Exam Cram Core 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You are a technician for an accounting company. You have submitted a request for a new wireless access point. You receive and set up the new device and power it on, but the company router doesn't appear to recognize it. Which of the following statements best describes how to fix the problem? (Select the best answer.) You should perform an apt-get update. You should run Windows Update. You should install the firmware update. You should perform an RPM update.

You should install the firmware update. Explanation: Always check if there is a new firmware update available for your wireless access point or other networking device before configuring it and making it available for use. In the scenario, a protocol is probably not the correct version, so the router cannot see the wireless access point. In this case, updating the firmware is the right move. But always check your company policies before doing so. See Chapter 6, "SOHO Networks and Wireless Protocols," for more information. Incorrect answers: The apt-get command is used to install and update applications in Linux operating systems. Windows Update is the program used to update and patch Windows operating systems. A Red Hat Package Manager (RPM) update, now simply known as RPM Package Manager, is used to install software on Linux systems.

You are working at a customer's home and are installing a wireless technology that operates at 900 MHz. Which of the following are you installing? 802.11ac Z-Wave Bluetooth 5G

Z-Wave Explanation: Z-Wave is a wireless protocol used with many devices such as home automation products. It operates within unlicensed frequencies such as 800 and 900 MHz. See Chapter 6, "SOHO Networks and Wireless Protocols" for more information Incorrect answers: 802.11ac is a WLAN protocol that operates at 5 GHz. Bluetooth operates at 2.4 GHz. 5G is a cellular protocol that operates at a variety of higher frequencies including 3.5 GHz, 28 GHz, and beyond.

Your organization subscribed to a cloud service and is paying monthly for a group of services. The organization is then billed incrementally when it exceeds the monthly amount. Which of the following cloud concepts does this represent? Measured services Rapid elasticity Resource pooling On-demand

Measured Services Explanation: Measured services is when the provider monitors services rendered; this allows the provider (and the customer) to analyze the rate of resource usage. See Chapter 16, "Cloud Computing and Client-side Virtualization," for more information. Incorrect answers: Rapid elasticity is when a provider offers a scalable cloud-based network that can grow as the organization needs it to. On-demand is the ability for customers to gain access to resources 24 hours a day, 7 days a week. Resource pooling is when servers and infrastructure are grouped together for multiple customers to share.

hich of the following cable types should be used to connect a cable modem to a SOHO router? Ethernet Thunderbolt USB Coaxial

Ethernet Explanation: Use an Ethernet patch cable to connect a cable modem to a SOHO router. An Ethernet patch cable is a UTP cable with RJ45 plugs on each end and it is usually Cat 5e or Cat 6. See Chapter 5, "Ports, Protocols, and Network Devices" for more information Incorrect answers: A coaxial cable is used to connect the cable modem to the coaxial wall jack, which then leads to the Internet (or TV) provider. Thunderbolt is used for data and display connections, primarily by Apple computers. USB is the standard for connecting peripherals to computers and for charging/synchronizing mobile devices.

hich of the following devices should be configured to block specific ports on the network? Firewall Bridge Gateway Router Access point

Firewall Explanation: The firewall is the device that prevents outside intrusion by blocking ports and protocols. In many networks it is the first line of defense. See Chapter 5, "Ports, Protocols, and Network Devices," for more information. Incorrect answers: A gateway is a device (usually a router) that allows multiple clients on one network access to another (for example, computers on the LAN that want to gain access to the Internet). A router connects two networks together. A bridge separates

Which of the following devices should be configured to block specific ports on the network? Firewall Bridge Gateway Router Access point

Firewall Explanation: The firewall is the device that prevents outside intrusion by blocking ports and protocols. In many networks it is the first line of defense. See Chapter 5, "Ports, Protocols, and Network Devices," for more information. Incorrect answers: A gateway is a device (usually a router) that allows multiple clients on one network access to another (for example, computers on the LAN that want to gain access to the Internet). A router connects two networks together. A bridge separates a LAN into two distinct network sections. An access point allows wireless connectivity to the network for Wi-Fi-enabled computers.

Which of the following printer technologies uses piezoelectric pressure pads to produce small bubbles that are moved to the paper? Inkjet Laser Impact Thermal

Inkjet Explanation: The inkjet printer uses piezoelectric pressure pads to produce small bubbles that are moved to the paper. See Chapter 15, "Printers and Multifunction Devices," for more information. Incorrect answers: The laser printer applies toner to the paper in the electrophotographic imaging process. A thermal printer uses heat to create text and images on specially coated paper. Impact printers use a print head to hammer the letters through a ribbon and on to the paper.

You are planning to build a computer that will be used at trade shows on several different continents. Part of your planning includes specifications such as maximum RAM and a typical video card, CPU, and storage drive. Which of the following specifications is the most important for you to consider when you select a power supply unit? Number of SATA connectors Efficiency Input voltage 12 V rail amperage

Input Voltage Explanation: One of your most important considerations should be the input voltage. For example, in the United States (and some other countries) this is 120 volts. However, in many other countries it is 240 volts. (These are also represented as 115 V and 230 V.) It's better to avoid voltage converters if at all possible, so you will need a power supply unit (PSU) that can handle both. That means one of two things: 1. An auto-selecting PSU, or 2. A PSU with a voltage switch. The former is preferable, so that the person setting up the computer at trade shows does not need to remember to check the switch. However, keep in mind that you might still need an adapter for the actual three-prong connection used in other countries. See Chapter 13, "Peripherals and Power," for more information. Incorrect answers: The efficiency rating tells you how effectively the PSU uses energy. For example, the 80 Plus program promotes energy efficiency of more than 80 percent. While this is important for most computers - because we all want to conserve energy, right? - it is not as important for this particular system, because the PC will be relying on power that is provided by the trade show venues. Rail amperage is important for resource-intensive computers such as gaming PCs, design systems, and so on, where an individual rail (such as the 12 V) can overheat if driven too hard. Of course, we don't want our devices (such as GPUs) to draw too much current from the PSU (which generally can max out at about 30 amps or so); however, the system is using typical components, so current should not be a factor. As long as the PSU meets the wattage requirements, it should be okay. Maximizing the RAM shouldn't cause the computer to go beyond the maximum current or wattage (as long as we don't overclock it! And even then it is unlikely.

One of your co-workers has asked for a cable for an Apple mobile device that can charge it and transfer data to and from it. Which of the following connection types would meet the customer's requirements? Molex Lightning Micro-USB Mini-USB

Lightning × Explanation: The Lightning connector is a proprietary connector used by Apple mobile devices. It is the successor to the 30-pin connector. However, keep in mind that some Apple devices use USB-C. See Chapter 3, "Smartphones, Tablets, and Other Mobile Devices, Part 1," for more information. Incorrect answers: Apple devices do not use Micro-USB or Mini-USB, although adapters may be available depending on the device used. Micro-USB is common on Android-based devices. Molex is a power connection found inside PCs.

Of the following, which components are the most important in a virtualization server? (Select the two best answers.) Maximum memory Quad-core CPU Dual-rail 1000w PSU High-end sound card High-end video card

Maximum Mem, Quad-core CPU Explanation: A virtualization computer (especially a virtualization server) requires memory and a powerful multicore CPU above all else. Because virtual machines require a lot of raw resources, maximum memory and maximum-core CPUs are the most important items for virtualization workstations. See Chapter 14, "Custom PCs and Common Devices," for more information. Incorrect answers: High-end sound cards and video cards are typical in gaming computers and audio/video editing workstations. High-end video cards are also common in CAD/CAM computers (which, by the way, also require a lot of RAM and CPU power.) A dual-rail PSU is one that has two amperage outputs instead of just one; this is common in today's PSUs. 1000 watts is quite a high amount and is required by computers with a lot of powerful components, such as gaming computers.

Examine the following output: Fe80::403b:e791:b151:b92a%11(Preferred) 192.168.1.115(Preferred) 255.255.255.0 192.168.1.1 151.198.0.38 Based on the output, which address is most likely the DNS server? 192.168.1.115 255.255.255.0 192.168.1.1 151.198.0.38

151.198.0.38 Explanation: The information in the scenario was generated with the ipconfig /all command. The DNS server address is most likely 151.198.0.38. Fe80::403b:e791:b151:b92a%11(Preferred) is the link-local IPv6 address. See Chapter 5, "Ports, Protocols, and Network Devices" for more information Incorrect answers: 192.168.1.115(Preferred) is the IPv4 address of the computer. 255.255.255.0 is the subnet mask. 192.168.1.1 is the gateway address. The DNS server IP address does not have to be on the same network as the IP address of the local computer. However, by default the gateway IP address will be on the same network as the local computer. In this case, the network number is 192.168.1.0. Analyze the different lines of information within your own computer by running the ipconfig /all command.

Which of the following is the module format used by a laptop's DDR4 SODIMMs? 260-pin 200-pin 204-pin 240-pin

260-pin planation: DDR4 SODIMMs use the 260-pin module format. See Chapter 1, "Laptops, Part 1," for more information. Incorrect answers: As far as SODIMM technology goes, DDR1 and DDR2 use the 200-pin module format and DDR3 is 204-pin. 240-pin is used by full-size desktop DDR3.

hich of the following ports is used by DNS traffic by default? 3389 53 25 22 143

53 Explanation: Port 53 is the default inbound port on a DNS server. A DNS server resolves domain names and host names to their corresponding IP addresses. See Chapter 5, "Ports, Protocols, and Network Devices" for more information Incorrect answers: Port 22 is used by Secure Shell (SSH). Port 25 is used by the Simple Mail Transfer Protocol (SMTP); but secure versions include ports 587 and 465. Port 143 is used by the Internet Message Access Protocol (IMAP); but the secure version is port 993. Port 3389 is used by the Remote Desktop Protocol (RDP).

Which of the following voltages are normally supplied by a PSU's rails? (Select the two best answers.) 5 V 1.5 V 9 V 3.3 V

5V & 3.3V Explanation: The voltages a power supply unit (PSU) typically supplies include 3.3 V, 5 V, and 12 V (as well as their negatives) to components in the computer. See the section titled "Power Supplies" in Chapter 13, "Peripherals and Power," for more information. Incorrect answers: 1.5 is a common voltage for DDR3 RAM and for AA and AAA batteries. 9 V is usually associated with batteries used by handheld devices such as power supply testers and multimeters. PSU's do not supply a 9 V rail or 1.5 V rail.

hich inbound port does a DHCP server use? 67 389 53 443

67 Explanation: A DHCP server uses inbound port 67, which allows for incoming DHCP requests from clients (which incidentally use port 68 outbound). See Chapter 5, "Ports, Protocols, and Network Devices" for more information Incorrect answers: Port 53 is the port used by DNS servers. Port 443 is used by HTTPS for web servers and some other types of systems. Port 389 is used by the Lightweight Directory Access Protocol (LDAP)—common with Windows Servers.

What are some ways to increase the lifespan of a mobile device's battery? (Select the three best answers.) Use airplane mode Configure sleep mode for 1 minute or less Make use of GPS Use a battery monitoring app Avoid draining the battery

A, B, E Explanation: A few ways to increase the lifespan of a mobile device's battery include: avoid draining the battery below 50 percent; configure sleep mode for 1 minute or less; and use airplane mode, which turns off all wireless connections, and generally conserves power. Remember: "wireless connections" means WLAN (Wi-Fi), Bluetooth, GPS, NFC, and so on. See Chapter 1, "Laptops, Part 1" for more information Incorrect answers: Using additional apps actually puts an additional strain on the battery, even if they are meant to monitor the battery. GPS applications put a mighty strain on the battery and should always be turned off after use.

One of the technicians at your company replaced a broken LCD screen on a mobile computer. The OS and apps can be seen perfectly on the screen but touchscreen functionality is non-responsive. Which of the following are the most probable root causes for the problem? (Select the three best answers.) The digitizer cable is not seated properly on the motherboard. The hardware replacement used is a non-touchscreen. The replacement part was DOA. The grounding screws are not securely attached. The LCD panel firmware must be updated. The new touchscreen drivers must be installed. Select 3 answers

A, B, F Explanation: Three of the probable root causes to this problem include: the digitizer cable is not seated properly on the motherboard; the hardware replacement used is a non-touchscreen; and the new touchscreen drivers must be installed. Always double-check connections (especially before closing up a mobile device), and be sure to install the correct drivers for the hardware. See Chapter 2, "Laptops, Part 2" for more information Incorrect answers: It is possible that a part is dead on arrival (DOA), but it is unlikely. Bad screens are maybe 1 in 1000, and that means actual manufacturing errors. That number does not include shipping damage and/or technician mishandling. If the operating system and applications are displaying properly, then the LCD panel's firmware probably does not have to be updated—though it is wise to check if an update is required; the firmware probably won't have an effect on touchscreen capability the way the touchscreen drivers do. When we talk about grounding screws, we are usually referring to electrical connections, such as AC outlets, switch boxes, and junction boxes that use grounding screws. Because mobile devices are portable, they are self-contained, and do not connect to AC outlets (except when charging). Regardless, any type of grounding issue could cause unexpected system restarts or damage to the system when plugged in.

You are troubleshooting a printer. Which of the following are common symptoms of printer failure or other printer issues? (Select the two best answers.) Unable to install the printer to the OS Failure to document cable and screw locations Vertical lines on the page Failure to organize parts Num Lock indicator lights are on

A, C Explanation: Some common symptoms of printer trouble include vertical lines on the page, which would indicate a print drum issue, likely fixed by a toner cartridge replacement or inkjet cartridge calibration. Also, problems installing the printer to an operating system are a symptom of printer trouble. If the printer has failed, the OS will have difficulty seeing it and the printer will have to be repaired before the printer and print driver can be installed to the client computer's OS. See Chapter 21, "Troubleshooting Printers." Incorrect answers: Num Lock (Number Lock) indicator lights are displayed on laptop and PC keyboards. If a laptop's Num Lock indicator light is on, it will probably be difficult for a user to log in to the system. Instead of the user typing the regular password, a mixture of unwanted letters and numbers will be typed, causing the login to fail. Of course, this is not a common symptom of printer failure but could be the cause for a failed login. Failure to document cable and screw locations and the failure to organize parts could make reassembly of a printer or laptop difficult. These failures could possibly even be reasons why the printer or laptop fails, but they wouldn't be symptoms of the problem. When troubleshooting, be sure to understand the difference between a symptom of a problem and a cause of a problem. And of course, think carefully about the best solution to the problem!

You are working at the bench repair department in your company and a user approaches you with a problem concerning a smartphone. It is unable to send or receive voice calls and cannot connect to Wi-Fi. Otherwise, applications work properly unless they require connectivity. What is the most likely cause of the problem? Tethering Disabled hotspot Airplane mode VPN

Airplane Mode Explanation: Of the listed answers, the most likely cause is that the smartphone is in airplane mode. It's a quick fix that is often overlooked—disable airplane mode and everything will work again! That includes Wi-Fi, Bluetooth, voice calls, texting, and any applications that require Internet access. See Chapter 4, "Smartphones, Tablets, and Other Mobile Device, Part 2" for more information Incorrect answers: When a mobile device is tethered to a PC or Mac (via USB), it is sharing it's Internet connection with that desktop or laptop computer. While tethering and hotspots can disable Internet access on the smartphone while they are on, if the user has brought the device in for repair, then it is most likely not physically tethered to the other computer anymore. Disabling a hotspot means that it has been turned off. If the hotspot was on, then it would interfere with the smartphone itself getting on the Internet; but being off is the default state, and the smartphone would work normally. VPN connectivity works over the Internet connection. If VPN is functional, then applications should work. In less common scenarios, VPN can cause conflicts with Internet access, but it is not as likely as the device being in airplane mode.

A monitor's on-screen display (OSD) indicates that the proper video source has been selected, yet no image is displayed. Which of the following are the most likely causes? (Select the two best answers.) The monitor's backlight has failed. The source cable has been disconnected. There is no device sending video. The monitor's brightness setting is too low. The monitor's contrast setting is too high.

B, C × Explanation: The most likely answers here are that there is no device sending video (such as a video card) or that the source cable has been disconnected (for example, from the computer's video card to the monitor). Always check the connections on both ends, and make sure that the computer (the video source) is on and booting properly. See Chapter 20, "Troubleshooting Video Issues and Mobile Devices," for more information. Incorrect answers: The brightness and contrast settings are not likely to cause a no-image issue. On most monitors you can reduce the brightness to zero but still see the image on the screen. Likewise, you can increase the contrast to 100 (or whatever maximum number is used) and still see the image on the screen. It is not possible for the monitor's backlight to have failed because you can see in the OSD that the proper video source has been selected. The OSD would not be visible (or would only be barely visible with a flashlight) if the backlight had failed. Again, it is much more likely that there is a connectivity or source video problem. Always check the connections first!

One of your customers attempts to copy a DVD with a third-party application. It reads the source DVD fine, but when a blank disc is inserted, the program keeps asking the customer to insert blank media. What are some possible reasons for this? (Select the three best answers.) The drive is a CD-RW drive. The DVD was inserted upside down. A Blu-ray disc was inserted into the drive. The customer is using the wrong DVD type. The program cannot copy the DVD due to copyright laws. There isn't enough free space on the hard drive.

B, C, D × Explanation: If the source DVD was read fine, there are three possible correct answers: an incorrect DVD type was inserted into the drive; a Blu-ray disc was inserted into the drive; or the DVD was inserted upside down. See Chapter 10, "RAM and Storage" for more information Incorrect answers: The scenario doesn't specify whether or not the DVD is protected by copyright laws. The hard drive doesn't play into this scenario because the program's message is simply to insert blank media. The drive can't be a CD-RW drive if it accepted the source DVD. Chances are you won't see many CD-ROM or CD-RW drives. If you see any optical drives on systems, they will be DVD/CD compatible or Blu-ray/DVD/CD compatible.

You are required to perform preventive maintenance on a laser printer. What should be replaced? (Select the three best answers.) Paper trays Pickup rollers Paper Transfer belt Fuser assembly RAM

B, D, E Explanation: The fuser assembly, pickup rollers, and transfer belt should be replaced. These are normally contained within a printer maintenance kit. Many printers warn you when the fuser and possibly the transfer belt are just about ready to be replaced. When you get a warning like this, you should install the maintenance kit right away. See Chapter 15, "Printers and Multifunction Devices" and/or Chapter 21, "Troubleshooting Printers" for more information Incorrect answers: The printer's RAM should never have to be replaced, unless there was some kind of damage caused by overheating or a surge. Paper is a consumable that needs to be replaced more often; it is not part of a maintenance kit. It is usually not the responsibility of the technician, but the department where the printer is located. Also, toner cartridges might need to be replaced, but it isn't always necessary during preventive maintenance. The paper trays will rarely fail and are not part of a maintenance kit. But they should be checked to make sure they are in working order when maintenance is required on the printer.

You are attempting to load an operating system from a USB flash drive at computer startup. Which of the following settings should you modify in the BIOS? Boot sequence Enable TPM Enable a BIOS password Disable TPM

Boot Sequence × Explanation: Most of the time a computer's BIOS (or UEFI) will be configured to boot to the hard drive first. To boot from a USB flash drive, or optical disc, or other removable media, you might need to change the boot sequence, otherwise known as the boot order or boot priority, and place the removable media first. However, if the drive is brand new and blank, you might be able to still boot from the removable media, even if it is not first on the list. This will depend on the system, but essentially, the BIOS will see that the drive is blank and move on to the next boot media on the list. Keep in mind that you might boot to removable media with an operating system for other reasons than installing the OS (for example, recovering an existing system). See Chapter 11, "Motherboards and Add-on Cards," for more information. Incorrect answers: Enabling a password is not necessary, but there should be a password. If there is, you will need to know it in order to access the BIOS. If not, you should create one while you are there. TPM (Trusted Platform Module) deals with the encryption of data on the hard drive and should be enabled or disabled before an operating system is installed; it won't have any bearing on the boot sequence.

A user at your company just purchased a new mobile device that uses a different operating system than the previous one. The user wants to copy the contact and appointments from his corporate account without entering them manually. Which of the following is the best option? Create a Bluetooth connection between the two devices and copy the contacts and the calendar. Use NFC to transfer the contacts and appointments from one device to another. Log into the same e-mail provider on the new device and restore the contacts and calendar appointments. Back up the old device to a desktop computer and import the contacts and appointments to the new device.

C Explanation: Most mobile devices will use cloud-based e-mail (Gmail or similar). The whole point of using these services is that they can seamlessly synchronize from one platform to another (Android to iOS, or vice versa). Simply make sure the app is installed on the new device, log in, and allow the application to synchronize the data to the new device. All of the data will be copied to the new device automatically. See Chapter 4, "Smartphones, Tablets, and Other Mobile Device, Part 2" for more information Incorrect answers: All of the other answers deal with backing up and restoring, or transferring. But these are not necessary. Proper synchronization simply requires that the app is installed, a proper login is entered, and that Internet access is available. So, Bluetooth, NFC, and backing up/restoring to and from a PC are not necessary.

You are tasked with building a high-end gaming PC and need to select the right power supply. Which features should you be looking for? (Select the three best answers.) Mini-ITX form factor 20-pin power connector 24-pin power connector Large number of connectors Dual 12 V rails 400 watts

C,D,E × Explanation: You should be looking for a high number of connectors because gaming PCs will often have multiple video cards, hard drives, and so on. You should also look for a 24-pin main power connector as opposed to a 20-pin. Finally, look for a multirail system. This distributes the power used (and gaming PCs use a lot of power) and avoids overheating on the rails. See Chapter 13, "Peripherals and Power," for more information. Incorrect answers: The 20-pin main power connector is the older ATX style that is not often used today. Mini-ITX is good for smaller computing systems, but the form factor simply doesn't allow for the space necessary for most gaming PCs. 400 watts is not nearly enough power for a high-end gaming PC; the number will be double that or more.

Which of the following does not have anything to do with virtualization? VMware Hyper-V CAD/CAM Hypervisor

CAD/CAM Explanation: The only answer that does not have anything to do with virtualization is CAD/CAM, short for computer-aided design/computer-aided manufacturing. CAD/CAM computers must run on their own individual physical platform because they require so many resources. See Chapter 14, "Custom PCs and Common Devices" for more information Incorrect answers: All of the other answers deal with virtualization: the creation of a virtual hardware platform, an OS, a storage platform, or a network resource. VMware and Hyper-V are commercial virtualization applications that allow you to run virtual operating systems within your OS, or directly within a bare-metal hypervisor. The hypervisor is the manager that houses guest operating systems within virtualization software. It can be Type 1 (bare metal), which runs directly on top of the PC's hardware, or Type 2 (hosted), which runs within the current OS.

Which of the following components can be considered the "brains" of a computer? Hard drive RAM CPU Motherboard

CPU Explanation: The central processing unit (CPU), otherwise known as the processor, is often considered to be the "brains" of the computer because it performs the bulk of the calculations for the system. See Chapter 12, "CPUs," for more information. Incorrect answers: Random access memory (RAM) stores calculated data over the short term - it is often called volatile memory because its contents are lost when the computer is shut down. A hard drive stores data over the long term - it is often called nonvolatile memory, or simply "storage," because it retains data when the computer is shut down. The motherboard is the central connecting point for all components and connections within the computer, including the CPU, RAM, and hard drive.

You have an application that sends large amounts of data over the network to a server and requires a network connection that can handle as much as 600 Mbps. Which of the following network cables meets that requirement at the lowest price point? Cat 5e Cat 6 Cat 3 Cat 5

Cat 5e Explanation: The best answer is Category 5e (Cat 5e) cable. Cat 5e can be used for gigabit networks (1000 Mbps), but it has been around for a while and is cheaper than other types of cables that can transmit more data. See Chapter 9, "Cables and Connectors" for more information Incorrect answers: Cat 3 is an older cable type that can only transmit 10 Mbps. Cat 5 transmits at 100 MHz and can typically send/receive closer to 100 Mbps (by default). If a company is using Cat 3 or Cat 5, then it should most likely be upgraded. Cat 6 can handle the requirement of 600 Mbps (and beyond), but it is more expensive to purchase than Cat 5e because it is newer. Single-mode is a type of fiber optic cabling that is used for longer runs that carry a lot of data. It would be very expensive to purchase and install, as well as time consuming, and is excessive for this scenario.

When placing a mobile device into airplane mode, which of the following features are typically disabled? (Select the two best answers.) Cellular data Camera Data encryption Wireless Multitouch capability

Cellular Data Wireless Explanation: Cellular connections are disabled when a mobile device enters airplane mode, and any other wireless connections as well, such as Wi-Fi, Bluetooth, GPS, and NFC. However, on some devices, some of these other wireless technologies can be turned on individually after the device has been placed in airplane mode. See Chapter 4, "Smartphones, Tablets, and Other Mobile Devices, Part 2," for more information. Incorrect answers: The display's multitouch capabilities will work as normal, but web browsers, e-mail programs, and other apps that require Internet access will appear not to function properly when tapped on and navigated through - because, indeed, they are not functioning at all due to airplane mode. Data encryption will still function, though you won't be able to send that encrypted data anywhere. The camera will work, but posting images and video to a remote source will not function.

You are approached by a user who is experiencing problems displaying images within received e-mail messages. Which of the following can you perform to try to fix the problem? Modify the trusted sites list in the browser settings. Change the e-mail proxy settings. Change the e-mail settings in the antivirus application. Change the security settings of the e-mail client. Change the firewall settings.

Change the security settings of the email client Explanation: The best of the listed answers is to try changing the security settings of the e-mail client. Some e-mail clients (especially Outlook and web-based clients) will disable the display or download of images by default. That is because images within e-mails can have security vulnerabilities and can be used to launch an attack or spread malware. To fix this problem—for example, in Outlook—go to File > Options > Trust Center > Trust Center Settings and uncheck the appropriate check boxes. But always check company policy first before doing this. Unchecking these options can be a security risk. So only do this if the user requires it and your organization is okay with it. See Chapter 7, "Networked Hosts and Network Configuration" and Chapter 33, "Windows Security Settings and Best Practices" for more information Incorrect answers: Changing the firewall settings is something you would do to block certain e-mail addresses (or domains) from sending e-mails to your users. It isn't used to block images. However, you might block images from an e-mail server or content filter, or through group policy. The same goes for trusted sites in the browser settings; this will allow or block domains from communicating with a computer, but it is meant more for web browsing, not e-mail. E-mail proxy settings deal with the caching of e-mail at a server; however, proxy servers are most commonly used with HTTP, HTTPS, and FTP. Antivirus applications probably won't have an e-mail setting for displayed images; however, an anti-malware application might, but it isn't the first place you should go to fix the problem.

You just set up a printer in the company training room. The trainer wants to be able to print multiple copies of the training documentation for class. Which feature should be enabled on the printer? Duplexing Faxing Collating Print to PDF Scanning

Collating Explanation: The functionality that the trainer desires is collating. This prints the documentation as entire jobs (for example, page 1 through 10, then repeat) instead of printing all the required copies of page 1 before moving to page 2. This makes it easier on the trainer when it comes time to hand out documentation to students. Collating is usually enabled on today's printers, but if not, you would enable it in the printer properties in Windows or on the display of the printer. To test if it works, simply print out a document that has two or more pages and select 2 for the number of copies. See Chapter 15, "Printers and Multifunction Devices," for more information. Incorrect answers: Duplexing means that the printer will print to both sides of the paper. Faxing and scanning are options found commonly on multifunction printers, but they don't have anything to do with collating. There are several ways to print to a file, such as printing to PDF, which takes a document such as one created in Microsoft Word and converts it into a PDF. The physical printer isn't actually involved with this at all.

Which of the following is the fastest way to synchronize data between an iPhone and a work PC? Copy the data from the iPhone to a microSD card. Use Bluetooth to share data from the iPhone. Connect the iPhone's USB cable and use iTunes. Transfer data via Wi-Fi Direct to the user's laptop.

Connect the iphone's USB cable and use iTunes xplanation: The fastest way (of the listed answers) is to connect the iPhone via USB and use iTunes. With SuperSpeed USB, the data transfer rate can be 5 Gbps or more (depending on the version). This is much faster than any of the other methods listed. Note: As of the writing of this book, iTunes is slowly being phased out and broken up into three apps: Music, TV, and Podcasts, but synchronization with PCs and the cloud will work in essentially the same ways. See Chapter 4, "Smartphones, Tablets, and Other Mobile Device, Part 2" for more information Incorrect answers: Wi-Fi Direct is the name given to the technology that allows mobile devices to connect to each other directly (in an ad hoc manner) without a router. Although you can synchronize an iPhone to a computer running iTunes over Wi-Fi, the chances are that the PC doesn't support Wi-Fi Direct. Regardless, the speed that can be attained over Wi-Fi (even with 802.11ac connections) won't be faster than today's fastest USB connection. Copying the data to a microSD card will be quite slow, not only due to the speed of writing to the microSD card, but also given the fact that you will have to physically transfer the media to the PC. Bluetooth is not nearly as fast as Wi-Fi (let alone USB); at speeds limited to megabits, it is not meant for transferring large amounts of data or for synchronizing.

You are troubleshooting what appears to be a RAM issue on a desktop computer. Which of the following symptoms would indicate the problem is really a RAM issue? Continuous reboots POST code beeps Wrong BIOS time Distended capacitors

Continous Reboots Explanation: Continuous reboots can be a symptom of a RAM issue, potentially a bad stick of RAM. When this happens, check the RAM sticks in different slots and check the motherboard documentation for the correct installation of RAM. Of course, check if the RAM is compatible with the motherboard! See Chapter 18, "Troubleshooting Motherboards, CPUs, RAM, and Power" for more information Incorrect answers: POST code beeps are associated with a lot of different hardware components in the computer—including RAM. However, if there is a POST code error, it will often result in the computer simply not booting as opposed to continuously rebooting. POST code beeps regarding RAM could indicate that there is no RAM, or that the RAM is incompatible with the motherboard, or that it is installed improperly. Distended capacitors were a big problem in the early 2000s, and though less common today, a distended capacitor could cause the system to fail altogether, but not continuously reboot. If the BIOS reports the wrong time, it is probably due to a failed CMOS battery.

You need to make a patch cable to connect a computer to an RJ45 wall jack. Which of the following tools should be used to attach the RJ45 plugs to the patch cable? Cable tester Loopback plug Crimper Punchdown tool

Crimper Explanation: Use an RJ45 crimper to crimp those RJ45 plugs on the ends of a patch cable. See Chapter 8, "Network Types and Networking Tools," for more information. Incorrect answers: Use a punchdown tool to terminate individual wires to the RJ45 wall jack and to patch panels. Use a loopback plug to test a network adapter by plugging it into the card's RJ45 port. Use a cable tester to test patch cables or longer LAN cable connections.

A laptop's battery fails to charge. Which of the following should be checked first? CMOS battery AC circuit breaker DC-in jack AC-in jack

DC-in Jack Explanation: Of the listed answers, you should check the DC-in jack on the laptop. The very first thing you should do is check the basics; see if the power brick is connected to the AC outlet and to the DC-in jack and verify that the battery is connected properly. See Chapter 2, "Laptops, Part 2," for more information. Incorrect answers: Laptops don't have an AC-in jack - the power adapter takes care of converting AC power to DC power for the laptop to use. Of course, you should always check the laptop battery first, in the event that it is missing or not connected properly. Next, make sure the power adapter is plugged into the DC-in jack and that the jack is not damaged. A damaged DC-in jack can also cause the laptop to occasionally shut off. Users often damage the DC-in jack because they leave the power adapter plugged in while they are in transit. On most laptops, a new one has to be soldered on to the board. The CMOS battery is inside the laptop. It retains UEFI/BIOS settings and has nothing to do with charging the main laptop battery. The AC circuit breaker might have tripped, but is less likely than the previously listed reasons. Also, a good indication of a failed AC circuit is that all of the devices on that circuit would stop working.

You are working in a command line and see the following results: dprocomputer.com = 216.97.236.245 Which of the following server types has most likely helped supply this information to you? Print server DNS server Syslog server DHCP server Authentication server

DNS Server Explanation: The Domain Name System (DNS) server is the server that is in charge of resolving domain names (such as davidlprowse.com) to their corresponding IP addresses (such as 216.97.236.245). So, in other words, it provides mapping of user-friendly names to network resources. The DNS server can supply this information to you when you make use of various commands in the command-line such as ping, tracert, nslookup, and dig. See Chapter 7, "Networked Hosts and Network Configuration," for more information. Incorrect answers: A DHCP server takes care of handing out IP addresses to client computers automatically. An authentication server - such as a domain controller running LDAP - is in charge of verifying the identity of users who attempt to log in. A Syslog server is used to gather the logs from network devices and present the information in a manageable way to an admin's workstation. Though you could probably find out the name resolution within the log details, it wouldn't be done in the command line and it wouldn't be presented in the manner that it was in the question. A print server is a computer that is in charge of one or more printers on the network.

One of your customers reports to you that when typing on the laptop keyboard, the mouse pointer scrolls across the screen. Which of the following steps can resolve this? Plug in an external mouse. Disable the touchpad. Use an external monitor. Reboot the laptop.

Diable the touchpad Explanation: The person's arm or sleeve is probably brushing up against the touchpad, causing the mouse pointer to move. By disabling the touchpad in the Device Manager or elsewhere, you eliminate the chance of that, but the user also loses that functionality. See Chapter 1, "Laptops, Part 1" for more information Incorrect answers: Rebooting the laptop has the same effect and is not necessary. Using an external mouse alone does not fix the problem; even if there is an external mouse, the touchpad can still be used, unless it is disabled. An external monitor does not help you fix the touchpad issue, but it can be a nice addition to a laptop. In fact, many users who have laptops in an office also use them at home. At the office, and perhaps at home as well, it is best to set them up with a docking station, external keyboard, external mouse, and monitor. It usually results in greater productivity.

You are working on a gaming computer that is running an older version of Windows. There is a high-end gaming application that isn't performing very well. So far, you have updated all of the hardware on the system and flashed the BIOS. What should you analyze further in an attempt to fix the problem? Video driver OSD DirectX Safe Mode Resolution setting

DirectX Explanation: Check the level of DirectX that is installed. DirectX isa Windows technology that includes video, animation, and sound components. It helps a computer get more performance out of multimedia, games, and movies. You can find out what version of DirectX the Windows computer is running by going to Run and typing dxdiag. In the System tab you will see the version; for example, DirectX 12. Check for the requirements of the gaming application (it probably requires the latest version of DirectX) and install that from Microsoft's website. Some gamers want to run older versions of Windows (for a variety of reasons), but older versions of Windows come with older versions of DirectX unless it is updated. See Chapter 27, "Microsoft Operating System Features and Tools, Part 2" for more information Incorrect answers: You should always check the video driver and update it if necessary—especially if it is an older version of Windows—but the question scenario states that the hardware has been updated already. If the driver wasn't updated, the game might not even run. If it runs, it should perform fairly well with any driver (as long as it is supported). Updates to video drivers usually offer only a slight increase in performance or include security patches. "Resolution setting" is somewhat vague. High-end games usually have their own resolution setting that runs independently of the Windows resolution. Either way, increasing the resolution will use more resources and the game will not perform as well. Use Safe Mode to troubleshoot video drivers that aren't working; it's not something you would analyze in this scenario, but rather a tool you would use while updating or rolling back drivers. OSD stands for on-screen display. A monitor's OSD can be used to adjust the brightness, contrast, and other settings, but won

You are tasked with fixing a laptop that is not booting. You have analyzed the system and can't see any system lights or display, and you can't hear any sounds when the Power button is pressed. Which of the following should be attempted first when troubleshooting the problem? Boot the system from a boot CD. Connect an external monitor to the laptop to determine if the LCD has failed. Disconnect the AC and the battery and press and hold the Power button for several seconds. Remove hard drives and optical drives, RAM, and USB devices from the laptop.

Disconnect the AC and the bettery and press and hold the power butting for several seconds. Explanation: Although you could try several things, the best of the listed answers is to disconnect the AC connection and the battery and press and hold the Power button for several seconds. This effectively discharges the laptop (capacitors and such) and may also clear the BIOS, either one of which can fix the problem. Exactly what happens will depend on the model of laptop, and the length of time you will need to hold down the Power button will vary. Afterward, reconnect the battery and AC connection and continue troubleshooting from there if necessary. The key in this question is that you cannot hear or see anything happening. In most cases, something will happen, but in this case, the laptop may have had a voltage overload or other similar problem. Discharging it in this fashion can fix the problem, but you might have to reconfigure your BIOS. See Chapter 1, "Laptops, Part 1," for more information. Incorrect answers: Booting the system to a disc will probably result in nothing. If you can't see or hear anything, you need to take stronger measures than that. Sometimes, removing drives and USB devices can help when troubleshooting, but again, in this scenario where you can see and hear nothing, it probably won't help. Connecting an external monitor is a good idea if you can see LED lights blinking when you press the Power button but get no main display. In this case, the result will probably be no image on both displays.

Which of the following memory technologies enables protection against random inconsistencies when storing data? Parity Dual-channel RAID 5 ECC Quad-channel

ECC Explanation: ECC stands for error correcting code. ECC memory can detect and correct common types of data corruption. It is often used in servers. It is not typically installed to desktops but might be used if data corruption cannot be tolerated. It provides for error correction, and therefore protection while storing data in RAM. See Chapter 10, "RAM and Storage," for more information. Incorrect answers: Quad-channel means that the RAM can send data over four 64-bit channels at the same time - four sticks of RAM are required to take advantage of that. Parity support in RAM means that the memory can detect errors, but not correct them the way ECC does. Dual-channel RAM uses two 64-bit data channels at the same. RAID 5 is not a memory technology; rather it is a redundant hard drive array technology. While RAID 5 does use parity, it is not the same type of parity that RAM might use. Note: You may have heard of unbuffered and buffered memory. While these terms are not in the A+ objectives, as a tech, you should know what they mean: Unbuffered memory is standard RAM that you would install to a typical PC. Buffered memory (also known as registered memory) places less electrical load on the memory controller, making a system that has a lot of sticks of RAM more stable. It is sometimes found in servers.

A customer wants to share a local USB printer with other users in the office. Which of the following is the best method to accomplish this? Install a print server device. Install shared PCL drivers. Enable printer sharing. Install a USB hub.

Enable printer sharing Explanation: The best method is to enable printer sharing on the computer that the local USB printer is connected to. Then connect the other computers to the shared printer. See Chapter 15, "Printers and Multifunction Devices" for more information Incorrect answers: Installing a print server device is a possibility, but that would require purchasing a print server, removing the printer from the computer, and then connecting it to the print server. This incurs additional cost and work, so it isn't the best method. USB hubs are used to connect multiple USB devices to a single computer. PCL (Printer Command Language) drivers are standard in Windows and other operating systems—as such, they should already be installed to the other computers.

You are helping a customer with an Internet connectivity problem. The customer tells you that the computer cannot connect to her favorite website. After quickly analyzing the computer, you note that it cannot connect to any websites. Which of the following tasks should you perform next? Establish a theory of probable cause. Establish a plan of action. Identify the problem. Test your theory to determine cause.

Establish a theory of probably cause Explanation: In this scenario, you have already identified the problem: the computer cannot connect to any websites. So the next thing you should do according to the CompTIA A+ six-step troubleshooting methodology is to establish a theory of probable cause. For example, maybe your theory is that the network cable is not plugged into the computer, or perhaps your theory is that the computer is not obtaining an IP address. Pick one theory (the most likely in the situation) and move to step 3: test the theory to determine the cause. If you were to look behind the computer and see that the network patch cable was unplugged (and there is no possibility of wireless), then the theory has tested positive and you can move to step 4: establish a plan of action to resolve the problem and implement the solution. In this case, it's easy: plug in the cable! Afterward, you would verify full system functionality (step 5) by testing whether the web browser can access websites. Finally, in the last step, document the problem, the solution, and any additional details, such as advice you gave to the customer. When working on computers, apply the six-step troubleshooting methodology to your thinking process as much as possible! See Chapter 17, "Computer Troubleshooting 101" for more information

Which of the following cooling methods will an integrated GPU in a common desktop most likely use? Heat sink Heat sink and fan Video card cooling fan Liquid cooling

Heat sink and fan Explanation: An integrated graphics processing unit (GPU) means that it is integrated to the main CPU (or the motherboard) of the desktop computer. In this case, video and graphics are controlled by the main CPU instead of a video adapter card with its own GPU. Most commonly, the CPU has a heat sink and fan, though liquid cooling is also a possibility. See Chapter 12, "CPUs" for more information Incorrect answers: The heat sink by itself might be used on a GPU that is part of an adapter card (separate from the CPU), but only on low-performance video cards. It is also used on the chipset on the motherboard. Liquid cooling is more common in gaming rigs as a method of cooling the CPU; in a gaming rig, the GPU will always be on a separate video card (or more than one). And these will be active, meaning that they have a heat sink and a powered fan to cool the heat sink and GPU.

Your company manages its own cloud but utilizes a third-party vendor to help manage its storage. Which of the following cloud types is being implemented in this scenario? Public Community Private Hybrid

Hybrid Explanation: This is an example of a hybrid cloud: a mixture of public and private clouds. Dedicated servers located within the organization and cloud servers from a third party are used together to form the collective network. See Chapter 16, "Cloud Computing and Client-side Virtualization" for more information Incorrect answers: The answers "private" and "public" are incorrect because the cloud type being used is not only one of those, but a combination of those. A community cloud is another mix of public and private, but one where multiple organizations can share the public portion.

You are the systems administrator for a company that uses virtualization technology extensively. You have been tasked with configuring a server to host several virtual machines. What should you use to begin provisioning virtual machines? Device Manager Hypervisor Virtual LAN Terminal Services Disk Management

Hypervisor Explanation: Use a hypervisor to provision the virtual machines. The hypervisor is essentially the virtualization software that will host the virtual machines. It could be a Type 1 (bare-metal) or Type 2 (guest-based) hypervisor, but if you are dealing with multiple VMs and are using a server to do this, then a Type 1 hypervisor is recommended; for example, VMware ESXi or Microsoft Hyper-V. See Chapter 16, "Cloud Computing and Client-side Virtualization" for more information Incorrect answers: Device Manager, Disk Management, and Terminal Services are all Microsoft Windows applications. None of them have to do with provisioning virtual machines, though you might use Terminal Services (meaning Remote Desktop Services) to access and control the virtual machines. A virtual LAN is a local area network that is run within the virtualization software; it includes a virtual switch and the virtual connectivity to the virtual machines stored in the hypervisor. You can create a virtual LAN, virtual switch, and more virtual networking infrastructure in VMware ESXi or Microsoft Hyper-V.

Which of the following monitor types provide for the widest viewing angle along with rich colors and consistent backlighting? (Select the two best answers.) CCFL LED TN Plasma IPS

IPS & LED Explanation: IPS (in-plane switching) monitor technology offers the widest viewing angle, and LED (light-emitting diode) monitors offer rich colors and consistent backlighting. See Chapter 13, "Peripherals and Power," for more information. Incorrect answers: Plasma screens do not perform as well in these respects. TN (twisted-nematic) monitors are less expensive monitors that do not have as good of a viewing angle as IPS. CCFL stands for cold-cathode fluorescent lamp, which is the backlight used in standard LCD monitors. LED is superior to plain LCD when it comes to backlighting and rich colors. Note: LED also performs the best (compared to the others listed) when it comes to use in an area with a lot of natural light.

You are part of a team that has decided to make use of a cloud provider for some of your organization's technology needs. Your top priority is to offload some of your networking, storage, and VM hosting to the cloud. Which of the following services best suits your needs? PaaS SaaS IaaS DBaaS

IaaS Explanation: The best answer listed is infrastructure as a service (IaaS). This allows for networking services (also known as NaaS), storage, load balancing, routing, VM hosting, and more. See Chapter 16, "Cloud Computing and Client-side Virtualization," for more information. Incorrect answers: Software as a service (SaaS) provides common applications to clients over the Internet. Platform as a service (PaaS) provides software solutions such as the ability to develop and test applications within the cloud. Database as a service (DBaaS) - or cloud database - is where the creator of the database does not have to install or support the database software or server; instead, it is provided by a cloud service. The acronym DBaaS is not in the CompTIA A+ bulleted objectives, but it is listed in the CompTIA A+ Acronym list, where you will also find data as a service (DaaS) and network as a service (NaaS).

The power supply fan and case fans spin, but there is no power to other devices. Which of the following is the most likely cause of this? Failed hard drive Drive not recognized Improper connectivity Failed RAM

Improper Connectivity Explanation: If the power supply fan and the case fans are spinning but there is no power to other devices, the chances are that the main 24-pin power connection was not made from the power supply to the motherboard. In this scenario, the case fans would have been connected by way of Molex power connectors directly to the power supply. Although it's usually better to connect case fans to the motherboard, if they were connected to the motherboard, they would not spin, because the motherboard is not receiving power. If this scenario was to occur, no other devices would get power, including the CPU, RAM, motherboard, hard drives, optical drives, and so on. See Chapter 13, "Peripherals and Power," for more information. Incorrect answers: If the hard drive fails, the operating system will fail to boot up. If the hard drive cannot be repaired, it will have to be removed (often with a Phillips-head screwdriver) and replaced. If the drive is not recognized, again, the OS will not boot. It would have to be reconnected properly, configured in the UEFI/BIOS, or partitioned and formatted properly in Windows, depending on the specific situation. Failed RAM could cause a boot failure and will definitely be registered by the POST, but it doesn't necessarily mean that the RAM (or any other device) is not receiving power.

You are tasked with fixing a computer that is overheating after 30 minutes of use. What is the most likely cause? ACPI disabled Clogged temporary folders Incorrect input voltage settings Internal dust buildup

Internal dust buildup Explanation: The most likely listed cause is internal dust buildup, especially if the buildup is within the CPU fan. If the fan has too much dust and dirt, it will stop spinning at the right speed, thus reducing its effective cooling ability, and causing the CPU to overheat, shutting down the system. See Chapter 1, "Laptops, Part 1" for more information Incorrect answers: ACPI is the Advanced Configuration and Power Interface, used by operating systems for configuration and management of power to the system. This can be disabled in the BIOS on some systems, but isn't recommended. Regardless, the older APM (Advanced Power Management) should take over if it is. "Incorrect input voltage settings" is somewhat vague. Incorrect CPU voltage settings could cause the system to overheat (for example, if it was overclocked), but it is more likely that there is dust and debris in one of the fans. Temporary folders are folders in Windows. You can have as much data as you want in your Windows folders; it won't cause the system to overheat!

A user boots a computer and a message is displayed that reads "Alert! Cover previously removed." Which of the following was configured in the UEFI/BIOS to cause this alert? Date and time settings Intrusion detection Boot sequence Virtualization support

Intrusion Detection Explanation: If the intrusion detection setting is enabled in the UEFI/BIOS, and the computer was opened, the system will display a message and log what happened. This is a security feature on most of today's motherboards. See Chapter 11, "Motherboards and Add-on Cards," for more information. Incorrect answers: Configuring the date and time settings would not result in a message. The boot sequence deals with the list of drives that the system will attempt to boot from in order. Virtualization support allows the system to use CPUs that take advantage of Intel and AMD virtualization extensions.

Which of the following is an advantage of UDP over TCP? It is connection based. It uses connection handshakes. It uses flow control. It transfers packets faster.

It transfers packet faster × Explanation: The main advantage of UDP (User Datagram Protocol) over TCP (Transmission Control Protocol) is that it can transfer data packets faster. Because it is a connectionless protocol, it doesn't require the synchronization or sequencing that TCP does. This makes it a faster option for streaming services, VoIP, and so on. See Chapter 5, "Ports, Protocols, and Network Devices," for more information. Incorrect answers: UDP does not have an option for flow control. Also, it does not use a handshaking process. (TCP uses the three-way handshake: SYN, SYN-ACK, ACK.) As mentioned, UDP is connectionless, whereas TCP is connection based. However, even though UDP can transmit packets faster, you will find that TCP is used for most services and applications you will deal with.

A customer wants to control several computers with a single set of input devices. What solution should you provide for them? Ethernet switch Smartcard reader KVM Barcode reader

KVM Explanation: KVM stands for keyboard, video, and mouse. A KVM is a switch that enables the connection of one keyboard, monitor, and mouse. However, the KVM has connections for several computers, which can be selected by pressing a button on the KVM. See Chapter 13, "Peripherals and Power" for more information Incorrect answers: A barcode reader is a scanning device that can read and interpret information from barcodes and send that information to the computer. A smartcard reader is a device that reads smart identification cards when they are swiped and sends that information to an authenticating system. A different type of switch, the Ethernet switch, is a common LAN device that enables the connectivity of multiple computers for the purpose of networking.

Which protocol is relied upon most by Active Directory? (Select the best answer.) SMB WINS HTTP LDAP

LDAP Explanation: Of the listed answers, the Lightweight Directory Access Protocol (LDAP) is relied upon most by Active Directory. LDAP deals with directory lists (such as the users within a Microsoft Active Directory domain) or the users' e-mail addresses listed within a Microsoft Exchange server. See Chapter 5, "Ports, Protocols, and Network Devices," for more information. Incorrect answers: Server Message Block (SMB) is a protocol that allows shared access to files; it is important to any computer running Windows, not just computers that are in charge of, or connect to, a Microsoft Active Directory domain. SMB is also known as the Common Internet File System (CIFS.) HTTP stands for Hypertext Transfer Protocol, used to transfer data from a web server to a client computer's web browser. WINS stands for Windows Internet Naming Service, a name resolution technology that converts NetBIOS names to IP addresses. It is somewhat deprecated and is not commonly used; its successor is the Domain Name System (DNS.)

Which one of the following types of printers allows for the lowest cost per page? Impact Laser Thermal Inkjet

Laser Explanation: The laser printer has the lowest cost per page of the four listed answers. Laser printers and their corresponding toner cartridges are designed to be long lasting, and print many pages before needing maintenance or replacement. See Chapter 15, "Printers and Multifunction Devices" for more information Incorrect answers: The impact printer (for example, dot matrix) requires special perforated paper and needs to have the printing ribbon changed more often than a toner cartridge. The inkjet printer ink cartridges do not last nearly as long as the laser printer's toner cartridge, plus inkjet printers are not known for their durability. Thermal printers can be expensive and require more costly, specially coated paper.

Which of the following types of printers requires a maintenance kit that contains a fuser, transfer roller, and pickup rollers? Thermal Inkjet Impact Laser

Laser × Explanation: The laser printer is the one that is most associated with maintenance kits. Common components of a laser printer maintenance kit include a fuser, transfer roller, and pickup rollers. See Chapter 21, "Troubleshooting Printers," for more information. Incorrect answers: Common components of a thermal printer include the feed assembly and heating element. The inkjet printer normally includes the ink cartridge, print head, roller, feeder, duplexing assembly, carriage, and belt. An impact printer's components include the print head, ribbon, and tractor feed.

During a routine inspection, a network engineer found that a data rack was not properly grounded. To pass inspection, you have been tasked with making sure all network racks are properly grounded. Which tool should you use to complete your task? Multimeter Tone generator Cable tester Voltmeter

Multimeter Explanation: Use a multimeter to verify if the racks have been properly grounded. Multimeters can test electricity in multiple ways. For this scenario you would need a continuity test. You are looking for results close to zero Ohms (some multimeters will beep when they verify continuity). When network racks are grounded, it can be done with grounding bars and other grounding equipment, ultimately connecting to an earth ground, typically with 6-gauge grounding wire. See Chapter 8, "Network Types and Networking Tools", and Chapter 40, "Safety Procedures and Environmental Controls" for more information Incorrect answers: A cable tester is designed to verify the functionality of network cables—such as twisted-pair cables. While that test looks for continuity (more impedance), it is done over long distances. A tone generator is used to locate a cable or wire that is difficult to find—potentially within a bundle of wires. A voltmeter is used to test AC or DC voltage. You can use a device like this to check the ground wire of an outlet, but not a separate grounding wire connected to network racks.

Which of the following connection types is primarily used to transfer data between two devices that are in close proximity? Parabolic antenna 802.11ac NFC Bluetooth

NFC Explanation: Near field communication (NFC) can allow communication between mobile devices over very short distances; it uses radio frequency (RF) to do so. This close proximity could be within a few inches or by having the devices actually touch each other. It is sometimes referred to as "beaming" information between devices. See Chapter 3, "Smartphones, Tablets, and Other Mobile Device, Part 1" for more information Incorrect answers: 802.11ac is a wireless local area network (WLAN) protocol by the IEEE and allows for wireless transmissions over much longer distances. A parabolic antenna is used with satellite connections, which are long distance. Bluetooth is used by computers and phones to establish connections to wireless peripherals such as headsets, generally over an average distance of 10 meters. Apple's Airdrop technology uses a mixture of Bluetooth and Wi-Fi. Note: Infrared (IR) technology can also be used to send information between two devices over very short distances (usually a few feet). However, each device's IR sensor must be within line-of-sight of each other. That's one of the drawbacks of IR over NFC, though it can be used to advantage in some secure solutions.

One of your customers has signed up for a mobile pay service to be used on a first-generation smartphone. However, the smartphone does not work at any location that supports mobile pay service. Which of the following is missing from the customer's smartphone? NFC Bluetooth RFID IMSI

NFC × Explanation: Near field communication (NFC) is missing from the smartphone. Older (first generation) smartphones do not have NFC. Always check the minimum requirements of any software or service that you are planning to use with a smartphone, tablet, or other computer. Make sure that the mobile device in question meets the minimum requirements. See Chapter 3, "Smartphones, Tablets, and Other Mobile Devices, Part 1" for more information. Incorrect answers: IMSI stands for International Mobile Subscriber Identity and is a unique 64-bit field used to identify the user of a cellular network. By the way, don't confuse IMSI with IMEI. IMEI stands for International Mobile Station Equipment Identity, which identifies the phone. RFID stands for radio-frequency identification, a technology that uses tags and radio-frequency scanning to identify those tags. Bluetooth is a technology primarily used to allow for peripherals' access to a computer, such as using a Bluetooth headset with a smartphone.

A user calls you and tells you that his computer won't boot and that there is a faint smell of something burning. Which tool should be used to identify the problem? Cable tester ESD strap Loopback plug PSU tester

PSU Tester Explanation: Use a power supply unit (PSU) tester to check if the power supply is malfunctioning. If you ever smell something burning, even if it is a faint smell, turn off the power to any associated computers or devices and disconnect them from the AC outlet. Then test the affected PSU. Sometimes there is a burn-in period when it comes to new PSUs, and there might be a very faint smell for the first 24 to 48 hours. This is possible if the PSU was newly installed, but you should still test and monitor the PSU until the smell goes away. However, if the computer was working previously and suddenly doesn't work anymore, and you smell something burning, then you should most likely replace the PSU after testing it. Only test the PSU in your lab, and make sure you have all the necessary fire prevention tools and technologies available to you. See Chapter 18, "Troubleshooting Motherboards, CPUs, RAM, and Power," for more information. Incorrect answers: A loopback plug is used to test a switch port or the RJ45 port on a computer. There are many cable testers, but the term is often associated with network cabling, such as cable certifiers for Category 6 (Cat 6) cable. The ESD strap, or more accurately antistatic strap, is used to protect components from electrostatic discharge (ESD).

Which of the following should be reset during normal printer maintenance? Print job cache Tray settings Page count Job queue

Page Count Explanation: The page count should be reset whenever you perform normal, scheduled printer maintenance. For example, a laser printer can print about 200,000 pages before it needs a scheduled maintenance. By resetting the page count after a successful maintenance, you will know when the next maintenance should occur. This is reset on the printer itself. See Chapter 15, "Printers and Multifunction Devices," for more information. Incorrect answers: The job queue and cache should reset automatically; this is because you would normally turn the printer off before maintaining it. Any print queue located on a computer is not reset automatically, but jobs in the queue will probably have to be resent. The tray settings do not have to be reset.

You have been tasked with resolving a shadowy image that is being printed from a network printer. What should you do? Run a calibration. Replace the drum. Replace the network cable. Replace the fuser.

Replace the drum Explanation: Try replacing the drum. If this is within the toner cartridge (which it often is), then replace that as well. See Chapter 21, "Troubleshooting Printers," for more information. Incorrect answers: If the fuser needs replacing, you will probably see smeared text and images. If images or text are not straight or are colored incorrectly, you might need to calibrate the printer. If the network cable fails, the printer should not print at all from networked computers; however, a test page run locally at the printer should print just fine.

You are installing an IP-based camera system that connects directly to the network. To access the system remotely, which capability most likely requires configuration? QoS Static IPs VPN passthrough Port forwarding

Port Forwarding Explanation: Port forwarding is the best answer. For a person to remotely access the network and gain access to the system, you should forward a specific port from the router over to the system. This happens after the remote user has made a virtual private networking (VPN) connection to the network. See Chapter 6, "SOHO Networks and Wireless Protocols," for more information. Incorrect answers: QoS stands for quality of service, which can be configured to grant more connection performance to particular services, such as streaming media and Voice over Internet Protocol (VoIP). Static IP addresses are used when you need to have a permanent identification for a server (or the entire network) that can be accessed by hosts on the Internet. Although this might be used in the scenario, it isn't necessary and doesn't need to be configured to access the camera system. VPN passthrough means that VPN traffic is allowed on routers that utilize network address translation (NAT). NAT is the technology that allows multiple clients on the LAN to share the router to access the Internet.

Question Id : 220-1001-DP-01-15-31 A customer needs to convert a document into something that is readable from any OS, can be commented on, and is secured with a password. Which of the following should you recommend? Print to file. Print to image. Print to XPS. Print to PDF.

Print to PDF Explanation: To meet all the requirements in the question, recommend that the customer print to PDF. A PDF is a document that can be read on just about any platform, as long as PDF reader software is installed—and many operating systems have preinstalled PDF readers. Some PDF software applications (such as software provided by Adobe) can password protect the document, and allow for commenting and other reviewing features. If you are working in Microsoft Word, you can create a PDF by using the Print feature or the Save as feature. Print to PDF and all of the other answers listed are examples of virtual printing. See Chapter 15, "Printers and Multifunction Devices" for more information Incorrect answers: Print to XPS creates an .xps file that can be stored and later viewed on any computer that supports XPS; it includes improved color and graphics support. Print to file takes the document and saves it as a .prn file that can be printed later on or from another computer that has access to a printer. It's the backup to XPS. Print to image is when a window or region of the screen is captured and saved to a document—examples include Snagit (by Techsmith) and the Windows Snipping Tool.

Which of the following describes the use of DNS as it relates to TCP/IP networks? Provides separate control and data connections between network resources Provides remote connectivity to resources on the network Provides mapping of user-friendly names to network resources Provides automated addressing to computers on the network

Provides mapping of user-friendly names to network resources. Explanation: DNS (Domain Name System) provides the mapping of user-friendly names (domain names such as https://dprocomputer.com) to network resources (such as IP addresses). See Chapter 5, "Ports, Protocols, and Network Devices" for more information Incorrect answers: DHCP (Dynamic Host Configuration Protocol) provides automated addressing to computers on the network. FTP (File Transfer Protocol) offers separate control and data connections. RDP (Remote Desktop Protocol) provides remote connectivity to resources on the network.

Which of the following LAN hosts would most likely provide the services needed to allow multiple clients access to cached Internet web pages? File server Web server Proxy server DNS server

Proxy Server Explanation: A proxy server provides the services needed for multiple clients to access Internet web pages. It is a server that is normally located on the LAN, or the internal computer network, and as such is known as a LAN host or a network host. See Chapter 7, "Networked Hosts and Network Configuration," for more information. Incorrect answers: A web server provides web pages, yes, but the web server is not normally on the LAN. Web servers normally exist on the Internet, or on an intranet, or in a DMZ, so they cannot be considered network hosts or LAN hosts. File servers simply store files for multiple clients to access; Word documents and Excel spreadsheets are examples. A DNS server is used to resolve hosts' domain names to their corresponding IP addresses. They are very common on the Internet, though they can exist on the LAN as well. However, they don't deal with cached web pages the way that a proxy server will.

There are four people who share a connection to a SOHO router that connects to the Internet. When a single user starts streaming media over the Internet, browsing slows down for the rest of the users. Which setting should be configured to alleviate the problem? VPN DSL QoS WAN

QoS Explanation: Quality of service (QoS) is the performance of user connections over the network, particularly connections to the Internet. On some small office/home office (SOHO) routers, this can be configured to allow for equal data transfers among all users, or it can be used to configure special traffic (such as streaming media) to transfer faster. See Chapter 6, "SOHO Networks and Wireless Protocols," for more information. Incorrect answers: DSL stands for Digital Subscriber Line, which is a family of technologies used to transfer data over the Internet. WAN stands for wide area network - a network that spans a large geographic area and connects two or more LANs. VPN stands for virtual private network, which allows for secure (tunneled) connections over the Internet.

A user reports that her printer does not produce crisp images when printing documents from Windows. Which of the following should you address to fix the problem? Orientation Quality Collating Duplexing

Quality Explanation: You should reconfigure the quality settings. For example, a typical inkjet printer can be set to Draft, Normal, or Best with the quality settings in the Printing Preferences window. You might also see this referred to as dots per inch (DPI); the higher the better. For example, 600 DPI or 1200 DPI is preferred for quality documents. See Chapter 21, "Troubleshooting Printers" for more information Incorrect answers: Duplexing is the act of printing to both sides of the paper. Collating is when print jobs are organized by the page count. Orientation allows you to choose whether the print job will be printed in portrait mode (vertical, the default) or landscape mode (horizontal).

You have identified a network problem as a connectivity failure between one Windows computer and a switch. What should you do next? (Select the two best answers.) Test the theory to determine cause. Establish a plan of action to resolve the problem. Question the obvious. Document findings, actions, and outcomes Question the user of the Windows computer. Establish a theory of probable cause.

Question the obvious Establish the theory of prbably cause Explanation: You have already identified the problem (step 1 of the CompTIA A+ troubleshooting methodology) and so you move on to step 2: Establish a theory of probable cause. As part of this step you question the obvious. For example, is the network cable plugged into the computer? Is there a link light? Is the network adapter enabled? If using Wi-Fi, is the wireless connection enabled? The "obvious" list goes on. See Chapter 17, "Computer Troubleshooting 101" for more information Incorrect answers: If you have identified the problem, then chances are you already questioned the user (which is part of step 1), or perhaps the questioning was not necessary or the user was not available for questioning. Establishing a plan of action to resolve the problem is step 4, and you haven't gotten to that point yet. Testing the theory is step 3, which you will do immediately after you establish a theory! Documenting findings, actions, and outcomes is the sixth and last step of the A+ troubleshooting methodology. Know your six-step A+ troubleshooting process and apply it as you take the exam and when you work on technology problems in the real world! Step 1. Identify the problem. Step 2. Establish a theory of probable cause (question the obvious). Step 3. Test the theory to determine cause. Step 4. Establish a plan of action to resolve the problem and implement the solution. Step 5. Verify full system functionality and, if applicable, implement preventive measures. Step 6. Document findings, actions, and outcomes.

You have been tasked with configuring two drives for maximum performance. Which of the following RAID types should you select? RAID 1 RAID 10 RAID 0 RAID 5

RAID 0 provides for the striping of data over two or more drives. The main purpose of RAID 0 is to increase performance compared to using a single drive. See Chapter 10, "RAM and Storage" for more information Incorrect answers: Note that the question said nothing about fault tolerance. All of the other answers are fault tolerant, which decreases performance. RAID 1 is mirroring; it copies the data to two drives. RAID 5 is striping with parity; it stripes the data and parity information over three or more drives. RAID 10 is a stripe of mirrors. As far as performance goes, RAID 1 and RAID 10 will usually outperform RAID 5. But each has their purpose. Choose wisely!

Which type of connector is most commonly used with POTS lines? RJ11 BNC RJ45 SC

RJ11 Explanation: RJ11 connectors are most commonly used with POTS lines. The RJ11 is the telephone jack in the wall that you would plug a phone into. POTS stands for plain old telephone service; this refers to the standard public switched telephone network (PSTN), the technology that requires an analog "landline," a technology slowly becoming more and more obsolete. The POTS line uses a cable that consists of two twisted pairs of copper wires. See Chapter 8, "Network Types and Networking Tools" for more information Incorrect answers: RJ45 refers to the jacks and plugs used in twisted-pair networking connections; networking cables have four twisted pairs of copper wires. BNC is the type of connector used in older coaxial thinnet networks; it uses a single copper core. SC is a type of fiber optic cable connector; the cable has glass or plastic fibers within it.

Which of the following is the most common type of networking connector? F-connector RJ11 RJ45 BNC

RJ45 Explanation: The RJ45 connector is the most common type of networking connector. It is used in twisted-pair networks. See Chapter 9, "Cables and Connectors," for more information. Incorrect answers: RJ11 is the connector used by landline-based phones (POTS connections) and DSL connections in households. The F-connector is a type of coaxial connector used for cable TV and cable Internet connections. BNC is another type of coaxial connector used in some video applications and in older networks.

A user working at a PC is experiencing screen flicker. Of the following, what should you reconfigure? (Select the best answer.) Resolution CCFL Refresh rate Switch from HDMI to DVI

Refresh rate Explanation: If the PC's display is experiencing screen flicker then it could be due to an improperly configured refresh rate. Usually, monitors and operating systems will auto-configure a setting such as this, but not always - for example, if you are using a less common operating system or a more advanced application. The refresh rate is the number of times the display is drawn on the screen per second. A common amount is 60 Hz, but perhaps the user is working with an editing program or game that requires a higher refresh rate, and the monitor supports it, but it is not configured properly, either in the OS or in the application. Or perhaps it is an older system that is more prone to refresh rate issues. As you can see, there are a lot of possibilities when it comes to video. See Chapter 20, "Troubleshooting Video Issues and Mobile Devices," for more information. Incorrect answers: The cold-cathode fluorescent bulb (CCFL) is the backlight for LCD screens. You wouldn't reconfigure it, but you might have to replace it if the display starts blinking or shuts off completely. Keep in mind that many displays are LED based today and do not use a CCFL. A different resolution shouldn't cause screen flicker on a flat-panel display - it would either show the different resolution, no resolution, or possibly a distorted image. Resolution issues are more common with CRT monitors. Screen flicker could be caused by a loose connection, regardless of the connection used. But switching from one video port type to another probably won't help fix the actual problem.

You are a technician troubleshooting a workstation. When it is turned on, a black screen appears prompting the user for an administrative password. You cannot locate the password. What should you do? Remove the CMOS battery and reinsert it after 10 seconds. Disconnect and reconnect the internal hard drive. Press the power button for 30 seconds, then reboot. Remove the motherboard and replace it after 10 minutes.

Remove the CMOS battery Explanation: The best thing to do is to remove the CMOS battery and reinsert it after 10 seconds. This will clear the CMOS settings, including the BIOS administrator password, the time and date, and any other things you have configured. The battery is usually a CR2032 lithium battery. This works on PCs and some laptops. With most laptops you can simply remove the laptop battery. In less common scenarios—mostly older computers—you might have to remove or reconfigure a jumper. See Chapter 18, "Troubleshooting Motherboards, CPUs, RAM, and Power" for more information Incorrect answers: There is no need to do anything with the hard drive because it won't affect a UEFI/BIOS password. Pressing the power button for 30 seconds won't help in this situation; when the system starts back up, it will simply ask for the password again. However, that can help to remove any charge that is built up on a motherboard, especially when dealing with laptops. Removing the motherboard is pretty extreme, and usually not necessary. It is a last resort because it would require a lot of time to disassemble all components.

On your server, two drives of a RAID 5 array have failed. What should you do? Replace one of the failed drives and repair the RAID array using system utilities. Replace the failed drives and restore the data from tape backup to the repaired RAID array. Replace the failed drives and format the RAID array using the quick option. Replace one of the drives and run RAID repair.

Replace the failed drives and restore the data from...... Explanation: You will need to replace both failed drives (which causes a total RAID 5 array failure, by the way) and restore the entire set of data from tape backup. See Chapter 19, "Troubleshooting Hard Drives and RAID Arrays," for more information. Incorrect answers: In a RAID 5 array, one drive can fail and you can still recover from the issue without tape backup (using the RAID parity information), but no more than one can fail. If more than one fails - as in the question's scenario - then you need to restore all data from a previous backup. However, in RAID 6, two drives can fail and it can still recover. Formatting the RAID array is a good idea if you have to recover from backup but not a good idea otherwise because it will make the current data inaccessible. However, the term "quick option" is a Windows term, implying that the RAID array was created in Windows, and is therefore a software-based array. It is recommended that you create hardware-based arrays that connect to a RAID adapter card (or RAID-enabled motherboard). In a hardware-based system such as this, you could repair the array with the system utilities, but again, in this scenario (RAID 5) only if one drive has failed.

You are troubleshooting a RAID 6 array on a high-end computer. Two disk drives have their fault lights on. What is the best action for you to take? Replace the failed drives and verify the RAID array rebuilds completely. Reseat the drives and monitor the RAID status over a few days. Replace the failed drives and restore the data from a known good backup. Reseat the drives, back up the data, and then replace the drives.

Replace the failed drives and verify the RAID array rebuilds completely. Explanation: The best action to take is to replace the failed drives and verify the RAID array rebuilds the data on those two drives. See Chapter 10, "RAM and Storage" for more information Incorrect answers: If the fault lights are on, then there is probably a problem with the drives that will not be fixed by reseating them. It will usually be impossible (and not recommended) to back up data on a drive that has a fault light on. In this case, you need to take slightly more assertive action. The beauty of RAID 6 is that it can rebuild data even if two drives fail. If this was a RAID 5 array, only one drive would be permitted to fail at any given time, and so you would most likely need to restore data from a known good backup. Because it is RAID 6, you won't have to restore from backup, but always make sure you are backing up just in case! Reseating the drives is not enough. You should monitor the array after you rebuild it though.

A laptop's LCD is being scratched by the keyboard when the lid is closed. Which of the following steps should be performed to remedy this issue? Replace the LCD hinges. Replace the rubber bumpers. Replace the LCD panel. Replace the keyboard.

Replace the rubber bumpers Explanation: You should replace the rubber bumpers. These can wear down over time or might become unstuck from the laptop. These bumpers create a space between the keyboard and the LCD; without them, the LCD can get scratched by the keyboard. See Chapter 1, "Laptops. Part 1" for more information Incorrect answers: If the laptop opens and closes okay, then there is no reason to replace the hinges, because they won't change how the screen is touching the keyboard. The LCD panel is only scratched; it hasn't failed as of yet, so it doesn't need to be replaced. The keyboard is most likely not the cause of the problem. There is the uncommon possibility that the keyboard is not mounted properly; a quick sideways glance at the laptop keyboard surface can tell you right away. You would have to remove the laptop bezel and reconnect the keyboard properly if this is the case. However, it is more likely that the rubber bumpers fell off or became worn down.

A user can no longer print from his computer to the default printer. While troubleshooting this issue, you learn that you can print a test page from the printer and the printer's queue shows that the job is ready to print. Which of the following tasks should be performed next in order to resolve the situation? Reset the printer. Delete the job and resubmit it. Restart the Print Spooler service. Reinstall the print drivers.

Resart the Print Spooler Service Explanation: If the user could print to the printer previously and the job is just sitting in the print queue, you should most likely restart the Print Spooler service at the user's computer. This can be done in the GUI of Windows within Computer Management > Services and Applications > Services or by typing net stop spooler and net start spooler in the Command Prompt. See Chapter 21, "Troubleshooting Printers" for more information Incorrect answers: Deleting the job and resubmitting it will probably have the same effect and you will have to restart the spooler anyway. Printer drivers are not the cause of a stalled print job. Resetting the physical printer will not help; the job will still be sitting in the user computer's print queue.

Which of the following is the best protocol to use when securely transferring large files? Telnet SSH SFTP FTP

SFTP Explanation: SFTP (Secure File Transfer Protocol or SSH File Transfer Protocol) is the best option when attempting to securely transfer large files. It utilizes SSH (Secure Shell) to create a secure connection (using port 22), but remember that SSH by itself is simply a secure way of connecting to other computers. See Chapter 5, "Ports, Protocols, and Network Devices" for more information Incorrect answers: Basic FTP is not secure by default (other than requiring the use of a password). Telnet is deprecated and should be avoided and replaced with SSH as well.

Which of the following protocols is used to perform file sharing between Apple computers running macOS and PCs running Windows on a LAN? SMB RDP POP3 SSH

SMB Explanation: SMB (Server Message Block) can be used to facilitate file sharing between Windows computers and computers running macOS. It is sometimes referred to as its older name CIFS (Common Internet File System). If SMB is for some reason unavailable on the Mac-based systems, then they will attempt to use the Apple File Protocol (AFP). See Chapter 5, "Ports, Protocols, and Network Devices," for more information. Incorrect answers: RDP is the Remote Desktop Protocol, used to view or take control of remote computers from a central workstation. SSH is Secure Shell, a protocol used to make secure connections to other systems; it replaces protocols such as Telnet. POP3 is the Post Office Protocol (version 3) used with downloading e-mail.

You just installed a barcode reader. Which of the following should you do to configure the reader? Adjust jumper switches. Use the Device Manager to enable the IR port. Enable the reader in the BIOS. Scan in program codes.

Scan program codes. Explanation: After installing a barcode reader, you should start scanning various test barcodes in order to calibrate and configure the reader. Many reader devices will come with a physical book that has printed test codes used to calibrate the device. See Chapter 13, "Peripherals and Power," for more information. Incorrect answers: The infrared (IR) port should work automatically on a barcode reader; there is no reason to enable it. Barcode readers do not usually have jumper switches. Also, these are usually plug-and-play devices that do not need to be enabled in the BIOS.

You are a network administrator for your company. You work on the third floor of your building. Your network switches are located in a server room on the first floor. You want to be able to read through the events of your managed switches while sitting at your Windows workstation. Which technology should you implement? DNS FTP IDS HTTPS Syslog

Syslog Explanation: Use Syslog. Devices such as switches and routers can send their event logs in real time to workstations by using the Syslog protocol. First, configure Syslog to function on the network device. Point it to the IP address of the workstation (or server) that will accept the logs. Then, set up Syslog software at the workstation (or server and workstations). The Syslog software will automatically pull the logs from the switch or other device in real time, allowing you to monitor the device from your desk. See Chapter 5, "Ports, Protocols, and Network Devices" for more information Incorrect answers: FTP is used to move files back and forth between clients and servers (usually over the Internet). DNS resolves hostnames to IP addresses. An IDS is used to detect network attacks. HTTPS is used for secure websites.

You just completed a CPU installation. However, when you turn on the computer, the POST sounds a series of beeps and the system won't boot. What is the most likely cause? The mouse is not plugged in. The CPU is not properly seated. The fan is running too fast. The operating system is corrupted.

The CPU is not properly Seated. Explanation: Of the listed answers, the most likely cause is that the CPU needs to be reseated. This will result in a series of beeps from the power-on self-test (POST) as the BIOS searches for the CPU and can't find it. If a computer was being built in this scenario, then it's also possible that the RAM was not seated properly, or there is some RAM compatibility issue. See Chapter 18, "Troubleshooting Motherboards, CPUs, RAM, and Power," for more information. Incorrect answers: No other answer choice would cause the POST to issue a series of beeps. The mouse would not, but a lack of a keyboard would result in beeps. (Always make sure the keyboard is securely connected!) Also, the POST doesn't look for operating system corruption; it is relegated to hardware only. But it can display messages such as "no operating system found" or a similar message if the hard drive is missing, not formatted, or not in the correct location in the BIOS boot order. "The fan is running too fast" is subjective; regardless, its maximum speed is usually governed by the BIOS, and shouldn't affect how the system boots.

A workgroup of five PCs uses a shared printer that is connected to one of the PCs. A customer says she cannot print to the printer but can access shares on another PC used for common files. The printer appears to be powered on. Which of the following would be the most likely cause? Device drivers are corrupted. The printer is low on toner. The printer needs to be restarted. The PC with the connected printer is off the network.

The PC with the connected printer is off the network. Explanation: The most likely listed cause is that the PC to which the printer is connected is currently off of the network. It would appear from this scenario that the printer is connected to a PC by way of USB and is shared at the PC itself, which is offline. If the customer can connect to other shares on other PCs, you know that that particular computer is functional on the network. See Chapter 15, "Printers and Multifunction Devices," for more information. Note: In this scenario, the user is accessing shared files from another PC. Remember that this is a shared printer. That means that the printer is connected to another PC on the network, not directly to the network. The answer "PC is off the network" means the PC that has the printer connected to it. The key here is that the customer can access shares on other PCs, indicating an issue with the computer that has the printer connected to it. Incorrect answers: The printer is on, and restarting a printer can fix some issues, but it will most likely return the printer to the same state it was in previously. The printer being low on toner should have no effect on whether it can be accessed. But a message would probably appear on one of the computer's screens stating that the toner cartridge should be changed soon. If device drivers are corrupted, the printer should still be accessible and might print, but it will probably print garbled information.

You replace a failed hard drive with a new one. You then boot to a special preinstallation environment disc so that you can install a custom operating system build that is meant for deployment to the network. The hard drive is recognized in the UEFI/BIOS, but once you have booted to the preinstallation environment, the hard drive is not recognized, the process fails, and the drive can't be imaged. Which of the following statements best describes the most likely problem? The boot media has failed and needs to be replaced. The hard drive has not been partitioned correctly. The PC's power supply cannot provide enough power for the new drive. The hard drive must be configured in the UEFI/BIOS.

The hard drive has not been partitioned correctly. Explanation: Of the listed answers, the most likely problem is that the hard drive has not been partitioned correctly. In this scenario, the point of the preinstallation environment (PE) - which is often located on removable media such as a USB flash drive or boot disc - is to boot the system and partition the hard drive, readying it for the image to be obtained over the network. If the drive is not partitioned properly, the process will fail because the image will expect to be installed to a specific partition. See Chapter 19, "Troubleshooting Hard Drives and RAID Arrays," for more information. Note: In some scenarios, a drive can be fully unpartitioned, and you can have the image install properly. This depends on several factors, including the local system hardware, what type of network installation is being done, and what software is being used for the imaging process. Incorrect answers: Hard drives don't vary much from one to the next in regard to power, so the power supply should provide plenty of power. If it didn't, then you wouldn't see the drive in the UEFI/BIOS. The boot media has not failed; in the scenario it says that you have accessed the preinstallation environment. That is only possible if the PE boot media was booted to successfully. Today, it is uncommon for the drive to be configured in the BIOS or UEFI (unless it is part of a RAID array, which is controlled by the motherboard). Normally, the drive is either seen or not. If not, you might need to perform a flash of the BIOS or UEFI.

Memory was added to a workstation. When the computer was booted, it reported memory errors. Which of the following is the most likely cause of this problem? A different brand of memory was installed into bank two. The second memory stick was smaller than the first. The new memory was installed in the second bank and runs at a lower speed than bank one. The second memory stick was larger than the first.

The new memory was installed in the second bank and runs at a lower speed than bank one. Explanation: For multiple memory sticks to be compatible, they need to run at the same speed. You might be able to get away with one stick being one step slower, if the motherboard supports it, and as long as it is not dual-channel memory. But it isn't worth the chance. If the sticks are not compatible, or if the second stick is not compatible with the motherboard, you will probably get memory errors during POST. See Chapter 10, "RAM and Storage," and "Chapter 18, "Troubleshooting Motherboards, CPUs, RAM, and Power" for more information Incorrect answers: It's not recommended, but RAM from different manufacturers can be mixed together as long as the type and speed are the same. A second stick can sometimes be a different size, but if you are installing a kit with two or four modules, then they are usually the same size.

Which of the following best describes why you might hear a loud clicking noise coming from a faulty hard drive? The coil reversing the polarity is in an endless loop. The solid-state read/write head is scratching the platter surface. The noise is created by the repeated motion of the read/write head arm located parallel to the platter. The hard drive has a bad spindle motor bearing.

The noise is created by the repeated motion of the read/write head arm located parallel to the platter. Explanation: The loud clicking noise coming from a faulty hard drive is usually due to repeated motion of the read/write head parallel to the platter. It could be that the armature (arm) or its corresponding actuator is faulty and is not moving correctly. See Chapter 19, "Troubleshooting Hard Drives and RAID Arrays," for more information. Incorrect answers: Remember that this is a problem associated with hard disk drives, meaning magnetic-based drives. It does not affect solid-sate drives (SSDs) because they do not use read/write heads. If a bearing in the motor was causing problems, then the arm might not move at all. If the coil was in an endless loop, there would be no activity or data would keep getting written to the same place; either way, you probably wouldn't hear anything.

Your office printer was working earlier in the day but is no longer printing any documents. Preexisting workstations are manually configured to print to the printer directly over the network. You begin troubleshooting the problem and determine that the printer is still visible when browsing the network directory. You also verify, at the physical printer, that the printer can print test pages successfully. Which of the following is the most likely cause of the problem? The message "perform printer maintenance" is displayed on the printer's display panel. The print spooler was restarted. The printer's IP address has changed. Two users sent print jobs at the same time, which caused a collision.

The printers IP address has changed. Explanation: In this scenario, it is possible that the printer's IP address has been changed, and it is the best choice of the listed answers. The workstations were manually configured (most likely via IP address), which means that an IP address change on the printer would cause any print jobs from those workstations to fail. The IP address could have been configured manually by another tech, or if it was set to DHCP, the printer might have received a new address from the DHCP server. Because of this exact scenario, it is always a good idea to configure a static IP address at the printer itself (within the LCD display). Remember, in the scenario the printer can be seen in the network directory, which usually searches by printer name as opposed to printer IP address. Also, test pages are printing successfully. All these are clues that point to a potential IP problem. See Chapter 21, "Troubleshooting Printers," for more information. Incorrect answers: Restarting the print spooler service is a troubleshooting technique used when the spooler service is hung up for some reason. It generally doesn't cause problems but can fix a lot of spooling issues. Two print jobs can't be sent at the same time - collisions are a concept related to networking. It is possible that packets or frames can collide, but not the print jobs. The print jobs are placed into a queue either at the printer or at the print server. The need to perform printer maintenance doesn't usually cause print failures, but if you see that message, you should attend to it right away.

A school classroom is set up with removable drives to train students in various versions of Windows. One student tells you that one of the computers will not boot up and receives an error: no operating system found. All of the cables are plugged in securely to the computer. Which of the following is the most likely cause of this problem? The lab network is down. The monitor is not functioning. The memory is not seated properly. The removable drive is not locked.

The removable drive is not locked Explanation: The most likely reason the computer won't boot and presents the no-OS error is that the removable drive is not locked. Removable drives are common in schools and labs. A frame is installed to a 5 1/4-inch bay and connected to the motherboard via SATA the way a hard drive normally would be. Then, swappable trays are inserted into the frame, each with a different hard drive and a different OS. When the drive tray is inserted into the frame, it must be locked; it is common to forget to lock one or two. If it isn't locked, the data port will not connect properly and the OS will not boot. See "Chapter 10, "RAM and Storage" for more information Incorrect answers: If you get a message on the screen, then you know the monitor is working. Messages reporting no operating system or missing OS happen before the computer can connect to the network, so have no fear—the lab network is probably not down. If the memory needed to be reseated, you would get a message in the POST or a series of beeps.

A customer of yours is opening an Internet café and wants to offer computers for the patrons to access the Internet. Which type of computer system should you recommend? Audio/video workstation Standard thick client HTPC Thin client Gaming PC

Thin Clinet Explanation: The best answer listed is thin client. A thin client is used for basic applications, and it meets the minimum requirements for a selected OS. It is usually a diskless workstation with limited CPU power. It gets its operating system from flash-based memory or from a server and doesn't have a hard drive. In addition, it resets itself every time it is restarted. This helps to protect against malware and decreases the chances of hardware failure. See Chapter 14, "Custom PCs and Common Devices," for more information. Incorrect answers: A standard thick client is generally a PC. Internet cafes do not need the power of a thick client, an audio/video workstation, a gaming PC, or an HTPC. By the way, HTPC stands for home theater PC - a kind of computer used to connect to television stations, play DVDs and Blu-rays, connect to streaming services, as well as work like a regular computer. The acronym is not in the CompTIA A+ bulleted objectives, but it is listed in the CompTIA A+ Acronyms list at the end of the objectives.

Which of the following best describes the most likely reason for connecting a tone generator to an RJ45 cable drop? To locate the position of the cable on a patch panel To confirm continuity of the conductors To test the transmission quality of the connection To validate proper wiring of the network jack

To locate the position of the cable on a patch panel Explanation: A tone generator (part of a tone and probe kit) is often used to locate cables, especially if there are a bunch of them in a small area. In the scenario, the technician is connecting the tone generator to an RJ45 port, perhaps near a person's desk. Then the technician uses the probe (an inductive amplifier) to locate the other end of that cable at the patch panel either in a wiring closet or in the server room. See Chapter 8, "Network Types and Networking Tools," for more information. Incorrect answers: The other answers require a cable certifier. Although a cable certifier can often act as a tone generator, a tone generator is not a cable certifier - it can only generate a tone across the cable. Cable certifiers are used to confirm continuity, validate proper wiring, and test the transmission quality of a given connection.

You are troubleshooting a laptop that has a problem with the cursor. When working on Word documents, the cursor jumps around the display. Which of the following is the most likely cause? Unsigned device drivers Faulty software Touchpad settings Improper screen calibration

Touchpad Setting Explanation: The problem is most likely due to the touchpad settings (or calibration). The sensitivity might be too high, causing the cursor to jump quickly across the display. Another possibility is that the user's sleeve (or part of their arm or hand) is dragging across the touchpad. As a quick fix, you can disable the touchpad, often from a function key on the keyboard of the laptop (or in the Device Manager), until it is configured to the user's liking. See Chapter 1, "Laptops, Part 1," for more information. Incorrect answers: Touchpad calibration is separate from screen calibration, which should not cause a problem with the cursor. Faulty software is a pretty vague answer. It's possible that third-party software that is used to configure the touchpad is where the issue lies, but more accurately, this would still be the touchpad settings. You don't know if the laptop uses Windows to configure the sensitivity of the touchpad, so the answer is not accurate enough. If a driver is unsigned, then Windows will ask for an administrator's permission to go ahead with the installation. If you can't provide the admin username and password (or you are not logged in as an admin), then the installation will fail. So, the driver either installs or it doesn't, but that has no bearing on the settings or calibration of the touchpad.

hich of the following describes the function of a switch in a network? Transmits packets it receives to specific connections Converts a packet for transmission from one network to another network Broadcasts packets it receives to all connections Determines whether a packet belongs on an internal or an external network

Transmits packets it receives to specific connections Explanation: A switch can be described as a network device that transmits packets it receives to specific connections. It does this by mapping systems' MAC addresses to physical ports on the switch. See Chapter 5, "Ports, Protocols, and Network Devices," for more information. Incorrect answers: A router would convert a packet for transmission from one network to another network. It also determines whether a packet belongs on an internal or an external network, though this process can be augmented by other devices. A hub broadcasts packets it receives to all connections.

Which of the following protocols does not depend on an acknowledgment of receipt from the sender? IP HTTPS UDP TCP

UDP Explanation: The User Datagram Protocol (UDP) is a connectionless protocol. Unlike the Transmission Control Protocol (TCP), UDP does not need acknowledgment for each packet sent. It is used especially in the streaming of media. By the time an acknowledgment (ACK) receipt got back to the sender, it would be too late to re-send the packet because many other packets have already been streamed. UDP streaming sessions expect a percentage of bounced, dropped, and otherwise undeliverable packets as part of the technology. See Chapter 5, "ports, Protocols, and Network Devices" for more information Incorrect answers: HTTPS stands for Hypertext Transfer Protocol Secure, used to display website information within a browser program. IP is the Internet Protocol, the second half of TCP/IP that deals primarily with IP addresses and packets.

A fully functional touchscreen LCD monitor requires a DVI connection and a power connection. Which of the following is also required? Ethernet connection SAS connection USB connection Audio connection

USB Connection Explanation: A touchscreen LCD monitor also requires a USB connection. This kind of monitor is used by users who wish to tap on the screen or use a stylus; to input that information, the display must also have a USB connection to the computer. This might be used by AV editors, CAD/CAM operators, home users, at meetings, and so on. Chapter 9, "Cables and Connectors" for more information Incorrect answers: Because a touchscreen LCD monitor connects directly to a PC, an Ethernet connection to the network is not necessary. SAS connections are often used for high-speed, efficient hard drives. An audio connection is not required to have a fully functional touchscreen, but a user might want it, especially if this monitor uses DVI for video, because DVI does not carry audio. The audio connection could manifest itself as a 1/8-inch cable or a USB connection. However, most touchscreen monitors will use HDMI, which can send video and audio signals.

Which of the following charging/data ports uses a bidirectional connector? Micro-USB USB-C USB Type A Mini-USB

USB-C Explanation: The USB-C connector is bidirectional, which means that it can be used to charge in either direction. For example, a smartphone with a USB-C connector can use that connector for charging the phone as well as for supplying power to a USB device, such as a USB flash drive. Bidirectional might also be referred to as nondirectional. See Chapter 3, "Smartphones, Tablets, and Other Mobile Devices, Part 1" for more information Incorrect answers: Micro-USB, Mini-USB, and USB Type A are unidirectional when it comes to charging. For example, a Micro-USB port is used to charge a mobile device. A standard USB Type A port on a PC can be used to charge whatever is plugged into it.

A customer states that an inkjet printer is printing streaks on documents. Which of the following steps should be performed to resolve this issue? Print a test page from the printer. Reinstall the drivers. Use the printer's clean option. Replace the printer data cable.

Use the printers clean option Explanation: Use the printer's built-in clean option. This might be accessible from the display on the printer or from within the printer's software in the operating system. Cleaning the cartridges is necessary every once in a while so they don't get clogged. If the clean option doesn't work, you can try physically removing the cartridge, sparingly using a solution of 50 percent water/50 percent isopropyl alcohol, and cleaning the cartridge nozzle with a cotton swab. See Chapter 21, "Troubleshooting Printers" for more information Incorrect answers: Streaks on documents are not caused by faulty data cables or bad drivers. A faulty data cable would probably cause complete print failure; bad drivers would cause the printer to print garbled text. Printing a test page will result in the same document streaks.

Which of the following identifies the best utilization for a virtual machine running locally on a PC? Using the virtual machine on a PC with minimal RAM Using the virtual machine in a thick client configuration Using the virtual machine for patch testing before rollout Using the virtual machine in a gaming PC configuration

Using the virtual machine for patch testing before rollout. Explanation: Before rolling out patches to many computers on a network, it is best to test those patches on a single PC. A great way to do this is within a virtualized system. See Chapter 16, "Cloud Computing and Client-side Virtualization" for more information Incorrect answers: A thick client is simply a regular PC. Gaming PCs are powerful computers that normally do not run within a virtual machine and usually do not host virtual machines. PCs that are acting as virtualization workstations need to have a lot of RAM in order to support the VMs that will run on them. An individual VM might only use 2 GB of RAM, but chances are that the virtualization software will be supporting more than one VM.

Which of the following cable types would most likely experience degraded video signal quality over long distances? DisplayPort DVI HDMI VGA

VGA Explanation: VGA is an older standard that outputs analog signals to a monitor. Of the listed answers, it is the most susceptible to signal degradation. See Chapter 9, "Cables and Connectors," for more information. Incorrect answers: HDMI, DVI, and DisplayPort are designed to work best sending digital signals and can send them over longer distances than analog cables (such as VGA). Digital is inherently better as far as distance and signal quality goes.

You are attempting to install Hyper-V on a Windows computer. However, you receive an error that the software cannot be installed. Which of the following CPU characteristics should be checked? Virtualization support Number of cores Hyper-Threading Cache size

Virtulization Support × Explanation: You need to check whether the CPU has virtualization support enabled in the BIOS/UEFI. If this is not enabled, Windows will not allow the installation of Hyper-V to continue. You may receive an error message, or Windows will simply have a grayed-out area where you want to select Hyper-V in Programs and Features. See Chapter 11, "Motherboards and Add-on Cards," for more information. Incorrect answers: The number of cores, Hyper-Threading, and cache size will not cause an error in Windows. However, you should make sure that your system meets the minimum requirements to run Hyper-V. In most cases, if the system can run Windows, then it should be able to run Hyper-V.

You are configuring a new Windows-based mobile device for a user who has had trouble reading text on the previous device. Which of the following is the best way to help the user see content on the screen better? Utilize text-to-speech. Increase the resolution. Use haptic feedback. Use the magnifier.

use the magnifier Explanation: One of things you can do to aid the user is to use the Magnifier program. This allows the user to quickly zoom in and zoom out the entire display or a selected area. You can open this by opening the Run prompt and typing magnify or by searching for "magnifier". You could also try increasing the brightness or decreasing the resolution. See Chapter 3, "Smartphones, Tablets, and Other Mobile Devices, Part 1" and Chapter 38, "Troubleshooting Mobile Operating Systems" for more information Incorrect answers: Haptic feedback is a way of communicating with a mobile device; it is done by touch—for example, through vibrations made by the device. Text-to-speech programs can be very helpful to users who can't see the text very well, but it doesn't help them see the content better, it helps them to hear the content. You might also consider the reverse: a speech-to-text program such as Dragon, or Microsoft's Dictate program, to allow the user to speak commands instead of typing them. Increasing the resolution means configuring a higher resolution, which would make all of the text and images smaller, and therefore harder to read. In this scenario you might consider decreasing the resolution to make the text bigger, or configuring scaling to 125 percent, 150 percent, or beyond.


Ensembles d'études connexes

FINAL EXAM INTERNATIONAL MARKETING

View Set

Bios 242 Week 1 Concepts: The Cell

View Set

EAQ: PEDI Hematological Disorders

View Set

ch 3 carbs ch 4 proteins midterm exam

View Set

Emergency Preparedness Response Course (EPRC) Operator Course Pre-Test

View Set