Official CompTIA A+ 1001 Practice Test 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

1.0 Mobile Devices Which of the following communication technologies does a smartwatch use to communicate with a smartphone? A) Bluetooth B) Infrared C) NFC D) WiFi CA) A smartwatch communicates with a smartphone by using THIS connection. This means that the devices must be within a distance of roughly 30 feet to be able to communicate with each other. This would include any exercise data and notification items such as phone calls, media, and text messages. WA1) It is a communications protocol for data and voice network connections. The power consumption required for THIS would be too demanding for a smartwatch. WA2) THIS requires devices to be within a couple inches of each other. It is typically used to share mobile contacts or in commerce solutions such as Apple Pay. WA3) It is a line of sight type of communication. This means that the devices would need to point directly at each other in some fashion in order to communicate. An example of THIS is a television remote control.

A) Bluetooth WAs) D, C, B.

5.0 Hardware and Network Troubleshooting How can you fix the problem of users unable to install a network printer due to their lack of permissions? A) Change the network security policies for the users. B) Replace the 32-bit driver with a 64-bit driver. C) Restart the Print Spooler service. D) Uninstall old drivers and install new ones. CA) THIS will normally have to be performed by an administrator. It is possible to configure these in a way to install printers with signed drivers. WA1) If the problem is not related to permissions, check that you are attempting to install a driver for the correct version and type of Windows. WA2) You should restart THIS if you cannot delete a print job (if the print queue is backed up or stalled). WA3) When installing new print drivers, the existing printer drivers can interfere with the one you're trying to install. DO THIS FIRST BEFORE ANYTHING ELSE.

A) Change the network security policies for the users. WAs) B, C, D.

3.0 Hardware Which of the following connectors can have audio and video pass through it? A) High Definition Multimedia Interface (HDMI) B) Digital Visual Interface (DVI) C) Video Graphics Array (VGA) D) RGB (Red, Green, and Blue) CA) This is the most widely used graphic device interface. - It supports both video and audio digital streams, plus remote control and digital content protection. WA1) The distinctive blue, 15-pin connector was the standard analog video interface for PC devices for a very long time, before our correct answer came along. WA2) This is an old standard used by workstation video monitors. It uses the same signals as VGA, both of which are being phased out over newer technologies. WA3) is a video cable type designed for flat panel display equipment. It is now being phased out in favor of better-established technologies.

A) High Definition Multimedia Interface (HDMI) WAs) C, D, B

3.0 Hardware Which term does NOT refer to a variant of the full-size Secure Digital (SD) memory card? A) Micro-SD B) SDHC C) SDXC D) SD CA) This is the smallest version of the SD card, except that it also has the same capacity and speed designations. WA1) This is a full-size type of memory card, used extensively in consumer digital imaging products but is smaller in size than the Compact Flash cards. WA2) This is a full-size SD memory card but with a storage capacity of between 4 GB and 32 GB. WA3) This has the largest storage capacity of the full-size SD memory cards of more than 32GB.

A) Micro-SD WAs) D, B, C.

5.0 Hardware and Network Troubleshooting Put the steps of the CompTIA A+ troubleshooting model in order [1, 2, 3, 4, 5, 6] [document findings; establish probable cause; identify the problem; implement a solution; test the theory; verify functionality]

According to the CompTIA A+ troubleshooting model: (1) identify the problem; (2) establish probable cause; (3) test the theory; (4) implement a solution; (5) verify functionality; (6) document findings. User provides (1); technician provides (2 to 6).

4.0 Virtualization and Cloud Computing Which cloud deployment type uses both private and public cloud features? A) Community B) Hybrid C) Private D) Public CA) These are a combination of public and private cloud type. - An example of this can be the use of public cloud storage services for an internal private cloud application. WA1) These are available to anyone. A service freely available to the general public is an example. WA2) These are available only to a certain group. Individuals using a cloud application for project purposes is an example. WA3) These are available within an organization. An organization's Intranet is an example.

B) Hybrid WAs) D, A, C.

5.0 Hardware and Network Troubleshooting What can control whether an external display duplicates or extends the built-in one? A) The cutoff switch B) The display function key C) OS display settings D) OS power management settings CA) THESE control whether the external display duplicates or extends the built-in one. WA1) You can toggle THIS to switch the video feed between the built-in laptop display, the built-in display and an external monitor (dual display), and an external monitor only. WA2) When THIS is depressed, power to the backlight is switched off. - You would want to check that THIS is not stuck if you are troubleshooting a problem with the display. WA3) You would want to check that THESE are not set to an energy saving mode if you are having problems with the backlight disabling or dimming.

C) OS display settings WAs) B, A, D.

5.0 Hardware and Network Troubleshooting What is the difference between open and closed questioning techniques when questioning the user? A) Closed questions allow the user to explain a problem; open questions invite a Yes/No answer. B) Closed questions help establish the user's opinion; open questions always imply trust in the user's judgement completely. C) Open questions allow the user to explain a problem; closed questions invite a Yes/No answer. D) Open questions can be used to get to the nature of the problem; closed questions help to avoid making wrong assumptions.

C) Open questions allow the user to explain a problem; closed questions invite a Yes/No answer.

2.0 Networking Which type of networking problem does encryption help resolve? A) Hackers are easily able to determine the internal IP address scheme of a network. B) Network admins need to manually configure Transmission Control Protocol/Internet Protocol (TCP/IP) information on every client device. C) Unsecured traffic is easily intercepted by authorized devices snooping on the network. D) Users are experiencing lag in time-sensitive applications such as video chat and streaming. CA) Encryption scrambles the messages being sent over a network so that anyone intercepting them is not able to capture any valuable information. WA1) Universal Plug-and-Play (UPnP) is associated with a number of security vulnerabilities and is best disabled if not required. WA2) Using static addressing requires that an administrator visit each computer to manually enter the TCP/IP configuration information for that host. WA3) Quality of Service (QoS) allows devices to prioritize and manage data traffic. Some applications are more sensitive to delays than others. - A delay in a few seconds of receiving an email is less disruptive than a lag in a live video conference. - QoS allows the router to identify traffic that deserve the highest priority and allocate enough bandwidth to support them.

C) Unsecured traffic is easily intercepted by authorized devices snooping on the network. WAs) A, B, D.

3.0 Hardware You are building a high-end gaming computer system. Which of these would NOT be what you would choose to put into such a system? A) A liquid-based cooling system B) A maximum amount of RAM C) A PATA hard drive D) A set of specialized audio and video cards CA) This is the legacy technology replaced by SATA (Serial Advanced Technology Attachment). These drives are much slower than modern drives. WA1) Gaming PCs will share some of the traits of a home theater PC such as having surround sound audio and a high-quality display, so the systems need these 2 things. WA2) This essential component refers to a system of pumping water around the chassis. PCs used for high-end gaming (those with twin graphics cards for instance) and with overclocked components may generate more heat than basic thermal management can cope with. WA3) A gaming system needs the MAX AMOUNT of THIS motherboard can handle to process the large complex files generated by the video-intensive programs.

C)A PATA hard drive WAs) D, A, B.

HARDWARE & SOFTWARE COMPONENTS INTEGRATED ONTO THE MOTHERBOARD: 1) CPU Socket 2) Northbridge 3) Hard Drive 4) GUI 5) CMOS 6) Firmware WA1) Is what's displayed on the computer screen. WA2) Is a separate storage component that is ONLY connected to the motherboard.

CORRECT INTEGRATIONS: 1) CPU Socket 2) Northbridge 5) CMOS 6) Firmware WA1) GUI WA2) Hard Drive

5.0 Hardware and Network Troubleshooting Which of these can NOT cause slow wired LAN transfer speeds? A) Cable interference B) Congestion at a switch or router C) Misconfiguration of the network adapter driver D) A weak RF signal CA) The RF (Radio Frequency) signal from radio-based devices can have THIS happen considerably as the distance between the devices increases. - Wired LANs do not use wireless radio frequencies to transfer data. WA1) If you are experiencing slow transfer speeds, this may be happening to you. - This might be caused by a fault or by user behavior, such as transferring a very large amount of data. WA2) When troubleshooting slow transfer speeds, check THIS (via Device Manager) and the setting for the switch port (via the switch's management software). WA3) The network cabling could be affected in this manner. - This could be from an external source. - Also aim to check the ends of cable for excessive untwisting of the wire pairs.

D) A weak RF signal WAs) B, C, A.

2.0 Networking What is Network Address Translation (NAT)? A) It is the protocol that delivers status and error messages at the network layer. B) It is a secure tunnel through a public network that connects two ends of a private network. C) It maintains a directory of domain names and translates them to IP addresses. D) It is when a router converts the client's private IP address into a valid public address. Matching [Network Address Translation (NAT), DNS (Domain Name System), Virtual Private Network (VPN), ICMP (Internet Control Message Protocol)] CA) Is when clients on the local network connect via a router and the router converts the client's private IP address into a valid public address. WA1) Is the Internet's equivalent of a phone book. It maintains a directory of domain names and translates them to IP addresses. WA2) Connects the components and resources of two (private) networks securely over another (public) network. WA3) Works at the network layer, which delivers status and error messages and is used by diagnostic utilities such as ping and tracert.

D) It is when a router converts the client's private IP address into a valid public address. WAs) DNS, VPN, ICMP.

3.0 Hardware You are building a new server and need to ensure that it has the highest achievable disk fault tolerance. Which type of RAID (Redundant Array of Independent Disks) do you need? A) RAID 0 B) RAID 1 C) RAID 5 D) RAID 10 CA) THIS is a combination of both Striping without Parity and Mirroring. This configuration offers excellent fault tolerance but carries the same 50% disk overhead that mirroring does. WA1) AKA Striping with Distributed Parity. - It writes error checking information across all the disks in the array. - All normal write operations suffer reduced performance due to the parity calculation. WA2) AKA Mirroring. - It duplicates the data disk to a second disk. - Each write operation is duplicated on the second disk in the set, introducing a small performance overhead. WA3) AKA Striping without Parity. - It spreads the data in a fixed order among all the disks in the array. - Its principal advantage is to improve performance but provides no redundancy of data.

D) RAID 10 WAs) C, B, A.

3.0 Hardware What term describes the number of pixels that make up the dimensions of a display? A) Brightness B) Contrast C) Refresh rate D) Resolution CA) This is the term that describes the number of pixels that make up the dimensions of a display. The higher this is, the more objects or information you can fit on the screen at once. WA1) This is a measure of how much light is being emitted from a display device whereas resolution has to do with the number of pixels WA2) This is a measure of the difference in intensity between adjacent colors in an image and resolution is the number of pixels that make up the dimensions of a display. WA3) This is a measure of how many times the display is refreshed per second. This is also sometimes called the frame rate.

D) Resolution WAs) A, B, C.

MATCHING [Open / Closed] 1) invite someone in and allows them to explain a problem in their own words. 2) invite a Yes/No answer or a fixed response from the user. 3) can be used to ""drill down"" into the nature of the problem. 4) are good to start with as they help to avoid making your own assumptions about what is wrong. 5) help establish information rather than asking for the user's opinion, and you should never trust the user's judgment completely.

1) Open 2) Closed 3) Closed 4) Open 5) Open

2.0 Networking Which generation of cellular digital communications standards is supposed to deliver a minimum of 100 Mbps for access from moving users? A) 5G B) EV-DO (CDMA2000/Evolution Data Optimized) C) LTE (Long Term Evolution) D) LTE-A (Long Term Evolution Advanced) CA) THIS is supposed to deliver a minimum of 100 Mbps for access from a fast-moving vehicle and 1 Gbps for stationary users. Speeds of up to 70 Gbps have been achieved under test conditions. WA1) THIS is a converged 4G standard supported by all network providers. - It has a maximum downlink of 150 Mbps in theory, but around 20 Mbps is typical of real-word performance. WA2) THIS is intended to provide a 300 Mbps downlink, but this aspiration is not matched by real-world performance. - Current typical performance for this is around 40 Mbps. WA3) These are the main 3G standards deployed by network providers of the same FIRST name. - These support a 3.1 Mbps downlink and 1.8 Mbps uplink.

A) 5G WAs) C, D, B.

5.0 Hardware and Network Troubleshooting What needs to be available to be able to ping DNS names? A) A DNS server B) A firewall C) A Fully Qualified Domain Name (FQDN) D) An internet connection CA) You can ping DNS names (ping comptia.org for example) or FQDNs (ping sales.comptia.org for instance). - However, this will not work if THIS is not available. WA1) Ping uses Internet Control Message Protocol (ICMP) to request status messages from hosts. - THIS can be configured to block ICMP, and therefore block ping requests. WA2) You do not need THIS to ping hosts on the local subnet, for example, or hosts on separate subnets if they are connected to each other by a router configured to allow traffic between them. WA3) THIS is only necessary to make your device accessible from the internet. - Our correct answer is required to be able ping a DNS host name locally or between networks.

A) A DNS server WAs) B, D, C.

5.0 Hardware and Network Troubleshooting Which of these can NOT cause a printer to display a "Low memory" error? A) A paper jam B) Printing high-resolution graphics C) The printer needing a driver update D) Jobs stuck in the print queue CA) This is one of the most frequently-occurring printer problems. The printer control panel should identify the location of this issue. WA1) If a print job contains THIS or multiple pages the printer may not have sufficient resources to handle the job and may display a ""Low memory"" error. WA2) If you receive a ""Low memory"" error, try clearing this out and sending the job again or cycling power on the printer. WA3) If there are persistent problems with printing from a specific application, check the vendor's troubleshooting website to find and determine this can fix things.

A) A paper jam WAs) B, D, C.

4.0 Virtualization and Cloud Computing Which of the following is an example of an IaaS (Infrastructure as a Service) service? A) AWS B) Cisco WebEx C) Dropbox D) Google App Engine CA) THIS is a popular IaaS service. - It contains many sub-services that can be further individually categorized into other cloud types of service such as SaaS (Software as a Service) and Paas (Platform as a Service). WA1) THIS is a PaaS (Platform as a Service) that offers a web framework and a cloud computing platform for scalable web hosting. WA2) THIS is a SaaS (Software as a Service) that allows for online meetings via the cloud. WA3) THIS is a SaaS (Software as a Service) that allows for file storage via the cloud.

A) AWS WAs) D, B, C.

1.0 Mobile Devices You are shopping for a new tablet. You are hoping to make a purchase that includes a stylus pen. Which of the following satisfies the stylus requirement of touch sensitivity. A) Active B) Mesh C) Passive D) Rubberized CA) THIS includes electronics within the stylus that enable features, such as menu options via buttons on the stylus, and touch sensitivity. A tablet would need to support this in order for one to be used with it. WA1) THIS is a stylus pen that includes no electronics and is meant to supplement and/or replace using a finger on the touch screen. This type of stylus can be used with any tablet. WA2) THIS is a stylus pen, similar in type to (1), that includes no electronics and is meant to supplement and/or replace using a finger on the touch screen. This type of stylus has this type of tip, and can be used with any tablet. WA3) THIS is a stylus pen that, similar in type to (1), includes no electronics and is meant to supplement and/or replace using a finger on the touch screen. This type of stylus has a woven mesh tip of fibers rather than rubber and can be used with any tablet.

A) Active WAs) C, D, B.

1.0 Mobile Devices What does tethering two mobile devices mean? A) Allowing one device to use the other's Internet access B) Connecting two mobile devices via USB for copying data C) Enabling a mobile device as a flash storage to another via USB D) Setting synchronization of Apps and data between the devices CA) Tethering refers to THIS, being done via a USB cable or by WiFi. - As an example, a smartphone can share its cellular connection to the Internet to a tablet by acting as a WiFi hotspot. WA1 & 2) Tethering refers to connecting two or more devices for internet sharing, not THESE actions. WA3) This is easily done with the device's app stores and other application features, but does not describe tethering.

A) Allowing one device to use the other's Internet access WAs 1 & 2) B & C. WA3) D.

4.0 Virtualization and Cloud Computing You are developing a web based application. You have decided that the storage of all media files for the application should be at an S3 storage location rather than with your web host. Which type of an account do you need to create to use S3 for storage? A) Amazon B) DropBox C) Google D) Microsoft CA) This specific account is required to use __WS (______Web Services). - S3 (Simple Storage Service) is one of the most popular and oldest offerings for this service. - S3 is used for object based storage in the cloud. WA1) This account would be required for many services here including this same-named Suite and this same-named Cloud Platform. WA2) This account is required to use many of THESE online services including Office 365 and Azure. WA3) This account is required to use THIS specific online storage service.

A) Amazon WAs) C, D, B.

2.0 Networking Which type of server provides an access control system for the network? A) Authentication Server B) DHCP server C) DNS server D) Mail server CA) THIS server is one that consolidates authentication services across multiple access devices, such as switches, routers, and access points. WA1) THIS server manages sending email messages for users using SMTP or SMTPS. - It also manages the transfer of messages to the users' inboxes using POP3, POP3s, IMAP, or IMAPS. WA2) THIS assigns IP address information to a host automatically when they connect to the network. WA3) THIS allows users to access resources using host names and Fully Qualified Domain Names (FQDN) by resolving those names to IP addresses.

A) Authentication Server WAs) D, B, C.

3.0 Hardware Which one of these notable corporate features of Windows Pro, Enterprise, Ultimate, and Education editions encrypt all the data on a drive? A) BitLocker B) Branch-cache C) Domain network D) Encrypting File System (EFS) CA) THIS enables the user to encrypt all the information on a disk drive. - Encryption means that data on the device is protected even if someone steals it (so long as they cannot crack the user password). WA1) THIS can be used to apply file- or folder-level encryption, whereas our correct answer encrypts an entire drive. WA2) The principal distinguishing feature of the Professional/Pro, Enterprise, Ultimate, and Education editions (regardless of version) is the ability to join THIS. WA3) THIS allows remote computers to share access to a single cache of data from shared folders and files or document portals such as SharePoint sites.

A) BitLocker WAs) D, C, B.

4.0 Virtualization and Cloud Computing Which cloud deployment type is targeted towards only a certain group of users? A) Community B) Hybrid C) Private D) Public CA) These are available only to a certain group. Individuals using a cloud application for project purposes is an example of this. WA1) These are available to anyone. A service freely available to the general public is an example of this. WA2) These are a combination of (1) & (3). - An example of this can be the use of (1)'s storage services for an internal (3) application. WA3) These are available within an organization. An organization's Intranet is an example of this.

A) Community WAs) D, B, C.

3.0 Hardware You are installing a Redundant Array of Independent Disks 1 (RAID 1) and want to ensure that the controller card is not a single point of failure. What technique do you need to employ in this configuration? A) Disk duplexing B) Disk mirroring C) Disk partitioning D) Disk striping CA) In a RAID 1 configuration, data from an entire partition is duplicated on two identical drives through either this or (1). WA1) Involves the two disks sharing a drive controller. - In our correct answer, each disk has its own drive controller. This eliminates the drive controller as the single point of failure. WA2) AKA disk slicing. - THIS is the creation of one or more regions on a hard disk or other secondary storage, so that an operating system can manage information in each region separately. WA3) THIS is a technique in which multiple smaller disks act as a single large disk. - The process divides large data into data blocks and spreads them across multiple storage devices.

A) Disk duplexing WAs) B, C, D.

5.0 Hardware and Network Troubleshooting After the boot sector code loads the OS files into system memory, what can the error messages you receive on your Windows 10 computer be attributed to? A) Driver problems B) Hardware problems C) Problems with using the dmesg command D) Problems with the Startup Configuration utility CA) Error messages received after the boot sector code loads the OS files into system memory can usually be attributed to software (or ______) problems. WA1) Error messages you receive after the boot sector code loads the OS files into system memory are most likely not attributed HERE, but rather with our correct answer. WA2) THIS shows boot messages, but, in Windows 10, this setting does not work and you need to enable verbose boot messages via the registry. WA3) You can only use THIS command on a Linux machine. In Windows, boot messages are written to the C:\Windows\ntbtlog.txt file. You should also use Event Viewer to analyze the System and Application logs for any errors.

A) Driver Problems WAs) B, D, C.

3.0 Hardware What underlying characteristic determines if a laptop's onboard wireless card can be upgraded or replaced? A) If the wireless card is integrated into the system board or is independent of it B) If the laptop has an ExpressCard slot or not C) If the wireless card is more than three years old D) If the laptop's manufacturer has upgraded components for sale CA) Whether or not a wireless card can be upgraded or replaced is based on these specifics. - It is important to read the manufacturer's documentation to verify that replacing a component does not void a manufacturer's warranty guidelines. WA1) Though THIS can grant you wireless functionality, a laptop simply having a slot for THIS does not determine if the onboard wireless card can be upgraded or not. WA2) Even if the laptop manufacturer has this in place, it does not mean those components would work or fit within your specific laptop or its form factor. - You would have to determine the card's independence from the system board first. WA3) THIS would have no bearing on its ability to be upgraded or replaced but could impact whether those upgrades or replacements are available to easily locate or purchase.

A) If the wireless card is integrated into the system board or is independent of it WAs) B, D, C.

5.0 Hardware and Network Troubleshooting You are troubleshooting printer connectivity to the network. Where can you look for multiple failed print jobs? A) In the printer server logs B) In the Printer Spooler Properties C) In the print queue D) In the security group permissions CA) When troubleshooting printer connectivity to the network, you should check for multiple failed jobs HERE, look up error codes, or look through the logs from the device itself. WA1) THIS being backed-up means that there are lots of jobs pending but not printing. WA2) You would need to restart THIS if you cannot delete a job or if the print queue is backed up or stalled. WA3) You would need to add the user to THIS (or add THIS group or user object to the printer), if a user receives an "Access Denied" message.

A) In the printer server logs WAs) C, B, D.

5.0 Hardware and Network Troubleshooting What is the drawback of only testing connections to servers by trying to use them? A) It cannot conclude whether a problem is with an application or if it is a network fault. B) It measures the RTT for latency. C) It is only dependent on a working link and IP configuration. D) It uses ICMP to requests to find out the status of hosts on the network. CA) One drawback of connections to servers simply by trying to use them is that there could be some sort of application fault rather than a network fault. WA1) It is useful to have a low-level test of basic connectivity, such as ping, for this situation. WA2) Ping uses this for this frequent/constant information-keeping purpose. WA3) The millisecond measures of THIS is used by the ping command, and can be used to perform certain diagnostics on a link.

A) It cannot conclude whether a problem is with an application or if it is a network fault. WAs) C, D, B.

4.0 Virtualization and Cloud Computing You are working on a project that requires visualizing an operating system (OS) for an end user to test an application. It has been requested that you use a type-2 hypervisor to accomplish this. Which of the below would fulfill that requirement? A) KVM B) Microsoft Hyper-V C) Oracle VM Server D) VMWare ESX CA) THIS is an open-source Linux-based type-2 hypervisor that is used with most Linux operating systems including Ubuntu, Debian, and SUSE. - A type-2 hypervisor installs on top of a host operating system and does not have direct access to the underlying hardware. WA1) THIS is an open-source type-1 hypervisor that uses Xen technology. - It is important to not confuse THIS with Oracle VM Virtualbox, which is a type-2 hypervisor. - A type-1 hypervisor has no operating system beneath it and has direct access to the hardware. WA2) THIS is a type-1 hypervisor. Windows Server 2008, 2012, 2016, and Windows 10 all include it. - There is also a stand-alone version of this product. - It can be enabled or disabled inside a Windows operating system. - This eludes to being a type-2 hypervisor as it is within the Windows operating system. - It is actually a type-1 hypervisor as it has direct access to the underlying hardware, and does not rely on the operating system. WA3) THIS is a type-1 hypervisor that is popular with server visualizations. - It is a direct competitor with Microsoft's Server based product called (2).

A) KVM WAs) C, B, D.

1.0 Mobile Devices Which of the following is a proprietary port that is found on Apple iOS devices? A) Lightning B) Thunderbolt C) USB-A D) USB-C CA) THIS is a proprietary 8 pin port and connector that is used for device connections and battery charging of Apple iOS mobile devices. The connector is reversible, meaning that it can be inserted without concern of which side is up or down as both sides of the connector are identical. WA1) THIS is a type of very common interface found on many modern mobile devices that is used for device connections and battery charging. The connector is reversible, meaning that it can be inserted without concern of which side is up or down as both sides of the connector are identical. WA2) THIS is a type of very common interface found on many devices, such as computers, that accepts the connection of peripherals such as printers, cameras, scanners, and portable mobile devices. WA3) THIS is an Intel technology that can be found on desktops and laptops. This interface is commonly used as a display interface for HDMI and DisplayPort, and the technology is often found in laptop docking stations. There are currently three versions of it, with version 3 being the most recent.

A) Lightning WAs) D, C, B.

5.0 Hardware and Network Troubleshooting What is true about RAID 0? A) RAID 0 has no redundancy. B) RAID 0 provides fault tolerance. C) RAID 0 requires at least four disks. D) RAID 0 uses striping with distributed parity. CA) RAID 0 is setup so if one of the disks fails it will stop working. Because of this, this method cannot be said to be a true RAID implementation. WA1) What RAID 0 does provides high throughput, but leaves the data at risk. RAID 1 provides mirroring, which is what we're looking for here. WA2) What we're looking for here is associated with RAID 5, which is what writes error checking information across all the disks in the array. WA3) You will need at least four disks to create a RAID configuration that combines RAID 0 with Mirroring, and there must be an even number of disks to do it. - RAID 0 needs only half the disks this configuration needs at minimum.

A) RAID 0 has no redundancy. WAs) B, D, C.

3.0 Hardware What do the terms "cloud printing" and "remote printing" refer to? A) The ability to print from a mobile device that normally doesn't have print capabilities B) The ability to print documents in a digital format such as a Portable Document Format (PDF) C) The ability to send a print job to a printer that is directly connected to the local machine D) The ability to manage a networked printer with a dedicated computer called a print server CA) As the prevalence of mobile devices continues to increase, the ability to DO THIS with such is becoming more important. - THIS is what's referred to as remote printing or cloud printing. WA1) The defining aspect of network-based printing is exactly THIS. - This holds the print queue, not the networked. WA2) This format was created by Adobe and latterly published as an open standard as a device-independent format for viewing and printing documents. - Print (or export) to this format's1 functionality is available in many software applications. WA3) This type of printer is one which is directly connected to a specific computer via USB cable. - It is a printer that is only accessible from that workstation, and therefore, can only service one computer at a time.

A) The ability to print from a mobile device that normally doesn't have print capabilities WAs) D, B, C.

5.0 Hardware and Network Troubleshooting When you boot-up your brand-new computer, you hear a single short beep, but the screen is blank. You are using a "known-good" monitor that is connected properly and turned on. What could be the problem? A) There is a problem with the graphics card. B) There is a problem with the motherboard. C) There is a problem with the Real Time Clock battery. D) There is a system memory problem. CA) If the screen is blank on boot-up but you hear a single beep, check the monitor is turned on and connected properly. Try testing the monitor with a different computer. If the monitor is OK, DO THIS. WA1) This is failing if and ONLY if the computer is losing the correct time. WA2) During the POST code beeps at boot-up, problems HERE would be indicated by, no beeps, a continuous beep, repeating short beeps, or 1 long beep followed by 1 short beep. WA3) Problems HERE are indicated by a continuous POST beep code, or be a cause of slow disk performance.

A) There is a problem with the graphics card. WAs) C, B, D.

5.0 Hardware and Network Troubleshooting What is NOT true about troubleshooting WiFi network problems? A) There may be a problem with the Ethernet NIC. B) There may be a standards mismatch. C) You need to be in range of the wireless AP. D) You need to consider problems with physical media. CA) You need a wireless version of THIS to connect to WiFi networks. - THESE connect to wired networks. WA1) When troubleshooting wireless networks, as with cabled links, you need to consider problems with this area of things, such as interference, and configuration issues. WA2) If a user is looking for a network name that is not shown in the list of available wireless networks (SSID not found), the user may have THIS EXACT issue. WA3) If THIS is not operating in compatibility mode, it will not be able to communicate with devices that only support older network components.

A) There may be a problem with the Ethernet NIC. WAs) D, C, B.

2.0 Networking In Windows Firewall properties, how can you prevent a specific port from receiving traffic? A) Use the "Allow" state for inbound connections and create a rule to block the port. B) Use the "Allow" state for outbound connections and create a rule to block the port. C) Use the "Block" state for inbound connections and create a rule to block the port. D) Use the "Block" state for outbound connections and create a rule to allow the port. CA) When using THIS command, you must create rules for any incoming connections you wish to block. WA1) When using THIS command, you must create rules for each program that is allowed to make an outbound connection. WA2) Using THIS command means all outbound connections are allowed by default. You must create rules for programs you wish to block. WA3) Using THIS command, you must create rules for any incoming connections you wish to allow.

A) Use the "Allow" state for inbound connections and create a rule to block the port. WAs) D, B, C.

3.0 Hardware Which of these attributes describe the Small Form Factor (SFF) case designs? A) Used for entertainment systems requiring a very limited number of components B) Used for high-end users requiring more internal space for components than offices but less than servers C) Used for offices or homes requiring extra internal space for components D) Used for servers requiring the most internal space for components CA) Small Form Factor (SFF) case designs are semi-portable, space-saving designs typically used for "Media Center" purposes. - They are usually cube-like or super slimline. - DO THE MATH. WA1) Full tower cases are usually requiring such space for additional hard disks, adapter cards, and redundant power supply units. WA2) Mini-tower cases are usually for where additional internal devices and adapter cards is limited. WA3) Mid tower cases are used in a way requiring extra devices and adapter cards, but not as many as (1).

A) Used for entertainment systems requiring a very limited number of components WAs) D, C, B.

1.0 Mobile Devices Which of the following devices makes use of cellular data technology? A) A dial-up modem B) A mobile hotspot C) A satellite dish D) A wireless access point CA) Is a portable device that provides wireless Internet access to mobile devices such as smartphones, tablets, and laptops. - These are similar to wired Internet routers, but use a mobile broadband service from cellular providers in the form of 3G and 4G for Internet access. WA1) These are devices that use an analog phone connection and service. - These can be used to connect computers to other computers and systems via a dial-up modem on the receiving end of the connection. WA2) Is a device that can provide broadband audio, video, and data services via these exact signals. - Their service providers deliver services similar to those provided by cable companies. WA3) Is a device that is used to gain access to a data network. - This may be used to provide access to a private network such as a corporate network, a public network such as the Internet, or both.

B) A mobile hotspot WAs) A, C, D.

5.0 Hardware and Network Troubleshooting What is the best solution to fix slow disk performance? A) Replace the hard drive. B) Add more RAM. C) Use the Disk Cleanup program to free up space. D) Upgrade the hard drive. CA) Slow disk performance is often a bottleneck for modern computer systems. In this case the best solution may be THIS. PC) Low disk capacity can also be a cause of slow disk performance. You can use THIS to free up space but the user may have to take manual steps, such as moving or deleting files, uninstalling unnecessary applications, and so on.

B) Add more RAM. PC) C

3.0 Hardware Which type of device is likeliest to run iOS as its operating system? A) An Amazon Kindle Fire B) An Apple iPad C) A Microsoft Surface D) A Samsung Galaxy Tab CA) iOS is a mobile operating system created and developed by Apple Inc., and as such, is going to be found on here. - The operating system debuted on the original iPhone in 2007 and was called iPhone OS. A different name became essential after this was released and Apple announced the change in June 2010. WA1) This is a line of Android-based tablet computers produced by Samsung Electronics. The Android operating system version 3.0 was dubbed "Honeycomb." WA2) This particular operating system is an Android-based mobile operating system produced by Amazon for this series of tablets. WA3) DUH, it uses the Windows operating system.

B) An Apple iPad WAs) D, A, C.

1.0 Mobile Devices Which of the following methods would be used to connect a fitness tracking device to a smartphone? A) 802.11ac B) Bluetooth C) Cellular D) WiFi CA) This is a short-range protocol used to connect a variety of devices to each other that are usually in close proximity to one another. Fitness tracking watches, audio speakers, and game controllers are examples of such devices. WA1) This is a wireless standard for (2). WA2) It is a long-range communication method that is suitable for data such as network connections. WA3) It is a wide area communication method provided by service providers for voice and data communications. Many mobile devices support this type of communication via an internal or external WWAN adapter.

B) Bluetooth WAs) A, D, C.

1.0 Mobile Devices Which of the following Intel CPUs are laptop only chips? A) Core 2 B) Core Duo C) Celeron D) Core i3 CA) THIS is an Intel brand of mobile CPU that is found only in laptops. - This chip's predecessor, the Core Solo, is also a laptop only chip. WA1) This brand of chip is used in both laptops and desktops. - This chip arrived on the market after the Core Solo and our correct answer, which are only found in laptops. WA2) This is a modern chip and is also available as a +2 of that, as well as a +4 of that. - These chips are found in both laptops and desktops. WA3) This is Intel's CPU budget line that can be found in both laptops and desktops.

B) Core Duo WAs) A, D, C.

3.0 Hardware You have been tasked with recommending which thin clients to purchase for the new training lab. What will you need to consider when making this decision? A) If the thin clients have high-end graphics cards B) If the thin clients meet the minimum OS requirements C) If the thin clients have a RAID array D) If the thin clients have a Trusted Platform Module (TPM) CA) The thin clients will have to meet THESE for installing Windows and running the basic software to access the applications hosted by the server. WA1) Use the opposite of THIS to match up with our correct answer. WA2) While having THIS on the motherboard helps with security of the system, it is not an important consideration for a thin client. WA3) Installing THIS is not a consideration for a thin client, as the applications and data are hosted on the server.

B) If the thin clients meet the minimum OS requirements WAs) A, D, C.

4.0 Virtualization and Cloud Computing You are starting a project that requires virtualization of two Windows 10 workstations on a single host computer. Your supervisor has gone ahead and purchased VMWare Workstation Pro for the project. Which method best describes installing the host system properly? A) Format the host system's hard drive and then install VMWare Workstation Pro as a bare-metal hypervisor. B) Install an operating system such as Windows 10 on the host system and then Install VMWare Workstation Pro. C) Install VMWare Workstation Pro and then install Windows 10 as a dual-use operating system that can act as a host and as a guest. D) Install Windows 10 with Hyper-V and then install VMWare Workstation Pro. CA) THIS uses a type-2 hypervisor. A type-2 hypervisor needs to run atop an operating system. WA1) A type-1 hypervisor is known as EXACTLY THIS and does not require that the host have an operating system. WA2) Installing THIS first is not possible as it is a type-2 hypervisor and requires a host operating system. Also, using this OS as a dual-use operating system is not possible. WA3) Installing this OS with this VM would not be correct. - While an operating system is required for VMWare Workstation Pro, it would not run as it conflicts with this VM, which is a type-1 hypervisor.

B) Install an operating system such as Windows 10 on the host system and then Install VMWare Workstation Pro. WAs) A, C, D.

5.0 Hardware and Network Troubleshooting What is true about integrated graphics in laptops? A) All integrated graphics are upgradeable. B) Integrated graphics are part of the system chipset or CPU. C) Integrated graphics drain the battery faster than dedicated graphics. D) Integrated graphics has its own memory. CA) Laptops often use an integrated graphics adapter that is part of either of these 2 motherboard components. WA1) Sorry, but integrated graphics adapters and cheaper graphics cards SHARE THIS with the CPU. WA2) Laptop video cards are more likely replaceable than they are THIS. - This is because high-end cards tend to have specific power and cooling requirements and a modular approach is not possible given the limited space available. WA3) Sorry, but integrated graphics can be advantageous in terms of THIS and cooling. - However, as laptops get used more and more as desktop replacements, particularly as games machines, dedicated graphics becomes much more important.

B) Integrated graphics are part of the system chipset or CPU. WAs) D, A, C.

2.0 Networking A switch connects nodes together in a single network, establishing a virtual circuit between any two network nodes. How does the switch perform this function? A) It forwards signals received out of each port for reception by all devices. B) It receives frames into a port buffer and reads the destination MAC address from the Ethernet frame. C) It tracks MAC addresses of each port and only forwards communications out of the port associated with the destination MAC address. D) It transmits and receives signals and processes them as digital data. CA) This first step is a function of a switch where the frames are received into a port buffer. - The switch then performs this second step. - The switch then uses its MAC address table to look up the port connected to the destination MAC address and sends the frame. Matching [Hub, Bridge, NIC] WA1) This keeps track of the MAC addresses attached to each segment. It only passes signals from one segment to another if there is a match to the destination MAC address, reducing traffic loads in any one segment. WA2) This transmits and receives the signals sent over the bridge and processes the signals as digital data. WA3) In older networks, these forward signals received out of each port for reception by all devices which can cause collision and poor network performance. Tracking and forwarding based on MAC addresses help to alleviate collisions.

B) It receives frames into a port buffer and reads the destination MAC address from the Ethernet frame. WAs) Bridge, NIC, Hub.

3.0 Hardware Which of the following storage technologies is used by hard disk drives? A) Impact B) Magnetic C) Optical D) Solid-state CA) Whether storage OR recording, THIS is the storage of data on a magnetized medium. - IT is one of the most affordable ways to store large amounts of data on hard disk drives. WA1) Here, a laser beam encodes digital data onto THIS, or a laser-based disk in the form of tiny pits arranged in concentric tracks on the disk's surface. WA2) THIS a printer technology ONLY. WA3) THIS is a type of computer storage media made from silicon microchips. - It stores data electronically instead of like our correct answer on this type of drive.

B) Magnetic WAs) C, A, D.

2.0 Networking Which device can divide ports into Virtual Local Area Networks (VLANs)? A) Bridge B) Managed Switch C) Router D) Unmanaged switch CA) This will work as (2) out-of-the-box but an administrator can connect to it over a management port, configure security settings, and then choose options for the switch's more advanced functionality, such as configuring VLANs. WA1) This is responsible for moving data around a network of networks, known as an inter-network or internet. WA2) This performs the micro-segmentation function without requiring any sort of configuration. You just power it on, connect some hosts to it, and it works without any more intervention. WA3) This is a device that divides a local network into two or more segments. - Hosts on one segment are able to communicate with those on another segment only via this component.

B) Managed Switch WAs) C, D, A.

4.0 Virtualization and Cloud Computing Which of the following is NOT an example of a SaaS (Software as a Service) application? A) Google Suite B) Microsoft Excel 2010 C) Microsoft Office 365 D) Zoho Office Suite CA) THIS is not a SaaS application, as it is locally installed software that is not accessed via a web browser. WA1 to WA3) Is an example of a SaaS application suite, which resides in the cloud. - While it offers optional locally installable software / components / services, at its core, THIS is an SaaS suite that offers a number of services that may be accessed through a web browser.

B) Microsoft Excel 2010 WAs) A, C, & D.

4.0 Virtualization and Cloud Computing What are the four cloud deployment types? A) Public, On-Demand, Private, Hybrid B) Public, Private, Community, Hybrid C) Public, Private, Elastic, Community D) Public, Private, Measured, On-Demand CA) The four cloud deployment types are these: - One of these are available to anyone. - One of these are available only to an organization. - One of these are available only to a certain group. - One of these are a combination of cloud types. WA1) One of these is a service type found within a cloud that allocates resources as needed. WA2) One of these is a service type that allows a cloud technology to adapt resources to a workload as needed. WA3) One of these is a cloud service type that uses metering to record usage statistics for purposes such as billing.

B) Public, Private, Community, Hybrid WA1) On-Demand WA2) Rapid Elasticity WA3) Measured (Metering)

3.0 Hardware Employees in your organization regularly need to print sensitive documents. The employees properly dispose of the hard copies of these documents. How can you ensure that electronic copies of these documents are not leaked to unauthorized users after the documents are printed? A) Encrypt all transmissions to network printers. B) Regularly purge the hard drive caches of all network printers. C) Require user authentication for all network printer connections. D) Tell employees to delete any temporary files created from their computer's print queue. CA) Most printers have a local storage device (hard drive) to use to cache print files. - Someone with access to the device could be able to recover confidential information from the hard drive cache. - Doing THIS regularly will ensure that no electronic data remains even after the print job completes. WA1) Even if you do this for security reasons, some authenticated users are not authorized to view certain documents. WA2) Even if you DO THIS to documents as they are transmitted to printers, the printer could do the opposite the document and store said copy in the cache. WA3) Deleting cached files or any files of THIS KIND on the user's computer won't necessarily delete those files from the printer.

B) Regularly purge the hard drive caches of all network printers. WAs) C, A, D.

5.0 Hardware and Network Troubleshooting After testing your theory of probable cause of a critical problem, what should you do if a part or system that you are troubleshooting is still under warranty? A) Repair the part. B) Replace the part. C) Use a workaround. D) Verify system functionality. CA) If a part or system is under warranty, you can return it for this reason. - To do this, you normally need to obtain a Returned Materials Authorization (RMA) ticket from the vendor. WA1) You need to determine whether the cost of this 2nd step makes this the best option. However, if the part is still under warranty - DON'T. WA2) Only do this if the problem is not critical, and if neither (1) nor our correct answer is cost-effective. WA3) You do THIS, AND, if applicable, implement preventative measures after you apply and verify a solution to the problem.

B) Replace the part. WAs) A, C, D.

1.0 Mobile Devices Which of the following ports would NOT be found on a tablet? A) Lightning B) Serial Port C) USB-B D) USB-C CA) AKA (RS-232/DB-9). - It is a legacy port that supports data rates up to 115 Kbps. - These may be found on desktop and laptop computers to support older peripherals, and some network equipment for management purposes. WA1) It is a common USB connection found on NEWER devices including Android tablets. - It is used for purposes such as connecting a tablet to a computer system or for charging the tablet. WA2) It is a common USB connection found on OLDER devices including Android tablets. - It is used for purposes exactly like (1). WA3) This is a proprietary 8 pin port and connector that is used for device connections and battery charging of Apple iOS mobile devices.

B) Serial Port WAs) D, C, A.

3.0 Hardware What is the main connection difference between USB-A and other versions of USB? A) The connector is small and beveled. B) The connector is a large flat rectangle. C) The connector is square with a beveled top. D) The connector is small, flat and reversible. CA) You use USB Type A (USB-A) to connect to a host. The connector and port are shaped, as described, to do so. WA1) USB-C is a new connector that can be inserted either way up. The connector design is also more secure and robust. WA2) The USB-B is used in connecting to a device such as a printer and is shaped to do so effectively. WA3) THIS is a USB-B Mini OR Micro connection. - This type of connector was seen on early digital cameras (Type B Mini) but is no longer widely used.

B) The connector is a large flat rectangle. WAs) D, C, A.

5.0 Hardware and Network Troubleshooting What is the best solution if a virus has caused damage to the Master Boot Record (MBR) or the GUID (Globally Unique ID) Partition Table (GPT)? A) Create a multi-boot configuration with a non-standard partition table. B) Use the boot disk option in your anti-virus software. C) Use chkdsk to restore the files from bad sectors. D) Use the repair options that came with the Windows product disk. CA) If a virus damages the Master Boot Record (MBR) or the GUID (Globally Unique ID) Partition Table (GPT), the best way to resolve it is using THIS. WA1) If you can't use the boot disk created by the AV software, you can try the repair options coming from THIS. - However, This may not work completely reliably if the system is still infected with a virus. WA2) Our correct answer, or the repair options on the Windows product disk may not work with THIS if another OS has created this formatting of a disk. WA3) This command line tool restores file fragments from bad sectors to the root of the volume, but these are rarely directly usable.

B) Use the boot disk option in your anti-virus software. WAs) D, A, C.

2.0 Networking How do you configure a host to use a static Internet Protocol version 4 (IPv4) address in Windows? A)Define an alternative IP configuration on the Alternate Configuration tab of the IPv4 Properties dialog. B)Select the "Use the following IP address" option and enter the IP address on the General tab of the IPv4 Properties dialog. C) Select the "Obtain an DNS server address automatically" option on the General tab of the IPv4 Properties dialog. D) Select the "Obtain an IP address automatically" option on the General tab of the IPv4 Properties dialog. CA)To configure a static IPv4 address, select the second radio button on this part of the IPv4 Properties dialog and enter the 32-bit number. WA1)To obtain this automatically, select this option on the General tab of the IPv4 Properties dialog. WA2) On this specific tab, Windows allows you to define this special configuration for a machine if it cannot contact a DHCP server and using APIPA is unsuitable. WA3) To use Dynamic Host Configuration Protocol (DHCP) in Windows, select this option on the General tab of the IPv4 Properties dialog.

B)Select the "Use the following IP address" option and enter the IP address on the General tab of the IPv4 Properties dialog. WAs) C, A, D.

3.0 Hardware The Director of your company is traveling out of the country with the company laptop. Which feature will you need to configure to prevent theft of the laptop? A) The drive lock BIOS password B) The LoJack tracking software C) The system BIOS password D) The TPM security chip on the motherboard CA)Some laptop firmware is bundled with this software, essentially a security rootkit designed to prevent theft. - If the laptop is reported stolen, the authorization servers can force the laptop into a locked down mode. WA1) This protects access to the system setup program by requiring a password before entering the ____ system. - This should be set to protect the device, even if it isn't what our correct answer does. WA2) To help protect device data, this happens to be a hardware-based storage of digital certificates, keys, and hashed passwords, and only thus. WA3) THIS is a way to secure access to the laptop disk specifically by configuring a drive password and storing it in the PC or drive firmware. - This protects device data but cannot prevent theft.

B)The LoJack tracking software WAs) C, D, A.

2.0 Networking What is a Virtual Private Network (VPN)? A) A directory of domain names that can be translated to IP addresses B) The protocol that delivers status and error messages at the network layer C) A secure tunnel through a public network that connects two ends of a private network D) When a router converts the client's private IP address into a valid public address [MATCHING]...[DNS, ICMP, NAT, VPN]: 1) THIS connects the components and resources of two (private) networks securely over another (public) network. 2) THIS is the Internet's equivalent of a phone book. It maintains a directory of domain names and translates them to IP addresses. 3) THIS is when clients on the local network connect via a router and the router converts the client's private IP address into a valid public address. 4) THIS works at the network layer to deliver status and error messages and is used by diagnostic utilities such as ping and tracert.

C) A secure tunnel through a public network that connects two ends of a private network [MATCHING] 1) A Virtual Private Network (VPN) 2) The DNS (Domain Name System) 3) Network Address Translation (NAT) 4) ICMP (Internet Control Message Protocol)

3.0 Hardware An ordinary office environment needs computers that have multiple user account settings where each user is allocated private data storage. What type of workstations would you build for this environment? A) Build a CAM workstation B) Build a thin client. C) Build a thick client. D) Build a virtualization workstation. CA) This is an ordinary "office" PC. It will be used to run locally installed desktop Applications. - This can be configured with multiple user accounts with each having its own private data storage folders. WA1) This is a PC or appliance designed to act as an interface to applications that run on a network server. User accounts are created on the server rather than directly on this WA2) This will run one or more operating system environments for testing not normally required in an ordinary office environment. WA3) These control machine tools found in manufacturing environments, not normal office environments.

C) Build a thick client. WAs) B, D, A.

2.0 Networking Which type of server uses a distributed database that contains information on domains and hosts within those domains? A) Authentication Server B) DHCP server C) DNS server D) Mail server CA) THIS allows users to access resources using host names and Fully Qualified Domain Names (FQDN) by resolving those names to IP addresses. - It uses a distributed database that contains information on domains and hosts within those domains. WA1) THIS manages sending email messages for users using SMTP or SMTPS. - It also manages the transfer of messages to the users inboxes using POP3, POP3s, IMAP, or IMAPS. WA2) THIS assigns IP address information to hosts automatically when they connect to the network. WA3) THIS server is one that consolidates these specific services across multiple access devices, such as switches, routers, and access points.

C) DNS server WAs) D, B, A.

5.0 Hardware and Network Troubleshooting Which of these is NOT necessary when troubleshooting display configuration issues? A) Checking the brightness controls B) Checking the connections C) Fixing dead pixels D) Trying the monitor with a different PC CA)Many display problems are caused by errors in configuration, but you must also be alert to the possibility of hardware faults in the monitor itself, such as THESE. WA1) If you have a problem with image quality, you should check between the video card and monitor, as well as this. WA2) If there is no image displayed on the monitor, do this and see if it works. WA3) If the image is dim, check these to make sure they are not turned all the way down.

C) Fixing dead pixels WAs) B, D, A.

4.0 Virtualization and Cloud Computing Which of the following Hypervisors is included with Linux distributions? A) ESXi B) Hyper-V C) KVM D) VMWare Fusion CA) THIS is a virtualization hypervisor that is included with Linux distributions. - It is an open source type-2 hypervisor. - A type-2 hypervisor requires an underlying operating system and does not have direct access to the host system's hardware. WA1) THIS is a server hypervisor from VMWare. - It is a type-1 hypervisor that does not require an underlying operating system and has direct access to the host system hardware. WA2) THIS is type-2 virtualization hypervisor that can be used to run guest operating systems on an Apple computer. WA3) THIS is a type-1 hypervisor that is included with Windows 10 Professional. - A type-1 hypervisor has direct communication with the system's physical hardware.

C) KVM WAs) A, D, B.

2.0 Networking Which protocol defines how a client can query and update network resources? A) File Transfer Protocol (FTP) B) Common Internet File System (CIFS) C) Lightweight Directory Access Protocol (LDAP) D) Simple Network Management Protocol (SNMP) CA) Using TCP port 389, it defines how a client can access information, perform operations, and share directory data on a directory server. Network resources are objects within the directory, which is like a database. WA1) Also known as Server Message Block (SMB), is the application protocol underpinning file and printer sharing on Windows networks. - Uses port UDP 137/38 & TCP port 139/445. WA2) Using TCP ports 20/21, it allows a client to upload and download files from a remote server. It is widely used to upload files to websites. WA3) This is a framework for management and monitoring network devices. It consists of a management system (UDP port 161) and agents (UDP port 162).

C) Lightweight Directory Access Protocol (LDAP) WAs) B, A, D.

2.0 Networking You need to configure a SOHO (Small Office Home Office) network to provide Internet Protocol (IP) Addresses only to devices allowed on the network. You have configured a list of devices that are allowed to access the network. Which feature should be enabled? A) DHCP (Dynamic Host Configuration Protocol) B) DNS (Domain Name System) C) MAC (Media Access Control) Filtering D) SSID (Service Set Identifier) CA) THIS refers to a security access control method whereby the hardware address, unique to each network card, is used to determine access to the network. IP addresses are assigned to network devices. WA1) THIS is the protocol responsible for assigning IP (Internet Protocol) addresses and will need to be enabled. The IP addresses are allocated dynamically. WA2) THIS is used to uniquely identify any given wireless network by giving it a name. It distinguishes one wireless network from another. WA3) THIS is the Internet's equivalent of a phone book. It maintains a directory of domain names and translates them to IP addresses.

C) MAC (Media Access Control) Filtering WAs) A, D, B.

3.0 Hardware Which bus slot provides the highest video performance? A) AGP (Accelerated Graphics Port) B) PCI (Peripheral Component Interconnect) C) PCIe (Peripheral Component Interconnect Express) D) SCSI (Small Computer System Interface) CA) THIS offers the highest video performance. - THIS x16 version 3 card can transfer a maximum of 16 gigabyte per second (GB/s). - Compare this to the closest competitor listed: (2), which can do 2,133 megabyte per second (MB/s), about 1/8 of PCIe. WA1) THIS is used for hard drives and scanners among other things, but not for video. WA2) THIS was created specifically for graphics cards, allowing them a shorter path to the CPU to make them more efficient. - Unfortunately, our correct answer progressed faster, and little was done to THIS slot, so manufacturers moved away from THIS as our correct answer surpassed it. WA3) THIS is the predecessor to our correct answer but is rarely used for video anymore. - It is limited to 133 or 266 MB/s, depending on the speed; either way, it doesn't hold a candle to our correct answer.

C) PCIe (Peripheral Component Interconnect Express) WAs) D, A, B.

4.0 Virtualization and Cloud Computing Which of the following cloud computing service offerings consists of infrastructure that is operated solely for a single organization? A) Community Cloud B) Hybrid Cloud C) Private Cloud D) Public Cloud CA) This is a cloud infrastructure setup for the use of a single entity. An example is an organization's private Intranet. WA1) This is available to a specific group. For example,it may be available only to specific groups or subscribers. WA2) This is available to everyone. An example of this is Google Maps. WA3) This is a combination of two or more types of cloud offerings and usually allows more than one group's usage within a larger business sector.

C) Private Cloud WAs) A, D, B.

2.0 Networking Which feature of a wireless router allows you to prioritize certain types of network traffic? A) Dynamic Host Configuration Protocol (DHCP) B) Network Address Translation (NAT) C) Quality of Service (QoS) D) Universal Plug and Play (UPnP) CA) THIS is a feature that allows you to prioritize certain types of network traffic. WA1) THIS is used to conceal internal private IP addresses from external networks. WA2) THIS is a network service that provides automatic assignment of IP addresses and other TCP/IP configuration information for clients configured to use this. WA3) THIS is a feature built into many wireless routers that enables computers, printers, and other wireless devices to be easily discoverable by the router. It is recommended that this feature be disabled if not required as it poses a number of security risks.

C) Quality of Service (QoS) WAs) B, A, D.

2.0 Networking What is the primary purpose of a web server? A)Logging event messages sent by network devices for identification of any issues or problems B)Maintaining a pool of IP addresses and leasing these to network devices C)Storing, processing and delivering web pages to clients D)Translating names into numeric IP addresses CA) The primary function of a web server is to do 3 exact things for users of them. - The communication between client and server takes place using the Hypertext Transfer Protocol (HTTP). MATCHING [Syslog, DNS, DHCP] WA1) These are the Internet's equivalent of a phone book. - They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. WA2) This server maintains a pool of IP addresses and leases an address to any ____-enabled client when it starts up on the network. WA3) This is a logging server that tracks and monitors networked devices for any issues or problems that need to be attended to immediately.

C) Storing, processing and delivering web pages to clients WAs) DNS, DHCP, Syslog.

3.0 Hardware Which USB standard defines a data rate of up to 10 Gbps (Gigabits per second)? A) USB 2.0 B) USB 3.0 C) USB 3.1 D) USB 3.2 CA) Defines a SuperSpeed+ mode with a data rate of up to 10 Gbps (Gigabits per second) and makes the link full duplex. WA1) Promises 20 Gbps, but only over USB-C ports and cabling. WA2) Introduces a SuperSpeed mode. SuperSpeed improves the bus bandwidth tenfold (to 5 Gbps or 5000 Mbps) and makes the link full duplex so a device can send and receive at up to 5 Gbps simultaneously. WA3) Is the HighSpeed standard specifies a data rate of 480 Mbps. - Note that the bandwidth is shared between all devices attached to the same host.

C) USB 3.1 WAs) D, B, A.

3.0 Hardware A user has lost the charging cable for their company issued Android smartphone. You are tasked with providing them with a replacement. The user has requested to make the cable work with their device without an adapter. While you would need to know the specific make and model of the device to supply the correct charging cable, you can immediately rule out one of the following cables: A) Micro-USB B) Mini-USB C) USB Type B D) USB Type C CA) These are typically utilized for connecting devices such as printers and while they can provide power to devices, they are not used with Android devices. WA1) This is the emerging standard for charging and transferring data. Right now, it's included in devices like the newest laptops, phones, and tablets. This could work if it is a newer smartphone. WA2) Android-based devices usually have THIS port for charging and connectivity. New devices are quickly adopting (1), however. THIS would likely work on this device. WA3) THESE are found in older devices and has since been replaced with (2) and most recently, (1). If the smartphone is older, this otherwise might work.

C) USB Type B WAs) D, A, B.

2.0 Networking You need to manage settings on a user's computer remotely using your administrator credentials. What can you do to accomplish this? A) Instruct the user to send a request for remote assistance using Windows Remote Assistance tool. B) Run a Telnet program to connect to the Telnet Daemon on the user's computer. C) Use a Remote Desktop Connection to the user's computer. D) Use SSH to connect securely to the user's computer and manage the computer remotely. CA) This protocol allows a remote user to connect to a desktop machine. - Once the connection is established, the computer goes to the logon screen and the remote user can log on. - TCP Port 3389. WA1) This protocol allows a user to ask for help from a technician or co-worker. The "helper" can then connect and join the session with the user. WA2) This very old protocol is unlikely to be used on a modern network as it sends all messages in clear text; the security risks are too high. - TCP Port 23. WA3) This protocol is designed to replace unsecure administration and file copy programs such as (2) and FTP (Port 21). - By default, Windows systems do not have native support for this protocol. - TCP Port 22.

C) Use a Remote Desktop Connection to the user's computer. WAs) A, B, D.

4.0 Virtualization and Cloud Computing Which of the following is NOT a system requirement for a Hyper-V host? A) AMD-V B) Intel VT C) X86 D) X86-64 CA) THIS is a 32-bit processor (CPU) technology. Hyper-V guest virtual machines (VM) can be 32-bit. However, the host requirement is 64-bit architecture. WA1) THIS is one of many names for 64-bit processing (CPU) technology. Hyper-V guest virtual machines (VM) can be 32-bit. However, the host requirement is 64-bit architecture. WA2) This is a type of hardware-assisted virtualization built into Pin Grid Array processors (PGA CPU). - This technology provides the hypervisor with features that allow the physical CPUs in the host to be utilized independently buy guest virtual machines (VM). WA3) This is a type of hardware-assisted virtualization built into Land Grid Array processors (LGA CPU). - This technology provides everything under (2).

C) X86 WAs) D, A, B.

3.0 Hardware Which motherboard form factor is a square 9.6" square board? A) ATX (Advanced Technology Extended) B) ITX (Information Technology eXtended) C) mATX (Micro-ATX) D) mITX (Mini-ITX) CA) THIS specifies a 9.6 (244x244mm) square board, with fewer expansion slots (up to 4 compared to a maximum of 7 for full-sized ATX boards). WA1) This is a full-sized board that is 12" wide by 9.6" deep (305x244mm). - This was developed by Intel in 1995 to provide a new design for PC motherboards. WA2) This was released by VIA Technologies to promote the low power C3 processor. - It is a full-sized board that is 8.4" wide by 7.5" deep (215x191mm). WA3) Small Form Factor (SFF) PCs often use these specific VIA Technologies'. - IT is 6.7" wide by 6.7" deep (170x170mm) with one expansion slot.

C) mATX (Micro-ATX) WAs) A, B, D.

5.0 Hardware and Network Troubleshooting What is the first thing you should test if you are experiencing problems with AC power? A) The DC socket B) The LED on the AC adapter C) The outlet D) The peripherals CA) If you experience problems working from AC power, first test THIS with a ""known good"" device (such as a lamp). WA1) After you rule out our correct answer, you should next check that THIS is green; if not, check the fuse on the plug and if available, try testing with a ""known good"" adapter. WA2) If testing with a ""known good"" adapter does not work, inspect THIS on the laptop for any sign of damage. WA3) THESE can draw too much power. - Try disconnecting drives from the media bays or USB then re-booting to see if the problem is fixed. - This is usually associated with spontaneous reboots likely caused by overheating, similar to malfunctioning CPU / RAM.

C) the outlet WAs) B, A, D.

3.0 Hardware There is no current standard that dictates the size and form factor of fan connectors. Which of these is NOT one of the common connectors? A) 3-pin Molex KK B) 4-pin Molex C) 4-pin Molex KK D) 4-pin port CA) Internal USB connections are made via 9-pin headers, which accept up to two of these connections (the 9th pin is to orient the cable correctly). - Fan connectors are EVERYTHING ELSE. WA1) Is commonly used to connect a fan directly to the motherboard. WA2) Is similar in function to (1), except that it has an extra pin to provide the ability to control the speed of the fan. WA3) This connects directly to the system's power supply.

D) 4-pin port WAs) A, C, B.

2.0 Networking You need to configure a SOHO (Small Office Home Office) network to be easily discovered by guest users. Which feature should be configured? A) DHCP (Dynamic Host Configuration Protocol) B) DNS (Domain Name System) C) MAC (Media Access Control) Filtering D) SSID (Service Set Identifier) CA) THIS is used to uniquely identify any given wireless network by giving it a name. It distinguishes one wireless network from another, for example, a guest network. WA1) THIS refers to a security access control method whereby the hardware address, unique to each network card, is used to determine access to the network. IP addresses are assigned to network devices. WA2) THIS is the protocol responsible for assigning IP (Internet Protocol) addresses and will need to be enabled. The IP addresses are allocated dynamically. WA3) THIS is the Internet's equivalent of a phone book. It maintains a directory of domain names and translates them to IP addresses.

D) SSID (Service Set Identifier) WAs) C, A, B.

3.0 Hardware What is the maximum number of expansion slots on a ATX (Advanced Technology Extended) motherboard? A) Zero B) One C) Four D) Seven CA) The ATX (Advanced Technology Extended) is a full-sized board that is 12" wide by 9.6" deep (305x244mm). Full size ATX boards has this MAX # of expansion slots. WA1) Small Form Factor (SFF) PCs often use VIA Technologies' mITX (Mini-ITX) form factor. mITX is 6.7" wide by 6.7" deep (170x170mm) with only this much (very little) expansion room, compared to what we're looking for. WA2) The Micro-ATX (mATX) standard specifies a 9.6" (244x244mm) square board, with fewer expansion slots than what we're looking for. WA3) Pico-ITX motherboards are slightly larger than a standard deck of playing cards; DO THE MATH.

D) Seven WAs) B, C, A.

1.0 Mobile Devices What purpose does the Fn key on a laptop fulfill? A) Additional function keys beyond F12 B) Immediate power down of the laptop C) Sleep mode D) Special keyboard functions CA) The Fn key on a laptop is used for THIS. - These are usually identified with corresponding keys marked with symbols of the same color as the Fn key. - By first pressing the Fn key and then one of the symbol keys, this action is carried out. - An example of a special function would be volume muting. WA1) Modern systems have 12 function keys in blocks of four keys at the top of the keyboard. These keys are labeled F1 through F12 and have no relation to the Fn key that is used for special functions. WA2) The power button on the laptop can be used for THIS, which is accomplished with a long press of the button. A short press will do (3), instead. WA3) The power button on the laptop can be used to put the laptop into (2). This is accomplished with a short press of the button. A long press will do THIS, instead.

D) Special keyboard functions WAs) A, C, B.

1.0 Mobile Devices Which of the following ACPI (Advanced Configuration and Power Interface) power modes would cut power to most of a laptop's devices and peripherals, but would maintain power to system memory to save the system's state when the battery may be running low? A) ACPI Mode S4 B) Energy Star C) Hibernate D) Standby CA) This mode cuts power to most devices and peripherals on a system and suspends the system to RAM. These means that power is provided to memory in order to save the system's current state. WA1) This mode will save any data that is memory to disk and then will shut the computer down. The data that is saved to disk is a hibernation file that is found in the root of the boot volume. WA2) THIS is a label from the US EPA (Environmental Protection Agency) that identifies that a system does support power management features. WA3) This is also known as (1). - There are several levels of ACPI power modes, ranging from S0 to S5, and G3. - Our correct answer's mode(s) are found in ACPI power modes S1 - S3.

D) Standby WAs) C, B, A.

5.0 Hardware and Network Troubleshooting How can you verify whether a solution you apply fixes a problem? A) Document the outcomes. B) Eliminate any factors that could cause the problem. C) Re-establish a new theory. D) Substitute the part for a "known good" one. CA)A basic technique when troubleshooting a cable, connector, or device is to have THIS on hand. This approach very quickly identifies ""non-causes."" WA1) To fully solve a problem, you should try THIS as well. However, this is a preventative measure that should be implemented after you verify full system/part functionality. WA2) THIS should be one of the last things you do when troubleshooting a problem. It is very useful for future troubleshooting. WA3) You should only DO THIS if your theory is not proven by the test you make or the research you undertake. This step would be performed before you even implement a solution.

D) Substitute the part for a "known good" one. WAs) B, A, C.

5.0 Hardware and Network Troubleshooting Which of these can cause damage to a hard disk? A) Blue Screen of Death (BSoD) B) Disk thrashing C) Noise D) Sudden loss of power CA) This can (and will!) damage a disk, especially if it is in the middle of a read/write operation. WA1) Is a symptom of a failing hard disk or file corruption and thus severe read/write failure. WA2) A healthy hard disk makes this at a certain low-level when accessing the platters. Anything else, such as clicking / grinding, is a symptom of a failing disk. WA3) Constant LED activity (which THIS is) can be a sign that there is not enough system RAM as data is continually moved between RAM and the page file.

D) Sudden loss of power WAs) A, C, B.

5.0 Hardware and Network Troubleshooting Your computer shuts down every time you plug your external USB optical drive to it. After removing the optical drive, it works fine. What kind of problem could this indicate? A) There is a problem with the motherboard. B) There is a problem with the wall socket. C) The power cable is faulty. D) The PSU is under-powered. CA) If disconnecting the optical drive solves the problem, you'll need to fit one of these onto the PC with one of these of a higher power rating, or there may be a fault or overload on the peripheral device itself. WA1) You should try another one of these if you are consistently not receiving power at all, or overheating because it is not properly connected, or having problems with the plug or fuse. WA2) Try plugging another piece of ""known-good"" equipment into this area. - If it does not work, it's faulty. - In this case, the computer without the optical drive is considered "known-good" equipment. WA3) The problem is likely to be THIS or adapter card if you still cannot identify the fault after removing the optical drive.

D) The PSU is under-powered. WAs) C, B, A.

5.0 Hardware and Network Troubleshooting In a laptop, what can be easily accessed by removing the screw plate on the back cover of the laptop? A) The digitizer B) Peripheral devices C) The portable battery D) The WiFi card CA)Some Field Replaceable Units (FRUs) can be accessed easily by removing a screw plate on the back cover (underside) of the laptop. - This provides access to the disk drive, optical drive, memory modules, and possibly Mini PCIe adapters such as modems and THIS. WA1) These are the computer components that are designed to be handled by the user outside the case or chassis. - A computer will normally feature at least one or two USB ports to connect peripherals. WA2) When a laptop has a touchscreen display, it will also have THIS fitted to work with it. - This is sandwiched between a layer of glass and the LCD display. WA3) This is usually removed by releasing catches on the back or underside of the laptop.

D) The WiFi card WAs) B, A, C.

2.0 Networking Which device provides micro-segmentation without requiring any sort of configuration? A) Bridge B) Managed Switch C) Router D) Unmanaged switch CA) THIS performs the micro-segmentation function without requiring any sort of configuration. - You just power it on, connect some hosts to it, and it works without any more intervention. WA1) THIS will work as our correct answer out-of-the-box but an administrator can connect to it over a management port, configure security settings, and then choose options for the switch's more advanced functionality. WA2) THIS is responsible for moving data around a network of networks, known as an inter-network or internet. WA3) THIS is a device that divides a local network into two or more segments. Hosts on one segment are able to communicate with those on another segment only via the bridge.

D) Unmanaged switch WAs) B, C, A.

1.0 Mobile Devices Which wireless technology found in some laptops allows a connection to a cellular network? A) 802.11 B) Bluetooth C) WLAN D) WWAN CA) THIS cellular network access is possible with an internal adapter or even a USB adapter. This type of adapter uses software to provide credentials to authenticate to a service provider for Internet access. Like a mobile phone, the adapter would have a data subscription with the service provider. WA1) A WiFi connection provides THIS type of network access. Most laptops will have an internal WiFi adapter or use a USB adapter. This network connection type does provide connection to a cellular network. WA2) THIS is a short range protocol used to connect peripheral devices such as game controllers, speaker, headphones, and more. It can also be used as a data connection but does not provide cellular network access. WA3) THIS is a wireless networking standard that covers WiFi. Most laptops will have an internal WiFi adapter, or use a USB adapter. This network connection type does NOT provide a connection to a cellular network.

D) WWAN WAs) C, B, A.

1.0 Mobile Devices If you were to order a new laptop that required a screen resolution of 1280 x 800, which resolution standard would you look for? A) HD (High-definition) B) SXGA (Super XGA) C) WSXGA (Wide Super XGA) D) WXGA (Widescreen XGA) CA) THIS is a display that has a screen resolution of 1280 x 800 pixels and has a widescreen aspect ratio of 16:10. WA1) THIS is a display that has a screen resolution of 1280 x 1024 pixels and has an aspect ratio of 5:4. WA2) THIS is a display standard that has a resolution of 1366 x 768 and a widescreen aspect ratio of 16:9. WA3) THIS is a display standard that has a screen resolution of 1440 x 900 and a widescreen aspect ratio of 16:10.

D) WXGA WAs) SXGA, HD, WSXGA.

STORAGE DEVICE MATCHING [Least to Most Volatile (1 to 5)] [CPU Cache, HDD, RAM, Removable Storage, SSD] [Power to Store Data???] [YES / NO] [TRUE or FALSE]: Least Volatile) These are slower, but do not require power to store data. Most Volatile) These are fast, but require power to store data.

LEAST 1) Removable Storage [NO] 2) HDD [NO] 3) SDD [NO] 4) RAM [YES] 5) CPU Cache [YES] MOST [TRUE or FALSE] BOTH are TRUE.

MATCHING Required Bandwidths REMEMBER: Each PCI Express (PCIe) lane supports a transfer rate of 250 MB/s in each direction; (n * 2 == Bi-Directional, BTW.) - PCIe x1 is 250 MB/s. - PCIe x4 is 1GB/s. - PCIe x8 is 2GB/s. - PCIe x16 is 4 GB/s. - PCI is 133 MB/s, which also run at 266 MB/s. - PCI-X (PCI Extended) is for servers ONLY. RAID Controller Card: ~2 GB/s Video Card: ~4 GB/s Wireless NIC Card: ~250 MB/s Sound Card: ~ 133 MB/s

MATCHING THINGS UP... RAID Controller Card: PCIe x8 (v1.x) Video Card: PCIe x16 (v1.x) Wireless NIC Card: PCIe x1 (v1.x) Sound Card: PCI


संबंधित स्टडी सेट्स

Chapter 39: Pediatric Variations of Nursing Interventions

View Set

NURS401 Ch23: Coronary Vascular Disorders

View Set

The Passionate Shepherd to His love & The Nymph's Reply

View Set

Vocabulary Workshop Unit 12 Synonyms and Antonyms

View Set

Civics Questions (U.S Geography)

View Set

PM -Project Initiation - Module 2

View Set