ITSP 136 M15 - C.2.4 - CompTIA A+ 220-1102 (Core 2) Domain 4: Operational Procedures (20 Questions)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

While it takes 3,000 volts or more of ESD before you can feel it, it takes very little ESD to damage a computer component. What is the minimum ESD volt discharge that can actually damage a component? Answer 100 volts 500 volts 50 volts 10 volts

10 volts

Which of the following tools can help prevent ESD damage when working with computer components? Answer IC insertion and extraction tool Tone generator and probe 3-prong parts retriever Antistatic pad and wrist strap

Antistatic pad and wrist strap

You are filling out a change order form. Toward its end, you explain how you will return affected hardware and software to its original state if the change fails. What is this plan called? Answer Risk analysis System image plan Rollback plan Backout plan

Backout plan ---A backout plan is the portion of a change order form that details how you will return affected hardware and software to its original state if the proposed change fails. A risk analysis is the portion of a change order form that details the risks of the proposed change and presents a plan for mitigating them. A rollback is an operation that returns a database to a previous state. A system image backs up all data on a drive volume.

You are in the habit of regularly monitoring performance statistics for your devices. You find that this month, a specific server has averaged a higher number of active connections than last month. Which type of document should you update to reflect this change? - Wiring schematic - Baseline - Configuration documentation - Change log - Network diagram

Baseline

Your company provides testing services that help customers identify and resolve performance issues with their software and e-commerce sites before they go live. To perform accurate testing, a large number of computers are required, sometimes numbering in the hundreds. Recently, you have noticed that the lights in the testing lab seem dimmer than normal and sometimes flicker. Which of the following electrical terms BEST describes the condition you are most likely experiencing? Answer Power spike Brownout Power surge Blackout

Brownout

What should you use to clean metal contacts (like those found on expansion cards)? Answer Damp cloth Denatured isopropyl alcohol Cleaning solvent Compressed air

Denatured isopropyl alcohol

What method is used to ensure proper ventilation in a server room? Answer Internal fans Hot and cold aisles Maintaining a steady temperature Internal cooling systems

Hot and cold aisles the rest are used to but do not deal with ventilation

Which of the following protocols provides authentication and encryption services for VPN traffic? Answer L2TP TCP IPsec SSL

IPsec ---IPsec provides authentication through a protocol called IPsec Authentication Header (AH) and encryption services through a protocol called IPsec Encapsulating Security Payloads (ESP). --- Transmission Control Protocol (TCP) is a Transport layer, connection-oriented protocol that provides data transmission services. It is not a secure protocol and relies on other measures, such as IPsec, to provide security. ---Secure Sockets Layer (SSL) is an Application layer protocol that is designed to secure network traffic from certain other protocols, such as HyperText Transfer Protocol (HTTP) and Post Office Protocol version 3 (POP3). SSL does not provide security for protocols lower in the TCP/IP protocol stack, such as TCP and UDP. --- The Layer 2 Tunneling Protocol (L2TP) is a protocol used to encapsulate Point-to-Point Protocol (PPP) traffic.

ESD is most likely to occur in which of the following environments? Answer In a cool, dry atmosphere In a cool, humid atmosphere In a warm, dry atmosphere In a warm, humid atmosphere

In a cool, dry atmosphere

Which of the following is true of a synthetic backup? Answer It backs up every file that has changed since the last full backup. It backs up every file that has changed since the last full or incremental backup. It compares the data found in the last full backup with the current content and uploads only the changes. It backs up every file.

It compares the data found in the last full backup with the current content and uploads only the changes.

Which tool would be the BEST choice for securing cable wiring to a patch panel? Answer Punch down tool Network tap Combination ratchet/screwdriver Extension magnet

Punch down tool ---A punch down tool is used to secure cable wiring to a punch-down block or a patch panel, not to retrieve screws that have fallen into a computer case or other areas you cannot reach. An extension magnet is a small magnet on a collapsible rod that's used to retrieve screws that have fallen into a computer case or other areas you cannot reach. A combination ratchet/screwdriver is not designed to secure cable wiring to a patch panel. A network tap is used to collect data on traffic traveling across a network, not for retrieval of hardware parts.

Which of the following occurs during asset deployment? Answer Deciding which assets to replace Recording of asset tag information Finding out how much an asset will cost Applying updates and patches

Recording of asset tag information

You need to find out which kind of laws might apply to your network's operations. Which document type would you consult? Answer Regulation Policy Standard Operating Procedure (SOP) Procedure

Regulation

Occasionally, Rachel works from another Mac in her office rather than her own. She needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to do this? Answer Remote Desktop Protocol Telnet Screen Sharing SSH

Screen Sharing --You can use Screen Sharing to access your Mac while you are away, solve a problem on someone else's Mac, or collaborate with others on a project such as a website or presentation. Remote Desktop Protocol is a Windows remote sharing solution. SSH is used to establish a secure terminal connection over a network. Telnet is used to establish an unsecure connection over a network.

Which of the following does the GPL prevent you from doing with an open-source software program? Answer Modify its source code Sell a license to use the program Access its source code Sell a contract for technical support

Sell a license to use the program ---The GPL (General Public License) prevents you from selling a license to use the program, as the GPL allows free access to anyone. The GPL allows anyone to access the source code, to modify the source code, and even sell a contract for technical support.

Hard drives are best stored in which of the following? Answer Styrofoam-lined box Refrigerator Static shielding bag Plastic bag

Static shielding bag

What is a VPN's primary purpose? Answer Allow the use of network-attached printers. Support the distribution of public web documents. Allow remote systems to save on long-distance charges. Support secure communications over an untrusted network.

Support secure communications over an untrusted network.

Match each backup method on the left with the correct description on the right. Full back up Synthetic backup differential backup Incremental backup

\Backs up all files (even those that have not changed). Full \Backs up every file that has changed since the last full or incremental backup. Incremental \Backs up every file that has changed since the last full backup. Differential \Compares the data found in the last full backup with the current content and uploads only the changes. Synthetic


Ensembles d'études connexes

AZ-204: Developing Solutions for Microsoft Azure

View Set

Tax Chapter 8 Examples and Solutions

View Set

Halloween Traditions, Gruesome history and Culture Around the World

View Set

WORLD GEO CHAPTER 5 AND 6 LESSON 2

View Set