor when using a Windows 10 laptop with a touchpad?

Settings,>Devices>Touchpad>Speed First, open Settings, and click/tap on the Devices icon. Then, click/tap on Touchpad on the left side. On the right side of the screen, adjust the slider labeled "Change the cursor speed" to a speed that is more comfortable to use.

Which of the following devices have most of the same functionality as a personal computer but can be operated with a single hand?

Smartphone A smartphone is a device with roughly the same functionality as a personal computer operated with a single hand. Most smartphones have a screen size between 4.5" and 5.7". Leading smartphones provide high-resolution screens. Smartphones have fast multicore CPUs, anywhere between 2 and 6 GB system memory, and 16 GB+ flash memory storage. They come with premium front and back digital cameras, input sensors like accelerometers, and Global Positioning System (GPS) chips. They can establish network links using Wi-Fi and a cellular data plan. A high-end smartwatch (for example, an Apple Watch) will allow the user to see their notifications, chat activity, and even make phone calls. A mid-range or low-end smartwatch can still have the ability to read your chat and notifications, but you may be unable to make phone calls from it. A smartwatch is not a replacement for a laptop or desktop, but a high-end smartphone can be.

Which of the following is used to capture the logs from different devices across the network to correlate different events across multiple servers and clients?

Syslog server A Syslog server is used to capture logs from different devices. It allows for the correlation of logs to simplify log review and an analyst's ability to respond to alerts. For example, Syslog messages can be generated by Cisco routers and switches, servers and workstations, and collected in a central database for viewing and analysis. A proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. The Domain Name System (DNS) uses port 53 and is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. The Dynamic Host Configuration Protocol (DHCP) uses port 67 and is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client-server architecture.

Which of the following statements about the 5.0 GHz wireless frequency used by Wi-Fi is correct?

The 5.0 GHz frequency is less effective at penetrating solid surfaces than 2.4 GHz The longer wavelength of 2.4 GHz makes it better at propagating through solid surfaces than the 5.0 GHz frequency. The 2.4 GHz frequency has a longer wavelength than the 5.0 GHz frequency. The longer wavelength gives it the ability to cover a longer range using the same power output levels as the 5.0 GHz frequency. The 5.0 GHz frequency supports higher data rates than the 2.4 GHz frequency due to lower levels of congestion and interference. The 5.0 GHz frequency has more individual channels giving it less congestion and interference than the 2.4 GHz frequency.

Your computer keeps losing track of time and the date in the system. Which of the following is MOST likely causing this issue?

The CMOS battery is dead and needs to be replaced Most motherboards (especially older ones) have a small coin-sized battery installed on them to power the CMOS RAM when the computer is powered down. This is where the BIOS settings and date/time are saved when power is removed from a workstation. If a computer continually loses track of the day/time, this is a classic sign that the CMOS battery is dead and needs to be replaced. Please note that some newer motherboards have replaced the need for a CMOS battery by replacing it with an area of nonvolatile memory used instead to store the BIOS settings and the date/time.

On Tuesday evening, the company just pushed a new Windows 10 security update to all of its workstations. On Wednesday morning, the help desk receives numerous complaints about the network being slower than normal. Previously, the network was baselined at 1 Gbps as each workstation uses a wired CAT 6 connection. Today, a technician ran a speed test and saw the network was only reaching speeds of 100 Mbps. Which of the following is the MOST likely cause of the network slowdown?

The network card drivers were updated last night Often, security updates, patches, and upgrades will reconfigure a network card's drivers during a Windows security update. If this happens, the system may revert to a more generic version of the driver, decreasing speeds from 1 Gbps to 100 Mbps. The network card's drivers should be rolled back to the previous driver to restore functionality and correct it. If there were configuration changes to the DNS or DHCP server, it would limit connectivity completely instead of simply slowing down the connection. If the network changed from DHCP to static assignments, the workstations would not get an APIPA address and would not have connected to the network at a slower speed.

Which of the following types of USB connections can support up to 4.5 watts of power per connected device?

USB 3.0 USB 3.0 can support providing up to 4.5 watts of power per connected device. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at the slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power.

Using the image above, which of the following correctly indicates the port labeled as J?

USB 2.0 These ports are the USB 2.0 connections. This is indicated by their black color (instead of being red or blue for USB 3.0 ports). Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at a slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power. For the exam, it is important that you can identify the different parts of a motherboard's rear port cluster by sight.

Which of the following types of USB connections can support data rates of up to 480 Mbps?

USB 2.0 USB 1.0/Low-Speed: 1.5 Megabits per second (Mbps) USB 1.1/Full-Speed: 12 Mbps USB 2.0/Hi-Speed: 480 Mbps USB 3.0/SuperSpeed: 5 Gbps USB 3.1/SuperSpeed: 10 Gbps USB 2.0 can support data rates up to 480 Mbps. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at a slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power.

Which of the following types of USB connections can support data rates of up to 480 Mbps?

USB 2.0 USB 2.0 can support data rates up to 480 Mbps. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at a slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power.

You are connecting a laptop to a brand new digital high definition TV. Unfortunately, the laptop is a little outdated and only has an analog display output. Which of the following adapters could you use to convert the signal from analog to digital for use with the new television?

VGA to DVI-D Connects Analog to Digital Since this question asks you to select the converter that can convert a signal from analog to digital, you need to consider which of the connectors are analog and digital. S-Video, RCA, and VGA are all analog. HDMI and DVI-D are both digital. Therefore, the correct answer is VGA (analog) to DVI-D (Digital). HDMI to VGS would be digital to analog. S-Video to RCA would be analog to analog. DVI-D to HDMI would be digital to digital.

Which of the following is the MOST dangerous type of threat when using virtualization?

VM escape VM escape refers to malware running on a guest OS jumping to another guest or the host. As with any other software type, it is vital to keep the hypervisor code up-to-date with patches for critical vulnerabilities. VM escape is the biggest threat to virtualized systems. A virtual network interface card (vNIC) represents the configuration of a VM connected to a network. A VM can be configured to have multiple vNICs. A rogue VM is one that has been installed without authorization. VM sprawl is the uncontrolled deployment of more and more VMs.

Dion Training has recently purchased a new wireless printer and has asked you to configure it in their office. You have installed the necessary printer drivers on your workstation and have plugged the printer into the power outlet. You just configured the printer to connect to the guest wireless network. Next, you try to print a test page, but nothing prints out. Which of the following is the most likely cause for the printer not printing the test page?

You connected the printer to the guest wireless network instead of the corporate wireless network Most corporate wireless networks are configured as two separate networks: one for the corporate wireless network traffic and another for any guests that might connect to the wireless network while visiting your offices. These two wireless networks are isolated from each other, so if you connect the printer to the guest wireless network then the workstations will be unable to reach the printer and print out any documents or test pages.

Which of the following is an open-source wireless communication protocol operating in the 2.4 GHz frequency band and is primarily used for home automation?

Zigbee Zigbee is an open-source wireless communication protocol used for home automation. Zigbee is open-source, unlike Z-Wave, which is proprietary. Zigbee uses the 2.4 GHz frequency band. This higher frequency allows more data bandwidth at the expense of range than Z-Wave and the greater risk of interference from other 2.4 GHz radio communications. Zigbee supports more overall devices within a single network (65,000 compared to 232 for Z-wave), and there is no hop limit for communication between devices. Z-wave is a low-power wireless communications protocol used primarily for home automation. Z-wave uses radio frequencies in the 800 MHz and 900 MHz frequency ranges. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another.

Which of the following statements about an eSATA connection is correct?

eSATA is used to add additional external storage devices The External Serial Advanced Technology Attachment (or eSATA) is used for connecting external drives to provide additional storage. When connecting a cable to an eSATA port, you must use a shielded cable. SATA is an internal connector for adding storage, while eSATA is reserved for external use. USB 3.0 can operate at speeds up to 5 Gbps, while eSATA can operate at speeds of up to 6 Gbps.

Which of the following synchronization methods does NOT work with Android devices?

iTunes Android devices can use Gmail to sync emails and contacts. Android devices can also use Office 365 to sync emails, contacts, and other files if you are a Microsoft subscriber. Android devices can use Flickr to sync photos. Android can not use iTunes to perform synchronization functions. The iTunes application only works with Apple devices, such as iPhones and iPads.

Jason has just returned to his office after vacation and is attempting to access diontraining.com. He receives an error that he cannot connect to the website. He then tries to connect to the company's local intranet server, which he can connect to without any issues. Next, he pings the IP address for diontraining.com and gets a successful connection. Finally, he tries to ping diontraining.com by its domain name, and then he receives an error. Which of the following commands should Jason enter NEXT to try and resolve this issue

ipconfig /flushdns Whenever you have an issue where you can ping the server's IP, but you cannot access it by its domain name, it has something to do with DNS. Being able to troubleshoot issues with internet connections is an important part of being an IT technician or administrator. The ipconfig /flushdns command provides you with a means to flush and reset the contents of the DNS client resolver cache. During DNS troubleshooting, if necessary, you can use this procedure to discard negative cache entries from the cache, as well as, any other dynamically added entries. Resetting the cache does not eliminate entries that are preloaded from the local Hosts file. To eliminate those entries from the cache, remove them from the hosts.ini file instead.


Kaugnay na mga set ng pag-aaral

4.1 - 4.5 — The Renaissance and Reformation

View Set

Maryland Real Estate Practice And Law 13th Ed. Ch 3

View Set

Which Word to Use? - Ware, wear, where, were, we're

View Set

CS 110 - Midterm Study Notes - Part 1

View Set

Identify the survivorship curve described in each of the following

View Set

Introduction To Activated Sludge Study Guide

View Set