A+ Prep quiz 3

Ace your homework & exams now with Quizwiz!

The correct answer is: Blue Screen of Death A non-maskable interrupt on a Windows system often results in the Blue Screen of Death.

How does an NMI manifest on a Windows system?

The correct answer is: Kickoff Kickoff functions like a Start button for KDE desktops.

What KDE feature is essentially the Start button?

The correct answer is: Settings The Settings app in Windows 10 offers many utilities in a unified interface.

What Windows app in Windows 10 combines many utilities into a unified tool?

The correct answer is: Charms bar Microsoft did not include the Charms bar in Windows 10/11.

Which Windows 8 feature did Microsoft not include in Windows 10 and 11?

Hypervisor is the correct answer. A hypervisor, also known as a virtual machine monitor or VMM, is software that creates and runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, such as memory and processing. Hypervisors make it possible to use more of a system's available resources and provide greater IT mobility since the guest VMs are independent of the host hardware. This means they can be easily moved between different servers. Because multiple virtual machines can run off of one physical server with a hypervisor, a hypervisor reduces: 1. Space2. Energy3. Maintenance requirements

After successfully installing the new Linux server, you want to begin creating and provisioning virtual machines. Which of the following should you utilize to allow you to create and provision the virtual machines on the Linux server?

The correct answer is: He needs to move one of the installed sticks to a different slot to activate dual-channel memory Motherboards can be tricky and require you to install RAM in the proper slots to enable dual-channel memory access. In this case, Silas should move one of the installed sticks to a different slot to activate dual-channel memory. (And he should check the motherboard manualfor the proper slots.)

Paul has an AMD-based motherboard with two sticks of DDR3 RAM installed in two of the three RAM slots, for a total of 8 GB of system memory. When he runs CPU-Z to test the system, he notices that the software claims he's running single-channel memory. What could be the problem?

802.11n is the correct answer.

The new project is to install a wireless network for the bakery shop in your neighborhood. The owner wants the network to be extremely fast and not have frequency-overlap problems. Which of the following wireless standards should you install for the fastest data transfer speeds that support both 2.4GHz and 5GHz?

Fiber is the correct answer. As opposed to most types of cable, fiber-optic cable (also known as an optical fiber) uses light instead of electricity to transmit signals. Obviously, light is the fastest method of transmitting information, but fiber-optic cable has the additional advantage of not being subject to electrical interference.

Given the following internet connection types which one uses light instead of electricity to transmit signals?

RG-59 is the correct answer. RG-59 is a specific type of coaxial cable, often used for low-power video and RF signal connections. RG-59 is often used at baseband video frequencies, such as composite video. It may also be used for broadcast frequencies, but its high-frequency losses are too high to allow its use over long distances; in these applications, RG-6 or RG-11 is used instead.

If you want to terminate a coaxial cable, which of the following connector should you pick?

NFC is the correct answer. NFC stands for "Near Field Communication" and, as the name implies, it enables short-range communication between compatible devices. This requires at least one transmitting device, and another to receive the signal. Another use case of NFC is to transfer files from one device to another.

In many places around the world, contactless payments have become commonplace. What type of technology does this most likely rely on?

The correct answer is: Reboot the computer and watch for instructions to enter the CMOS setup utility (for example, a message may say to press the DELETE key). Do what it says to go into CMOS setup Jill should reboot the computer and watch for instructions to enter the CMOS setup utility (for example, a message may say to press the DELETE key). She should do what it says to go into CMOS setup.

Julia decided to add a second hard drive to her computer. She thinks she has it physically installed correctly, but it doesn't show up in Windows. Which of the following options will most likely lead Jill where she needs to go to resolve the issue?

The correct answer is: If the system can handle that much RAM Mike needs to know if the system can handle that much RAM

Mike wants to add 8 GB of PC3-12800 DDR3 to an aging but still useful desktop system. The system has a 200-MHz motherboard and currently has 4 GB of non-ECC DDR3 RAM in the system. What else does he need to know before installing?

The correct answer is: She installed faulty RAM If you have no problems with a system and then experience problems after installing something new, chances are that something new is at fault.

Nicole installs a second stick of DDR4 RAM into her Core i5 system, bringing the total system memory up to 16 GB. Within a short period of time, though, she begins experiencing Blue Screens of Death. What could the problem be?

The router doesn't function properly is the correct answer. Since you can ping other workstations within the accounting department, but you cannot successfully ping workstations outside of your network, this indicates that the router is not functioning properly. If the router is not functioning, the workstations will be unable to access any devices or servers outside of the accounting department.

The accounting department complaining they aren't able to connect to the internet. You connect your laptop to the accounting department's network and open the command prompt to type the command ipconfig/all. The command provides your IPv4 address which is 192.168.1.10, your subnet mask 255.255.255.0, and your default gateway 192.168.1.1. Next, you run the command ping 145.3.5.87 but you don't get any successful reply back, you just get the message "Request timed out". Next, you ping one of the workstations on the same network by typing the command ping 192.168.1.11 and you receive four successful replies. Which of the following is MOST likely the issue in the accounting department?

The correct answer is: Hyper-Threading Intel loves its Hyper-Threading, where a single-core CPU can function like a dual-core CPU as long as it has operating system support.

Which feature enables a single-core CPU to function like two CPUs?

Overclocking is the correct answer. Overclocking refers to pushing your computer components harder and faster than the manufacturer designed them to go. Overclocking can certainly speed up your system (and save you some cash in the process), but only if you do it right.

Which of the following CPU features allow your computer components to behave faster and better than how the manufacturer initially created them to be?

802.11 802.11b 802.11g 802.11ax 802.11n

Which of the following IEEE 802.11 Wi-Fi standards use the 2.4 GHz band? (Choose all that apply)

Class C networks have the first octet in the range of 192-223, inclusive, and their network IDs have a 0 in the last three octets. Valid Class C network IDs are: 222.0.0.0 195.0.0.0 Class A networks have the first octet in the range of 1-126 and use a default subnet mask of 255.0.0.0. The address 22.22.3.0 is a Class A network. Class B networks have 128-191 as their first octet and use a default subnet mask of 255.255.0.0. The address 191.255.255.0 is a Class B network. The address 127.0.0.0 is a loopback address. The IP address range 127.0.0.0 - 127.255.255.255 is reserved for loopback and they are used for testing purposes.

Which of the following addresses are valid Class C network IDs? (SELECT TWO.)

IaaS is the correct answer. IaaS (Infrastructure as a Service) businesses offer services such as pay-as-you-go storage, networking, and virtualization. IaaS gives users cloud-based alternatives to on-premise infrastructure, so businesses can avoid investing in expensive on-site resources. IaaS examples: AWS EC2, Rackspace, Google Compute Engine (GCE), Digital Ocean.

Which of the following computing models offers services such as pay-as-you-go storage, networking, and virtualization and helps businesses to avoid investing in expensive on-site resources?

Establish a theory of probable cause is the correct answer. For the exams, you should be able to identify all the steps of the troubleshooting methodology. 1. Identify the problem- Question the user and identify user changes to computer and perform backups before making changes- Inquire regarding environmental or infrastructure changes- Review system and application logs 2. Establish a theory of probable cause (question the obvious)- If necessary, conduct external or internal research based on symptoms 3. Test the theory to determine cause- Once the theory is confirmed, determine the next steps to resolve problem- If theory is not confirmed re-establish new theory or escalate 4. Establish a plan of action to resolve the problem and implement the solution 5. Verify full system functionality and, if applicable, implement preventive measures 6. Document findings, actions, and outcomes

Which of the following is the second step of the CompTIA troubleshooting methodology?

Resource pooling is the correct answer. Resource pooling is a term used in cloud computing environments to describe a condition in which providers provide provisional and scalable services to multiple clients or customers. These services can be customized to suit each client's requirements without doing changes being apparent to the client or end-user.

Which of the following virtualization and cloud computing concepts describes a condition in which providers provide provisional and scalable services to multiple clients or customers?

The correct answer is: Mini-PCI The Mini-PCI format conserved space and power, which made it an ideal card type for use in laptops.

Which variation of the PCI bus was specifically designed for laptops?

PCIe is the correct answer. PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has a number of PCIe slots you can use to add GPUs (aka video cards aka graphics cards), RAID cards, Wi-Fi cards or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on the motherboard you buy.

You are building a video editing/graphic design PC in order to support all the Adobe Suite's software. The computer needs a high-end processor, lots of RAM, and a dedicated high-end graphics card. The graphics card will be installed in one of the expansion slots on your motherboard. Which of the following motherboard connections will most likely be used to connect the graphics card?

The DHCP is not configured properly as it doesn't provide the IP address of the DNS server is the correct answer. Since you are able to ping the IP of the knowdirect.org but you can't visit the site by its domain name then the issue is DNS-related. So, the DHCP isn't configured properly.

You are setting up a new wireless network for the new department. After finishing the installation of the wireless access points and the configuration of the DHCP server, you need to test if everything works as expected, so you turn on the laptop and connect to the network. Your laptop is automatically assigned an IP address of 192.168.1.2 from the DHCP server. On the terminal, you type the command ping 192.168.1.1 to check if the default gateway responds, and sure enough, it works. You open Google Chrome and attempt to connect to knowdirect.org, but you cannot connect, instead, you get an error. Afterward, you attempt to ping the IP address for the KnowDirect web server (87.2.5.99) and it responded successfully. Which of the following is MOST likely the cause of this issue?

Barcode reader is the correct answer. A barcode reader is a device used to capture and read the information contained in a barcode. Barcodes are generally used to help track inventory, but there are many more possibilities and interesting ways to use them.

You are working in the IT department for a large shipping company. The company needs to buy a device that allows them to automatically read information about the products they receive from their customers in order to keep them organized. Which of the following devices should the company buy to BEST meet this requirement?

DNS doesn't work is the correct answer. The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online through domain names, like examsdigest.com or youtube.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources. Each device connected to the Internet has a unique IP address that other machines use to find the device. DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as 2100:bb22:3272:1::2133:b1a4 (in IPv6). DNS records are instructions that live in authoritative DNS servers and provide information about a domain including what IP address is associated with that domain and how to handle requests for that domain. These records consist of a series of text files written in what is known as DNS syntax. DNS syntax is just a string of characters used as commands which tell the DNS server what to do. The most common types of DNS are: A is used to map hostnames to an IPv4 address of the host. AAAA is used to map hostnames to an IPv6 address of the host. CNAME is used to point a domain or subdomain to another hostname. SRV is used to identify computers that host specific services. MX is used to help route emails. TXT is used to provide the ability to associate text with a zone. NS indicates which DNS server is authoritative for that domain. PTR is used for the Reverse DNS (Domain Name System) lookup.

You can ping the IP address of 1.2.3.4 and 195.46.2.4 but you are unable to access knowdirect.org and comptia.org. Which of the following services is malfunctioning; causing the issue?

Fiber is the correct answer. A fiber optic cable is a network cable that contains strands of glass fibers inside an insulated casing. They're designed for long-distance, high-performance data networking, and telecommunications. Compared to wired cables, fiber optic cables provide higher bandwidth and transmit data over longer distances.

You have been asked to install a network cable inside a conduit that will be placed underground and used to connect two buildings that are located about 2 km apart. Which of the following cable types should you choose?

IMAP is the correct answer. The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a remote web server from a local client. IMAP allows simultaneous access by multiple clients. This is why IMAP is more suitable for you if you're going to access your email from different locations or if your messages are managed by multiple users. IMAP is one of the most common protocols for receiving email and syncs messages across all devices. By default, the IMAP protocol works on two ports: Port 143 - this is the default IMAP non-encrypted port; Port 993 - this is the port you need to use if you want to connect using IMAP securely.

You have been hired as a 1st line support engineer and your day-to-day duties include solving problems at the first point of contact so that the customer can continue with their day. Today you receive a call from a customer that needs help related to email synchronization. He wants that each time he receives an email, the email should be synchronized across all devices. Which of the following protocol should you use to make that happen?

Bluetooth is the correct answer. Wireless devices with Bluetooth radios must be paired with each other before they can communicate. This involves making them discoverable and entering a PIN as part of the pairing process. The pairing process works with Bluetooth profiles, and each device has to be compatible.

You have been hired as a network technician to install, maintain, and troubleshoot wireless connections. Your task is to find out which of the following types of wireless connections requires a pin to be entered as part of the pairing process prior to it being utilized?

Docking station is the correct answer. Docking stations for laptops are meant to bridge the gap between portability and having a stationary place to work and play.With a docking station, you can get the best of both worlds with a system that allows your laptop to work for both purposes. The docking station itself is usually pretty small and doesn't take up much space, which can be great if you don't have much room on your desk. Some of the most basic docking stations provide a power supply and ports for connecting to other devices. More advanced docking stations may include space for additional PC monitors, keyboards, and computer speakers. It can also have additional USB-C ports to connect to printers, add external hard drives, and connect microphones and audio.

You have been tasked to create an easy and efficient solution for the door-to-door salespeople of your company, to quickly connect an external monitor, keyboard, mouse, a wired network connection, and an additional hard drive for storage to the HP laptop whenever they come back into the office. Which of the following type of devices should you choose to provide all the functionality above and complete the task?

Firewall is the correct answer. A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Firewalls have been the first line of defense in network security. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet. A firewall can be hardware, software, or both.

You have been tasked to implement a security policy at your organization by configuring an ACL rule. The ACL (Access Control Rule) should prevent users with IPs 145.167.255.0 - 145.167.255.254 from accessing the network 2.2.2.2. Which of the following devices would you use to configure the ACL?

Enable pairing is the correct answer. By pairing the device, you will establish the Bluetooth connection between your smartphone and the wireless headphone. Bluetooth is commonly used to create a wireless connection between a smartphone and wireless headphones for making/receiving phone calls and listening to music.

You have just bought a new wireless headphones and you want to connect the headphones with your smartphone to listen to music and make and receive calls. Which of the following actions should you execute to connect your smartphone to the wireless headphones?

USB to Ethernet is the correct answer. Ethernet ports are used to connect computers to a wired local area network or to a modem that provides a broadband Internet connection. While most computers used in a business environment have one or more Ethernet ports available, some lighter notebook and tablet computers are designed for wireless connectivity with no Ethernet port included saving on system space.

You have just bought the new MacBook Pro that comes without a wired network slot. It has only type-c ports and one USB port. Which of the following devices will you buy to connect to the internet using a cable?

Lightning is the correct answer. Lightning is a proprietary computer bus and power connector created and designed by Apple. The Lightning connector is used to connect Apple mobile devices like iPhones, iPads, and iPods to host computers, external monitors, cameras, USB battery chargers, and other peripherals.

You have just realized that you lost the charging cable of your iPhone 8. Now you are heading to the Apple store to buy a new one, as the battery of your phone is running low. What sort of cable do you need to charge your phone?

WPA2 and AES is the correct answer. This is the most secure option. It uses WPA2, the latest Wi-Fi encryption standard, and the latest AES encryption protocol. You should be using this option. WPA2 is the most secure wireless encryption standard, as it has replaced both WPA and WEP. AES is an extremely strong encryption algorithm, and it used by default in the WPA2 standard.

You just bought a new SOHO router for your home. You want to install the router to provide wireless broadband routing and make the network secure. Which of the following encryption settings would you configure to make the wireless network secure?

Backup the hard drive from the workstation is the correct answer. S.M.A.R.T. (Self-Monitoring, Analysis and Reporting Technology; often written as SMART) is a monitoring system included in computer hard disk drives (HDDs), solid-state drives (SSDs), and eMMC drives. Its primary function is to detect and report various indicators of drive reliability with the intent of anticipating imminent hardware failures. When S.M.A.R.T. data indicates a possible imminent drive failure, software running on the host system may notify the user so preventive action can be taken to prevent data loss, and the failing drive can be replaced and data integrity maintained.

You just receive a call from your colleague that needs your help. He has reported that his workstation is running extremely slow. You perform a reboot of the workstation and you receive a S.M.A.R.T. error during the boot-up process. Which of the following actions should you perform as the next step?

Change the way she receives the IP address from static to dynamic using DHCP is the correct answer. This is a common error that occurs when two network devices are assigned the same IP address on a network. This is happening when static IP addresses are used, so the easiest way to avoid this issue is to use DHCP to assign the IP addresses on the network dynamically to avoid duplication.

You just received a new troubleshooting ticket from your co-worker Marie. She is trying to connect to the internet (wirelessly) but she receives an error message that says "There is an IP address conflict with another system on the network". Which of the following options will resolve the issue?

Switch is the correct answer. A network switch connects devices within a network (often a local area network) and forwards data packets to and from those devices. Unlike a router, a switch only sends data to the single device it is intended for (which may be another switch, a router, or a user's computer), not to networks of multiple devices. The term collision domain is used to describe a part of a network where packet collisions can occur. Packet collisions occur when two devices on a shared network segment send packets simultaneously. The colliding packets must be discarded and sent again, which reduces network efficiency. Collisions occur often in a hub environment because all devices connected to the hub are in the same collision domain.

You notice that the network performance of the IT department is running slow. After the troubleshooting process, you find out that the issue is due to an extremely high number of collisions. This is happening due to the hub device you had installed in the past. Now you need a more advanced device to replace the hub. Which of the following devices should you install to decrease the number of collisions and increase the network performance?

Replace the toner cartridge is the correct answer. The most obvious sign of a low-toner cartridge is poor print quality. Streaking, lines or missed prints are all possible signs that cartridge replacement is imminent. If you have tried rocking the toner cartridge and are still getting poor prints, it is likely time to replace your cartridge.

You see streaking, lines, and missed prints when you are printing documents using your office's laser printer. What action should you perform next to solve this problem?

RJ-45 is the correct answer. RJ45 is a type of cable connector which is mainly used in computer networks. RJ45 is mainly used for ethernet networking which is used to connect different types of devices like a switch, hub, PC, router, firewall to each other. RJ45 is the most known and popular connector type in the IT world.

You train the new junior network engineer of your company to install a CAT 6 network. You ask him to give you the right connector to terminate the CAT 6 cables. He opens the tool kit bag to find it, but he doesn't know which connector type is ideal for the installation. Which of the following connectors does the junior network engineer need to select to terminate the new CAT 6 cables being installed?

1TB SSD is the correct answer. A solid-state drive (SSD) is a newer, faster type of device that stores data on instantly-accessible memory chips. So, the SSD is the best storage solution to meet your need to store more data while maintaining fast data access speeds.

You want to upgrade the workstation with more internal storage in order to install additional applications, and store movies, videos, and photos. Which of the following is the BEST storage solution to meet your need to store more data while maintaining fast data access speeds?

KVM is the correct answer. The KVM switch is a device that improves productivity and saves space, and money by allowing you to use multiple computers with one set of keyboard, monitor, and mouse. The exclusive feature offers IT, administrators, centralized real-time updates, and maintenance.

You've just set up your new home office. As part of your job, you need to use two or three computers at your workstation. However, setting up three monitors, three keyboards, and three mice is making your desk far too crowded. Plus, there's the additional hassle of moving around to use each computer. Which of the following device should you use that allows you to use multiple computers with one set of keyboard, monitor, and mouse?

DHCP failure is the correct answer. Automatic Private IP Addressing (APIPA) is a feature in operating systems (such as Windows) that enables computers to automatically self-configure an IP address and subnet mask when their DHCP server isn't reachable. The IP address range for APIPA is 169.254.0.1-169.254.255.254, with the subnet mask of 255.255.0.0. Since Emilie's workstation assigned an IP address of 169.254.2.2 then you can identify that the issue is on the DHCP server. When a DHCP client boots up, it looks for a DHCP server in order to obtain network parameters. If the client can't communicate with the DHCP server, it uses APIPA to configure itself with an IP address from the APIPA range. This way, the host will still be able to communicate with other hosts on the local network segment that is also configured for APIPA.

Your co-worker Emilie just open a new trouble ticket for you, stating that she is not able to connect to the internet. After a quick investigation, you have noticed she receives an IP address of 169.254.2.2. What is most likely the cause of this issue?

Airplane mode is enabled is the correct answer. If the smartphone is functioning properly except for applications that require network connectivity, then the issue is either a misconfiguration (like enabling airplane mode by mistake), a defective cellular radio chip, or a similar issue. The most likely cause is that Lisa accidentally enabled the airplane mode on the device, which will turn off the cellular radio for the smartphone and cause the network connectivity to be lost.

Your co-worker Lisa, came to you to ask for your help. She says that she can't connect to the internet even if she has data, and she can't make/receive calls. She thinks that the phone was hacked. After a quick investigation, you notice that the rest of the functionalities are fine such as playing music, open the calendar, add new contacts etc... Which of the following is MOST likely the problem with Lisa's phone?

Your co-worker should log into his corporate email account on the new Android phone and restore his contacts to the new device is the correct answer. Since your co-worker has a corporate account that is used to synchronize data from his device to the cloud, the easier, quickest, and most efficient method would be for him to fully synchronize his contacts with his corporate cloud-based account from his old device first. Then, he can configure his new Android device to access his corporate account, and it will automatically download and synchronize the data from the cloud-based servers onto his new Android device. The rest option can be considered as correct but the question says to find the BEST and most EFFICIENT way to make the migration. The rest options are error-prone and time-consuming.

Your co-worker just got a new Android phone from the company. He has been tasked to migrate all of his phone's existing business-related contacts from the current phone (iPhone) to the new phone (Android). His phone had been configured to keep all of his business-related contacts to the company's on-premise cloud-based service. Your co-worker came to you to guide him on how to complete this task. Which of the following is the BEST and most EFFICIENT way for your co-worker to migrate his data from his old iPhone to his new Android device?

MAN is the correct answer. A metropolitan area network (MAN) is a computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities, and towns, or any given large area with multiple buildings. A MAN is larger than a local area network (LAN) but smaller than a wide area network (WAN).

Your company has several campuses located across the city. Within each campus, the buildings are interconnected with a campus area network. If you connect each of the campuses to each other across the city, what type of network would this become?

Duplex is the correct answer. Duplex printing is a feature of some computer printers and multi-function printers (MFPs) that allows the printing of a sheet of paper on both sides automatically. Print devices without this capability can only print on a single side of the paper, sometimes called single-sided printing or simplex printing.

Your coworker wants to print a sheet of paper on both sides (front and back) automatically using the multi-function printer (MFP) of your company. Which of the following settings should your co-worker select in the printer settings?

Cellular and Bluetooth are the correct answers. Airplane mode disables a device's cellular radio, Wi-Fi, and Bluetooth—all the wireless transmission functions.

Your mobile data on your phone is enabled and you are browsing the web, and watching videos on Youtube. Suddenly, you enable the airplane mode and find out that the internet connection has been lost. Which of the following are signals being disabled by airplane mode? (SELECT TWO.)

Hotspot is the correct answer. You can use your phone's mobile data to connect another phone, tablet, or computer to the internet. Sharing a connection this way is called tethering or using a hotspot.

Your phone has run out of data and you need to connect on the web. Unfortunately, there are no Wi-Fi hotspots around you. Your friend told you he can share his own mobile data in order to connect on the web. Which feature does he need to enable in order to share his internet connection with you?

Corruption of the memory is the correct answer. A stop error or exception error commonly called the blue screen of death (BSoD) or blue screen, is an error screen displayed on Windows computers following a fatal system error. It indicates a system crash, in which the operating system has reached a condition where it can no longer operate safely. This is caused by many different problems, such as a corruption of memory or a crucial process terminating unexpectedly.

Your workstation just stops working and displays a BSOD (Blue screen of death) error on the screen like the image below. Which of the following is the most likely cause of this error?


Related study sets

Match the definition Chapter 14-17

View Set

AP Exam Prep | Population + Migration

View Set

Seeing and Knowing Visual Art Chapters 9-13

View Set

Chapter 8 Multiple Choice Questions

View Set

geography (1st year) (summer tests)

View Set

Italian Speaking Questions and Answer

View Set