HW TBS
Which of the following network components is responsible for converting digital data into a signal that can be transmitted?
Network interface
As an IT technician, you added a printer for a client. When you did this, you were prompted to select and install the drivers. Which of the following can you do to avoid repeating this step for subsequent clients?
Install the printer drivers on the print server.
What is an advantage of using scan-to-email over scan-to-folder network document scanning?
It can transmit larger files.
Which type of printer uses a drum, plastic toner, and fuser to create a printed page?
Laser
Your company needs to print a lot of high-quality black-and-white text documents. These documents need to be printed as quickly and inexpensively as possible. The printer must also have the capacity to perform duplex printing. Which of the following printers BEST meets your company's printing requirements?
Laser
Which of the following network types uses special hardware to provide high-speed access to storage across the network?
Storage area network
You are currently learning about networking devices and have just learned about MAC addresses. You look up your device's MAC address, and it comes back as 00-B0-D0-06-BC-AC. Which portion of this MAC address can tell you who the manufacturer is?
00-B0-D0
What is the host ID?
192.168.0
To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer. Which of the following TCP/IP port numbers is the default port used by this protocol?
3389
You have connected your printer directly to your Windows workstation with a USB cable. Which type of printer have you set up?
A local printer
7. You are working as a junior technician for a small consulting firm. You have been tasked with installing a new computer on the network. You have performed this task and connected the computer to the network. To verify network connectivity, you decide to ping the network server. Before this can happen, the new device needs to know the MAC address of the network server so it can match it to the IP address. The computer sends a broadcast message, asking who has the IP address. The network server responds with its MAC address, and now the computer can communicate with the server. Which protocol is being used when sending the broadcast message to match the MAC address to the IP address?
ARP
In order to edit print server properties in Windows 11, which section do you need to select from the Settings menu?
Bluetooth & devices
Inkjet printers are popular for small businesses because they provide good quality printouts. However, fuzzy lines can appear in artwork, or colored areas in images can sometimes start and stop before they should. Which of the following should you do when this happens?
Calibrate the printer
Inkjet printers spray microscopic dots of ink with precise, controlled movement. Which of the following components carries the printhead back and forth during a print job?
Carriage assembly
As an IT network administrator for your financial company, you have decided to set up document scanning services to digitize, store, and share the large number paper-based documents used in financial transactions. You want to be able to store these digitized documents offsite and make them available to all authorized employees from a centralized storage location for mobility and collaboration in real time. Which of the following document scanning solutions MOST closely matches your requirements?
Cloud services
Your employer wants a system that guarantees that all components will work together with minimal configuration and setup. Time is of the essence in getting this new system ready. Which of the following would BEST meet your employer's needs?
DCS
A technician has configured a client computer's network interface to request an IP address. Which of the following TCP/IP suite protocols does the client computer use to perform the request and receive an IP address from a server?
Domain Name System (DNS)
A technician has configured a client computer's network interface with server addresses to which the client will send requests for translating fully qualified domain names (FQDNs) to IP addresses and IP addresses to FQDNs. Which of the following TCP/IP suite protocols is used by the client to perform the request and also used by a server to respond to those requests?
Domain Name System (DNS)
You want to allow your users to download files from a server running the IP protocol. You also want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?
FTP
You want to scan a variety of family history documents and photos, many of which are very large. There are also some family history books that you need to scan. Which of the follow scanners will MOST likely meet your scanning needs?
Flatbed scanner
You are the network administrator for a small consulting firm. The firm has recently rolled out a new intranet site, and you are responsible for configuring the DNS. You are able to connect to the intranet site by using the IP address, but you cannot connect by using the hostname. Which of the following do you need to configure to access the site with the hostname?
Forward lookup zone
Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option to keep mail messages on the server?
IMAP
Which of the following UTM appliances monitors all network traffic and blocks malicious traffic while notifying the network security team?
IPS
You are a junior network technician for a small consulting firm. You have recently learned about IP addressing and run the ipconfig command on your local computer. The output from the command is:
IPv4 Address..... 192.168.0.52
What is the best way to set up a Wi-Fi-incompatible printer to provide the most reliable wireless printing?
If the printer is Ethernet-capable, connect it to the network through a wireless router.
Which printer permission would you assign to a user so that they can pause the printer?
Manage this printer
Which of the following is an advantage of connecting a printer to a network?
Multiple users can print to the same printer.
Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer?
Peer-to-peer
Which component in a laser printer prepares the photosensitive drum for writing by causing the drum to receive a negative electrostatic charge?
Primary corona
Which printer management feature would you use to view the drivers that a printer uses?
Print Server Properties
Which term refers to the portion of the hard drive where print jobs are stored before going to the print device?
Print queue
When an application (such as Microsoft Word) sends a print job to the printer, which of the following manages the printing process?
Print spooler
Several employees have called you to complain about the default configuration settings on the network printer. One has asked to change the page orientation, another has wanted to change the collating setting, and another asked about duplexing. Which of the following print features would allow the employees to make the requested changes to their print jobs?
Printer Properties
Which of the following DHCP scope options will assign a static IP configuration to a device using the device's MAC address?
Reservation
You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share?
SMB
Which of the following identifies both the host computer and the network to which it belongs?
Subnet mask
A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which of the following Transport layer IP suite protocols is MOST likely used for this service?
User Datagram Protocol (UDP)
Which of the following is an inherent vulnerability of embedded devices?
Vulnerable to malware
You are working as an installer for a small IT company. One of your residential clients has purchased some IoT devices and you have been tasked with installing them for the client. These IoT devices will be networked together in a small network. Each device will connect to each other and act a relay for the network signal so additional network infrastructure will not be needed. Which of the following best describes this type of network?
Wireless mesh network
Your system administrator shared a USB laser printer connected to your Windows 11 system so other users on the network could send jobs to it. A network user has sent a large job to the printer, but the print job has stalled. You try to delete the print job, but can't. Which of the following BEST describes the reason you cannot delete the print job?
You do not have the Manage this printer permission