SkillSoft Exam Practice

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

If you are purchasing a micro-ATX motherboard, how many PCI expansion cards should you be able to install? A. 4 B. 10 C. 1 D. 7

4 Notes: micro-ATX motherboard maximum of four PCI cards ATX motherboard = seven PCI slots mini-ITX motherboards = one PCI slot.

You want to implement Software Defined Networking without adding any extra on-premises hardware for your cloud applications. Your solution should offer zero provisionings. Which of the following should you implement? A. Network-as-a-service (Naas) B. SaaS (Software-as-a-Service) C. Cloud-based network controller D. PaaS (Platform-as-a-Service)

UNKNOWN

Refer to the exhibit. Identify the main power connector in the exhibit.

1 Notes: The connector labeled as 1 is the main power connector. It is a set of 20+4 connectors, which operate at +3.3V, +/- 5V, and +/- 12V. The 20-pin connector is used with the motherboard, and the 4-pin connector is free and can be used to provide additional 12V to the processor if required. The connector labeled as 2 is 4-pin Molex power connector. Number 3 is the SATA power connector. Number 4 is a 6-pin PCIe power connector. Number 5 is the 4-pin CPU power connector. Number 6 is a 4-pin floppy power connector.

You are creating a document in MS Word, and the cursor jumps from its location on a regular basis. Which of the following settings must you configure to correct this issue? Answers A. Touchpad B. Mouse C. MS Word D. Screen resolution

A. Touchpad Notes: In this scenario, you need to configure the touchpad settings. You might also update the device drivers for touchpad.MS Word does not control the mouse, and therefore, it cannot cause the mouse to jump. The mouse settings do not have any configuration that controls the mouse jumping from one location to another location. Screen resolution is measured in width x height in pixels. It has nothing to do with the mouse.

Refer to the exhibit. Identify the image(s) that have distorted geometry. A. 2 and 3 B. 1 and 3 C. 1 and 2 D. 1, 2, and 3

A. 2 and 3 The image number 1 is a normal projected image. Images 2 and 3 are distorted geometry images. Image 2 has a horizontal distortion. The right side of the screen is closer to the projector. Image 3 has a keystone distortion in which the bottom of the screen is closer to the projector.

What is the number of pins in a SATA 2.5 drive? A. 44 B. 40 C. 50 D. 48

A. 44 Notes: A SATA 2.5 drive has 44 pins.SATA 3.5 drives have 40 pins. Remaining pins are not used by any other drives.

You have several laptops that have 2 GB DDR2 memory modules installed. You need to upgrade the memory in these laptops. You want to utilize the existing memory modules. What should you do? A. Add more DDR2 memory modules in the empty slots B. Replace DDR2 memory modules with DDR3 memory modules C. Add DDR3 memory modules in the empty slots D. Replace the existing 2 GB DDR2 memory modules with 4 GB DDR2 memory modules

A. Add more DDR2 memory modules in the empty slots Notes: In the given scenario, you add more DDR2 memory modules in the empty slots. DDR2 and DDR3 are electrically incompatible with each other. Along with this difference, there are two key differences in the design: 1. Key notch is located differently in both the memory modules. 2. DDR2 has round notches on both the sides and DDR3 has square notches on both the sides. You cannot replace DDR2 with DDR3 because of the differences mentioned above. Therefore, DDR2 and DDR3 cannot work together. If you need to upgrade to DDR3, then you will need to replace the motherboard in the laptops. The scenario states that you need to utilize the existing memory modules and therefore, you should add more DDR2 memory modules in the empty slots to ensure all of the existing memory modules are utilized.

If overclocking is enabled on a processor, which of the following considerations should you make? [Choose all that apply.] A. Adequate power from the motherboard B. System stability C. Adequate cooling D. The higher amount of RAM E. Higher I/O

A. Adequate power from the motherboard B. System stability C. Adequate cooling Notes: Each manufacturer sets a clocking rate on the CPU. If you enable overclocking, the processor is going to run faster, but it will require more power from the motherboard and also will generate heat. Excessive heat can cause permanent damage to a system.Overclocking is known to cause errors, and therefore, system stability can also be a concern. Higher I/O and higher amount of RAM is not a point of consideration with overclocking.

Which of the following can cause the No boot device error? [Choose all that apply] A. Bad CMOS battery B. Missing master boot record (MBR) C. SMART not enabled D. Missing active partition E. Slow spinning hard drive

A. Bad CMOS battery B. Missing master boot record (MBR) D. Missing active partition

You connect a monitor to a system. When you power on the system, you do not see any image on the screen. You verify several times, but there is no display. Which of the following actions should you perform to rectify this problem? [Choose all that apply] A. Check the seating of the display adapter B. Check the monitor connectivity with the system C. Turn off the monitor and turn it on again D. Replace the monitor with another monitor

A. Check the seating of the display adapter B. Check the monitor connectivity with the system D. Replace the monitor with another monitor Notes: There are three actions that you should perform. First, check the monitor connectivity with the system. You could also check the seating of the display adapter. Another task that you can perform is to replace the monitor with another working monitor and see if it works. Since the monitor is not displaying anything in this scenario, most likely, the monitor is a non-functional one and therefore, turning it on and off will not work. It could be a hardware fault with the monitor, and therefore, it is unable to display anything.

If fast forward and previous buttons aren't working in Windows Media Player, which of the following methods can be used to attempt to resolve this problem? [Choose all methods that apply] A. Clear the Windows Media Player database cache files B. Run Troubleshooter and select Windows Media Player C. Turn Windows Media Player off as a feature and then turn it on D. Clear the Windows Media Player database

A. Clear the Windows Media Player database cache files B. Run Troubleshooter and select Windows Media Player C. Turn Windows Media Player off as a feature and then turn it on D. Clear the Windows Media Player database Notes: You can attempt the following resolution as mentioned in the scenario: Turn Windows Media Player off as a feature and then turn it on Clear the Windows Media Player database cache files Clear the Windows Media Player database Run Troubleshooter and select Windows Media Player

If you install an analog wireless camera at home and it works at 2.4 GHz frequency, which of the following is likely to cause interference? [Choose all that apply] A. Cordless phone B. Routers C. Video game controllers D. Microwave

A. Cordless phone B. Routers C. Video game controllers D. Microwave Notes: The analog wireless cameras work at three different speeds: 900 MHz, 2.4 GHz, and 5.8 GHz. Most common ones work at 2.4 GHz. Microwave, cordless phone, video game controllers and routers work at the same speed and therefore, can cause interference with the analog wireless cameras.

Refer to the exhibit. Identify the connector shown in the exhibit. A. Micro-USB B. USB-C C. Mini-USB D. Lightning

A. Micro-USB Notes: The exhibit displays the Micro-USB connector, which is similar in shape to Mini-USB but is thinner. It serves the same purpose as Mini-USB, which is no longer common. It was mainly used with mobile devices for charging and data transfer. A lightning connector can also be inserted only one way, and it works only with the Apple devices, such as iPhone. USB-C connector, which is inserted into the mobile, is reversible and does not have up or down orientation, which was the problem with the Micro-USB and Mini-USB chargers.

You have connected your laptop with your TV using the HDMI cable. You want to watch a movie on the TV that is stored on the laptop. However, you are not able to see anything on the TV. Which of the following methods can help you resolve this problem? [Choose all that apply.] A. Disconnect the cable from both the end, reboot the laptop, keep the TV on, and then connect the cable to both the end B. Keep the TV off, connect the laptop and then reboot the laptop C. Keep the TV on, connect with the laptop and then reboot the laptop D. Keep the laptop on while keeping the cables connected at both the ends and then switch off and switch on the TV

A. Disconnect the cable from both the end, reboot the laptop, keep the TV on, and then connect the cable to both the end B. Keep the TV off, connect the laptop and then reboot the laptop C. Keep the TV on, connect with the laptop and then reboot the laptop D. Keep the laptop on while keeping the cables connected at both the ends and then switch off and switch on the TV Notes: To troubleshoot the HDMI connection from laptop to the TV, you can try the following methods: Keep the TV on, connect with the laptop and then reboot the laptopKeep the TV off, connect with the laptop and then reboot the laptopKeep the laptop on while keeping the cables connected at both the ends and then switch off and switch on the TVDisconnect the cable from both the end, reboot the laptop, keep the TV on, and then connect the cable to both the end If none of these methods work, then you can try replacing the cable and then verify if the connections between both the devices work.

On a laptop, which of the following could be reasons for no wireless connectivity? [Choose all that apply] A. Enabling Airplane mode B. Having limited wireless connectivity C. Pressing the wireless push button D. Enabling Bluetooth

A. Enabling Airplane mode C. Pressing the wireless push button Notes: You can have no wireless connectivity on a laptop if you enable the Airplane mode or press the wireless push button, which is usually pressed along with the Fn key. Either one of these methods can lead to no wireless connectivity.Enabling Bluetooth does not lead to no wireless connectivity. Having limited wireless connectivity still allows you to connect to the wireless network even though the connection may break due to weak signals.

You have successfully resolved a critical issue in a system. The customer has also verified the solution and is satisfied with it. What else should you do next? Answers A. Get a sign-off from the customer B. Verify full system functionality C. Document the problem and solution D. Implement preventative measures

A. Get a sign-off from the customer B. Verify full system functionality D. Implement preventative measures Notes: After resolving an issue, you need to verify the full system functionality. This is required to ensure that the solution you implemented has not impacted any other functionality. You should also implement preventative measures, such as updating the antivirus or device drivers. You should also ensure the system is updated with the latest patches using Windows Update. At the end of this stage, it is critical to get customer sign-off. This ensures that the customer is satisfied with the solution.Documenting the problem and solution stage occurs after the system functionality has been verified, and preventative measures have been implemented.

You have been asked to implement an 802.11n wireless network. The key requirement is that the wireless network should provide maximum performance. How should you implement this wireless network? A. Implement it in the Greenfield mode B. Implement in the Legacy mode C. Implement it in the Mixed mode D. Implement it in the single mode at 2.4 GHz

A. Implement it in the Greenfield mode Notes: 802.11n is an amendment that improves upon the previous 802.11 standards by adding multiple-input-multiple-output (MIMO) antennas. 802.11n operates on both the 2.4 GHz and the 5 GHz bands. To get the maximum performance from the 802.11n wireless network, you need to implement it in the Greenfield mode that will operate in the high throughput mode. The Legacy mode allows it to be backward compatible with the only 802.11 a, b, and g devices. The Mixed mode allows it to be compatible with 802.11 a, b, g, and n.

Which of the following could be the key reason for oversized images and icons on the monitor? A. Incompatible monitor resolution B. Display drivers C. Bad monitor cable D. Corrupt operating system

A. Incompatible monitor resolution B. Display drivers Notes: The two key reasons for oversized images and icon on the monitor: Windows is unable to load the device drivers for the graphics adapter and therefore, loads the default device drivers with the lowest resolution Monitor resolution is incompatible with the system settings

In which of the following devices are you likely to use an SD card with the dimensions 32x24 mm by directly inserting in? [Choose all that apply] A. Laptop B. Digital cameras C. Netbook D. Desktop

A. Laptop B. Digital cameras C. Netbook Notes: In the following devices, you can use an SD card of the dimension 32x24 by directly inserting it into the relevant slot: netbook, laptop, and digital cameras.To insert it into a desktop, you will need an SD card reader.

If you are using the Zigbee protocol, which of the following types of network is being used? A. Mesh B. Bus C. Ring D. Star

A. Mesh Notes: A mesh network topology is one in which the intermediary network devices are connected directly, but not hierarchically to as many other nodes as possible. They cooperate in such a way so that they can route traffic in the most efficient manner. A full mesh network is one where each network node is connected to all other nodes in the network. This is the most reliable and redundant network topology as it provides the most alternative routes from any source to any destination. Zigbee is not implemented in star, Bus, or Ring topology. A ring topology is a bus topology in a closed loop where data travels around the ring in one direction. When one node sends data to another, the data passes through each intermediate node on the ring until it reaches its destination. A bus network topology is one where each node is connected to a single cable using specialized interface connectors. This central cable is the mainstay of the network and is known as the bus. A signal from the source travels in both directions to all apparatuses connected on the bus cable until it finds the intended recipient. In a network star topology, each network host is connected to a central network device with a point-to-point connection. So, it can be said that every host is indirectly connected to every other host with the help of the central network device.

Refer to the exhibit. Identify the component labeled as 1. A. Scraper B. Precision cutting knife C. Screwdrivers D. Tweezers E. Precision cutting knife F. Pry bars

A. Scraper

Your system is unable to detect the hard drive a few times when you boot it up. Other times, the hard drive is detected without any problem. When you connect the hard drive using the same cable with another system, this issue does not occur. Which of the following could be causing this problem? A. Motherboard B. RAM C. Processor D. Power supply

A. Motherboard Notes: Since the hard drive is checked in another system using the same cable, it cannot be an issue with the hard drive or the cable. This leaves the only motherboard which may have bad or intermittently working hard drive sockets. This issue generally occurs due to circuitry issues on the motherboard. You should replace the motherboard immediately. RAM, processor and power supply do not cause this issue.

You are not getting any sound from the built-in speakers in your laptop. You have verified in Device Manager that the speakers are enabled. What could the possible causes for this? [Choose all that apply.] A. Mute is turned on. B. Speakers are powered off. C. Speakers are not connected properly. D. Laptop volume is turned down

A. Mute is turned on. D. Laptop volume is turned down Based on the scenario, there could be two possible reasons for not getting the sound from speakers: either the volume is turned down, or speakers are muted. In this scenario, the speakers are working fine as you have verified in the Device Manager. Therefore, it could only be the issue with the volume. Since these are inbuilt speakers, there is no issue with the connectivity, and they cannot be powered off.

Which of the following can be the cause for continuous reboots of a system? [Choose all that apply] A. Overheating CPU B. Corrupt Windows installation C. Power supply D. Power brownouts E. Bad device drivers

A. Overheating CPU B. Corrupt Windows installation C. Power supply D. Power brownouts E. Bad device drivers Notes: The following can be the reasons for continuous reboots: Corrupt Windows installation Overheating CPU Bad device drivers Power supply Power brownouts

To read a CompactFlash card, which of the following methods do you use? [Choose all that apply] A. PC card slot with a plug adapter B. FireWire C. As an ATA (IDE) D. PCMCIA storage device with a reader E. USB

A. PC card slot with a plug adapter B. FireWire C. As an ATA (IDE) D. PCMCIA storage device with a reader E. USB Notes: A CompactFlash card can be read in the following way: In a PC card slot with plug adapter As an ATA (IDE) PCMCIA storage device with a reader USB FireWire

You boot up a system, but it does not power on. You notice that the power supply fan is spinning. Which of the following could be causing this issue? [Choose all that apply] A. Power supply B. Motherboard C. RAM D. Processor

A. Power supply B. Motherboard Notes: This issue can be due to a faulty motherboard or power supply. If the power supply is not able to provide power to the motherboard in the right manner, then the motherboard cannot function. This issue can also be due to a faulty motherboard.RAM and processor if they are faulty, then post beeps will indicate the problem.

Which of the following are valid reasons to choose to use 802.11n/ac over 802.11g? [Choose two.] A. Provides larger channel bandwidths per user B. Use of 5GHz frequencies incur less interference C. 802.11g provides higher bandwidths D. Use of 2.4GHz frequencies provide more bandwidth and less interference

A. Provides larger channel bandwidths per user B. Use of 5GHz frequencies incur less interference Notes: 802.11n and 802.11ac provide higher end-user throughput and take advantage of the 5GHz frequency range and its lesser vulnerability to interference. Larger channel bandwidths are also available as channel binding is a feature of these standards.

You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is listening on port number 161 for network events. Which network monitoring protocol is in use? A. SNMP B. RMON C. Netmon D. SMTP E. CMIP

A. SNMP Notes: Simple Network Management Protocol (SNMP) is an Internet standard agreement for collecting and organizing data about managed devices on IP networks and for manipulating that information to change device behavior. SNMP uses port 161. SMTP is meant for mail transfer and uses port 25. RMON is mainly used to monitor and analyze packets of CSS Ethernet ports. CMIP uses port 163 and 164. Netmon uses port 2606.

You have a network that uses the 192.168.0.1 IP range and has 50 systems. If you need to assign a static IP address to a system that will connect to the Internet using the proxy server using its name, which of the following configuration must be done on the system? [Choose all that apply] A. Subnet mask B. DNS server C. IPv4 address D. IPv6 address E. Gateway

A. Subnet mask B. DNS server C. IPv4 address E. Gateway Notes: Show explanation Show answer To meet the requirements in the given scenario, you need to assign the following configuration:IPv4 addressSubnet maskGatewayDNS serverYou do not need to assign an IPv6 address. The scenario states that it is an IPv4 network because it uses 192.168.0.1 address.

If you have connected the printer to your laptop and want to share it with the other users, which of the following requirements must be met? [Choose all that apply.] A. The laptop must be on. B. The printer must be connected using a USB cable C. Users must have permissions. D. The printer must be powered on.

A. The laptop must be on. C. Users must have permissions. D. The printer must be powered on. Notes: If you need to share a printer connected with your laptop, you need to ensure that the following requirements are met: The laptop must be on.Users must have permissions.The printer must be powered on. It is not necessary that the printer must be connected with a USB cable. You can also have a serial connection with the laptop if it has a serial port.

You have upgraded from a 3G to a 4G SIM card. However, when you insert the new SIM into your mobile device, you only get a 3G connection. Which are the most likely causes? [Choose two.] A. The mobile device is set to use 3G. B. The mobile device does not support 4G connectivity. C. The service provider is providing only 3G connectivity. D. A wrong service provider is configured on the mobile.

A. The mobile device is set to use 3G. B. The mobile device does not support 4G connectivity. Notes: After inserting the 4G SIM into the mobile device, if you are still getting 3G connectivity, there can be two primary reasons: The mobile device is set to use 3G The mobile device doesn't support 4G connectivity

Which of the following are drawbacks of a using 7200rpm hard drive instead of a 5400rpm hard drive? [Choose all that apply.] A. They tend to be more expensive. B. They produce more heat. C. They produce more noise.

A. They tend to be more expensive. B. They produce more heat. C. They produce more noise Notes: As 7200rpm hard drives are spinning faster, they produce more heat than a 5400rpm hard drives. In turn, this also produces more noise. Also, the price of 7200rpm hard drives tends to be higher than 5400rpm hard drives, due to the higher speeds and better functionality.

You need to run several desktop applications on a system. You also want to store the data locally. To be able to meet these requirements, which of the following type of system would be appropriate? A. Thick client B. Dumb terminal C. Thin client D. Home Server PC

A. Thick client Notes: You need to have a thick client. It can run the applications and store data locally. A thin client cannot run the applications locally and store data. Similar to a thin client, a dumb terminal does not store data or runs applications locally. Home Server PC is meant for media streaming and sharing files and printers.

Which of the following can be the reasons for paper jams in a laster printer? [Choose all that apply.] A. Transfer rollers are worn out. B. Imaging drum is worn out C. Developer roller is defective. D. Incorrect paper size is being used.

A. Transfer rollers are worn out. D. Incorrect paper size is being used. Notes: For paper jam in a laser printer, there are two main reasons: either the incorrect paper size is being used, ir the transfer rollers are worn out. Defective imaging drum will not print correctly. A defective roller will not be able to supply toner to the image drum.

Which USB standards are compatible with a USB C-Type cable? A. USB 3.0 B. USB 1.1 C. USB 3.1 D. USB 2.0

A. USB 3.0 C. USB 3.1 D. USB 2.0 Notes: USB Type-C connectors are compatible with the newest USB protocol (USB 3.1), in addition to older USB protocols (USB 2.0 and 3.0). To connect to devices that use older USB protocols and connectors (Type A and B), you will need to use a special cable or adapter that has been specifically designed for that type of connection.

You are designing a new Ethernet network for the first time. Your manager has asked you not to use UTP cabling. What could be the possible reasons? [Choose three.] A. UTP cables will be laid near the fluorescent lighting. B. Cables longer than 100 meters are required. C. There are high voltage cables running nearby. D. UTP cables paths run a parallel to fiber optic cables. E. Cables will need to run perpendicular to high voltage cable.

A. UTP cables will be laid near the fluorescent lighting. B. Cables longer than 100 meters are required. C. There are high voltage cables running nearby. Notes: Unshielded Twisted Pair (UTP) is a type of wiring in which two conductors of a single circuit are twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources. UTP cables for Ethernet have four twisted pairs. Although the twisting does reduce EMI interference, UTP cables for Ethernet should never run parallel to high voltage cables nor near Fluorescent lighting as this can cause interference. UTP provides Ethernet functionality for up to 100-meter cables runs.

Which of the following method should you use to ensure the printer is safe from the unauthorized users? [Choose all that apply.] A. Use printer drivers with encryption B. Disable remote printing C. Lock the printer configuration D. Encrypt the printer hard drive

A. Use printer drivers with encryption B. Disable remote printing C. Lock the printer configuration D. Encrypt the printer hard drive Notes: Following methods can be used to secure a printer from unauthorized users: Use printer drivers with encryption Encrypt printer hard drive Lock the printer configuration Disable remote printing

Which of the following can cause slow transfer speeds from a Web server on the Internet? [Choose all that apply] A. Virus on the local system B. Hard drive fragmentation the local system C. Too little space on the hard drive of the local system D. Overload on the Internet connectivity

A. Virus on the local system D. Overload on the Internet connectivity Notes: There are two primary causes for the slow transfer speeds: Overload on Internet connectivity Virus on the local system When there is an overload on the Internet connectivity, the bandwidth is distributed amongst various users connected to the Internet. As a result, each user gets only a small portion of the bandwidth and therefore, experiences slow internet speeds. A virus on the local system can also play the trick by consuming the system resources, that might include the bandwidth, which the user does not know.Hard drive fragmentation would cause slow read and write speed but does not impact the transfer speed. Too little space on the hard drive also does not impact the transfer speed. It may interrupt the download if there is no space left.

Identify the components that can cause ghost images on a printout in a laser printer:Toner cartridgeImaging drum wiper bladeFusing unit A. 1 and 2 B. 1, 2, and 3 C. 1 and 3 D. 2 and 3

B. 1, 2, and 3 Notes: Following components can cause ghost images on a printout: Toner cartridge Imaging drum wiper blade Fusing unit

You need to implement an IEEE 802.11 standard wireless network with maximum data rates of over 3Gbps and operates at the 5GHz frequency band. You will need to connect a printer to this network for the users to use. Of the given choices, which of the following would meet your requirement? A. 802.11n B. 802.11ac C. 802.11a D. 802.11b E. 802.11g

B. 802.11ac Explanation: IEEE 802.11ac is an amendment that improves upon the previous IEEE 802.11 standards. Characteristics of this standard include the introduction of wider channels (80 or 160 MHz compared to 40 MHz for 802.11n) in the 5 GHz band, more spatial streams (up to eight) and the addition of Multi-user MIMO (MU-MIMO).

Which of the following could be digitizers? A. A mechanical keyboard B. A graphics tablet C. A laptop touchpad

B. A graphics tablet C. A laptop touchpad Notes: A digitizer device creates a digital representation of analog information it receives. Graphics tablets and laptop touchpads convert the analogue touch input into visible output into a document. A mechnical keyboard does not use the same technology as a digitizer.

You have an e-commerce application that needs to be implemented. Implementing the application includes allowing access to external users on the Internet. You want to ensure the application is protected from cross-site scripting (XSS) and SQL injection. You also want to prevent OSI Layer 7 traffic. To meet the criteria in the scenario, which of the following should you implement along with the application? A. Network Intrusion Detection System (NIDS) B. Application Firewall C. Network Firewall D. URL filtering

B. Application Firewall To meet the criteria in the given scenario, you need to implement an application firewall, also known as a Web application firewall (WAF). It is designed to prevent an application from the XSS as well as SQL injection attacks. WAF works at OSI Layer 7 protecting HTTP and HTTPS traffic. Network firewalls are designed to protect an internal network from the threats coming from the Internet and does not work on Layer 7. NIDS is designed to monitor network traffic. URL filtering allows or denies access to specific Websites URLs that are contained within a defined list.

Refer to the exhibit. Identify the card displayed in the exhibit. A. Video capture card B. Cellular wireless data card C. TV Tuner card D. Riser card

B. Cellular wireless data card Notes: A cellular card is required for connecting to the Internet. If a laptop does not have network connectivity, this card can be used to connect to the Internet using mobile services, which can be in the form of 3G or 4G, depending upon the services provided by the Internet Service Provider. A video capture card is mainly used for capturing videos. A TV tuner card is used for receiving the television signals and then display it on the monitor. A riser card is used for adding expansion cards. Assume you have to add four PCI cards but have only one PCI slot available, you can use the riser board, which will be seated on this slot. Then, you can add four PCI cards on the riser board.

You need to connect a laptop to a mobile device for Internet connectivity. Which of the following solutions will work? [Choose all that apply] A. Enable wireless on the mobile phone B. Enable hotspot on the mobile phone C. Enable hotspot on the laptop D. Use tethering method

B. Enable hotspot on the mobile phone D. Use tethering method Notes: Since the laptop does not have any Internet connectivity, you can enable hotspot feature on the mobile and let the laptop connect to the mobile using wireless. When a hotspot is configured on the mobile, the Internet connection is available for connectivity using wireless. The laptop can then connect to the wireless network and access the Internet. If there is a USB cable available, then you could connect to the mobile with the laptop using the USB cable. This would have allowed the laptop to connect to the Internet. This method is known as tethering. Enabling hotspot on the laptop will not enable it to connect to the Internet. If there was Internet connectivity available, then it would have allowed other devices to connect to the Internet via laptop's hotspot. Enabling wireless on the mobile phone will allow it to connect to a wireless network.

You want to configure switches with VLANs to mitigate from switch spoofing. You want to ensure that you can use all possible methods to prevent this type of attack. What should you do? [Choose all that apply.] Answers A. Use encrypted VLANs B. Hardcode all the access ports as an access port and disable DTP everywhere C. Avoid keeping an access port in dynamic desirable, dynamic auto, or trunk mode D. Disable unused physical ports on a switch E. Disable unused TCP ports on a switch F. Hardcode all the trunk ports as a trunk port and never enable DTP on trunk ports

B. Hardcode all the access ports as an access port and disable DTP everywhere C. Avoid keeping an access port in dynamic desirable, dynamic auto, or trunk mode D. Disable unused physical ports on a switch Notes: F. Hardcode all the trunk ports as a trunk port and never enable DTP on trunk ports Notes: When employing switches in an enterprise network environment, it is considered the best practice to disable any unused ports. This will prevent any users from connecting their own network equipment (PC, access point, other switches) to the network and thus gain unauthorized access. Furthermore, such connections can have detrimental effects on the network. Other methods that you can use are: Hardcode all the access ports as an access port and disable DTP everywhere Avoid keeping an access port in dynamic desirable, dynamic auto, or trunk mode Hardcode all the trunk ports as a trunk port and never enable DTP on trunk ports

You are designing a new network in which you need to use network cables. You need to use the air ducts to lay down the cables. Which of the following type of cable would be most appropriate in this situation? A. Low smoke zero halogen rated cable B. Plenum rated cable C. PVC cables D. Riser rated cable

B. Plenum rated cable Notes: Since you will be putting the cables in the air ducts, you need to use the Plenum rated cables. This type of cable is fire resistant and does not spread the fire. If there is a fire, it will melt but not extend the fire. The Riser-rated cable is used between the floors. The PVC cables use plastic cable insulation, which has a lower cost and is easy to install. The Low smoke zero halogen rated cables emit limited smoke and no halogen, but they are not used in the air ducts.

You attempt to boot a newly assembled system, but it does not turn on. When you inspect it, you notice that the system is not receiving power. You have verified that the system is properly connected to the power socket on the wall. What could be the possible causes? [Choose all that apply] A. Loose connection to the power socket B. Power supply failure C. Loose power supply connection on the motherboard D. Incorrect front panel connection on the motherboard

B. Power supply failure C. Loose power supply connection on the motherboard D. Incorrect front panel connection on the motherboard Notes: The following can be the causes for no power to a system: Power supply failure Incorrect front panel connection on the motherboard Loose power supply connection on the motherboard As the scenario states, you have already verified that the system is connected properly to the power socket on the wall. Therefore, a loose connection to the power socket cannot be a reason for no power supply.

Refer to the exhibit. Identify the connector shown in the exhibit. A. F-Connector B. RS-232 C. BNC D. DB-25

B. RS-232 Notes: The connector shown in the exhibit is RS-232. It is a serial connector that has 9-pins (male) or 9-holes (female). The BNC connector is in round shape and is used to terminate a coaxial cable. The F-Connector is used at homes, such as dish TV cables. It is round like BNC connector. The DB-25 connector uses 25-pins.

You need to provide resources for a server that you have set up with a cloud service provider. You do not want the cloud service provider's intervention or dependency on them as you may need to add more resources at odd office hours. Which of the following methods would be good to use in this scenario? [Choose two.] A. Resource pooling B. Rapid elasticity C. Measured service D. On-demand

B. Rapid elasticity D. On-demand Notes: With on-demand, you can provision the resources, such as storage, as and when you need it without the intervention of the cloud service provider. The Rapid elasticity feature gives the advantage of pay-as-you-grow. You can scale up or scale down the infrastructure as you may need. With Rapid elasticity, you can get resources on an instant basis without having to request them from the cloud service provider. The cloud service provider charges the client for services and resource usage. In resource pooling, the cloud service provider provides all resources in a resource pool. You can opt for a specific resource, such as network bandwidth or storage.

You have a USB 2.0 port on your laptop. You usually use this port to connect a USB drive. However, now the USB port is not detecting the USB drive, which is working on another system. You need to fix this issue. What should you do first? A. Change the USB cable B. Reboot the laptop C. Run the Windows Troubleshooter D. Update the drivers for the required device

B. Reboot the laptop Notes: If the issue persists run the Windows Troubleshooter or update the drivers that have a yellow exclamation mark in the Universal Serial BUS controllers' category in Device Manager.

You use a USB drive to copy data between two systems. You have copied the data to the USB drive recently. Due to a recent Windows update, you boot your system and are prompted with the no boot device found error. How should you resolve this error? [Choose all that apply.] A. Change the hard drive and boot the system B. Remove the USB drive and boot the system C. Fix the MBR on the hard drive D. Repair the Windows installation E. Go to BIOS and then set hard drive as the first boot device

B. Remove the USB drive and boot the system E. Go to BIOS and then set hard drive as the first boot device Notes: There are two means that you can use to fix the error mentioned in the scenario. First, you can simply remove the USB drive and boot the system. Second, you can set the hard drive as the first boot device in the BIOS settings. The second option is more appropriate if you are using a USB drive. You are likely to face this error again if you do not change the boot order and boot the system with USB plugged in. The scenario does not indicate that there is an issue with the hard drive. Therefore, you are not required to change it. Same is the case with MBR. The scenario does not indicate that there is an issue with the hard drive. You should not repair the Windows installation because there is no issue with the Windows installation.

You need to replace the network backbone cable, which is CAT5. You do not have a spare CAT5 cable with the same length. You want to replace it with a cable that reduces electromagnetic interference. The cable that you use must be backward compatible with CAT5 cable. What should you do? [Choose all that apply.] A. Replace it with a CAT3 cable B. Replace it with a CAT6 cable C. Replace it with a CAT7 cable D. Replace it with a CAT5e cable

B. Replace it with a CAT6 cable C. Replace it with a CAT7 cable Notes: CAT5e is backward compatible with CAT5 but does not reduce electromagnetic interference.

You are investigating an issue with a system. You have discussed with the user and have a fair idea about the issue. After you have reproduced the problem, what are you likely to do? A. Verify the full system functionality B. Test your solution C. Establish a plan to resolve the problem D. Assume that the problem is resolved

B. Test your solution Notes: When you have a fair idea about the issue, you have developed a theory. Your theory is confirmed after you have reproduced the issue. Then, you need to establish a plan to resolve the issue. You are in the third stage of troubleshooting methodology. You can test the theory in which you also verify the hardware and software configuration. In the fourth stage, after the problem is resolved, you verify the system functionality. You cannot assume that the problem is solved.

You are using Internet Explorer to access an FTP server on the Internet. When you attempt to connect, you get the following error: Windows cannot access this folder. Make sure you typed the file name correctly and that you have consent to access to the folder. The operation timed out. What could be the probable cause? [Choose all that apply.] A. The FTP Server is not configured to accept connections from Internet Explorer. B. The Enable folder view for FTP sites option is enabled in Internet Explorer. C. A firewall on the network is preventing access. D. It is a network bandwidth issue.

B. The Enable folder view for FTP sites option is enabled in Internet Explorer. C. A firewall on the network is preventing access. Notes: This error can be caused due to the following reasons: A firewall is preventing the access to the FTP server and therefore, the connection times out as the connection is not built within the defined time. The second reason is that the Enable folder view for FTP sites option is enabled in Internet Explorer. With this option enabled, Internet Explorer attempts to bypass the firewall and connect to the FTP server directly, which it cannot. You do not need to configure the FTP server to accept connections from Internet Explorer. Network bandwidth issues do not cause this issue.

Which of the following statement can be considered a drawback for the BD-RE discs when you need to re-write them? A. They are slow B. They perform a pre-write C. They can be written once only D. They can write only audio files

B. They perform a pre-write Notes: The only drawback when rewriting BD-RE is that there is a pre-write time. It takes time to erase the existing data and then write the new data. The BD-RE discs are not slow and can be written multiple times. They can store different formats of data.

You use an old laptop that does not have a wireless adapter. You need to connect this laptop to a wireless network. Which of the following methods could you use? A. Add a PCI wireless card in the laptop B. Use a USB wireless adapter C. Connect the wireless access point to the laptop D. Use a Bluetooth dongle

B. Use a USB wireless adapter Notes: You can use a USB wireless adapter and connect to a wireless network. This is the only possible method. You can connect the wireless access point to the laptop using an Ethernet cable, but it is similar to connecting to a wired network. A laptop will not have enough space to add a PCI wireless card, and therefore, this option can be ruled out. A Bluetooth dongle will provide Bluetooth connectivity but not wireless.

Your office has satellite Internet connectivity, which is causing problems. Every time, there is a thunderstorm or heavy rains, there is intermediate connectivity. You want to replace this connection with a fast connection that has low latency and has high speed. What should you do? A. Use a Satellite connection B. Use a fiber connection C. Use a cable connection D. Use a mobile hotspot connection

B. Use a fiber connection Notes: It would be better to replace the satellite connection with a fiber connection. Out of the given choices, only Fiber meets the requirements stated in the scenario. Cable and DSL connections can experience high latency and are not as fast as compared to the Fiber connection, which can provide speed up to 1 Gbps. A hotspot connection is good for an individual, but it cannot serve the entire office and also does not provide high speed.

You are deploying a Web application that will have a database running in the backend. Users from the Internet will log in to the application. You need to secure the application and ensure that the data between each user's system and the Web application is encrypted during transmission. What should you do? Answers A. Enable Windows Firewall on each user's system B. Deploy a Web Application Firewall on the same server as the Web application C. Use the HTTPS with the Web application D. Deploy a network firewall that allows only the Web application

C. Use the HTTPS with the Web application Notes: You need to use HTTPS with the Web application. When HTTPS is used, it encrypts the traffic between the user's system and the Web application. In this scenario, it is the most suitable solution. A Web Application Firewall (WAF) is used for protecting the Web application from attacks, such as cross-site scripting (XSS). It cannot protect the traffic between the user's system and the Web application. Similarly, enabling Windows Firewall will protect each user's system but not the traffic going to the Web application. A network firewall protects the network traffic and the systems that are part of the network. If the Web application is hosted on your network, you will need to allow port 443 for the users to connect to the Web application.

You have been using a Gmail account on your mobile. However, you are no longer able to send E-mails and receive emails. You open Google Chrome and search online for solutions but do not get a proper solution. Which of the following methods can help you resolve this situation? A. Turn off the Airplane mode B. Check if you are connected to the Internet C. Check your password D. Enable the mobile data on the mobile

C. Check your password Note: You can search on google so the other options are eliminated.

You are the administrator for a small network of 20 computers that contain static IP configurations. You need to add 100 more computers on this network. Which of the following protocols would you use to avoid having to configure the IP network configuration parameters of each computer individually? A. NAT B. WINS C. DHCP D. DNS

C. DHCP Notes: Dynamic Host Configuration Protocol (DHCP) automatically provides IP network configuration parameters such as IP addressing, subnet mask, gateway, and DNS server information to devices on the network. The Domain Name System (DNS) is a hierarchical decentralized naming system for computer services and other resources connected to the Internet. It is used to associate various information with domain names. More specifically, it is used to translate IP addresses to human-friendly domain names. Network Address Translation (NAT) is a method of translating one IP address space into another by modifying the network information in the header of the IP packets. Windows Internet Name Service (WINS) is used for NetBIOS name resolution.

You have installed a RAID controller in a system in a proper way. However, the system is not able to detect it. What should be your first step to resolve this issue? A. Install the RAID controller's drivers B. Reseat the RAID controller C. Enable the RAID controller in the BIOS D. Ensure all drive cables are connected properly

C. Enable the RAID controller in the BIOS Notes: After installing the RAID controller, if it is not detected, then you should enable it in the BIOS. After that, reboot the system and RAID controller will be recognized. You do not need to install the RAID controller drivers as the first step. If the operating system detects the RAID controller but does not recognize it, then the drivers need to be installed. Since the scenario states that the RAID controller is installed in a proper way, reseating it is not required. If one or more hard drives are not detected, then you need to ensure all cables are connected properly.

Which of the following can take full advantage of the mATX motherboard? A. Web development B. Document creation C. Gaming D. Web hosting

C. Gaming Notes: Out of the given choices, the gaming can take full advantage of the mATX motherboard. It offers multiple slots for memory modules, can support high-end graphics cards, and support overclocking. All these features can benefit gamers while playing performance intensive games. Even though Web hosting, Web development, and document creation can also use the mATX motherboard, but its features will be more relevant and thoroughly useful for gaming.

You are configuring a messaging client on your laptop. You want to retain the messages on the server but also want them to synchronize them with the messaging client on your laptop. Any changes made to the messages must get replicated with the server. Which of the following protocol should you configure in the messaging client? A. POP3 B. S/MIME C. IMAP D. SMTP

C. IMAP The Internet Message Access Protocol (IMAP) stores messages on the server and allows the user to work on the server directly. You will be able to retain the messages on the server as well as synchronize them with the messaging client on your laptop. Any changes made to the messages will get replicated with the server. The Secure/Multipurpose Internet Mail Extensions or S/MIME is used to encrypt and digitally sign the E-mails. The Simple Mail Transfer Protocol (SMTP) is used for sending E-mails across the Internet. POP3 is a client/server protocol that downloads the E-mails from a messaging server. After the E-mails are downloaded, they are deleted from the messaging server.

When you enable Bluetooth on a mobile handset, how does it find a device for pairing? A. It will attempt to connect Bluetooth devices within 10-meters radius B. The connection will be automatically enabled with all Bluetooth-enabled devices C. It will scan for and list Bluetooth-enabled devices within 10-meters radius D. It will attempt to create a connection with all Bluetooth -enabled devices

C. It will scan for and list Bluetooth-enabled devices within 10-meters radius Notes: Show explanation Show answer When you enable Bluetooth on a mobile handset, it will find Bluetooth-enabled devices within 10-meters radius. However, no automatic connection is established. When a user selects a device, then the receiving device sends a unique key that is displayed on the mobile handset. None of the remaining options are correct and are not performed when Bluetooth is enabled on a mobile handset.

You are using a dual-slot graphics adapter in a gaming system, which overheats within a few hours of usage. Which of the cooling method would be most appropriate? A. Temperature sensors B. Thermal paste C. Liquid-based cooling D. Heat pipes

C. Liquid-based cooling Notes: The dual-slot graphics adapter is placed in two adjacent slots on the motherboard and blocks the air flow. Therefore, the system tends to overheat. The liquid-based cooling uses small hoses to send the cooling liquid through the heat exchanger, which that absorbs heat. Thermal paste sits between the heat sink and the processor. It draws the heat from the processor and passes it on to the heat sink. Temperature sensors are built-in to the processors. They help the processor to acknowledge overheating. Once the processor acknowledges that, then it shuts itself down until it is cooled down. Heat pipes vaporize coolant liquid when a component generates heat.

Your laptop's lithium-ion battery provides less than one-hour battery time. What should you do to fix this issue? A. Clean the battery and battery contacts on the laptop B. Drain the battery completely and then charge it C. Replace the battery with a new one D. Take out the battery and reseat it properly

C. Replace the battery with a new one Notes: When the battery provides less than one hour of charging, you can be sure that the battery is reaching the end of its lifecycle. The battery time will keep reducing further until, eventually, the battery fails to provide any battery time at all. It is advisable to replace the battery before the battery reaches that stage. If suddenly you find that the laptop is not able to run on the battery, then you should clean the battery and battery contacts on the laptop. You can also take out the battery and then reseat it completely. If the battery is not seated properly, or if the battery contacts are dirty, the battery may not be able to charge or may not be able to provide the backup. Drain the battery and then charging it will not help in this case. Ideally, you should be draining the battery as much as possible and then charging it.

Refer to the exhibit. Which of the following problem is indicated by the picture in the exhibit? A. BSOD B. Memory crash C. SPoD D. Application failure

C. SPoD

Your organization has multiple file servers that are used for file sharing. The Sales team has a requirement for these files to be readily available when they are working remotely. You decide to provide cloud storage. However, before you implement this solution, which of the factors should be a concern from a security aspect? A. Number of files B. Availability of files C. Sensitivity of files D. File size E. Number of users

C. Sensitivity of files Notes: Since the Sales team requires these files to be readily available for their use, these files can be moved to cloud storage. However, to maintain the security aspect, you should be aware of the sensitivity of the information contained in these files. Remaining factors really do not constitute a security concern.

You connect your iPhone to the charging cable to charge it. However, the phone is not charging. You test the cable with another iPhone, and it works fine. You do not have a spare cable to charge your phone, and you suspect that the charging port on the phone has got dust inside. You need to clean this port. What should you do? [Choose all that apply.] A. Blow into the charging port B. Use a needle to scrape the dust C. Shake the phone D. Use compressed air E. Use a pin to draw out the dust carefully

C. Shake the phone D. Use compressed air Notes: The best method for removing dust and debris from the changing port on a mobile phone is to use a couple of short quick bursts of compressed air. You may also want to try shaking the phone as gently as possible to see if any loose dust or debris has been dislodged. You would not want to physically blow into the port as air from your mouth may contain moisture, which can cause issues with sensitive electronic components. You should also not stick metal objects such as pins and paperclips into the port as they may hold a static charge that could potentially damage the phone.

If you are building a media streaming server, which of the following should be the most critical requirement of the system? A. High-end cooling B. CPU C. Storage D. Memory

C. Storage Notes: When building a media streaming system, you should have the maximum amount of storage available to store media files, such as audio and video. None of the remaining can be considered a critical requirement in this scenario.

You connect your desktop computer to a TV with built-in speakers via a DVI-to-HDMI cable. You are able to see the video on the TV, but there is no audio. What is the most likely cause of this issue? Answers A. The cable is faulty and audio connectors are not working. B. The TV is not capable of receiving audio through this cable. C. The video card does not support audio transmission. D. You cannot transmit audio using the DVI-to-HDMI cable.

C. The video card does not support audio transmission. Notes: A DVI-to-HDMI cable can transmit audio and video over a single cable if your video card supports HDMI audio via DVI. If the video card is older and does not support audio transmission, you would need to use a separate cable for audio. If the DVI-to-HDMI cbale was faulty, then you will not see the video either. Any TV that has HDMI ports would be capable of receiving audio signals from a DVI-to-HDMI cable, so this is not likely the cause of the issue.

Refer to the exhibit. Which of the following laptop component is being discussed? A. Mouse B. Touch screen C. Touchpad D. Keyboard

C. Touchpad Notes: The settings shown in the exhibit are of a touchpad. You can configure a single or double tap on a touchpad to get the touchpad to operate accordingly. Touchscreens, mouse, and keyboards do not have these features.

You are setting up a new network with multiple subnets, and you want to be able to have more control over the network traffic. You should be able to configure, manage, and monitor your network and its traffic. What should you do? A. Put a firewall between each subnet B. Use a separate router for each subnet C. Use the managed switches for the network D. Use a Simple Network Management Protocol (SNMP) server

C. Use the managed switches for the network Notes: Out of the given choices, only managed switches will help you achieve your goal. They help you with complete control over the network traffic and using them; you can configure, manage, and monitor your network and its traffic. A firewall will filter the traffic but does not manage the network or its traffic. A router is used for routing the information, not for managing the traffic. Managed switches use SNMP, which is mainly used for monitoring the network devices remotely.

Your home Wi-Fi is not able to cover the small room in the corner of the lawn of your house, which is at a distance of 100 meters from your main house complex. If the WI-Fi is not detectable, what would you do to make a cost-effective internet connection available in the small room without using additional wiring or calling an electrician? A. Use multiple repeaters in the house to make sure that the signal strength of the Wi-Fi routers reaches to the small room B. Replacing the existing Wi-Fi router with a more powerful and costly Wi-Fi router so that coverage area increases C. Using ethernet over power adaptors for extending the range of a home network to places where your wireless coverage is poor. D. Installing a new Wi-Fi router with a new internet connection in the small room

C. Using ethernet over power adaptors for extending the range of a home network to places where your wireless coverage is poor. Notes: Ethernet over Power is used to extend the internet. By using this technology, data can be transported along the same electrical wirings at much higher frequencies, without causing any interference. Though other options offer valid solutions but are incorrect options as they will not be cost effective.

Which of the following devices has a virtual NIC? A. Virtual Router B. Content filter C. VM D. Network server

C. VM Notes: A virtual Network Interface Card (NIC) is an entity that is created in software that allows a Virtual Machine (VM) to access the Ethernet network. It is configured just like its physical counterpart with an IP address, default gateway but exists entirely within the software. It is bridged with a physical NIC which places its frames on the wired network with a MAC address that is unique to the virtual NIC.

A user is unable to access any other system or network share on the network. No other user has reported this problem. What should be your first step in troubleshooting this problem? A. Check the DNS server availability B. Check the user access on the network share C. Check the network cable D. Check the IP address on the system

Check the IP address on the system

Your laptop is running out of storage space. You would like to extend its storage using an external device. What should you do? A. Add a PATA drive to the laptop. B. Add a SCSI drive to the laptop. C. Add an IDE drive to the laptop D. Add an eSATA drive to the laptop.

D. Add an eSATA drive to the laptop. Notes: In this scenario, the requirement is to add an external device to extend the laptop storage. Out of the given choices, only eSATA is an external storage device. IDE and PATA are internal hard drives. SCSI is also an internal storage device, but it is more common in servers.

Refer to the exhibit. In the given 802.11b/g/n 2.4 GHz frequency, identify the channels that can be used. A. 1, 6, 14 B. 1, 2, 3 C. 1, 3, 5 D. 1, 6, 11

D. 1, 6, 11 Notes: As shown in the exhibit, there are three channels that are non-overlapping. These channels are 1, 6, and 11. These are the ones that can be used. Remaining channels are overlapping except for channel 14, which does not have channel separation and therefore, cannot be used.

You attempt to connect to a Windows 7 system using Remote Assistance. However, the connection is not successful. You identify the issue as the firewall blocking the connection. Which port should you open in the firewall to connect to this system? Answers A. 65535 B. 53 C. 49152 D. 3389

D. 3389 Notes: By default, port 3389 is used by the Remote Desktop Protocol (RDP) for Microsoft Remote Desktop and Remote Assistance. Therefore, you need to ensure that this port is open.Port 53 is used by the DNS service. The ports 49152 and 65535 are used by TCP.

When troubleshooting a problem where users are not able to access resources on the network, after the most probable cause of the problem is determined, what should be done next? A. A divide and conquer approach should be adopted to solve the problem B. The users that have observed the problem should be questioned for details C. The troubleshooter should connect to the network device and begin making changes D. An action plan should be formulated mentioning the steps to resolve the problem

D. An action plan should be formulated mentioning the steps to resolve the problem Notes: When troubleshooting a networking problem, once the procedures for determining a theory and a probable cause of the problem are complete, and once this theory is confirmed, the troubleshooting process moves into the resolution stage. This stage involves preparing an action plan that mentions a series of next steps that should be taken to begin resolving the problem.

Which of the following is an example of an emulator? A. VMware Workstation B. XenServer C. Hyper-V D. BlueStacks

D. BlueStacks Notes: Out of the given choices, BlueStacks is the only application that is an emulator, which runs as a guest inside an operating system. BlueStacks is used for running Android applications on Windows. Remaining are examples of virtualization technologies.

You need to have only selected wireless clients to connect to the wireless network of your office. Which of the following will help you achieve this? A. Enabling firewall on the WAP B. Enabling WPA2 on WAP C. Enabling Quality of Service (QoS) on WAP D. Enabling MAC filtering on WAP

D. Enabling MAC filtering on WAP Notes: To control which wireless clients connect to your wireless network, you need to enable MAC filtering on the WAP. You can feed in the MAC addresses that are allowed.

A Windows system has suffered a Blue Screen of Death (BSOD). The system indicates the IRQL_NOT_LESS_OR_EQUAL error. What does this error mean? A. The system is unable to read the hard drive B. It is a registry failure C. The hard drive is corrupt D. Error is caused by a faulty device driver

D. Error is caused by a faulty device driver Notes: The IRQL_NOT_LESS_OR_EQUAL error is caused by a faulty device driver.An NTFS_FILE_SYSTEM error indicates that the hard drive is corrupt. An INACCESSIBLE_BOOT_DEVICE error indicates that the system is unable to read the hard drive. The REGISTRY_ERROR indicates that there is a registry failure.

You have an older system that has an IDE hard drive. When you attempt to boot the system, you are prompted with a message that IDE drive is not ready. What could be the cause? A. Boot files are missing on the hard drive B. Hard drive's IDE cable is unseated C. SMART is predicting a failure D. Hard drive not spinning fast enough

D. Hard drive not spinning fast enough When you see a message stating that the IDE drive is not ready, it means that the hard drive is not spinning fast enough. You may have to enable the delay time for the hard drive. When the boot files are missing on the hard drive, the system will not be able to boot. SMART stands for Self-Monitoring, Analysis, and Reporting technology. It can detect if a hard drive is failing. However, this issue is not about a hard drive failing. If the IDE cable was unseated, the system will not be able to locate the hard drive and will not be able to generate the IDE drive not ready error.

You are using a Mac notebook and an iPhone. You need to connect the devices together and transfer the data from the iPhone to the Mac notebook. Which of the following connection would be most appropriate in this scenario? A. USB-C B. HDMI C. Mini-USB D. Lightning

D. Lightning Notes: Lightning is the connector that should be used. It is a proprietary format by Apple and is used only compatible with Apple devices. HDMI is used for audio and video but is not used for transferring of data. USB-C is a new format that is used with many mobile phones, specifically with Android mobile devices. Mini-USB is a format that is used with a mobile phone and tablets. It is less common than Micro-USB. It is used for charging and transferring data.

Refer to the exhibit. You are using an iPhone, and your WhatsApp is configured to backup data on iCloud. One day, while the backup starts, you are prompted with the error shown in the exhibit. What should you do? A. Make space available on iCloud B. Restart the iPhone C. Fix the Internet connectivity D. Make some space available on the iPhone

D. Make some space available on the iPhone Notes: This error usually occurs when the iCloud storage is not sufficient. With regular backups, it could run out of free space, and when the next backup starts, you are prompted with the error shown in the exhibit. Best solution is to remove some of the old backups or shift them somewhere else with the help of a third-party tool. Since this backup is being done to the iCloud storage, free space on the iPhone is not a concern. The backup had already started, and therefore, Internet connectivity is not an issue in this scenario.Restarting the iPhone does not fix this issue.

Refer to the exhibit. Identify the connector shown in the exhibit. A. Micro-USB B. Lightning C. USB-C D. Mini-USB

D. Mini-USB Notes: The exhibit displays the Mini-USB connector, which is no longer common. It was mainly used with mobile devices for charging and data transfer. Micro-USB is similar in shape to Mini-USB but is thinner. A lightning connector can also be inserted only one way, and it works only with Apple devices, such as an iPhone. A USB-C connector, which is inserted into the mobile, is reversible and does not have up or down orientation, which was the problem with the Micro-USB and Mini-USB chargers.

Refer to the exhibit. Which device is being displayed? A. USB hub B. Docking station C. KVM switch D. Port Replicator

D. Port Replicator Notes: Port replicator is an addition for a notebook computer that allows a number of devices such as a printer, large monitor, and keyboard to be concurrently connected. However, it can also enable the devices that do not have an expansion slot to connect and use these peripherals. A USB hub allows multiple USB devices to be connected to the laptop. A KVM (Keyboard, video, and mouse) switch allows you to manage multiple systems using one set of keyboard, display, and mouse. A docking station allows you to use multiple peripherals even if your laptop does not have the ports to accommodate them. It can also raise the height of a laptop to a certain level.

Refer to the exhibit. Identify the component of the inkjet printer. A. Ink Cartridge B. Duplexing Assembly C. Feeder D. Print Head

D. Print Head

You have a book on a Kindle application on your mobile device. The book is synchronized on your laptop. However, the current page of the book from the mobile device is not synchronized to Kindle application on your laptop. Remaining books are getting synchronized properly. What should you do? A. Check on the Internet connectivity B. De-register and register Kindle on your laptop C. Clear the temporary files on your laptop D. Remove the book from the mobile and add it on both the devices

D. Remove the book from the mobile and add it on both the devices Notes: Since the progress of the book is not getting replicated, you should remove the book from both the devices and then add it again. It would start the synchronizing process. This could happen when there is an update for the book. It could break the progress synchronization. You need not de-register and register kindle on your laptop. It would break the synchronization for the remaining books. Since you can synchronize the remaining books, Internet connectivity is not an issue. Temporary files cleanup does not help as these files are saved in the user's profile in the Windows system.

You are using a computer with an IP address of 192.168.2.44 and a subnet mask of 255.255.255.0. You can ping the destination of 192.168.2.66 but not 192.168.3.21 even though you know that the latter is a functioning workstation. The workstation with the IP address, 192.168.3.21 can ping systems on the 192.168.2.x subnet. What could be the reason for this? A. The firewall between both the subnets is blocking the traffic. B. Both are located on a different subnet. C. Duplicate MAC addresses have been detected. D. The default gateway is configured incorrectly.

D. The default gateway is configured incorrectly. Notes: When connectivity is available between hosts on the same subnet and yet is not available between hosts in different subnets, the most likely culprit is the default gateway settings. This is because the default gateway is used for connectivity to networks outside of the local one. A device will examine the destination IP address, and if it is not in the same subnet as itself, it will send the packets to the default gateway. The default gateway will then route the packet appropriately to get to its destination. If the default gateway is configured incorrectly, communication of a host with subnets outside of its own is not possible.

Your organization uses Active Directory with Exchange Server 2016 for messaging. The network is protected by a firewall. You need your laptop to be configured with Outlook 2016 using the IMAP protocol. When you attempt to login to the E-mail account using your domain account, the authentication fails. However, you are able to log in to your laptop. You check with IT support and no other remote user has reported this issue. What could be the probable cause? A. Port 143 is blocked on the firewall B. Exchange Server does not support IMAP. C. IMAP is incompatible with Outlook 2016. D. The password contains Unicode characters. E. The Outlook profile is corrupt.

D. The password contains Unicode characters. Notes: There is an issue with the IMAP and Outlook 2016 and IMAP fails to authenticate a user if the password contains Unicode characters. As a workaround, you can change your password, use a different protocol, such as POP3, or downgrade the Outlook 2016 to 2013. The same password will then work. Port 143 is already open on the firewall as no other remote user has an issue in using IMAP, which is fully compatible with IMAP. Exchange server supports IMAP and POP3. You are currently setting up the Outlook profile and authentication is in process. Once authentication completes, then the profile will be set up.

You have configured two devices to share contact information over NFC. The information sharing starts, but then you move one of the devices a little further away accidentally. Contact sharing between devices now fails. What could be the probable cause? A. NFC connectivity is time-bound, and time has lapsed. B. Both devices are incompatible with each other. C. It is not possible to share contacts using NFC. D. There should be a maximum of two-inches distance between both the devices.

D. There should be a maximum of two-inches distance between both the devices. Notes: The only possible cause, in this case, is that both the devices are more than two inches apart from each other. The maximum distance between the two devices should be two inches when using NFC. You can share contacts using NFC. Since both the devices were earlier connecting, they cannot be incompatible. NFC connectivity is not time bound.

If you want to access blocked websites, hide your location, encrypt data, which of the following should you do? A. Use remote access B. Use Encryption C. Use firewall D. Use VPN

D. Use VPN Notes: VPNs can help access blocked websites, hide your location, encrypt your data, and much more. VPN essentially creates a virtual tunnel between a computer and a server. That virtual cable creates a tunnel that encrypts any data that passes through it. Encryption is used for protecting data when you do not want anyone but the legitimate user to access it. A firewall protects a system, server, or network by allowing or denying access. Remote access allows a user to connect to a remote system.

You have recently setup a new virtual environment with multiple virtual machines. You need to protect these virtual machines and need to ensure that the entire environment is secured. Which device should you use? A. VM B. Router C. Next Generation Firewall D. Virtual firewall E. Virtual switch

D. Virtual firewall Notes: A virtual firewall is a network security device that provides security features of a traditional firewall but functions entirely within a virtualized environment.

In which of the following situations would you update the radio firmware? A. When a device is non-functional B. When there is an issue with the processing speed C. When there is an issue with device memory D. When there is an issue with the cellular signals

D. When there is an issue with the cellular signals Notes: You should update the radio firmware when there is an issue with the cellular connection. A radio firmware contains the configuration parameters for the cellular settings. None of the remaining issues can be fixed with the radio firmware.

You need to transfer critical files from your desktop to a file server. You want to ensure that you use a private and safe data stream. Which of the following should you use? A. SSL B. FTP C. SSH D. SMTP

SSH Notes: Secure Shell or SSH is used to create a secure channel over which Secure File Transfer Protocol (SFTP) functions. SSH ensures that the server has already authenticated the client and that the identity of the client user is available to the protocol.

You have installed an '802.11a' wireless network router which is rated at 54 Mbps but, you observe that it is not able to transmit data even at a rate of 30 Mbps. Where may the problem lie? A. The wireless driver needs to be updated as it will increase the data throughput and solve the issue B. There may be an issue of network congestion so switching the router off and on again will resolve the issue C. The maximum theoretical transmitted throughput is 1/2 of the maximum bi-directional throughput of 27 Mbps. D. The router you have purchased is expected to handle the throughput of 30 Mbps as per written specifications, but the device seems to be of substandard in quality.

The maximum theoretical transmitted throughput is 1/2 of the maximum bi-directional throughput of 27 Mbps. Explanation: Wireless devices are not full duplex. Wireless data has unidirectional flow at any one point in time due to which in actual operation the maximum data transfer rate or throughput will be well below half of the raw wireless network speed. Other options are incorrect because restarting, updating drivers, or going for the best quality product cannot exceed the maximum theoretical limit of 27 Mbps.

You have to deploy a solution on a client site where the solution must consist of a Firewall, Anti-spam, Content filtering, DLP, and Malware scanner. The client wants to receive alerts if suspicious traffic is detected. It should also be able to provide reports on the number of viruses and spam messages blocked, and summaries of content filter violations. The client does not want to load the network with multiple devices and wants a single solution. To be able to meet your goal, which of the following would be an optimal solution for the client? A. Antimalware Tool B. Content Filtering Tool C. Data Loss Prevention (DLP) D. Firewall E. Unified Threat Management (UTM)

Unified Threat Management (UTM) Notes: UTM can perform the functions of: Firewall Anti-spam Content filtering DLP Malware scanner

You configure a Wireless Access Point (WAP); you disable the SSID broadcast. What will be the outcome of this configuration? A. Users will see the wireless network and it will be connected automatically. B. Users will no longer be able to either see the wireless network or connect to itUsers will not be able to connect to the wireless network. C. Users will see the wireless network, but they will not be able to connect to it.. D. Users will no longer be able to see the wireless network, but they can connect to it manually

Users will no longer be able to see the wireless network, but they can connect to it manually Notes: SSID broadcast is the internet name showing up as the connection.


Kaugnay na mga set ng pag-aaral

ACSM Quiz Domain I: Initial Client Consultation and Assessment

View Set

Naming and Storing Website Files Quiz

View Set

LearnSmart Chapter 8 Microbiology Assignment

View Set

History of Rock and Roll test #3

View Set

Primavera World History A Unit 4: Exploration, Encounters, and Exchanges

View Set

Bangladesh: Over-Population Case Study

View Set