CompTIA A+ 220-1101
Chapter 4: Printers and Multifunction Devices Which voltage is applied to the paper to transfer the toner to the paper in an EP process laser printer? A. +600VDC B. -600VDC C. +6000VDC D. -6000VDC
Answer: A. +600VDC Because the toner on the drum has a slight negative charge (-100VDC), it requires a positive charge to transfer it to the paper; +600VDC is the voltage used in an EP process laser printer.
Chapter 6: Introduction to TCP/IP Which of the following IP addresses would not be valid for a DNS server on the Internet? A. 10.25.11.33 B. 18.33.66.254 C. 155.118.63.11 D. 192.186.12.2
Answer: A. 10.25.11.33 DNS servers resolve hostnames to IP addresses. On the Internet, a DNS server needs to have a public IP address. The address 10.25.11.33 is in a private address space, so that address would not be valid for a DNS server on the Internet.
Chapter 5: Networking Fundamentals What Ethernet specification would you be running if you needed to make a connection of 10 Gbps over a distance of 5 kilometers? A. 10GBaseER B. 10GBaseT C. 10GBaseSR D. 10GBaseLR
Answer: A. 10GBaseER If you need to make a connection that is 5 kilometers long, then you are limited to fiber-optic cable, specifically single-mode fiber (SMF). Two common SMF standards are 10GBaseER and 10GBaseEW. (Think of the E as extended.) A T designation in an Ethernet standard refers to twisted pair. SR and LR are fiber standards that do not stretch for 5 kilometers.
Chapter 6: Introduction to TCP/IP Which of the following are valid examples of IPv6 addresses? (Choose all that apply.) A. 2001:0db8:3c4d:0012:0000:0000:1234:56ab B. ::ffff:c0a8:173 C. 2001:db8:3c4d:12::1234:56ab D. 2001::1ab4::5468
Answer: A. 2001:0db8:3c4d:0012:0000:0000:1234:56ab B. ::ffff:c0a8:173 C. 2001:db8:3c4d:12::1234:56ab An IPv6 address contains 128 bits, written in eight 16-bit fields represented by four hexadecimal digits. Option A contains all eight fields expressed in full. Option B is an IPv4 address expressed in IPv6 form. Option C is the same address as option A, but written in accepted shorthand. Option D is not valid because the double colons (::) can be used only once within an address.
Chapter 10: Mobile Connectivity and Application Support A technician is configuring a mobile client to use email through an ISP. Which port number should they configure to use SMTP? A. 25 B. 110 C. 143 D. 995
Answer: A. 25 SMTP sends mail to the server on TCP port 25. POP3 uses port 110. IMAP4 uses port 143. POP3 uses port 995 securely over SSL or TLS.
Chapter 3: Peripherals, Cables, and Connectors You are attaching an external hard drive to a computer with USB 2.0 ports. The user is concerned about data transfer speed. What is the maximum speed of USB 2.0? A. 480 Mbps B. 5 Gbps C. 10 Gbps D. 20 Gbps
Answer: A. 480 Mbps USB 2.0 has a maximum speed of 480 Mbps. USB 3.0 is 5 Gbps, USB 3.1 is 10 Gbps, USB 3.2 is 20 Gbps, and USB4 is up to 40 Gbps.
Chapter 7: Wireless and SOHO Networks You are setting up a wireless network. Which wireless standards would give the users over 40 Mbps throughput? (Choose all that apply.) A. 802.11ac B. 802.11b C. 802.11g D. 802.11n
Answer: A. 802.11ac C. 802.11g D. 802.11n Three standards listed—802.11ac (1,300 Mbps), 802.11g (54 Mbps), and 802.11n (600 Mbps)—give users the required throughput. 802.11ax would do so as well, although it's not an option.
Chapter 8: Network Services, Virtualization, and Cloud Computing A computer using which of the following would be considered a legacy device? (Choose all that apply.) A. A 386 processor B. The IPX/SPX protocol C. An application developed in 1983 D. 1 GB of RAM
Answer: A. A 386 processor B. The IPX/SPX protocol C. An application developed in 1983 Legacy systems are ones that use older hardware, software, or network protocols that are not commonly used today. A system with only 1 GB of RAM might be woefully underpowered, but that in and of itself does not make it a legacy system.
Chapter 12: Hardware and Network Troubleshooting You have an inkjet printer. Recently, papers are being printed with excessive amounts of ink, and the ink is smearing. What is the most likely cause of the problem? A. A faulty ink cartridge B. A corrupted print driver C. A faulty fuser D. Too much humidity in the air
Answer: A. A faulty ink cartridge If an ink cartridge is faulty or develops a hole, it can release excessive amounts of ink, which leads to smearing. A corrupt print driver would result in printing garbage. Inkjet printers do not have a fuser. Excessive humidity may cause smearing, but it wouldn't cause the disbursement of too much ink.
Chapter 8: Network Services, Virtualization, and Cloud Computing Which of the following are services that a print server should provide? (Choose two.) A. Accepting print jobs from clients B. Turning off printers on demand C. Providing clients with the appropriate printer driver during installation D. Notifying users when the print job is complete
Answer: A. Accepting print jobs from clients C. Providing clients with the appropriate printer driver during installation Print servers should make printers available to clients and accept print jobs. They also process print jobs and manage print priorities. Finally, they provide client computers with the right print drivers when the clients attempt to install the printer. They do not turn printers off on demand or provide notification that a job has printed.
Chapter 6: Introduction to TCP/IP What are advantages that TCP has over UDP? (Choose two.) A. Acknowledged delivery B. Faster delivery C. Lower overhead D. Virtual circuits
Answer: A. Acknowledged delivery D. Virtual circuits TCP is a connection-oriented protocol that establishes virtual circuits and acknowledges delivery of packets. Because of these features, it has higher overhead than UDP and is a little slower.
Chapter 4: Printers and Multifunction Devices What happens during the developing stage of laser printing? A. An electrostatic charge is applied to the drum to attract toner particles. B. Heat is applied to the paper to melt the toner. C. The laser creates an image of the page on the drum. D. An electrostatic charge is applied to the paper to attract toner particles.
Answer: A. An electrostatic charge is applied to the drum to attract toner particles. After a laser has created an image of the page, the developing roller uses a magnet and electrostatic charges to attract toner to itself and then transfers the toner to the areas on the drum that have been exposed to the laser. The toner is melted during the fusing stage. The laser creates an image of the page on the drum in the exposing stage. An electrostatic charge is applied to the paper to attract toner in the transferring stage, which happens immediately after the developing stage.
Chapter 4: Printers and Multifunction Devices Recently, employees have been printing off unauthorized materials that may contain hate speech. Which of the following can be used to see which users printed specific jobs? A. Audit logs B. Badging C. User authentication D. Secured prints
Answer: A. Audit logs Audit logs will track print jobs and the users who printed them. User authentication is where a user is required to log into the printer. This can be done via badging—or swiping an employee badge on a badge reader on the printer—or by manually entering credentials. Secured prints is when a print job is held until a user authenticates at the printer and tells it to start printing.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems You are training a class of new technicians on troubleshooting motherboard issues. Which of the following are issues most likely caused by a failing CMOS battery? (Choose two.) A. BIOS time and setting resets B. Attempts to boot to the incorrect device C. Intermittent device failure D. BSOD/pinwheel errors
Answer: A. BIOS time and setting resets B. Attempts to boot to the incorrect device When the system is powered off, BIOS settings on a motherboard are maintained by the CMOS battery. If the battery fails, the system will likely forget the BIOS time and date settings and the boot order configuration. Replacing the CMOS battery will resolve the issue.
Chapter 5: Networking Fundamentals Which of the following wireless communication standards is often described in terms of a wireless personal area network? A. Bluetooth B. Infrared C. Cellular D. Ethernet
Answer: A. Bluetooth Bluetooth networks are often called wireless personal area networks (WPANs).
Chapter 7: Wireless and SOHO Networks Besides 802.11 standards, which wireless communication methods may also work in the 2.4 GHz range? (Choose all that apply.) A. Bluetooth B. Satellite C. Long-range fixed wireless D. mmWave E. NFC
Answer: A. Bluetooth C. Satellite Bluetooth also operates in the 2.4 GHz range, and long-range fixed wireless can if it uses unlicensed frequencies. Satellite uses satellite waves; 5G cellular mmWave is between 24 GHz and 86 GHz, and NFC uses 13.56 MHz.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems When you turn on a desktop computer, you hear a loud squealing noise coming from inside the case. Which components are potential culprits for making the noise? (Choose all that apply.) A. CPU fan B. Power supply fan C. HDD D. SSD E. CPU F. RAM
Answer: A. CPU fan B. Power supply fan C. HDD Only components with moving parts can make ticking, clicking, or squealing noises. It's probably a fan of some sort (such as the CPU fan or power supply fan), or it could be a conventional hard drive. SSDs, CPUs, and RAM do not have moving parts and therefore could not be causing this problem.
Chapter 5: Networking Fundamentals What is the lowest grade of UTP that is rated for 100 Mbps transmission? A. Cat 5 B. Cat 5e C. Cat 6 D. Cat 6a
Answer: A. Cat 5 Cat 5 was the first UTP standard ratified for 100 Mbps transmissions. Before that, Cat 3 was popular but only supported 10 Mbps. Cat 5e, Cat 6, and Cat 6a all support at least 1 Gbps and came after Cat 5.
Chapter 4: Printers and Multifunction Devices Which printer contains a wheel that looks like a flower with raised letters and symbols on each "petal"? A. Inkjet printer B. Daisy-wheel printer C. Dot-matrix printer D. Laser printer
Answer: B. Daisy-wheel printer The daisy-wheel printer gets its name because it contains a wheel with raised letters and symbols on each "petal."
Chapter 10: Mobile Connectivity and Application Support Which of the following are disabled on an Android device when airplane mode is switched on? (Choose all that apply.) A. Cellular B. Wi-Fi C. Bluetooth D. Settings app E. Lock screen
Answer: A. Cellular B. Wi-Fi C. Bluetooth On an Android phone, airplane mode disables all radio communications, including cellular, Wi-Fi, and Bluetooth (and NFC as well). It does not affect the opening of any other apps or the lock screen. In recent versions of iOS, Bluetooth is not affected by airplane mode.
Chapter 10: Mobile Connectivity and Application Support You need to enable clients to synchronize their mobile devices to their laptops. Which of the following are common connection types to enable laptop synchronization? (Choose all that apply.) A. Cellular B. Bluetooth C. Wi-Fi D. USB E. Tethering
Answer: A. Cellular C. Wi-Fi D. USB Three common connection types for synchronization to a desktop (or laptop) are cellular, Wi-Fi, and USB. Bluetooth is not used for desktop synchronization. Tethering is when a laptop or other device is granted cellular network access by connecting to a mobile device, such as a smartphone.
Chapter 7: Wireless and SOHO Networks You have just installed a wireless router on your home network. Which of the following should you do to make it highly secure? (Choose all that apply.) A. Change the default administrator name and password. B. Change the SSID. C. Enable WEP. D. Configure it to channel 11.
Answer: A. Change the default administrator name and password. B. Change the SSID. You should always change the default administrator name and password as well as the default SSID when installing a new wireless router. Enabling encryption is also a good idea, but WPA, WPA2, and WPA3 are better options than WEP. The channel has nothing to do with security.
Chapter 12: Hardware and Network Troubleshooting A network cable for a crucial server has failed. There are no premade Ethernet cables available, but there is bulk cable and connectors. Which tool do you need to use to make a new cable? A. Crimper B. Punch-down tool C. Cable tester D. Loopback plug
Answer: A. Crimper A crimper is used to make network cables. Punch-down tools are used to connect the wires of a cable to a wiring rack, such as a 110-block. Cable testers are for verifying that a cable works properly (and may be handy after you complete the cable). A loopback plug is for testing the ability of a network adapter to send and receive.
Chapter 6: Introduction to TCP/IP You are setting up a small network that will not connect to the Internet. You want computers to be able to locate each other by using hostnames. What service will do this? A. DNS B. DHCP C. FTP D. APIPA
Answer: A. DNS DNS is typically known as a name resolver on the Internet, but it will work on private networks as well. DNS resolves hostnames to IP addresses. DHCP automatically configures clients with IP address information. FTP is for file downloads. APIPA is a process used to assign clients a private IP address automatically when they can't reach the DHCP server.
Chapter 6: Introduction to TCP/IP You are manually configuring a TCP/IP host. Another administrator gives you the router's IP address. What is the TCP/IP term for this? A. Default gateway B. Subnet mask C. DNS server D. DHCP server
Answer: A. Default gateway The router is your doorway out into other networks, and it is known in TCP/IP terms as the default gateway. Without this configuration option, you would not be able to get to external networks. The subnet mask tells a host which network it's on. The DNS server resolves hostnames to IP addresses, and a DHCP server provides IP configuration information to hosts.
Chapter 9: Laptop and Mobile Device Hardware You have a user who needs to keep desktop devices such as keyboard, monitor, and mouse permanently connected so that they can be used by an attached laptop. What type of device do you recommend that they use? A. Docking station B. Keyboard, video, mouse (KVM) switch C. Input/output virtual server D. USB hub
Answer: A. Docking station A docking station made specifically for its associated brand and model of laptop can host desktop components permanently, regardless of whether the laptop is attached to the docking station. When the laptop's portability is not required, but instead use of the desktop components is the priority, attaching the laptop to the docking station makes such components available to the laptop without separately attaching each component.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems You have fixed a printer problem and verified full functionality. What is the next step to take in the best practice methodology? A. Document findings, actions, and outcomes. B. Conduct internal or external research. C. Review system and application logs. D. Establish a theory of probable cause.
Answer: A. Document findings, actions, and outcomes. After verifying full system functionality and implementing preventive measures as needed, the final step in the best practice methodology is to document findings, actions, and outcomes.
Chapter 4: Printers and Multifunction Devices Which of the following most accurately describes how to obtain a firmware upgrade for your laser printer? A. Download the firmware upgrade for free from the manufacturer's website. B. Pay to download the firmware upgrade from the manufacturer's website. C. Have a certified laser printer technician come to your site and install a new firmware chip. D. Contact the manufacturer of the printer, and they will send you the firmware upgrade on a DVD.
Answer: A. Download the firmware upgrade for free from the manufacturer's website. Firmware upgrades for laser printers are downloaded for free from the manufacturer's website. A technician does not need to install a new chip, because firmware is upgraded via software. It's unlikely that the manufacturer will send you the upgrade on a DVD; it will refer you to its website to download it.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies You need to install a new hard drive into a desktop computer. Which of the following is not one of the three major components of a hard disk drive system? A. Drive interface B. Disk controller C. Hard disk D. Host adapter
Answer: A. Drive interface A conventional hard disk drive system consists of the hard disk and its often-integrated controller as well as a host adapter to gain access to the rest of the computer system. The drive interface is a common component of the controller and host adapter.
Chapter 4: Printers and Multifunction Devices Which step in the EP imaging process uses a laser to discharge selected areas of the photosensitive drum, thus forming an image on the drum? A. Exposing B. Transferring C. Developing D. Cleaning
Answer: A. Exposing The exposing step uses a laser to discharge selected areas of the photosensitive drum, thus forming an image on the drum.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems You turn on a desktop computer and it fails to boot. You hear a rhythmic ticking coming from inside the case. What is most likely the problem? A. Failed hard drive B. Failed motherboard C. Failed CPU D. Failed RAM E. A bomb
Answer: A. Failed hard drive Only components with moving parts can make ticking or clicking noises. (Bombs can too, but hopefully you recognized that as a fake answer!) This question assumes that the hard drive is an HDD and not an SSD, but none of the other components would make a ticking noise.
Chapter 6: Introduction to TCP/IP Which TCP/IP protocol uses port 80? A. HTTP B. HTTPS C. Telnet D. POP3
Answer: A. HTTP HTTP uses port 80. HTTPS uses port 443, Telnet uses port 23, and POP3 uses port 110.
Chapter 4: Printers and Multifunction Devices What part of a laser printer supplies the voltages for charging and transferring corona assemblies? A. High-voltage power supply (HVPS) B. DC power supply (DCPS) C. Controller circuitry D. Transfer corona
Answer: A. High-voltage power supply (HVPS) The high-voltage power supply (HVPS) is the part of the laser printer that supplies the voltages for charging and transferring corona assemblies.
Chapter 6: Introduction to TCP/IP Your network is running IPv4. Which of the configuration options are mandatory for your host to communicate on the network? (Choose two.) A. IP address B. Subnet mask C. Default gateway D. DNS server address
Answer: A. IP address B. Subnet mask The only mandatory IPv4 configuration items are an IP address and a subnet mask. If you are not connecting to another network, you do not need a default gateway. DNS servers resolve hostnames to IP addresses, but they are not mandatory.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems You are identifying the problem while troubleshooting a network issue. Which of the following are proper steps to help identify the problem? (Choose all that apply.) A. Inquire regarding infrastructure changes. B. Conduct internal or external research based on symptoms. C. Refer to the vendor's instructions for guidance. D. Determine the next steps to resolve the problem. E. Gather information from the user and identify user changes to the computer.
Answer: A. Inquire regarding infrastructure changes. E. Gather information from the user and identify user changes to the computer. The two sub-steps to identify the problem are: gather information from the user and identify user changes to the computer, and inquire regarding environmental or infrastructure changes. Conducting internal or external research is part of establishing a theory of probable cause. Referring to the vendor's instructions for guidance is part of establishing a plan of action to resolve the problem. Determining the next steps to resolve the problem is part of testing the theory to determine the cause.
Chapter 1: Motherboards, Processors, and Memory The 32 GB of DDR4 memory has failed in a client's desktop computer. The client requests that you upgrade the system for better performance when replacing the RAM. Which of the following is the best option? A. Install two new 32 GB DDR4 RAM modules. B. Install two new 128 GB DDR4 RAM modules. C. Install two new 32 GB DDR5 RAM modules. D. Install two new 128 GB DDR5 RAM modules.
Answer: A. Install two new 32 GB DDR4 RAM modules. The only viable option listed is to install two new 32 GB DDR4 RAM modules. Check the motherboard documentation first to make sure the system will support that much memory, though. DDR4 does not come in modules larger than 64 GB. DDR5 is not compatible with DDR4 motherboards.
Chapter 9: Laptop and Mobile Device Hardware You need to replace an LCD on a defective laptop. Which of the following are components of an LCD? (Choose all that apply.) A. Inverter B. Screen C. Wi-Fi card D. Backdrop
Answer: A. Inverter B. Screen The components of an LCD screen are the inverter, screen, and backlight. LCD display units also have a Wi-Fi antenna (not the card), webcam, and microphone. There is no backdrop component.
Chapter 3: Peripherals, Cables, and Connectors Which of the following connector types are capable of conducting power and transmitting data? (Choose all that apply.) A. Lightning B. Molex C. USB-C D. DB-9 E. Micro-USB
Answer: A. Lightning C. USB-C E. Micro-USB USB cables and eSATA cables can transmit power and data. You will find Lightning, USB-C, and micro-USB connectors on the ends of USB cables. A Molex connector is power-only. A DB-9 is for serial cables and is data-only.
Chapter 1: Motherboards, Processors, and Memory You are assembling a new computer and are looking at new cooling systems. Which of the following cooling systems requires the use of a pump? A. Liquid B. Thermal paste C. Heat sink D. Heat sink plus fan
Answer: A. Liquid Liquid cooling systems require a reservoir of liquid and a pump to circulate the liquid. It's possible that the system could malfunction, causing a mess inside the computer. Thermal paste is used to adhere a heat sink to a processor. Heat sinks and fans do not use pumps.
Chapter 10: Mobile Connectivity and Application Support An administrator needs to be able to control which apps are installed on the corporate network's mobile devices, and update or delete them and their data as necessary. Which type of service do they need? A. MAM B. MDM C. Location services D. Device synchronization
Answer: A. MAM Mobile application management (MAM) is a service that allows administrators to control corporate software on mobile devices, including updating and wiping apps. Mobile device management (MDM) controls which devices are on the network and can wipe entire devices. Location services does not manage software. Synchronization can back up apps and data but does not help with updates or deleting apps.
Chapter 7: Wireless and SOHO Networks Which of the following are features that allow 802.11ac to achieve higher data throughput? (Choose two.) A. MIMO B. Beamforming C. Channel bonding D. Code division multiplexing
Answer: A. MIMO C. Channel bonding The two technologies that 802.11ac employs to achieve high throughput are channel bonding and MIMO. Channel bonding is the combination of multiple smaller channels into one large channel for greater bandwidth. MIMO is enhanced over 802.11n to allow for multiple inputs and outputs. 802.11ac also uses beamforming, but that helps the range, not the throughput.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies A client just bought a new digital camera for his photography business. Which of the following is specifically designed as an internal storage device for cameras? A. Memory cards B. Optical discs C. Flash drives D. mSATA
Answer: A. Memory cards Memory cards such as SD cards were designed for devices such as digital cameras. Optical discs are larger and used mostly with laptops and larger systems. Flash drives are USB. Some cameras may have a USB port, but that is external storage and not internal storage. mSATA is a laptop expansion card technology.
Chapter 10: Mobile Connectivity and Application Support You need to synchronize Windows desktop settings between two laptop computers. Which service is designed to do this? A. Microsoft 365 B. MAM C. MDM D. ActiveSync
Answer: A. Microsoft 365 Microsoft 365 is able to sync desktop settings between multiple Windows-based computers. ActiveSync is for syncing mobile devices with an Exchange email server. Mobile application management (MAM) and mobile device management (MDM) are for managing apps and network access for mobile devices.
Chapter 3: Peripherals, Cables, and Connectors The company photographer is interested in buying a new digital camera. He wants to be able to plug it directly into his laptop to transfer pictures for editing. What type of connector will most likely be on his camera? A. Mini-USB B. Thunderbolt C. Molex D. Lightning
Answer: A. Mini-USB For smaller electronic devices such as cameras, micro-USB and mini-USB connectors are common. Thunderbolt is primarily used for video. Molex is a power connector. Lightning is the Apple proprietary connector.
Chapter 1: Motherboards, Processors, and Memory Which computer component contains all the circuitry necessary for other components or devices to communicate with one another? A. Motherboard B. CPU C. RAM D. Expansion bus
Answer: A. Motherboard The spine of the computer is the system board, otherwise known as the motherboard. All other computer components plug into the motherboard. On the motherboard, you will find the CPU, underlying circuitry, expansion slots, video components, RAM slots, and various other chips.
Chapter 8: Network Services, Virtualization, and Cloud Computing You have been asked to identify the right type of cloud service to help the team of developers to provide programming elements such as runtime environments. Which service do you recommend? A. PaaS B. IaaS C. SaaS D. DaaS
Answer: A. PaaS Platform as a service (PaaS) is probably the right level of service for the developer team. It provides infrastructure, like IaaS, and also supplies needed programming elements. Infrastructure as a service doesn't provide runtime environments; think of it as hardware. Software as a service provides apps and is too high a service for what's needed here. There is no current DaaS on the exam objectives.
Chapter 4: Printers and Multifunction Devices Which of the following are possible interfaces for printers? (Choose three.) A. Parallel B. SATA C. USB D. Network
Answer: A. Parallel C. USB D. Network Printers can communicate via parallel, serial, USB, wireless, and network connections. SATA is a bus interface that connects host bus adapters to storage devices such as hard drives and optical drives.
Chapter 5: Networking Fundamentals If you are going to run a network cable in the space above the drop ceiling in your office, which type of cable should you use? A. Plenum B. PVC C. Coaxial D. Fiber-optic
Answer: A. Plenum For areas where a cable must be fire retardant, such as in a drop ceiling, you must run plenum-grade cable. Plenum refers to the coating on the sleeve of the cable, not the copper or fiber within the cable itself. PVC is the other type of coating typically found on network cables, but it produces poisonous gas when burned.
Chapter 1: Motherboards, Processors, and Memory Your Core i5 fan has a 4-pin connector, but your motherboard only has a single 3-pin header with the CPU_FAN label. Which of the following will be the easiest solution to get the necessary cooling for your CPU? A. Plug the 4-pin connector into the 3-pin header. B. Buy a 4-pin to 3-pin adapter. C. Leave the plug disconnected and use only the heat sink. D. Add an extra chassis fan.
Answer: A. Plug the 4-pin connector into the 3-pin header. The easiest solution that works to cool your CPU is to connect the four-pin connector into the three-pin header. The missing pin allows you to control the speed of the fan. Without it, the fan will run at top speed, which is fine, albeit a little noisier. There is no four-pin to three-pin power adapter. The heat sink alone should not be relied upon for proper cooling of modern CPUs, and an extra chassis fan isn't designed to specifically help cool the CPU.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies Which of the following best describes the concept of hot-swappable devices? A. Power does not need to be turned off before the device is inserted or removed. B. The device can be removed with power applied after it is properly stopped in the operating system. C. Care must be taken when swapping the device because it can be hot to the touch. D. The device can be swapped while still hot, immediately after powering down the system.
Answer: A. Power does not need to be turned off before the device is inserted or removed. Hot-swappable devices can be removed while the power to the system is still on. Warm-swappable devices need to be stopped in the operating system before being removed. The term has nothing to do with the heat level of the device.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems A user complains of smoke and a foul odor coming from their desktop computer, so they shut it down. Which component is most likely causing the problem? A. Power supply B. RAM C. CPU D. Motherboard
Answer: A. Power supply Smoke and foul odors such as burning smells are not normal for computers! The most likely component causing the problem is the power supply. With the system off, open the computer case (not the power supply case!) to examine the inside for possible physical damage.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems A user pushes the power button on their desktop computer but nothing happens. They double-check that it is plugged in and that the wall outlet is working properly. Which components are most likely to cause this problem? (Choose two.) A. Power supply B. Motherboard C. Power cord D. CPU E. RAM
Answer: A. Power supply C. Power cord If the wall outlet is functioning and the power cable is connected properly (always check the obvious), then the most likely culprits are the power supply or the power cord. The motherboard, CPU, and RAM are unlikely to cause a complete power failure in a computer.
Chapter 8: Network Services, Virtualization, and Cloud Computing Which type of server is responsible for preventing users from accessing websites with objectionable content? A. Proxy B. Web C. DHCP D. DNS
Answer: A. Proxy A proxy server can be configured to block access to websites that contain potentially dangerous or inflammatory material. Web servers host web pages, some of which may have objectionable content. DHCP servers provide clients with IP addresses, and DNS servers resolve hostnames to IP addresses.
Chapter 5: Networking Fundamentals What type of coaxial cable is recommended for digital television cable signals? A. RG-6 B. RG-8 C. RG-58 D. RG-59
Answer: A. RG-6 The two RG standards used for cable television are RG-6 and RG-59. Of the two, RG-6 is better because it can run longer distances and can handle digital signals. RG-59 is for analog signals only. RG-8 is thicknet coax, and RG-58 is thinnet coax.
Chapter 8: Network Services, Virtualization, and Cloud Computing You are setting up a cloud contract with a provider. Your team needs the ability to quickly increase capacity to meet peak demands. What do you request? A. Rapid elasticity B. High availability C. Resource pooling D. Metered utilization
Answer: A. Rapid elasticity The ability to expand services quickly means rapid elasticity. High availability guarantees uptime for services. All cloud services use resource pooling. Metered utilization is how many suppliers track usage and charge accordingly.
Chapter 12: Hardware and Network Troubleshooting A user tells you that his Android phone case is bulging, and the device has been hot to the touch lately. You suspect a swollen battery. Which of the following is a good next step? A. Replace the device. B. Leave the device on to drain the battery, and then recharge the device. C. Turn the device off, let it cool to room temperature, and then recharge the device. D. Use the battery calibration utility. E. Freeze the system.
Answer: A. Replace the device. With a swollen battery, the best solution is to replace the device. If you are experienced with mobile device batteries, you may be able to replace the battery, but be careful! You should not charge a swollen battery or freeze the system. A battery calibration utility will do no good.
Chapter 5: Networking Fundamentals What devices transfer packets across multiple networks and use tables to store network addresses to determine the best destination? A. Routers B. Firewalls C. Hubs D. Switches
Answer: A. Routers Routers are designed to route (transfer) packets across networks. They are able to do this routing, determining the best path to take, based on the internal routing tables that they maintain.
Chapter 6: Introduction to TCP/IP Which network protocol is used for administration of networking devices such as routers and switches, and which port(s) does it use? A. SNMP, 161 and 162 B. SNMP, 25 C. SMTP, 25 D. SMTP, 161 and 162
Answer: A. SNMP, 161 and 162 Simple Network Management Protocol (SNMP) is used for networking device administration and management. It uses ports 161 and 162. Simple Mail Transfer Protocol (SMTP) is for sending email and uses port 25.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies When installing multiple add-on cards of the same type, which type of cards might you need to bridge together to function as a single unit? A. Video B. Sound C. USB D. eSATA
Answer: A. Sound PCIe video cards may be bridged together, enabling two cards to function as one system. Sound cards and I/O expansion cards such as USB and eSATA cards do not have bridging capabilities.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems You have been troubleshooting a laptop for an hour and have established a theory of probable cause for the problem. What is the next step you should take? A. Test the theory to determine cause. B. Document findings, actions, and outcomes. C. Verify full system functionality and implement preventive measures. D. Establish a plan of action to resolve the problem.
Answer: A. Test the theory to determine cause. The second step in the best practice methodology to resolve problems is to establish a theory of probable cause, which has been done here. The next step is to test the theory to determine the cause. After that, establish a plan of action to resolve the problem, verify full system functionality, and document findings.
Chapter 8: Network Services, Virtualization, and Cloud Computing 1. You have been asked to set up client-side virtualization on a computer at work. The manager asks for a Type 2 hypervisor. What is the disadvantage of using that type of hypervisor? A. The guest OS will compete for resources with the host OS. B. The guest OS will be forced to a lower priortity with the CPU than the host OS. C. The guest OS will be forced to use less RAM than the host OS. D. The virtual guest OS will not be able to get on the physical network.
Answer: A. The guest OS will compete for resources with the host OS. A Type 2 hypervisor sits on top of an existing OS, meaning that OSs installed in VMs will compete for resources with the host OS. The amount of resources available to a guest OS can be configured. Virtual OSs can get on the physical network if configured properly.
Chapter 10: Mobile Connectivity and Application Support Which of the following most accurately describes what a PRL is? A. The list of cell phone towers a mobile device should connect with while roaming B. The description of the user and mobile network C. The mobile carrier code D. The configuration settings of the network the mobile device is on
Answer: A. The list of cell phone towers a mobile device should connect with while roaming The preferred roaming list (PRL) is the list of cell towers a mobile device should connect to while roaming. It is not a description of the user and network, a carrier code, or the configuration settings of the network.
Chapter 9: Laptop and Mobile Device Hardware A user has requested a laptop memory upgrade. The technician attempts to put in new memory, but the memory module is a bit too wide for the slot. What is the most likely scenario? A. The technician is trying to install DDR4 into a motherboard with DDR3 slots. B. The technician is trying to install DDR3 into a motherboard with DDR4 slots. C. The technician is trying to install MicroDIMMs into SODIMM slots. D. The technician is trying to install DIMMs into SODIMM slots.
Answer: A. The technician is trying to install DDR4 into a motherboard with DDR3 slots. Laptops use SODIMMs (or possibly MicroDIMMs), which are much smaller than the standard DIMMs used in desktops. DDR2 and DDR3 SODIMMs are 67.6 millimeters wide, whereas DDR4 SODIMMs are 69.6 millimeters wide. It's likely that the technician has DDR4 SODIMMs and the motherboard supports DDR3 SODIMMs.
Chapter 12: Hardware and Network Troubleshooting Your laser printer keeps printing vertical black lines on its output pages. What is the most likely cause of the problem? A. There is a groove or scratch in the EP drum. B. The EP drum-cleaning blade is broken. C. The printer is low on toner. D. The transfer corona wire is not working properly.
Answer: A. There is a groove or scratch in the EP drum. The most likely cause is a groove or a scratch in the EP drum. Toner is collecting in that groove or scratch, and then it is being deposited onto the page. A broken drum-cleaning blade would result in unreadable images (too much toner). Low toner would cause faded images, and a bad transfer corona wire would cause blank images.
Chapter 3: Peripherals, Cables, and Connectors Which of the following display interfaces is equivalent to DisplayPort with PCIe added in? A. Thunderbolt B. HDMI C. DVI D. VGA
Answer: A. Thunderbolt Intel and Apple collaborated on Thunderbolt to add PCIe to VESA's DisplayPort and to make the resulting interface smaller and less expensive to connect. HDMI, DVI, and VGA are not equivalent to DisplayPort with PCIe added in.
Chapter 12: Hardware and Network Troubleshooting If the video on your laptop is not working, what should you do to troubleshoot it? (Choose two.) A. Toggle the video function key. B. Try using an external monitor. C. Remove the display unit and reattach it. D. Power the system off and back on.
Answer: A. Toggle the video function key. B. Try using an external monitor. Two helpful things to try are toggling the video output function key (usually something like Fn+F8) and plugging an external monitor into the laptop. Removing the display is possible but not necessary yet. Powering the system off and back on isn't likely to correct the problem.
Chapter 4: Printers and Multifunction Devices What is typically included in the EP laser printer toner cartridge? (Choose three.) A. Toner B. Print drum C. Laser D. Cleaning blade
Answer: A. Toner B. Print drum D. Cleaning blade An electrophotographic (EP) laser printer toner cartridge includes the toner, print drum, and cleaning blade. The laser is usually contained within the printer, not within the toner cartridge.
Chapter 9: Laptop and Mobile Device Hardware A user complains that their mouse cursor randomly jumps to different places on the screen when they type. Which device might you want to disable to prevent this from happening? A. Touchpad B. Mouse C. Point stick D. Trackball
Answer: A. Touchpad The touchpad sits below the keyboard, where the user's palms may rest when they are typing. That contact may cause the mouse cursor to appear to jump on the screen. Disabling the touchpad should prevent this from happening.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies When replacing a power supply, which of the following tends to vary among power supplies and must be chosen properly to support all connected devices? A. Wattage B. Voltage C. Amperage D. Resistance
Answer: A. Wattage Power supplies are rated in watts. When you purchase a power supply, you should make sure the devices inside the computer do not require more wattage than the chosen power supply can offer. The voltage is fairly standard among power supplies, and it has nothing to do with the devices connected to the power supply. Amperage and resistance are not selling points for power supplies. Another thing that could vary is the number of power connectors—make sure the new power supply has enough to support all installed peripherals.
Chapter 8: Network Services, Virtualization, and Cloud Computing When configuring a DNS server, administrators must create which of the following? A. Zone file B. Hosts file C. Scope file D. DNS proxy
Answer: A. Zone file DNS server records are contained in the zone file, which must be configured by administrators. A hosts file is an alternative to using DNS (but that does not work well when scaling to the Internet). A scope is created on DHCP servers. There is no DNS proxy.
Chapter 5: Networking Fundamentals Transmitting at 10 Gbps, how far can signals on an MMF cable travel? A. 100 meters B. 550 meters C. 1 kilometer D. 40 kilometers
Answer: B. 550 meters Multimode fiber (MMF) can transmit up to 550 meters, depending on the Ethernet specification. Other standards using MMF can transmit only up to 300 meters. If you need to transmit up to 40 kilometers, you will have to use single-mode fiber (SMF).
Chapter 8: Network Services, Virtualization, and Cloud Computing You have been asked to install Linux in a VM on a Windows 10 client. The Windows 10 client needs 4 GB of RAM, and Linux needs 2 GB of RAM. How much RAM does the system need at a minimum? A. 4 GB B. 6 GB C. 8 GB D. Unable to determine from the question
Answer: B. 6 GB There needs to be enough RAM to support both OSs, so the answer is 6 GB. More is better, though!
Chapter 7: Wireless and SOHO Networks Which of the following wireless IEEE standards operate on the 2.4 GHz radio frequency and are directly compatible with each other? (Choose two.) A. 802.11a B. 802.11b C. 802.11ac D. 802.11g
Answer: B. 802.11b D. 802.11g Both 802.11b and 802.11g operate in the 2.4 GHz range and use similar transmission standards. Some legacy devices are listed as 802.11b/g, meaning they will work with either system. Alternatively, 802.11a and 802.11ac operate in the 5 GHz range.
Chapter 7: Wireless and SOHO Networks A firewall operates by using a set of rules known as what? A. SLA B. ACL C. NAT D. APIPA
Answer: B. ACL The set of rules for access on a firewall is called an access control list (ACL). An SLA is an agreement on service level for QoS. NAT translates private IP addresses into public ones. APIPA assigns an IP address to a client that can't reach the DHCP server.
Chapter 9: Laptop and Mobile Device Hardware You need to replace a failed AC adapter for a client's laptop. When replacing the adapter, which of the following purchases is acceptable to obtain the same or better results? A. An AC adapter with a higher voltage rating than the original B. An AC adapter with a higher wattage rating than the original C. A DC adapter with the same voltage rating as the original D. An AC adapter with a lower voltage and wattage rating than the original
Answer: B. An AC adapter with a higher wattage rating than the original Think of wattage as a "bucket" of power that the attached device can draw from. A bigger bucket simply holds more power but does not force the power on the device. Less wattage is not advised, however. Voltage can be thought of as the pressure behind the power to the device. Anything but the proper voltage is dangerous for the device. When you replace a laptop's AC adapter, you should match the voltage ratings of the original adapter. This also means that you should use an adapter with a fixed voltage if that matches the characteristics of the original; otherwise, obtain one that automatically switches voltages at the levels needed.
Chapter 3: Peripherals, Cables, and Connectors VGA cables use what type of signal between the adapter and monitor? A. Digital B. Analog C. Composite D. Compressed
Answer: B. Analog VGA signals are analog, uncompressed, component signals that carry all of the video information for all three components of the original RGB signal. VGA signals are not digital, composite, or compressed.
Chapter 12: Hardware and Network Troubleshooting You turn on a laptop computer and the hard drive is not recognized. Where should you go to troubleshoot the issue? A. S.M.A.R.T. diagnostics B. BIOS/UEFI C. Windows Device Manager D. Boot sector manager
Answer: B. BIOS/UEFI If the hard drive is not recognized, the BIOS/UEFI is the place to check. Most systems do not come with built-in S.M.A.R.T. diagnostics software, even if the hard drive is capable of gathering S.M.A.R.T. data. And if there were one, it would give you potential errors on a working drive. Windows Device Manager is inaccessible without the drive being recognized. There is no boot sector manager, although this issue could be related to the boot sector.
Chapter 7: Wireless and SOHO Networks Due to channel interference, you are upgrading a wireless network from Wi-Fi 5 to Wi-Fi 6. Which feature of Wi-Fi 6 reduces channel interference? A. OFDMA B. BSS coloring C. MU-MIMO D. DFS
Answer: B. BSS coloring The feature of Wi-Fi 6 that reduces channel interference is Basic Service Set (BSS) coloring, which adds a field to the wireless frame that distinguishes it from others. Orthogonal Frequency Division Multiple Access (OFDMA) is a modulation technique that improves speed because it allows transmission to multiple clients at once. MU-MIMO also increases speed because in Wi-Fi 6 it works for uplink connections as well as downlink ones. Dynamic Frequency Selection (DFS) was introduced with 802.11n, and it detects radar interference and adjusts frequencies accordingly.
Chapter 9: Laptop and Mobile Device Hardware One of your network users has an older laptop with no Bluetooth support. They recently received a Bluetooth headset that they need to use with their laptop. What is the quickest and cheapest way to make the headset compatible with the user's laptop? A. Buy a Wi-Fi-compatible headset B. Buy a USB Bluetooth adapter C. Buy a Mini PCIe Bluetooth adapter D. Replace the laptop
Answer: B. Buy a USB Bluetooth adapter A USB Bluetooth adapter should do the trick. There are Mini PCIe Bluetooth adapters, but installing one is trickier than inserting a USB device. There aren't really any Wi-Fi-compatible headsets on the market—headsets are exactly what Bluetooth was designed for. Replacing the laptop is a much more expensive proposition.
Chapter 5: Networking Fundamentals ___________________ is the type of media access method used by NICs that listen to or sense the cable to check for traffic and send only when they hear that no one else is transmitting. A. T568A/T568B B. CSMA/CD C. CSMA/CA D. Demand priority
Answer: B. CSMA/CD Carrier Sense Multiple Access with Collision Detection (CSMA/CD) specifies that the NIC pause before transmitting a packet to ensure that the line is not being used. If no activity is detected, then it transmits the packet. If activity is detected, it waits until it is clear. In the case of two NICs transmitting at the same time (a collision), both NICs pause to detect and then retransmit the data. CSMA/CA listens to the line as well but tries to avoid collisions. T568A/T568B are twisted pair wiring standards. Demand priority is a media access method, but we didn't discuss it at all in the chapter as it's not related to the A+ exam. It's used with a standard called 100BaseVG.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies You install a new NIC for a user, and he asks what it does. Which of the following best characterizes the functions of this device? A. Multimedia B. Communications C. Input/Output D. Storage
Answer: B. Communications A network interface card (NIC) is used as a communications device. It enables the computer to talk to other computers on a network. It does not provide multimedia, input/output (such as a USB port does), or storage capabilities.
Chapter 10: Mobile Connectivity and Application Support Which of the following are universally common items that are synced between a mobile device and a larger computer? (Choose all that apply.) A. Office documents B. Contacts C. Operating system files D. Calendar E. Configuration settings F. Apps
Answer: B. Contacts D. Calendar F. Apps Contacts, calendar, and apps are commonly synchronized, along with pictures, music, videos, email, bookmarks, documents, location data, social media data, e-books, and passwords.
Chapter 9: Laptop and Mobile Device Hardware One of the users on your network needs to travel and wants to work on the airplane. Which laptop accessory will allow them to power their laptop from the airplane? A. AC adapter B. DC adapter C. Battery converter D. Airplane mode
Answer: B. DC adapter A DC adapter converts the DC output from a car or airplane accessory power plug into the DC voltages required by your laptop. An AC adapter is used with standard wall electrical outlets. There is no battery converter. Airplane mode shuts off all wireless communications.
Chapter 1: Motherboards, Processors, and Memory You need to replace memory in a desktop PC and go to purchase RAM. When you are at the store, you need to find the appropriate type of memory. What memory chips would you find on a stick of PC3-16000? A. DDR-2000 B. DDR3-2000 C. DDR3-1600 D. PC3-2000
Answer: B. DDR3-2000 Remember the 8:1 rule. Modules greater than but not including SDR SDRAM are named with a number eight times larger than the number used to name the chips on the module. The initials PC are used to describe the module; the initials DDR are used for the chips; and a single-digit number after PC and DDR is used to represent the level of DDR. The lack of a single-digit number represents DDR as long as the number that is present is greater than 133 (such as PC1600). Otherwise, you're dealing with SDR (such as PC133). This means that PC3-16000 modules are DDR3 modules and are populated with chips named DDR3 and a number that is one-eighth of the module's numeric code: 2000.
Chapter 6: Introduction to TCP/IP You have just set up a network that will use the TCP/IP protocol, and you want client computers to obtain IP configuration information automatically. Which type of server do you need for this? A. DNS B. DHCP C. NAT D. IP configuration server
Answer: B. DHCP A Dynamic Host Configuration Protocol (DHCP) server provides IP configuration information to hosts when they join the network. A Domain Name System (DNS) server resolves hostnames to IP addresses. Network Address Translation (NAT) translates private IP addresses into public IP addresses. There is no IP configuration server (other than a DHCP server).
Chapter 3: Peripherals, Cables, and Connectors Which of the following could be used with an analog monitor? (Choose two.) A. HDMI B. DVI-A C. DVI-D D. DisplayPort E. VGA
Answer: B. DVI-A E. VGA Analog monitors require an analog signal. VGA is an analog video standard and will work. DVI-A is also analog. (DVI-I would work as well.) HDMI, DVI-D, and DisplayPort are all digital standards.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems You are using the best practice methodology to troubleshoot a video problem. During which step should you question the obvious? A. Test the theory to determine cause. B. Establish a theory of probable cause. C. Identify the problem. D. Establish a plan of action to resolve the problem.
Answer: B. Establish a theory of probable cause. The second step in the best practice methodology is to establish a theory of probable cause (question the obvious). While it makes sense to question the obvious at all times during troubleshooting, it officially falls under this step in the best practice methodology.
Chapter 5: Networking Fundamentals What type of device will block unwanted traffic from your network using a set of rules called an ACL? A. Router B. Firewall C. Switch D. NAS
Answer: B. Firewall The job of a firewall is to block unwanted network traffic. Firewalls do this by using a list of rules called an access control list (ACL). Routers connect networks to each other, and switches are central connectivity points for networks. A network attached storage (NAS) device is like a dedicated file server.
Chapter 4: Printers and Multifunction Devices Which laser printer component permanently presses the toner into the paper? A. Transfer corona B. Fuser assembly C. Printer controller circuitry D. Paper transport assembly
Answer: B. Fuser assembly The fuser assembly presses and melts the toner into the paper. The transfer corona transfers the toner from the drum to the paper. The printer controller circuitry converts signals from the PC into signals for the various printer assemblies. The paper transport assembly controls the movement of the paper through the printer.
Chapter 10: Mobile Connectivity and Application Support Which of the following location services typically provides the best accuracy when detecting a user's location? A. Cellular B. GPS C. MAM D. MDM
Answer: B. GPS GPS is generally more accurate than cellular when determining location. MAM and MDM are mobile device management concepts, not location services.
Chapter 6: Introduction to TCP/IP Your friend is concerned about the security of making an online purchase. What should you tell them to look for in the address bar of the web browser? A. HTTP B. HTTPS C. SSH D. TLS
Answer: B. HTTPS The HTTP protocol is inherently unsecure, but the HTTPS protocol is secure. (SSH and TLS are secure as well, but they are not protocols used to connect to websites.)
Chapter 10: Mobile Connectivity and Application Support You are enabling email on a mobile client. Which of the following is not a standard integrated commercial provider for email? A. iCloud B. Hotmail C. Yahoo Mail D. Exchange Online
Answer: B. Hotmail Four commercial email providers to be familiar with are iCloud, Google/Inbox, Exchange Online, and Yahoo Mail. Hotmail used to be a commercial email provider, but it no longer exists; it's now part of Outlook.com.
Chapter 9: Laptop and Mobile Device Hardware Your manager tells you to replace the inverter on a broken laptop. Where will you find this component? A. Underneath the keyboard B. In the display C. Next to the heat sink and fan D. Near the CPU
Answer: B. In the display The inverter, which transforms AC power into DC power for an LCD backlight, is found in the display. It's not underneath the keyboard, next to the heat sink and fan, or near the processor, which are all located in the bottom half of the laptop.
Chapter 8: Network Services, Virtualization, and Cloud Computing Your manager wants to use the cloud because everyone seems to be talking about it. What should you include when you are listing the benefits of using the cloud? (Choose all that apply.) A. Increased security B. Increased scalability C. Lower cost D. Improved reliability
Answer: B. Increased scalability C. Lower cost D. Improved reliability Cloud solutions are great for enhancing scalability and reliability while generally lowering costs. Security could be an issue with cloud computing, depending on your organization's needs, because the resources aren't locally controlled and managed.
Chapter 4: Printers and Multifunction Devices Which device in an inkjet printer contains the print head? A. Toner cartridge B. Ink cartridge C. Daisy wheel D. Paper tray
Answer: B. Inkjet printer In an inkjet printer, the ink cartridge is the actual print head. This is where the ink is expelled to form letters or graphics. Toner cartridges are used by laser printers to store toner. A daisy wheel is the device that impacts the letters on the paper in a daisy-wheel printer. Paper trays are the storage bins in laser printers and inkjet printers that allow the pickup rollers to feed the paper into the printer.
Chapter 6: Introduction to TCP/IP Which of the following protocols was designed to access information stored in an information directory, such as employee phone books? A. FTP B. LDAP C. RDP D. CIFS
Answer: B. LDAP Lightweight Directory Access Protocol (LDAP) is designed to access information stored in an information directory typically known as an LDAP directory or LDAP database. This typically includes employee data and network configuration data. FTP is designed to transfer files. RDP is a remote desktop protocol, and CIFS is used to share files and printers.
Chapter 3: Peripherals, Cables, and Connectors A user with an iPhone 12 needs to charge her device and asks you to bring a cable. Which of the following connector types should you ensure that the cable has? A. Thunderbolt B. Lightning C. Mini-USB D. Micro-USB
Answer: B. Lightning Starting with the iPhone 5, Apple products use the proprietary Lightning connector for charging and connecting peripherals. Thunderbolt connectors are on MacBooks for peripherals. iPhones do not have built-in mini- or micro-USB connectors.
Chapter 12: Hardware and Network Troubleshooting You believe that a network card is beginning to fail. Which of the following tools should you use to see if the network card is capable of sending and receiving data from an RJ-45 port? A. Toner probe B. Loopback plug C. Multimeter D. Cable tester
Answer: B. Loopback plug A loopback plug is used to test the ability of a network adapter to send and receive. The plug gets plugged into the NIC, and then a loopback test is performed using troubleshooting software. A toner probe is used to trace a cable. Multimeters test for electrical issues. Cable testers are for verifying that a cable works properly.
Chapter 10: Mobile Connectivity and Application Support You need to configure email for a mobile client. Their device has a setting referring to port 587. Which mail protocol is likely using this protocol? A. SMTP with SSL B. SMTP with TLS C. IMAP4 with SSL/TLS D. POP3 with SSL/TLS
Answer: B. SMTP with TLS SMTP with TLS uses port 587 by default. With SSL, SMTP uses port 465. IMAP4 with SSL/TLS uses port 993, while POP3 with SSL/TLS uses port 995.
Chapter 10: Mobile Connectivity and Application Support A network administrator wants to be able to remotely wipe everything off of corporate smartphones if they are lost or stolen. What type of service do they need? A. MAM B. MDM C. Two-factor authentication D. Location services
Answer: B. MDM Mobile device management (MDM) is a type of service that allows network administrators to specify which mobile devices can join the network. It also gives administrators the ability to remotely lock and completely wipe mobile devices. Mobile application management (MAM) lets an administrator control the corporate apps on a mobile device. Two-factor authentication is a security concept. Location services can help find a mobile device, but not remotely wipe it.
Chapter 3: Peripherals, Cables, and Connectors Which of the following is not an example of a connector for a standard peripheral input device? A. 1/8″ jack B. Molex C. D-sub D. USB
Answer: B. Molex Peripherals most often use USB today, but they can also use D-sub connectors (rarely), and audio devices such as microphones and speakers use 1/8″ jacks. Molex connectors are power connectors for PATA hard drives and optical drives.
Chapter 5: Networking Fundamentals Which of the following are advantages to using a SAN? (Choose two.) A. More storage space on the network B. More efficient data storage C. Faster data access D. Automated data backups
Answer: B. More efficient data storage C. Faster data access Storage area networks (SANs) have many advantages, including block-level data storage, which is more efficient. They also reduce network loads, provide faster data access, and are easily expandable. They do not inherently provide more storage space (although they are easy to expand) or do automated data backups (although they are easier to set up).
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems A field technician reports back that the computer they are troubleshooting has exposed distended capacitors. Which component has most likely failed? A. Power supply B. Motherboard C. CPU D. RAM
Answer: B. Motherboard Capacitors store energy and are located on the motherboard and inside the power supply. Since the capacitors are exposed, it likely means the technician is seeing the problem on the motherboard. CPUs and RAM do not have capacitors.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies A client is looking for a desktop storage technology that provides the fastest possible data transfers. Which technology should you recommend? A. SATA B. NVMe C. 10,000 rpm D. 15,000 rpm
Answer: B. NVMe The fastest SSD communications interface is NVMe. SATA 10,000 rpm and 15,000 rpm refer to conventional hard drive spin rates, and conventional hard drives will always be slower than SSDs.
Chapter 8: Network Services, Virtualization, and Cloud Computing You have been asked to configure a client-side virtualization solution with three guest OSs. Each one needs Internet access. How should you configure the solution in the most cost-effective way? A. Three physical NICs B. One physical NIC, three virtual NICs, and one virtual switch C. One physical NIC, one virtual NIC, and three virtual switches D. One physical NIC, three virtual NIC, and three virtual switches
Answer: B. One physical NIC, three virtual NICs, and one virtual switch Each virtual machine will use its own virtual NIC, so you need three virtual NICs. The virtual NICs will communicate with one virtual switch managed by the hypervisor. The virtual switch will communicate with one physical NIC on the host system.
Chapter 1: Motherboards, Processors, and Memory A technician asks you how to get a computer's processor to run faster than it currently does. What are they trying to achieve? A. Hyper-Threading B. Overclocking C. Virtualization D. Multicore support
Answer: B. Overclocking Overclocking is when someone sets the speed of the processor to run faster than it was rated for. While overclocking can make a computer faster, it can also cause the processor to overheat, and it voids the warranty. Hyper-threading allows for a processor core to handle multiple processes simultaneously. Virtualization is when you create multiple virtual machines on a computer. Multicore means that the processor has more than one core—it's not a configurable option.
Chapter 1: Motherboards, Processors, and Memory You need to install a new video card into a desktop computer. What type of expansion slot is preferred today for high-performance graphics adapters? A. AGP B. PCIe C. PCI D. SATA
Answer: B. PCIe PCIe is the newest and fastest slot for video cards. AGP and PCI are legacy technologies. SATA is for hard drives.
Chapter 10: Mobile Connectivity and Application Support A mobile user is having cellular connectivity problems when roaming but not when near their home. They are told by their carrier that they need to update their settings. Which of the following settings do they most likely need to update? A. PRI B. PRL C. Baseband D. IMEI
Answer: B. PRL When roaming, the mobile device uses the preferred roaming list (PRL) to connect to the proper cell phone tower. The product release instruction (PRI) contains settings for configuration items on the device that are specific to the network that it's on. Baseband refers to all wireless communications. The international mobile equipment identity (IMEI) is a 15-digit serial number that is unique to each phone and is not relevant to this issue.
Chapter 7: Wireless and SOHO Networks Which of the following technologies can operate in the 125 kHz to 134 kHz range? A. Bluetooth B. RFID C. NFC D. LTE
Answer: B. RFID Radio frequency identification (RFID) can operate in three frequency bands: 125 kHz to 134 kHz, 13.56 MHz, or 856 MHz to 960 MHz. Bluetooth is 2.4 GHz, NFC is 13.56 MHz, and LTE is between 600 MHz and 6 GHz.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems You are troubleshooting a Windows-based desktop computer that is experiencing unexpected shutdowns. Which of the following would be a good next step to resolve the issue? (Choose two.) A. Replace the motherboard, CPU, and RAM to see if it resolves the problem. B. Replace the RAM to see if it resolves the problem. C. Reinstall Windows to see if it resolves the problem. D. Replace the CPU to see if it resolves the problem.
Answer: B. Replace the RAM to see if it resolves the problem. D. Replace the CPU to see if it resolves the problem. Intermittent shutdowns are hard to troubleshoot but are most likely hardware related. When troubleshooting, always make one change at a time to try to resolve the issue. Replacing the RAM or the CPU to see if it resolves the problem could be a good next step, but replacing three components at once is too many changes unless you have specific reason to believe it is all three. Reinstalling Windows is probably overkill as well. Narrow down the issue before implementing sweeping solutions such as that.
Chapter 8: Network Services, Virtualization, and Cloud Computing You need to set up a temporary operating system environment to quickly test a piece of software your manager wants to install on the network. Which should you use? A. AAA server B. Sandbox C. SCADA D. Application virtualization
Answer: B. Sandbox A sandbox is a temporary operating system environment, kind of like a "lite" version of a virtual machine. It's ideal for testing software such as this. An AAA server is for authentication, authorization, and accounting of security. SCADA is a legacy hardware and/or software environment used to control industrial systems. Application virtualization is used for legacy apps or cross-platform virtualization.
Chapter 8: Network Services, Virtualization, and Cloud Computing What does a DHCP server need to be configured with to operate properly? A. DNS server B. Scope C. Range D. DHCP relay agent
Answer: B. Scope Every DHCP server needs to have a scope, which is the range of addresses available to clients, as well as other options that it can give to client computers. A DHCP server can optionally provide clients with the address of a DNS server. There is no DHCP range. A DHCP relay agent is a system configured on a subnet with no DHCP server that relays DHCP requests to the DHCP server.
Chapter 3: Peripherals, Cables, and Connectors Which of the following types of cables will transfer data at the slowest rate? A. USB4 B. Serial C. Thunderbolt 3 D. HDMI
Answer: B. Serial Classic serial ports and serial cables have the slowest data transmission speeds of any cable discussed in this chapter.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies You are choosing an optical drive format for a client. Which optical disc format supports a data capacity of 25 GB? A. Double-sided, double-layer DVD+R B. Single-sided, single-layer Blu-ray Disc C. Double-sided, single-layer DVD-R D. Double-sided, single-layer DVD+R
Answer: B. Single-sided, single-layer Blu-ray Disc Blu-ray discs have a single-sided, single-layer capacity of 25 GB. A double-sided, single-layer DVD can store about 9.4 GB, and a double-sided, double-layer DVD can store about 17.1 GB.
Chapter 1: Motherboards, Processors, and Memory You press the front power button on a computer and the system boots. Later, you press it briefly and the system hibernates. When you press it again, the system resumes. You press and hold the button and the system shuts down. What is this feature called? A. Programmable power B. Soft power C. Relay power D. Hot power
Answer: B. Soft power Soft power is the feature whereby the front power button acts as a relay to initiate various system power changes, depending on the duration that the button is held. Programmable power, relay power, and hot power are not valid power options.
Chapter 12: Hardware and Network Troubleshooting Users are complaining that their print jobs are not printing. You open the print queue and see 50 jobs lined up. The printer is connected properly and online. What should you do? A. Open Printer Troubleshooting and have it diagnose the problem. B. Stop and restart the print spooler. C. Delete and reinstall the printer. D. Delete and reinstall Windows.
Answer: B. Stop and restart the print spooler. If print jobs are seemingly getting "stuck" in the printer queue, you should stop and restart the print spooler service. There is no Printer Troubleshooting utility. Deleting and reinstalling the printer and/or Windows is not necessary.
Chapter 7: Wireless and SOHO Networks Which of the following security standards was the first to introduce a dynamic 128-bit per-packet security key? A. WEP B. TKIP C. AES D. CCMP
Answer: B. TKIP WEP could use a 64-bit or 128-bit security key, but it was a static key. TKIP introduced a dynamic per-packet key. AES and CCMP came after TKIP.
Chapter 12: Hardware and Network Troubleshooting The display on your laptop appears warped and fuzzy. You plug in an external monitor, and the image on it is fine. What is the most likely cause of the problem? A. The video card B. The LCD display C. The motherboard D. The video driver
Answer: B. The LCD display It has to be a problem with the LCD display. If it were the video card, the display would appear warped and fuzzy on the external monitor as well. While many motherboards contain video circuitry, this answer is not specific enough. If the video driver were corrupted, you would have the same problem on all displays.
Chapter 10: Mobile Connectivity and Application Support Which of the following statements about configuring email access on a mobile device is true? A. Most Internet mail services offer an Exchange option. B. The TCP ports used for configuring access are usually standard port numbers. C. Most ports used for access are UDP ports. D. You must download third-party apps for connecting to email services.
Answer: B. The TCP ports used for configuring access are usually standard port numbers. Mail access uses standard secure or unsecure TCP ports, not UDP ports. Exchange access to such mail services is not unheard of, but it is exceedingly rare. Mobile devices tend to have email clients built in.
Chapter 8: Network Services, Virtualization, and Cloud Computing Your company hosts its own web server, and it allows consumers to make purchases via the server. The help line has been getting complaints that users are unable to access the website. You open the site from an internal workstation and it seems fine. What is the most likely cause? A. The firewall is blocking TCP port 23. B. The firewall is blocking TCP port 443. C. The security module of the web server is malfunctioning. D. The web server is down.
Answer: B. The firewall is blocking TCP port 443 For secure transactions, the web server will be using HTTPS, which uses port 443. If the website works from an internal workstation, then the server is fine. It's most likely that the firewall is blocking inbound traffic on port 443. Port 23 is Telnet.
Chapter 7: Wireless and SOHO Networks You have been asked to configure a network for a small office. The wireless router is installed, and now you need to connect the client computers. What do you enter on the client computers to connect to the router? A. The administrator password B. The security passphrase C. The client's MAC address D. The default router password
Answer: B. The security passphrase To join the network, client computers need to find the SSID, ensure that the security settings are correct (to match the router), and enter the security passphrase. As an administrator, you should have configured this passphrase to be different from the router's administrator password.
Chapter 9: Laptop and Mobile Device Hardware You need to wirelessly connect two accessories to a smartphone. Which of the following could be valid options to connect these wireless accessories? (Choose two.) A. USB B. Lightning C. NFC D. Bluetooth
Answer: C. NFC D. Bluetooth Two wireless connectivity options are NFC and Bluetooth; hotspot (not mentioned) is the third. USB, Lightning, and serial are wired connectivity methods.
Chapter 12: Hardware and Network Troubleshooting You are having problems with the video card in one of your computers. Where could you check for troubleshooting information? A. Another computer with the same video card B. The video card manufacturer's website C. The manual that came with the card D. The server log
Answer: B. The video card manufacturer's website The manufacturer's website is the first place you should go for information on your products, including troubleshooting information. Many years ago, manufacturers would provide paper manuals with their products, but that's almost unheard of today, unless you download a PDF version from the website. Server logs can show error codes, but they won't tell you how to fix anything.
Chapter 1: Motherboards, Processors, and Memory You have just replaced a processor in a computer and now need to add a cooling mechanism. What should you use to attach the cooling system to the processor? A. Heat sink B. Thermal paste C. Fan D. Superglue
Answer: B. Thermal paste Thermal paste is used to attach heat sinks and fans to processors. A heat sink usually gets attached to the processor using thermal paste, and then the fan is attached to the heat sink. Superglue would make it adhere, but it does not transfer heat properly—it would likely melt and cause a mess and processor failure.
Chapter 3: Peripherals, Cables, and Connectors You are installing a new video card that has an HDMI port. Which of the following is true about HDMI cables? (Choose all that apply.) A. They can transmit analog or digital signals. B. They can transmit audio as well as video. C. They are not used to connect to projectors. D. They can use HDMI or mini-HDMI connectors.
Answer: B. They can transmit audio as well as video. D. They can use HDMI or mini-HDMI connectors. HDMI cables transmit digital video and audio signals. They can be used to connect to projectors or monitors. HDMI cables can have standard HDMI connectors, mini-HDMI connectors, or micro-HDMI connectors.
Chapter 3: Peripherals, Cables, and Connectors Which two of the following standards use the same connector? (Choose two.) A. eSATA B. Thunderbolt 3 C. USB4 D. USB 2.0 E. Mini-USB
Answer: B. Thunderbolt 3 C. USB4 USB4 is based on the Thunderbolt 3 specifications, and both natively use USB-C connectors.
Chapter 1: Motherboards, Processors, and Memory You have just found out that a new UEFI upgrade exists for your computer, and you obtain a copy on a flash drive to install it. Which of the following is most helpful when flashing the UEFI on a desktop computer system? A. DVD-ROM B. Uninterruptable power supply C. Internet connection D. Windows administrator password
Answer: B. Uninterruptable power supply None of the options are required, but a UPS is by far the most helpful among the answers in that loss of power during this procedure can range from annoying to devastating.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems You have implemented a solution that resolved an audio problem on a laptop computer. Following the best practice methodology, what is the next step to take? A. Document findings, actions, and outcomes. B. Verify full system functionality and, if applicable, implement preventive measures. C. Establish a plan of action to resolve the problem. D. Review system and application logs.
Answer: B. Verify full system functionality and, if applicable, implement preventive measures. The fourth step in the best practice methodology is to establish a plan of action to resolve the problem and implement the solution, which was done already. The next step is to verify full system functionality and, if applicable, implement preventive measures. The final step is to document findings, actions, and outcomes. Reviewing system and application logs is part of identifying the problem, which is the first step.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies Which of the following is not a consideration when upgrading power supplies? A. You might find that you do not have a matching motherboard connector on your new power supply. B. You might find that your case has a nonremovable power supply. C. You might find that your power rating is not adequate on the new power supply. D. You might find that you do not have enough of the appropriate connectors coming from the power supply for the devices that you have installed.
Answer: B. You might find that your case has a nonremovable power supply. Personal computers do not have permanently installed power supplies. Like other electrical and electronic components, power supplies can and do fail on a regular basis. Permanently mounting a power supply to a chassis would be a disservice to the consumer. You should consider the cumulative power needs of your installed components, and you might have to obtain adapters and splitters if you do not have enough or you have the wrong types of connectors coming from the power supply.
Chapter 12: Hardware and Network Troubleshooting While troubleshooting a client computer, you decide to obtain a new IP address from the DHCP server. After releasing the existing address, which command do you use to get new IP information from the DHCP server? A. ipconfig /refresh B. ipconfig /renew C. ifconfig /release D. ifconfig /start
Answer: B. ipconfig /renew The ipconfig command is perhaps the most-used utility in troubleshooting and network configuration. The ipconfig /renew command sends a query to the DHCP server asking it to resend and renew all DHCP information. For a more detailed look at the ipconfig command, type ipconfig /? at the command prompt. The ifconfig command is used with Linux and macOS clients. There are no /refresh or /start switches for these commands.
Chapter 7: Wireless and SOHO Networks You are installing a single 802.11g wireless network. The office space is large enough that you need three WAPs. What channels should you configure the WAPs on to avoid communication issues? A. 2, 5, and 7 B. 1, 8, and 14 C. 1, 6, and 11 D. 3, 6, and 9
Answer: C. 1, 6, and 11 There are 14 communication channels in the 2.4 GHz range, but only the first 11 are configurable. The three nonoverlapping channels are 1, 6, and 11.
Chapter 1: Motherboards, Processors, and Memory You are installing a new video card into a PCIe slot. What is the combined total throughput of a PCIe 2.0 x16 slot? A. 500 MBps B. 1 GBps C. 16 GBps D. 32 GBps
Answer: C. 16 GBps The PCIe 1.1 specification provided 250 Mbps of throughput per lane per direction. With the 2.x versions of PCIe, this rate was doubled to 500 Mbps. As a result, each v2.0 lane is capable of a combined 1 Gbps. An x16 slot consists of 16 lanes, for a total bidirectional throughput of 16 Gbps.
Chapter 9: Laptop and Mobile Device Hardware You need to replace defective DDR4 memory in a laptop. How many pins will the replacement memory module have? A. 200 B. 204 C. 260 D. 288
Answer: C. 260 DDR4 SODIMMs have 260 pins. DDR2 SODIMMs have 200 pins, DDR3 SODIMMs have 204 pins, and DDR5 has 262. No SODIMMs currently have 288 pins, but DDR4 DIMMs do.
Chapter 1: Motherboards, Processors, and Memory You are told by a technician over the phone that you need to bring replacement DDR4 SDRAM memory. What type of packaging is used for DDR4 SDRAM memory? A. 224-pin DIMM B. 240-pin DIMM C. 288-pin DIMM D. 296-pin DIMM
Answer: C. 288-pin DIMM DDR4 SDRAM is manufactured on a 288-pin DIMM, as is DDR5 (although the two are keyed differently and are not compatible). DIMMs with 224 pins and 296 pins do not exist. DIMMs with 240 pins are used for DDR2 and DDR3 SDRAM.
Chapter 3: Peripherals, Cables, and Connectors What is the maximum data transfer rate of USB High Speed? A. 10 Gbps B. 5 Gbps C. 480 Mbps D. 12 Mbps
Answer: C. 480 Mbps Full Speed USB is 12 Mbps. High Speed is 480 Mbps. SuperSpeed runs at 5 Gbps and SuperSpeed+ at 10 Gbps.
Chapter 12: Hardware and Network Troubleshooting When you print documents on your laser printer, you see residue from previous images on the output. Which two things are the most likely causes of this problem? (Choose two.) A. A faulty transfer corona wire B. An overheating printer C. A bad erasure lamp D. A broken cleaning blade
Answer: C. A bad erasure lamp D. A broken cleaning blade Seeing images from previous print jobs is a phenomenon called ghosting (or ghost images). It's most likely due to a bad erasure lamp or a broken cleaning blade. If the transfer corona wire were faulty, there would likely be blank pages. An overheating printer will not necessarily leave residue behind.
Chapter 12: Hardware and Network Troubleshooting The display on a laptop computer is continuously flickering. Which of the following are most likely to cause this problem? (Choose two.) A. A failing display B. Interference from a nearby fan C. A failing backlight D. A failing inverter E. Incorrect video driver
Answer: C. A failing backlight D. A failing inverter Perpetually dim or flickering screens are most likely caused by a failing backlight or inverter, which supplies power to the backlight. LCD devices are not subject to interference from fans. An incorrect video driver will not cause a flickering image.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies Of the following voltage pairings, which one accurately represents the input and output, respectively, of power supplies and AC adapters? A. AC in, AC out B. DC in, DC out C. AC in, DC out D. DC in, AC out
Answer: C. AC in, DC out Power supplies and AC adapters use standard wall outlets for an input of AC voltage, which they convert to the DC voltages required by the components to which they supply power.
Chapter 1: Motherboards, Processors, and Memory Which of the following types of processors will likely generally be preferred for mobile devices? A. x64 B. x86 C. ARM D. LGA
Answer: C. ARM ARM processors generate less heat than do x64/x86 CISC processors and are therefore better options for mobile devices. LGA is a type of CPU socket.
Chapter 6: Introduction to TCP/IP Which of the following protocols is responsible for resolving IP addresses to hardware addresses? A. DNS B. DHCP C. ARP D. RARP
Answer: C. ARP The Address Resolution Protocol (ARP) resolves IP addresses to hardware (MAC) addresses. RARP does the reverse—it resolves MAC addresses to IP addresses. DNS resolves hostnames to IP addresses. DHCP automatically configures TCP/IP clients.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems A Windows user complains that their computer keeps crashing. What is the proprietary crash screen they are most likely seeing? A. Stop sign B. Pinwheel C. BSOD D. Black screen
Answer: C. BSOD When Windows-based systems crash, as can happen due to a memory, CPU, or motherboard problem, they will most likely display a Blue Screen of Death (BSOD). The good news is that the BSOD can often provide useful information, such as an error code, to help troubleshoot the problem. There is no stop sign proprietary crash screen, and the pinwheel is used in macOS. A black screen may indicate a system crash but is not proprietary to one operating system.
Chapter 10: Mobile Connectivity and Application Support A mobile device is having intermittent communications issues. Which software component of a mobile phone is most likely responsible for these issues? A. Either iOS or Android OS B. SIM OS C. Baseband OS D. Wireless OS
Answer: C. Baseband OS Each mobile phone has a separate processor that manages wireless communications, also known as radio communications or baseband communications. There is a baseband OS that manages this, and it works with the primary OS on the phone. A SIM OS is for managing data transfers between the phone and the SIM chip. There is no wireless OS.
Chapter 10: Mobile Connectivity and Application Support You need to pair two Bluetooth devices with each other. Which of the following is true regarding Bluetooth pairing? A. Bluetooth connections support wireless device control but not file transfers. B. Bluetooth is not yet a fully standardized protocol. C. Bluetooth connections do not reach as far as Wi-Fi connections. D. You must reboot the paired devices to complete the connection.
Answer: C. Bluetooth connections do not reach as far as Wi-Fi connections. The range of Bluetooth connections is considered short compared to Wi-Fi connections. Bluetooth is a fully standardized protocol that supports file transfers using FTP. Rebooting, or even restarting, paired devices is not a requirement for Bluetooth connection.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems A technician who has been troubleshooting a computer tells you that the system is having problems with overheating. Which component is most likely to cause this issue? A. Power supply B. Motherboard C. CPU D. RAM
Answer: C. CPU The processor runs the hottest of all computer components and is the most likely to overheat. Motherboards and RAM don't generate a lot of heat. Power supplies most often have fans to help dissipate heat, and they don't run as hot as CPUs.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems A desktop computer is experiencing continuous reboots. It gets to the BIOS screen and then reboots every time. Which two components are most likely to cause this problem? (Choose two.) A. Power supply B. RAM C. CPU D. Motherboard
Answer: C. CPU D. Motherboard Continuous reboots are most likely caused by the motherboard or CPU failing. It's possible it's the RAM, but less likely. The power supply is the least likely cause of the problem in this scenario.
Chapter 4: Printers and Multifunction Devices Which step in the laser printer printing process occurs immediately after the exposing phase? A. Charging B. Fusing C. Transferring D. Developing
Answer: D. Developing Developing happens after exposing. The correct order is processing, charging, exposing, developing, transferring, fusing, and cleaning.
Chapter 9: Laptop and Mobile Device Hardware What should you do for a Li-ion battery that appears to charge fully but does not last as long as the battery's meter indicates that it will last? A. Replace the battery B. Exercise the battery C. Calibrate the battery D. Short the terminals to discharge the battery
Answer: C. Calibrate the battery Battery calibration for Li-ion batteries allows the powered device to drain the battery's power before recharging. Battery exercising is the initial charging and discharging of nickel-based batteries so that they will function as expected. You should never short a battery's terminals, and replacement is a last resort, used when any battery has reached the end of its life.
Chapter 8: Network Services, Virtualization, and Cloud Computing You have been asked to advise a group of several universities that want to combine research efforts and store data in the cloud. Which type of cloud solution might be best for them? A. Public B. Private C. Community D. Hybrid
Answer: C. Community When multiple organizations with similar objectives want to combine efforts in a cloud, the best choice is generally a community cloud. This allows for the flexibility and scalability normally found in a public cloud, but it also limits the number of users to a smaller, trusted group.
Chapter 4: Printers and Multifunction Devices Which printer part gets the toner from the photosensitive drum onto the paper? A. Laser-scanning assembly B. Fusing assembly C. Corona assembly D. Drum
Answer: C. Corona assembly The transfer corona assembly gets the toner from the photosensitive drum onto the paper. For some printers, this is a transfer corona wire; for other printers, it is a transfer corona roller.
Chapter 3: Peripherals, Cables, and Connectors Which of the following connector types is typically not associated with hard drive use? A. USB-C B. eSATA C. DB-9 D. SCSI
Answer: C. DB-9 DB-9 connectors are most often used with serial cables and are not associated with hard drives. USB-C, eSATA, and SCSI are examples of connectors used with hard drives.
Chapter 9: Laptop and Mobile Device Hardware A user on your network wants to be able to draw images on a screen and have the laptop capture them. What type of device needs to be installed on the user's laptop? A. Inverter B. Capturer C. Digitizer D. Touchpad
Answer: C. Digitizer The user needs a digitizer, which takes input from the device, such as drawn images, and converts them into electronic images on the computer. The user could also use a touchscreen for the same purpose. An inverter changes DC power into AC power for a display backlight. There is no capturer laptop device. A touchpad is a pointing device that allows a user to control the mouse cursor.
Chapter 9: Laptop and Mobile Device Hardware A user wants their laptop to have a full-sized optical drive and external hard drive. Which of the following accessories is most likely to have full-sized bays for these devices? A. Laptop base B. Port replicator C. Docking station D. Mini PCIe dock
Answer: C. Docking station A docking station is a device that a laptop can be plugged into that replicates common laptop ports, and may also have full-sized bays for PC desktop expansion cards and storage devices, such as hard drives and optical drives. A port replicator will replicate laptop ports but does not usually have expansion bays. There is no specific laptop base accessory or a Mini PCIe dock. (Mini PCIe is an internal laptop technology.)
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies You have been asked to install a new hard drive for a client. Which of the following is not a consideration when installing an internal storage device? A. You should match the form factor of the drive or adapt it to an available drive bay or slot. B. You should secure the drive with at least two screws on one side and preferably two on each side. C. Due to the high revolutions at which modern hard drives spin, you must secure an external power source because the internal power supplies do not have the capacity. D. You need to be sure that the routing of the drive's data cable, if applicable, does not obstruct the engineered flow of air across internal components.
Answer: C. Due to the high revolutions at which modern hard drives spin, you must secure an external power source because the internal power supplies do not have the capacity. Today's hard drives, regardless of their rpm, have standard internal power connections. The other options are valid concerns when installing an internal drive.
Chapter 10: Mobile Connectivity and Application Support You are pairing a Bluetooth headset to a mobile device. On the mobile device, after finding the device for pairing, what is the next step to take? A. Enable Bluetooth B. Test connectivity C. Enter the appropriate PIN code D. Enable pairing
Answer: C. Enter the appropriate PIN code The next step is to enter the PIN code. The steps, in order, are as follows: enable Bluetooth, enable pairing, find a device for pairing, enter the appropriate PIN code, and test connectivity.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems You are using the best practice methodology to troubleshoot a printer. During which phase of the methodology should you use external research based on the symptoms? A. Identify the problem. B. Establish a plan of action to resolve the problem. C. Establish a theory of probable cause. D. Implement preventive measures.
Answer: C. Establish a theory of probable cause The second step in the best practice methodology is to establish a theory of probable cause (question the obvious). As part of that, if necessary, conduct external or internal research based on symptoms.
Chapter 5: Networking Fundamentals You are installing a network at a friend's house, and it's impossible to run a network cable from one point in the house to another. Your friend does not want to use wireless networking. Which of the following is the best option to get network connectivity between the two points? A. Power over Ethernet injector B. Power over Ethernet switch C. Ethernet over Power D. Router
Answer: C. Ethernet over Power Ethernet over Power can transmit network signals over power lines within a closed circuit, such as a house. It's the best choice. PoE devices provide power to devices that have only an Ethernet connection available. A router is for connecting network segments together.
Chapter 5: Networking Fundamentals Which of the following is a type of connector used with coaxial cable? A. RJ-11 B. RJ-45 C. F type D. SC
Answer: C. F type Coaxial cable can use BNC connectors and F type connectors. RJ-11 and RJ-45 are twisted pair connectors. SC is a fiber-optic connector.
Chapter 7: Wireless and SOHO Networks You are upgrading a wireless network from Wi-Fi 5 over to Wi-Fi 6. Which of the following statements is not correct? A. Users should get faster speeds. B. Network range will be similar. C. Fewer users will be able to use each access point. D. Devices may have lower power usage while connecting to the network.
Answer: C. Fewer users will be able to use each access point. Wi-Fi 6 is faster than Wi-Fi 5, and the network range is similar. More users should be able to access each access point, not fewer. Devices may have lower power usage in Wi-Fi 6 due to a new sleep feature.
Chapter 5: Networking Fundamentals Of all the network cabling options, ___________________ offers the longest possible segment length. A. Unshielded twisted pair B. Coaxial C. Fiber-optic D. Shielded twisted pair
Answer: C. Fiber-optic Fiber-optic cable can span distances of several kilometers because it has much lower attenuation, crosstalk, and interference as compared to copper cables.
Chapter 4: Printers and Multifunction Devices Which of the following is fed through an extruder on a 3D printer to create objects? A. Resin B. Dye C. Filament D. Extrusion powder
Answer: C. Filament 3D printers use filament or resin to create objects. Printers that have an extruder use filament, which is often plastic but can contain metals, too. 3D printers do not use dye. There is no extrusion powder.
Chapter 3: Peripherals, Cables, and Connectors You are asked to hook up a projector in a classroom. What type of cable are you most likely to need? A. USB Type A B. eSATA C. HDMI D. DB-9
Answer: C. HDMI A projector uses a standard video cable. In this case, HDMI is the most likely choice. eSATA is for hard drives, and DB-9 is a slow serial cable. It's possible that the projector has a USB interface, but the best selection is HDMI.
Chapter 8: Network Services, Virtualization, and Cloud Computing You are installing a file server for the accounting department. Where should this file server be located on the network? A. Outside of the firewall B. In the screened subnet C. In the secure network D. On the router
Answer: C. In the secure network If the data on the server does not need to be accessed via the Internet, then the server should be in the most secure place possible, which is inside the firewall(s) in the secure network.
Chapter 4: Printers and Multifunction Devices You have just installed a new printer, but it prints only garbled text. Which of the following is likely the problem? A. Wrong IP address B. Worn print head C. Incorrect printer drivers D. Unsupported printer
Answer: C. Incorrect printer drivers If a printer is using out-of-date or incorrect printer drivers, the printer may produce pages of garbled text. The solution is to ensure that the most recent printer drivers are downloaded from the manufacturer's website.
Chapter 4: Printers and Multifunction Devices Which types of printers are referred to as page printers because they receive their print job instructions one page at a time? (Choose two.) A. Daisy-wheel B. Dot-matrix C. Inkjet D. Laser E. Thermal
Answer: C. Inkjet D. Laser A page printer is a type of computer printer that prints a page at a time. Common types of page printers are the inkjet printer and the laser printer.
Chapter 12: Hardware and Network Troubleshooting A laptop user with an 802.11ac wireless network card just switched desk locations. In the new location, they say that their wireless drops connectivity intermittently and seems to have slow transfer speeds. Which of the following is most likely to resolve these issues? A. Replace the network card. B. Run ipconfig to ensure that they are receiving the right IP address from the DHCP server. C. Install a new WAP closer to their new desk. D. Use a network monitor to ensure that there are no IP address conflicts.
Answer: C. Install a new WAP closer to their new desk. Distance matters in wireless networks. Being too far away from an access point will result in a weaker signal, which can cause intermittent signal drops and poor performance. Moving closer to the wireless access point (WAP) or wireless router can help, as can installing additional WAPs or wireless routers. The IP address from the DHCP server won't matter, and since they reported no error message, there is not likely to be an IP address conflict. Unless there are other issues, replacing the NIC seems to be overkill.
Chapter 9: Laptop and Mobile Device Hardware Which of the following describes the job of an inverter in a laptop? A. It changes the screen orientation when the laptop is rotated. B. It converts AC power into DC power for the display backlight. C. It converts DC power into AC power for the display backlight. D. It allows the laptop display to function in tablet mode.
Answer: C. It converts DC power into AC power for the display backlight. The laptop power supply converts AC power into DC power for the laptop's internal circuitry. The display backlight, if used, needs AC power. The inverter's job is to convert (invert) the DC power into AC power for the backlight.
Chapter 3: Peripherals, Cables, and Connectors You got a new desktop computer for a designer at your company. On the front panel is a rectangular yellow USB port. What does that mean? A. It's USB 2.0. B. It's USB 3.0. C. It's a port capable of charging devices even with the system powered off. D. It's a port to be used with USB-C compatible devices.
Answer: C. It's a port capable of charging devices even with the system powered off. A yellow USB port is an "always on" charging port. It could be either USB 2 or USB 3. USB-C connectors are oval in shape vs. the older rectangular USB connectors.
Chapter 1: Motherboards, Processors, and Memory A motherboard failed on a desktop PC with an Intel Core i5-10600K processor. When you are looking for a replacement motherboard, which CPU socket does it need to have? A. LGA 1366 B. LGA 1150 C. LGA 1200 D. LGA 1700
Answer: C. LGA 1200 The Core i5-10600K is a Comet Lake-series processor, which uses the LGA 1200 socket. LGA 1150 sockets are for older i7s, and the LGA 1366 socket is for even older ones than that. The LGA 1700 socket is for 12th-generation Intel Core processors.
Chapter 10: Mobile Connectivity and Application Support You connect two Bluetooth devices together that have been previously connected. What is the process called that each device uses to verify the other's identity? A. MAM B. Synchronization C. Mutual authentication D. Pairing
Answer: C. Mutual authentication The devices verify each other's identity via mutual authentication. Pairing is done for the initial connection. MAM is mobile application management. Synchronization is used between a mobile device and a desktop/laptop or the cloud.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies Your goal is to build the fastest computer possible. Which of the following hard drive technologies should you choose for the fastest read performance? A. M.2 PCIe B. M.2 SATA C. NVMe PCIe D. NVMe SATA
Answer: C. NVMe PCIe M.2 and NVMe are both relatively new SSD options, and both are incredibly fast. NVMe is slightly faster, though. SATA is limited to 600 Mbps transfer speeds, whereas PCIe is not. An NVMe PCIe card can sustain data read rates of about 3,500 Mbps.
Chapter 1: Motherboards, Processors, and Memory You are replacing an HP laptop's motherboard. Which type of motherboard should you use? A. ATX B. AT C. One for the specific model D. mini-ITX
Answer: C. One for the specific model Laptop motherboards are usually custom-built for the specific case. A replacement board should be obtained that is the exact same size as the one that failed.
Chapter 12: Hardware and Network Troubleshooting A printer is printing unusually large margins on documents that are sent to it. You suspect that the paper size is set incorrectly. Where should you go to change this? A. Print spooler B. Paper selection switch on the printer C. Printing preferences D. Print queue
Answer: C. Printing preferences Printing preferences sets configuration options such as color versus black and white, paper size, and page orientation. The print spooler is where print jobs are held for printing. The print queue is the list of print jobs waiting to be printed. There is no paper selection switch on printers (at least not that we've seen).
Chapter 9: Laptop and Mobile Device Hardware A user complains that their 2-in-1 laptop screen does not properly detect where they place their finger on the screen. What should you do first to resolve the issue? A. Replace the touch screen B. Replace the touchpad C. Recalibrate the touch screen D. Recalibrate the touchpad E. Degauss the touch screen F. Degauss the touchpad
Answer: C. Recalibrate the touch screen If the touchscreen is not responding properly, the first step is to recalibrate it. If it continues to have problems, the screen may be defective and might need to be replaced. Degaussing is a process used on old CRT monitors and is not relevant to touchscreens.
Chapter 1: Motherboards, Processors, and Memory Which of the following allows you to perform the most complete restart of the computer without removing power? A. Start ➢ Restart B. Start ➢ Hibernate C. Reset button D. Power button
Answer: C. Reset Button The reset button causes the computer to return to nearly the same point it is in when you power it on, but without the need for power cycling. Using Restart in the Start menu does not reboot as deeply as the reset button. Hibernation is a power state that completely removes power after saving the contents of RAM to the hard drive; pressing the power button is required to resume the session in the same manner as starting the computer after a complete shutdown. The power button cannot be used as a method of restarting the system.
Chapter 6: Introduction to TCP/IP Which of the following protocols is responsible for sending email? A. IMAP4 B. POP3 C. SMTP D. SNMP
Answer: C. SMTP Simple Mail Transfer Protocol (SMTP) is responsible for sending email. IMAP4 and POP3 both receive email. SNMP is a network management protocol.
Chapter 10: Mobile Connectivity and Application Support If a user wanted to disable Location Services on an iPhone, where would they do that? A. Settings ➢ Location Services B. Settings ➢ Communications C. Settings ➢ Privacy D. Settings ➢ GPS
Answer: C. Settings ➢ Privacy In iOS (at least through iOS 15.3.1), Location Services are under Settings ➢ Privacy. There are no Location Services, Communications, or GPS sections directly in Settings.
Chapter 12: Hardware and Network Troubleshooting You turn a computer on and it doesn't boot up properly. You hear a rhythmic ticking sound coming from inside the case. What is most likely the problem? A. The motherboard B. The power supply fan C. The HDD D. The video card
Answer: C. The HDD The only components that make noise are the ones that have moving parts, such as fans and conventional hard disk drives. In most cases, a rhythmic ticking sound will be something that's generated by a conventional hard disk drive (HDD).
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies You have a motherboard with integrated video, and the video fails. You install a video add-on card. Which of the following statements are the most accurate? (Choose two.) A. The add-on card will not function properly because of the integrated video. B. The add-on card will function if it is bridged to the integrated video chipset. C. The add-on card will be detected automatically and function properly if it's PCIe. D. For the card to work properly, you might need to disable the integrated video in the BIOS. E. The add-on card will work properly by using the integrated card's video driver.
Answer: C. The add-on card will be detected automatically and function properly if it's PCIe. D. For the card to work properly, you might need to disable the integrated video in the BIOS. Most likely, the new card will be detected and function properly once the computer is booted up. However, the driver will need to be installed. Odds are the new card will be a different model than the integrated card, which will require a new driver. On some systems, you will need to go into the BIOS and disable the integrated adapter. Bridging happens between two PCIe video adapters, not an integrated video chipset.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems When a desktop computer boots up, there is no video on the LCD monitor, just a blank screen. The system makes one beep when it powers on, and air is coming out of the case fan. What is the most likely cause of the problem? A. The motherboard has failed. B. The video card has failed. C. The monitor is disconnected. D. The CPU or RAM has failed.
Answer: C. The monitor is disconnected. When troubleshooting, always question the obvious. In this case, the system beeps once, which is usually a signal from the BIOS that POST completed successfully and air is coming from the system fan. All of that appears to be normal. Check to see that the monitor is connected properly to the desktop computer and that it's receiving power.
Chapter 6: Introduction to TCP/IP An email administrator wants to help protect against their server being spoofed to send spam. They were told that they can do this with a TXT record in their DNS server. If they want to authenticate emails using an encrypted security key, which TXT record would be most appropriate? A. DMARC B. VLAN C. SPF D. DKIM
Answer: D. DKIM DKIM authenticates messages from email servers using private-public encrypted key pairs. SPF authenticates via IP addresses. DMARC is a TXT record that allows an administrator to specify how they want rejected emails to be handled. VLAN is a virtual LAN and is not a TXT record type.
Chapter 12: Hardware and Network Troubleshooting You support an old impact printer at work. When the printer prints, there is always a blank horizontal line in the middle of each line of output. What is the most likely cause of the problem? A. The print ribbon is old and needs to be replaced. B. The print ribbon is not advancing properly. C. The print head needs to be replaced. D. The wrong print driver is installed.
Answer: C. The print head needs to be replaced. If there is a consistent blank space, it likely means that a pin is not firing properly and that the print head needs to be replaced. If the print ribbon is old, you would have consistently faded printing. If the ribbon is not advancing properly, you would get light and dark printing. If the wrong driver was installed, you would get garbage.
Chapter 7: Wireless and SOHO Networks What is the primary function of the SSID? A. To secure communication between a web server and a browser B. To secure communication between a server and a remote host C. To serve as a parameter used to identify a network and configure a wireless connection D. To serve as a type of password used to secure a wireless connection
Answer: C. To serve as a parameter used to identify a network and configure a wireless connection A service-set identifier (SSID) is the unique name given to the wireless network. All hardware that is to participate on the network must be configured to use the same SSID. Essentially, it is the network name. When you are using Windows to connect to a wireless network, all available wireless networks are listed by their SSID.
Chapter 4: Printers and Multifunction Devices The network administrator has set up security on office MFDs that requires users to authenticate before printing. Which of the following are valid methods for users to authenticate to the MFD? (Choose two.) A. Use an authentication log. B. Enable secured print. C. Type their username and password on the MFD's touchscreen. D. Use SMB. E. Use their company ID for badging.
Answer: C. Type their username and password on the MFD's touchscreen. E. Use their company ID for badging. Two ways for users to authenticate are to use user authentication (which requires typing in the username and password) or badging, which requires the MFD to have a badge-scanning feature. Secured print will save print jobs until they are ready to be released. SMB is a file- and print-sharing protocol used by MFDs to send scanned documents to a shared network folder. There are no printer authentication logs, but audit logs may be used to see who has used the MFD.
Chapter 8: Network Services, Virtualization, and Cloud Computing Your manager wants you to install a networked Internet appliance that prevents network traffic-based attacks and includes antimalware and antispam software. What should you install? A. Spam gateway B. Load balancer C. UTM D. Proxy server
Answer: C. UTM It sounds like the manager wants a unified threat management (UTM) device. They are designed to be one-stop network protection devices. Spam gateways help with spam email but not with other malware. A load balancer spreads work around to multiple servers. A proxy server fulfills requests for clients.
Chapter 9: Laptop and Mobile Device Hardware There has recently been a string of hardware thefts in your office building. What should you recommend that your users do to help avoid this problem? A. Enable GPS tracking B. Use a docking station C. Use a cable lock D. Use the screensaver lock
Answer: C. Use a cable lock Sometimes the only way to ensure that equipment doesn't walk away is to lock it down physically. Laptops come equipped with holes for cable locks that can be used to secure them to a desk or other workstation. GPS tracking might help after the device is stolen, but it's best to prevent that in the first place. A docking station does not prevent physical theft, nor does a screensaver with a password.
Chapter 7: Wireless and SOHO Networks Which of the following is the most secure wireless encryption standard for 802.11 networks? A. WEP B. WPA C. WPA2 D. SAFER+
Answer: C. WAP2 WEP was the original encryption standard developed for Wi-Fi networks, but it is easily hacked. WPA is an upgrade, but WPA2 is more secure and incorporates the entire 802.11i standard. WPA3 is of course the safest, but it's not one of the options. SAFER+ is used to encrypt Bluetooth communications.
Chapter 7: Wireless and SOHO Networks You have set up a wireless router on your network and configured it to use AES. What configuration option do you need to choose on the client computers? A. WEP B. WPA C. WPA2 D. TKIP
Answer: C. WPA2 If your router is using AES, the clients need to use WPA2. TKIP is a protocol utilized by WPA. WEP is the weakest of the encryption options.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems You are solving a problem with a desktop computer that was caused by human error. When is the appropriate time to implement preventive measures, according to the best practice methodology? A. When documenting findings, actions, and outcomes B. When testing the theory to determine cause C. When verifying full system functionality D. When questioning the user to identify user changes
Answer: C. When verifying full system functionality The fifth step in the best practice methodology is to verify full system functionality and, if applicable, implement preventive measures. This step occurs after a plan of action to resolve the problem has been established and before findings, actions, and outcomes have been documented.
Chapter 5: Networking Fundamentals You need to put a connector on the end of an Ethernet crossover cable. The existing end has a white and green colored wire at pin 1. What color do you need to make pin 1 on the new end? A. White/green B. Green C. White/orange D. Orange
Answer: C. White/orange A crossover cable will flip pins 1 and 3 on each end. Therefore, this end needs to have the white/orange wire as pin 1. The correct order for this cable should be white/orange, orange, white/green, blue, white/blue, green, white/brown, brown.
Chapter 12: Hardware and Network Troubleshooting You are troubleshooting a server and discover that one of the hard drives in the RAID 0 array has failed. Which statement is true? A. You need to replace the failed drive, but the data is okay because the drive is configured as a mirror. B. You need to replace the failed drive, but the data is okay because the drive is configured as a disk stripe with parity. C. You need to replace the failed drive, and the data on the array is lost. D. You do not need to replace the failed drive; the system will function normally.
Answer: C. You need to replace the failed drive, and the data on the array is lost. A RAID 0 array is also known as disk striping. RAID 0 actually decreases your fault tolerance versus one hard drive because there are more points of failure. You need to replace the drive, and hopefully you had it backed up so that you can restore the data.
Chapter 5: Networking Fundamentals Your ISP has just finished running fiber-optic cable in your neighborhood, and you want to switch from cable Internet to a faster fiber-optic connection. Which of the following statements is true about how you will get an Internet connection? A. You will continue to use your cable modem. B. You need to switch to using a DSL modem. C. You need to switch to using an ONT. D. You need to switch to using PoE.
Answer: C. You need to switch to using an ONT. Fiber-optic Internet connections use an optical network terminal (ONT) to terminate the fiber and translate it into a digital connection over copper cable inside your home. A cable modem and DSL modem connect copper to copper. Power over Ethernet (PoE) is not relevant in this situation.
Chapter 3: Peripherals, Cables, and Connectors How do you connect a DVI-A interface on a peripheral to a DVI-D interface on the computer? A. With a DVI-I cable. B. With a cable that is terminated on one end with a DVI-A connector and on the other end with a DVD-D connector. C. You wouldn't interconnect those two interfaces. D. With a standard DVI cable.
Answer: C. You wouldn't interconnect those two interfaces. Such a connection should not be made. DVI-I cables act like universal cables; they can connect two DVI-A interfaces or two DVI-D interfaces with adapters. Natively, they are used to connect two DVI-I interfaces, both of which are configured as either analog or digital. They are unable to convert the analog signal to a digital one, however. Analog and digital DVI interfaces are too disparate to interconnect.
Chapter 10: Mobile Connectivity and Application Support A user needs to synchronize their iPhone to another platform. Which two options are the default ones for them to choose? (Choose two.) A. Google Drive B. SharePoint C. iCloud D. iTunes
Answer: C. iCloud D. iTunes Apple devices natively sync with iCloud and iTunes. Android devices sync with Google Drive. SharePoint is a Microsoft service that can be used to share files.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies You are choosing a flash standard for a client. They want the smallest flash cards possible. Which standard should you recommend? A. SD B. CompactFlash C. microSD D. miniSD E. xD
Answer: C. microSD The smallest of the options is microSD, at 15 mm × 11 mm. Perhaps "micro" gives it away, but that also makes it easy to remember. SD cards are 32 mm × 24 mm. CompactFlash cards are the largest, at 36 mm × 43 mm. MiniSD cards measure 21.5 mm × 20 mm, and xD cards are 20 mm × 25 mm.
Chapter 6: Introduction to TCP/IP What port does the RDP protocol work on? A. 53 B. 143 C. 389 D. 3389
Answer: D. 3389 Remote Desktop Protocol (RDP) works on port 3389. DNS works on port 53, IMAP4 works on port 143, and LDAP works on port 389.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies A client wants to ensure that their server does not lose power if their power supply fails. Which of the following best describes the type of power supply needed in this situation? A. A power supply that provides twice as much wattage than what is needed to power system components B. A power supply that provides a voltage output selector C. A modular power supply D. A redundant power supply
Answer: D. A redundant power supply To protect against a power supply failure, use a redundant power supply, which is basically two PSUs in one unit. More wattage will not help if the power supply fails. There are no voltage output selectors on PSUs. There are voltage input switches on some but that wouldn't help in this case. A modular power supply has removable and attachable cables to support a variety of peripherals.
Chapter 7: Wireless and SOHO Networks You are running an 802.11g wireless router in mixed mode. You have three 802.11g wireless NICs using the router. A new user connects using an 802.11b wireless NIC. What will happen? A. The user with 802.11b will access the network at 11 Mbps, while the users with 802.11g will access the network at 54 Mbps. B. The user with 802.11b will not be able to communicate on the network. C. The user with 802.11b will access the network at 11 Mbps. The users with 802.11g will access the network at 54 Mbps, unless they are communicating with the 802.11b device, which will be at 11 Mbps. D. All users will access the network at 11 Mbps.
Answer: D. All users will access the network at 11 Mbps. The good news is that 802.11g is backward compatible with 802.11b. The bad news is, if you run in a mixed environment, all devices that communicate with the WAP (or router) will be forced to slow down to accommodate the older technology.
Chapter 3: Peripherals, Cables, and Connectors You are installing a replacement monitor on a desktop computer. Which of the following is true regarding a monitor's refresh rate? A. As long as the graphics adapter can refresh the image at a particular rate, the attached monitor can accommodate that refresh rate. B. The refresh rate is normally expressed in MHz. C. The refresh rate is normally selected by using the controls on the front panel of the monitor. D. As you lower the resolution, the maximum refresh rate allowed tends to increase.
Answer: D. As you lower the resolution, the maximum refresh rate allowed tends to increase. As you lower the resolution, the maximum refresh rate allowed tends to increase. The refresh rate is most often expressed in cycles per second (Hz), not millions of cycles per second (MHz). You must usually select the refresh rate that you want from the display settings dialog boxes, not through the monitor's built-in menu system, although the monitor can often tell you the refresh rate that you're using. Finally, both the monitor and adapter must agree on the refresh rate you select. If either device does not support a particular refresh rate, such a rate cannot be used.
Chapter 9: Laptop and Mobile Device Hardware A client has a laptop with which you are unfamiliar. You are asked to perform a memory upgrade. How can you obtain the service manual for this laptop computer? A. By pressing F1 while in Windows B. By pressing F2 while the system is booting up C. By reading the paper copy that comes with the laptop D. By searching the manufacturer's website
Answer: D. By searching the manufacturer's website Laptop service manuals can be obtained from the manufacturer's website. It's very rare that paper service manuals are shipped with the laptop. Pressing F1 while in Windows will open Windows Help, and pressing F2 on many laptops during the system boot will take you into the BIOS/UEFI.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems You have discovered a fix for a broken laptop. Before implementing changes, what should you consider, according to the best practice methodology? A. The user's budget B. Company reputation C. Upgrade feasibility D. Corporate policies
Answer: D. Corporate policies According to the best practice methodology, you should always consider corporate policies, procedures, and impacts before implementing changes. The user's budget, company reputation, and upgrade feasibility are not mentioned in the best practice methodology to resolve problems.
Chapter 4: Printers and Multifunction Devices You have a finance manager who needs to print contracts in triplicate. Which type of printers are best for printing on multipart forms? A. Inkjet printers B. Laser printers C. Thermal printers D. Dot-matrix printers
Answer: D. Dot-matrix printers Dot-matrix printers are impact printers and therefore are the best for multipart forms. Daisy-wheel printers can be used with multipart forms as well.
Chapter 7: Wireless and SOHO Networks You are setting up a small office network for a client. Which Internet service would you recommend to provide the best speed? A. DSL B. Cable C. Satellite D. Fiber
Answer: D. Fiber Of the options listed, fiber provides the best speed. DSL and cable provide similar speeds but can't match fiber. Satellite is the slowest of the options listed.
Chapter 5: Networking Fundamentals ____________________ is immune to electromagnetic or radio-frequency interference. A. Twisted pair cabling B. CSMA/CD C. Broadband coaxial cabling D. Fiber-optic cabling
Answer: D. Fiber-optic cabling Companies that want to ensure the safety and integrity of their data should use fiber-optic cable because it is not affected by electromagnetic or radio-frequency interference. Even though some copper cables have shielding, they are not immune to EMI or RFI. This eliminates twisted pair and coaxial. CSMA/CD is an access method, not a cable type.
Chapter 7: Wireless and SOHO Networks You are configuring a SOHO client to use TCP/IP. Which parameter is needed to tell the client where to communicate to get on the Internet? A. Static address B. Dynamic address C. APIPA D. Gateway
Answer: D. Gateway The gateway, also known as a default gateway, is the address to the router to take a client to the next network (or Internet). Gateways can be configured with a static assignment or dynamically through a DHCP server. APIPA will automatically configure a client with IP address information if it's set to get its configuration from a DHCP server but none is available. APIPA-configured clients can't get on the Internet.
Chapter 12: Hardware and Network Troubleshooting A user brings in an iPhone and the touchscreen is not responding. What should you try first to get the device functioning again? A. Hold the power button and the sleep/wake button for 10 seconds to reset the device. B. Restore the device to factory settings. C. Replace the battery in the device. D. Hold the power button for 10 seconds to force the device to power off.
Answer: D. Hold the power button for 10 seconds to force the device to power off. The first step should be to try to reboot the device. In most cases with a frozen smartphone, holding the power button down for about 10 seconds will force it to power off. If that doesn't work, then you can move to trying to reset the phone by holding down the power button and the sleep/wake button for 10 seconds. There is no need to restore the device to factory settings (yet) or replace the battery.
Chapter 5: Networking Fundamentals A physical star topology consists of several workstations that branch off a central device called a ____________________. A. NIC B. Bridge C. Router D. Hub
Answer: D. Hub A hub or a switch is at the center of a star topology. A NIC is a network card, which each computer must have to be on the network. Bridges and routers are higher-level connectivity devices that connect network segments or separate networks together.
Chapter 8: Network Services, Virtualization, and Cloud Computing Your company wants to move to a cloud provider to be able to scale resources quickly, but it is concerned about the security of confidential information. Which of the following types of cloud models might be the most appropriate for your company? A. Public B. Private C. Community D. Hybrid
Answer: D. Hybrid A hybrid cloud provides the best of public and private clouds. You get the scalability and cost effectiveness of a public cloud but also the security that you need for important files on the private portion of the cloud.
Chapter 6: Introduction to TCP/IP Which of the following protocols is used for secure retrieval of email? A. SMTP B. SNMP C. POP3 D. IMAP4
Answer: D. IMAP4 IMAP4 and POP3 are the two protocols that are used for email retrieval. Of the two, only IMAP4 provides security features. SMTP sends email. SNMP is a network management protocol.
Chapter 1: Motherboards, Processors, and Memory A client wants you to build a new PC for her, with a smaller case and lower power requirements. When selecting a motherboard, which form factor should you choose for a smaller size and lower power consumption? A. ATX B. AT C. DTX D. ITX
Answer: D. ITX The ITX motherboard family consists of smaller boards that fit in standard or miniature cases and use less power than their larger counterparts. ATX are "standard" sized motherboards in today's world. AT is a legacy form factor that was bigger than ATX. There are no DTX motherboards.
Chapter 4: Printers and Multifunction Devices Which of the following is not an advantage of a Universal Serial Bus (USB) printer interface? A. It has a higher transfer rate than a serial connection. B. It has a higher transfer rate than a parallel connection. C. It automatically recognizes new devices. D. It allows the printer to communicate with networks, servers, and workstations.
Answer: D. It allows the printer to communicate with networks, servers, and workstations. The rate of transfer and the ability to recognize new devices automatically are two of the major advantages that currently make USB the most popular type of printer interface. However, it is the network printer interface that allows the printer to communicate with networks, servers, and workstations.
Chapter 6: Introduction to TCP/IP The workstations on your network are configured to use a DHCP server. One of the workstations can't communicate with other computers. Its IP address is 169.254.1.18. What could be the problem? A. The subnet mask is wrong. B. It has a private IP address. C. The default gateway is wrong. D. It can't reach the DHCP server.
Answer: D. It can't reach the DHCP server. The address assigned to the computer is an APIPA address. Microsoft client computers (and others) will configure themselves with an address in this range if they are unable to reach a DHCP server.
Chapter 6: Introduction to TCP/IP Which of the following is the name of a secure point-to-point connection made over a public network? A. NAT B. APIPA C. VLAN D. VPN
Answer: D. VPN A virtual private network (VPN) is a secure point-to-point connection made over a public network. NAT translates private IP addresses to public IP addresses. APIPA is an automatic IP address assignment if a client computer can't reach a DHCP server. VLANs are virtual local area networks configured through switches.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies You have been asked to configure a RAID 5 system for a client. Which of the following statements about RAID 5 is true? A. It provides fault tolerance but no performance improvement. B. It provides performance improvement but no fault tolerance. C. If multiple drives in the array fail, the data can be saved provided that one drive is still operational. D. It requires at least three drives to implement.
Answer: D. It requires at least three drives to implement. RAID 5 arrays require a minimum of three hard drives to implement. If one drive fails, the data is fine and the system can still function, albeit slowly. If more than one drive fails, the system will be inoperable. RAID 5 provides both fault tolerance and a performance improvement.
Chapter 1: Motherboards, Processors, and Memory You find out that a disgruntled ex-employee's computer has a boot password that must be entered before the operating system is ever loaded. There is also a password preventing your access to the BIOS utility. Which of the following motherboard components can most likely be used to return the computer to a state that will allow you to boot the system without knowing the password? A. Cable header B. Power reset connector C. Toggle switch D. Jumper
Answer: D. Jumper Most motherboards have a jumper or similar momentary closure mechanism that will allow you to clear the CMOS memory of any user settings and cause the BIOS to use factory defaults, including no user or supervisor passwords.
Chapter 5: Networking Fundamentals Which of the following connector types is an MFF connector? A. BNC B. ST C. SC D. LC
Answer: D. LC The local connector (LC) is a mini form factor (MFF) fiber-optic connector developed by Lucent Technologies. If it helps, think of LC as "Little Connector."
Chapter 8: Network Services, Virtualization, and Cloud Computing You have five web servers that manage requests for online purchases. An administrator notices that one of the servers is always busy while another is idle, and the company is getting some online complaints about the slow website. Which of the following servers will help fix this? A. DNS B. DHCP C. Proxy D. Load balancer
Answer: D. Load balancer A load balancer can spread the work around to multiple servers. It accepts the inbound request and then sends it to the most appropriate web server. DNS resolves hostnames to IP addresses. DHCP provides IP configuration information. A proxy makes requests (usually outbound) on behalf of clients.
Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems When a user turns on their desktop computer, nothing appears on the screen. They hear three long beeps, followed by three short beeps and three long beeps. What should you do as a next step? A. Replace the motherboard. B. Replace the RAM. C. Replace the CPU. D. Look up the beep code on the manufacturer's website.
Answer: D. Look up the beep code on the manufacturer's website. This system is producing a beep code and not completing the POST process. Different BIOS manufacturers use different beep codes. Look up this beep code on the manufacturer's website before replacing any hardware.
Chapter 7: Wireless and SOHO Networks When enabled, which feature of a wireless router allows only specified computers to access the network? A. Port forwarding B. WPS C. SSID D. MAC filtering
Answer: D. MAC filtering MAC filtering is a security option that can specify that only computers with specific MAC (hardware) addresses can access the network. Port forwarding is a feature of firewalls. WPS is an easy setup mechanism for wireless networks. SSID is the wireless network name.
Chapter 5: Networking Fundamentals Which of the following networking hardware devices is capable of creating VLANs? A. Firewall B. Patch panel C. Unmanaged switch D. Managed switch
Answer: D. Managed switch A managed switch can create virtual LANs (VLANs) using its management software. A firewall is a hardware or software solution that serves as your network's security guard. Patch panels and unmanaged switches cannot create VLANs.
Chapter 3: Peripherals, Cables, and Connectors A technician says he needs to provide power to an older IDE hard drive and a DVD-ROM in a desktop. The computer now has a new fully modular power supply, and the technician wants to know what type of power connectors he should use. What do you tell him? A. SATA B. SCSI C. Serial D. Molex
Answer: D. Molex A Molex connector is a power connector for IDE (PATA) storage devices. This includes hard drives and optical drives.
Chapter 7: Wireless and SOHO Networks Which service allows users with private IP addresses to access the Internet using a public IP address? A. DHCP B. DNS C. DSL D. NAT
Answer: D. NAT Network Address Translation (NAT) allows users to have a private IP address and still access the Internet with a public IP address. NAT is installed on a router and translates the private IP address into a public address for the user to access the Internet. DHCP assigns IP configuration information to clients. DNS resolves hostnames to IP addresses. DSL is a type of broadband Internet access.
Chapter 6: Introduction to TCP/IP What is the maximum number of IPv6 addresses that can be assigned to one IPv6 interface? A. One (unicast) B. Two (unicast and anycast) C. Three (unicast, anycast, and multicast) D. None of the above
Answer: D. None of the above An IPv6 interface is not limited in the number of addresses that can be assigned, although there could be limitations based on practicality.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies You are installing a new graphics adapter in a Windows 10 system. Which of the following expansion slots is designed for high-speed, 3D graphics adapters? A. USB B. NVMe C. PCI D. PCIe
Answer: D. PCIe Although technically PCI could be used for graphics adapters, PCIe supports high-speed, 3D graphic video cards. PCIe offers better performance than older graphics adapters. USB can stream video, but it is not used for attachment of internal graphics adapters. NVMe is an SSD communications interface.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies You are installing a new power supply in a desktop computer. Which of the following statements about power supplies is true? A. You must make sure that the voltage selector switch on the back of the power supply is switched to the lower setting if the computer is going to be used in Europe. B. SATA hard drives most often use the same type of power connector that PATA hard drives use. C. Power supplies require a 20-pin to 24-pin motherboard adapter to supply power to ATX-based motherboards. D. Power supplies convert AC input to DC output.
Answer: D. Power supplies convert AC input to DC output. PC power supplies accept alternating current (AC) as input and produce direct current (DC) for the internal components. Europe requires that the voltage selector switch be set at the higher setting. SATA drives most often use a specific power connector that is not compatible with the Molex connector used by PATA drives. ATX motherboards can have a 20- or 24-pin single power connector but an adapter is not always required.
Chapter 4: Printers and Multifunction Devices What is the correct order of the steps in the EP imaging process? A. Developing, exposing, transferring, fusing, charging, cleaning, processing B. Charging, processing, exposing, developing, transferring, fusing, cleaning C. Processing, transferring, exposing, developing, charging, cleaning, fusing D. Processing, charging, exposing, developing, transferring, fusing, cleaning
Answer: D. Processing, charging, exposing, developing, transferring, fusing, cleaning The correct sequence in the EP imaging process is processing, charging, exposing, developing, transferring, fusing, and cleaning.
Chapter 8: Network Services, Virtualization, and Cloud Computing You are configuring two email servers on your company's network. Which network protocol do the servers use to transfer mail to each other? A. POP3 B. IMAP4 C. SNMP D. SMTP
Answer: D. SMTP Simple Mail Transfer Protocol (SMTP) is used to transfer (send) email between servers. POP3 and IMAP4 are used to download (receive) email. SNMP is Simple Network Management Protocol and not related to email.
Chapter 5: Networking Fundamentals Which of the following devices works with MAC addresses to determine what to do with network traffic? A. Hub B. Router C. Patch panel D. Switch
Answer: D. Switch A switch is a Layer 2 device; therefore, it works with hardware (MAC) addresses. Hubs and patch panels work at Layer 1 and deal with bits, and routers work at Layer 3 and work with logical IP addresses.
Chapter 8: Network Services, Virtualization, and Cloud Computing You have been asked to set up client-side virtualization on an office computer. The host OS is Windows 10, and there will be three Windows 10 guest OSs. Which of the following is true about the need for antivirus security? A. The host OS needs an antivirus program, but virtual machines can't be affected by viruses. B. The host OS antivirus software will also protect the guest OSs on the VMs. C. Installing antivirus software on the virtual switch will protect all guest OSs. D. The host OS and each guest OS need their own antivirus software installed.
Answer: D. The host OS and each guest OS need their own antivirus software installed. Each instance of the OS you are running requires its own security software.
Chapter 9: Laptop and Mobile Device Hardware You are giving a seminar to new technicians on replacing laptop hard drives. A student asks how laptop hard drives differ from desktop hard drives. What do you tell them? A. Laptop hard drives use completely different standards from those used by desktop hard drives for communication with the host. B. Laptop hard drives are solid-state, whereas desktop hard drives have spinning platters. C. Laptop hard drives require a separate power connection, whereas desktop hard drives are powered through the drive interface. D. The most common form factor for laptop hard drives is smaller than that of a desktop hard drive.
Answer: D. The most common form factor for laptop hard drives is smaller than that of a desktop hard drive. Laptop hard drives commonly have a 2.5″ form factor, and smaller drives, such as M.2, are becoming more popular. The most common form factor for desktop hard drives is 3.5″. Laptop hard drives use the same drive technologies as their desktop counterparts, such as serial and parallel ATA. Like desktop hard drives, laptop hard drives are available in both solid-state and conventional varieties. Unlike desktop hard drives, laptop hard drives do not have separate power connectors.
Chapter 9: Laptop and Mobile Device Hardware The process by which the processor slows down to conserve power is officially called ____________. A. Underclocking B. Cooling C. Disengaging D. Throttling
Answer: D. Throttling The processor can reduce how fast it's working, which is called throttling, to help conserve battery life. CPUs do not perform underclocking, cooling, or disengaging.
Chapter 3: Peripherals, Cables, and Connectors Which of the following connectors is oval shaped? A. Micro-USB B. Mini-USB C. Thunderbolt 2 D. Thunderbolt 3
Answer: D. Thunderbolt 3 Thunderbolt 3 uses the oval-shaped USB-C connector. Thunderbolt 2 used a proprietary connector that was more of a square. Micro-USB and mini-USB connectors look more like trapezoids.
Chapter 12: Hardware and Network Troubleshooting Troubleshooting a network connectivity issue takes you into the wiring closet, where you realize that none of the cables are properly labeled. Several are disconnected. Which tool should you use to determine where the cables run to? A. Loopback plug B. Punch-down tool C. Cable tester D. Toner probe
Answer: D. Toner probe A toner probe is used to trace a cable from one location to another. A loopback plug is for testing the ability of a network adapter to send and receive. Punch-down tools are used to connect the wires of a cable to a wiring rack, such as a 110-block. Cable testers are for verifying that a cable works properly.
Chapter 9: Laptop and Mobile Device Hardware A user is getting a new laptop. Which of the following is not a valid option to get the user's files and data from the old hard drive to the new hard drive? A. Manually copy files from the old drive to the cloud, and then to the new drive B. Manually copy files from the old drive to an external hard drive, and then to the new drive C. Use a hard drive migration app D. Use the NFC disk transfer utility
Answer: D. Use the NFC disk transfer utility To migrate data from one hard drive to another, you can manually copy the data or use a migration app. There is no NFC disk transfer utility.
Chapter 10: Mobile Connectivity and Application Support A friend asks you why she would ever disable cellular data networking. Which of the following is not a valid reason to disable cellular data networking? A. You have a limited amount of data in your monthly plan. B. You have access to a reliable Wi-Fi signal. C. You are about to download an update to your phone. D. Your phone calls are going out over your carrier's cellular network.
Answer: D. Your phone calls are going out over your carrier's cellular network. Whenever you have a reliable Wi-Fi signal available, which you do not pay for "as you go," you should feel free to disable your cellular access to data networking. The wireless network is often faster and does not cost you anything to use. If data networking works better when you leave the cellular network available as a fallback, you can choose to disable it only for certain large downloads or disable it completely until the download is complete. Phone calls will continue to be sent over the cellular network. This does not imply that your data is not using an available Wi-Fi connection. Therefore, unless you are particularly sensitive to the situation or know that data is going out over your cell access, you might not need to disable the cellular data-networking feature.
Chapter 3: Peripherals, Cables, and Connectors Which of the following statements is true about eSATA cables and connectors? A. eSATA cables provide power and data to devices. B. eSATA connectors are smaller than USB-C connectors. C. eSATA is faster than USB4 and Thunderbolt 3. D. eSATA maximum throughput is 6 Gbps.
Answer: D. eSATA maximum throughput is 6 Gbps. The eSATA standards limit throughput to 6 Gbps, which is much slower than USB4 and Thunderbolt 3, both of which can get to 40 Gbps. Standard eSATA cables do not provide power, although there are versions of eSATA that do include power. The connectors are larger than USB-C connectors.
Chapter 6: Introduction to TCP/IP Which of the following is an IPv6 broadcast address? A. ::1 B. FE80:: C. FF00:: D. ::FFFF E. None of the above
Answer: E. None of the above IPv6 does not have broadcasts. IPv6 does have multicasts, which are a bit like targeted broadcasts. FF00:: is the first part of a multicast address.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies You are purchasing a new video card for a desktop computer. For the best performance, which type of video card should you purchase? A. PCI x16 B. PCI x128 C. AGP D. PCIe x128 E. PCIe x16
Answer: E. PCIe x16 For a video card, the best standard currently available is PCIe, and the widest channel width is x16. There are no PCI x16 or PCI x128 slots, nor is there a PCIe x128 slot. AGP is an older video expansion standard that is now obsolete.
Chapter 2: Expansion Cards, Storage Devices, and Power Supplies What are the output voltages that have been commonly produced by PC power supplies over the years? (Choose five.) A. +3.3VDC B. -3.3VDC C. +5VDC D. -5VDC E. +12VDC F. -12VDC G. +110VDC H. -110VDC
Answers: A. +3.3VDC C. +5VDC D. -5VDC E. +12VDC F. -12VDC A PC's power supply produces +3.3VDC, +5VDC, -5VDC, +12VDC, and -12VDC from a 110VAC input.
Chapter 1: Motherboards, Processors, and Memory You are training new technicians to install RAM and pointing out differences between packages. Which of the following are the numbers of pins that can be found on DIMM modules used in desktop motherboards? (Choose two.) A. 180 B. 184 C. 200 D. 204 E. 232 F. 240
Answers: B. 184 F. 240 DIMMs used in desktop motherboard applications have one of four possible pin counts. SDR SDRAM is implemented on 168-pin modules. DDR SDRAM is implemented on 184-pin modules. DDR2 and DDR3 are implemented on 240-pin modules with different keying, and DDR4 and DDR5 DIMMs have 288 pins but different keying. Older dual-channel DIMM modules have 232 pins. Modules with 200 and 204 pins are used in the SODIMM line, and there are no modules with 180 pins.
Chapter 1: Motherboards, Processors, and Memory You are installing a new computer, and the user wants to use virtualization. Which hardware components need to support virtual technology for this to work properly? (Choose two.) A. RAM B. Motherboard C. CPU D. BIOS
Answers: C. CPU D. BIOS For virtualization to work, both the CPU and BIOS need to support it. The operating system does as well. Virtualization support may need to be manually enabled in the BIOS. RAM does not need to support virtualization, and neither does the motherboard (except for the BIOS).