A+ working on these

Ace your homework & exams now with Quizwiz!

RDP (Remote Desktop Protocol)

Port 3389

using virtual machines as a method of provisioning workstations for corporate users?

VDI-Virtual Desktop Infrastructure (VDI) refers to using a VM as a means of provisioning(equipping/rigging) corporate desktops

type 2 hypervisors

VMWare Workstation is a popular virtualization platform for creating virtualized operating systems. It is, however, a type-2 hypervisor. A type-2 hypervisor installs on top of a host operating system and does not have direct access to the underlying hardware. VMWare is a type-2 hypervisor that is used on the Apple OS to virtualize various operating systems. Oracle VM VirtualBox is a free open-source type-2 hypervisor.

In a network thats starting to run slow on 24 port hub with 20 computers connected, causing collisions, what should you add to fix the collisions and improve the speed

a switch can breakdown the collisions to single collisions, meaning they would seperate, eliminating collisions, and sending data to the destination mac address

usb 3.0

always are going to be a different color than the main usb. 2.0 color, assuming it is always black

Some users are unable to access the Internet form their workstations. A technician runs the ipconfig command on one of the workstations and sees the following: ipv4: 192.168.1.27 subnet mask: 255.255.2255.0 default gateway192.168.1.1

an issue with the router

A customer asks a technician to help set up a specialized computing system for video editing. Which of the following should the technician install on the workstation to BEST meet the customer's specifications? (Choose two.) A. SSD B. Dual monitors C. Gigabit NIC D. Hypervisor E. Docking station F. NAS

an ssd and dual monitors

case fans making a whining noise after already being cleaned from dust

apply a small amount of oil on the case fans bearings

A user is experiencing email problems and explains to a technician that all emails with graphics or images do not display the graphics. Which of the following configurations would correct this behavior?

change the security settings on the email client

Which of the following internet connection types utilizes analog, audible signals being passed over a traditional phone line to connect two computer systems?

dial-up

form factors atx based smallest to largest

nano itx- not used for pcs but for systems that are portables mini itx-used for pcs offers one expansion slot. smallest system for a user micor atx-square board larger than mini-itx, not to big not too small atx- base size

FTP file transfer protocol port

port 20 and 21

what ports are used for SECURE Sessions 22(ssh) 23(telnet) 25(smtp) 80(hhtp 110(pop3 443(https)

port 22 (an ssh connection) port 443(https)

default gateway

the ip adress of a router to which packets destined for a remote network should be sent to by default

technician is setting up a VM for use in testing software deployments. The VM is offline, but the hypervisor is not. Which of the following settings should the technician change to resolve this issue?

the virtual cpu

technician is replacing an older video card with a new high-end video card in a workstation. The installation was successful, the new card seated properly, and power is connected. However, upon booting, the computer now emits several beeps and will not boot, but shows no error messages. Which of the following is MOST likely the cause of this issue?

there isnt enough power output by the psu

OLED Display

thinnest display you can use for manufacturers that are aiming on making a thin and light laptop display

CompTIA troubleshooting methodology in order. (

(1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and then implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.

Your company decided to upgrade to 10Gpbs using 10GBASE-T networking. Which category of Ethernet cable would you use?

(CA)Cat 6A uses 500MHz and carries 10Gbps of data up to 100m (328ft) and is used in 10GBASE-T networks .Cat 5 uses 100MHz and carries 100Mbps of data up to 100m (328ft) and is used in 100BASE-TX networks. Cat 6 uses 250MHz and carries 1Gbps of data up to 100m (328ft) and can carry 10Gbps of data up to 55m (180ft). 1Gbps is used in 1000BASE-T networks and 10Gbps is used in 10GBASE-T networks. Cate 5e uses 100MHz and carries 1Gbps of data up to 100 (328ft) and is used in 1000Base-T networks.

internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number

143

connectors

*A straight tip connector (ST connector) is a connector used in fiber-optic cables that utilizes a bayonet-style plug and socket; used mostly for multi-mode networks. The ST connector setup allows for unidirectional communication, so two ST connectors and two fiber cables are used for bidirectional communication. *Coax installations use screw-down F-connectors. A broadband cable service, for example, is likely to use the F-connector for drop cables. *Twisted pair cabling for Ethernet is terminated using module RJ-45 connectors. RJ-45 connectors are also referred to as 8P8C, standing for 8-position/8-contact. *A BNC (Bayonet-Neill-Concelman) connector is a miniature quick connect/disconnect radio frequency connector used for coaxial cable.

network authentication methods

*Public key authentication is a network authentication method that can be configured to use a smartcard and PIN. The user's private key can be configured with a passphrase that must be input to access the key, providing an additional measure of protection compared to host-based authentication. *Kerberos allows Single Sign On (SSO) on a network that runs the Kerberos authentication protocol. Window Active Directory domain networks use Kerberos. *Username/password requires the client to submit credentials that are verified by SSH either against a local database or using an authentication server. *Host-based authentication provides non-interactive login, relying on public key authentication between the server and the client. There is considerable risk from intrusion if a client host's private key is compromised.

ldap default port

389

smb/cifs use port

445

DNS on port

53 TCP/UDP

cellular digital communications speeds

5G is supposed to deliver a minimum of 100 Mbps for access from a fast-moving vehicle and 1 Gbps for stationary users. Speeds of up to 70 Gbps have been achieved under test conditions. Long Term Evolution (LTE) is a converged 4G standard supported by all network providers. LTE has a maximum downlink of 150 Mbps in theory, but around 20 Mbps is typical of real-word performance LTE Advanced (LTE-A) is intended to provide a 300 Mbps downlink, but this aspiration is not matched by real-world performance. Current typical performance for LTE-A is around 40 Mbps .CDMA2000/Evolution Data Optimized (EV-DO) are the main 3G standards deployed by CDMA network providers. EV-DO supports a 3.1 Mbps downlink and 1.8 Mbps uplink.

A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.) A. Documents findings, actions, and outcomes. B. Reboot the device to verify the fix. C. Reconnect the device to the network. D. Verify the settings in IPConfig. E. Research the problem based on symptoms. F. Run a virus scan.

A and F

CAT speeds

Cat 6A uses 500MHz and carries 10Gbps of data up to 100m (328ft) and is used in 10GBASE-T networks . Cat 5 uses 100MHz and carries 100Mbps of data up to 100m (328ft) and is used in 100BASE-TX networks .Cat 6 uses 250MHz and carries 1Gbps of data up to 100m (328ft) and can carry 10Gbps of data up to 55m (180ft). 1Gbps is used in 1000BASE-T networks and 10Gbps is used in 10GBASE-T networks . Cate 5e uses 100MHz and carries 1Gbps of data up to 100 (328ft) and is used in 1000Base-T networks.

A technician needs to routinely run scripting commands in Linux but does not want to walk over the server room every time to perform the task. The technician also travels between buildings and has a Windows 10 laptop with 4GB of memory and a fully partitioned 500GB hard drive. Which of the following steps should the technician take to resolve this issue? (Choose two.) A. Increase the memory to 8GB .B. Install a Linux guest VM. C. Add another 500GB hard drive. D. Create a Linux LiveBoot CD. E. Repartition the hard drive. F. Install Linux on a new ext3 partition.

E/F

An apipa address

If no DHCP server is currently available, either because the server is temporarily down or because none exists on the network, the computer selects an IP address from a range of addresses (from 169.254.0.0 - 169.254.255.255) reserved for that purpose.

type 1 hypervisors

Microsoft Hyper-V is a type-1 hypervisor. Windows Server 2008, 2012, 2016, and Windows 10 all include Hyper-V. There is also a stand-alone Windows Hyper-V Server product. Hyper-V can be enabled or disabled inside a Windows operating system. This alludes to being a type-2 hypervisor as it is within the Windows operating system. Because the scenario calls for a type-1 hypervisor, the best choice is to use the Windows Hyper-V Server, because it installs directly on bare metal. Oracle VM Server is an open-source type-1 hypervisor that uses Xen technology. VMWare ESX is a type-1 hypervisor that is popular with server virtualizations. VMWare ESX is a direct competitor with Microsoft's Server based Hyper-V.

What is true about RAID hardware configurations? *RAID hardware can be supported by the motherboard. *Server-level RAID drives are not hot swappable. *Low cost RAID solutions use SAS, server-class computers use SATA. *Hardware RAID is cheaper than software RAID.

RAID hardware can be supported by the motherboard.

What command is used to test if your own network card's driver is working properly?

The IP Address 127.0.0.1 is a localhost IP for testing your network interface card (NIC). This IP address is reserved for use with a loopback test

authenticating server

The authenticating server checks the credentials passed by the authenticator and grants or denies access.

Authenticator

The authenticator is the switch that enables the Extensible Authentication Protocol over LAN (EAPoL) protocol and waits for the device to supply the authentication data.

supplicant

The supplicant is the client wireless device requesting access to the network under 802.1X. The supplicant must supply logon credentials to the authenticator.

A technician is setting up a WiFi-enabled thermostat for a customer, but the customer is concerned about IoT devices getting hacked. Which of the following BEST address the customer's concerns? (Choose two.) A. Use the latest encryption standard on the wireless network and set a strong password. B. Enable two-factor authentication for the IoT device's cloud account, if it is available. C. Separate the IoT thermostat by segregating it in a DMZ network. D. Disable wireless access on the thermostat to make it unshakable. E. Upgrade the customer's router to the latest version to improve network security. F. Upgrade the customer's wireless network encryption to WPA.

a and C

acessing BIOS key

f12

printer types and characteristics

inkjet use an in cartridge thermal use heating element laser use imagining drum impact use print head virtual do print to file

The technician installed a small directional antenna on the office roof and pointed it at an antenna on another building 5 miles away. Which technology is being used?

line of sight technology

htpc systems use what form factor

m-itx, mini itx the most common form factor used on htpc systems(entertainment systems)

internal vms

virtual machines can have their network configured as internal to prevent them from communicating with the internet. When configured to internal, the VMs can communicate with each other and the host machine.


Related study sets

Chapter 44: Assessment and Management of Patients with Biliary Disorders

View Set

Exam FX Life and Health (CA) missed questions #2

View Set

EPA SECTION 608 CORE (2019 revision)

View Set

Chapter 3 Cell Structure and Function Test

View Set

Psychology In Everyday Life Chapter 5

View Set

Associated with tendencies and inclinations

View Set