Comptia A+ 1101 Practice Test

Ace your homework & exams now with Quizwiz!

Sandboxes can be used to analyze viruses, worms, and Trojans. Sandboxes also provide an isolated environment for what other important function?

Testing and development Test development often uses virtual desktop platforms based on some guest OS hypervisor.

If a computer produces digital art, what special process will it require?

Color calibration Color calibration is the process of adjusting screen and scanner settings to balance color input and output. A technician should configure color settings with the assistance of a color profile.

A user needs to change the direction of the viewing of a page. What tab would the user need to click on to change the page view from portrait to landscape?

Orientation Orientation is one of the default jobs options set in the preferences dialog.

A network technician installs wireless access points (APs) in an office and would like to use power over Ethernet (PoE) to power the APs. The current network infrastructure is not capable of doing this. What would the network technician need to install to augment the power requirements for PoE APs?

Power injector If a switch does not support PoE, a network technician can use a power injector. One port on the injector connects to the switch port. The other port connects to the device.

This protocol transfers email messages across a network and uses TCP port 25.

SMTP Simple Mail Transfer Protocol (SMTP) transfers email messages across a network and uses TCP port 25.

A contractor working for a managed services company works fully remote from their residence. They have multiple desktops, printers, and even some Wi-Fi access points set up. What type of network is this considered?

SOHO A small office home office (SOHO) LAN is a business-oriented network, potentially using a centralized server in addition to client devices and printers, but often using a single networking appliance to provide LAN and Internet connectivity.

What is a possible source of data corruption?

Sectors or blocks fail Data corruption can occur when particular sectors or blocks fail, meaning that the system cannot open the files stored in these locations or they simply disappear.

An automobile allows for connecting a smartphone or tablet for entertainment and audio purposes. Pairing the two occurs with which technology?

Bluetooth A Bluetooth wireless radio creates a short-range personal area network (PAN) to share data with a PC, connect to a printer, and even connect to automobiles. The connection occurs through what is known as pairing.

A user is trying to send the audio and video from their computer to a large panel display, but the audio will not play through the large display. The user has a VGA cable connected to the display. What would fix this problem?

Change to an HDMI cable. WHAT YOU NEED TO KNOW A video graphics array (VGA) cable does not carry audio. If the ports allow it, changing to a high-definition multimedia interface (HDMI) cable is the easiest solution.

A network administrator noticed that latency has been higher than their service-level agreement (SLA) covers for quite some time. What should they do?

Contact the ISP. If high latency is persistently higher than an agreed service level, contact the internet service provider (ISP) to resolve the issue.

Which internal component does a mobile device use to acquire single or multi-touch input?

Digitizer A touch screen is also referred to as a digitizer because of the way it converts analog touch input to digital software instructions. A digitizer sits above a display panel.

This protocol facilitates requests for an IP address and other network settings and uses ports 67 & 68.

Dynamic Host Configuration Protocol Dynamic Host Configuration Protocol (DHCP) utilizes two ports. DHCP clients use UDP port 68 to request an IP address configuration from a server. The server responds using UDP port 67 to provide clients with an IP address configuration.

A technician working on a 3-D printer needs to change out a part. The part is either 1.75 mm or 3mm and requires that the extruder be heated to the appropriate temperature to pull as much of the old part out as possible and finally push the new part through. What is this part?

Filament Filament supplies the ink of a 3-D printer. The filament spools require careful storage once opened. They should be kept free from heat and humidity.

A user is trying to connect a gaming console to a television. What type of connector should the user utilize?

HDMI A high-definition multimedia interface (HDMI) is the most widely used video interface. HDMI supports both video and audio. The user would utilize this because it is ubiquitous in consumer electronics.

A student borrows an external hard drive from a friend but cannot see the drive in Windows Explorer. The friend's computer is a Mac. What is the problem?

Incompatible file structures Mac and Windows file systems are not natively compatible with each other. The Windows device will not recognize the Mac-formatted external drive.

A consumer that is new to iOS devices does not understand what type of cable is required to charge a new iPhone. The consumer would like an extra cable to keep in a home office. What type of proprietary cable does the consumer look to purchase?

Lightning Most iPhone and iPad Apple devices use the proprietary Lightning connector. Some of the latest iPad models, such as the iPad Pro, use USB-C.

After running a Self-Monitoring, Analysis, and Reporting Technology (SMART) diagnosis on a computer, with extended read/write times, the input/output per second (IOPS) matches the vendor's baseline. What could be the problem?

Limited hard drive capacity The Self-Monitoring, Analysis, and Reporting Technology (SMART) diagnosis measures the input/output per second (IOPS) on the drive. If this matches the vendor baselines, the technician must address other problems. One possible problem is a hard drive nearly at capacity.

A company asked a network engineer to provide a solution that will allow a hosted application to be highly available if one or more servers are offline. They have plenty of resources to provide a cluster of servers that can run the application. Still, the company is looking for direction on making the application seamlessly available to customers. What solution would the engineer implement for this request?

Load balancer WHAT YOU NEED TO KNOW A load balancer can distribute client requests across server nodes in a farm or pool. The company can use a load balancer in any situation where multiple servers provide the same function.

A manager needs to electronically sign many documents while using a laptop. Precision is not required and there is very little money in the budget to spend. What does the manager choose to use as a solution?

Touchpad A touchpad is a navigation device that is built into laptops and acts as a mouse. Using a finger with the touchpad can cost-efficiently accomplish the manager's needs.

A projector shut down two hours into a presentation. What could be the problem?

Overheating Intermittent projector shutdown is typically caused by overheating. After being on for over two hours, overheating is a reasonable assumption. Check if the projector's fan is working and that the vents are free from dust and not obstructed.

A technician did not install the full complement of modules, which would allow the system to revert to as many channels as are populated. What types of channels would allow this to happen? (Select all that apply.)

Quad-channel, Triple-channel Technicians can use triple-channel memory controllers in some CPUs and supporting chipsets. Quad-channel memory controllers are similar to triple-channel as a technician can use them in certain CPUs and supporting chipsets.

An on-premises data center is moving to a cloud model to take advantage of the many benefits cloud computing offers. One of the most important benefits of this specific data center is handling changes to demand in real-time without degrading services. Which of the following is the most important benefit of migrating this data center to the cloud?

Rapid elasticity Rapid elasticity refers to the system's ability to handle changes to demand in real-time without loss of service or performance. Rapid elasticity allows a system to reduce costs when demand is low.

A systems engineer is building a virtual machine to run a service with 8 dual-core CPUs and 500 GB of random access memory to function properly. Where would these two hardware requirements be listed?

Resource requirements Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

While planning a new virtual environment, a systems engineer noted that one virtual machine (VM) would run a Windows OS and store two snapshots at all times. The VM will need to have at least 80 GB in its hard disk drive for the VM to function properly. What is the systems engineer considering when planning this aspect of the new virtual environment?

Resource requirements Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

Which of the following network scan services must the multi-function device (MFD) configure with the path to a suitable file server and shared folder?

SMB The Server Message Block (SMB) protocol means the scan generates as a file on a shared network folder. Each user must have permission to write to the share.

A technician installs a type of computer memory into a laptop built using integrated circuits. What is this called?

SODIMM Small outline DIMM (SODIMM) is the smaller form factor packaged for laptop RAM. The memory typically fits into slots that pop up at a 45-degree angle to allow the chips to be inserted or removed.

A security administrator checks computer components that rely on the unified extensible firmware interface (UEFI) feature that helps prevent malicious software applications from being hijacked. What is this component?

Secure boot Secure boot is a UEFI feature designed to prevent a computer from being hijacked by malware. Under secure boot, the computer firmware configuration has cryptographic keys that can identify trusted code.

Remote wipe, locator apps, device encryption, remote backup, and antivirus software fall under which category of requirements?

Security requirements WHAT YOU NEED TO KNOW Security requirements are correct because all the things listed in the question refer to profile security requirements established for any system.

A user has accidentally put too much paper in the feed. What possible issues might this cause? (Select all that apply.)

Staple jams, Hole punching issues An excessive number of sheets is also the primary cause of staple jams. Remove the staple cartridge, and release the catch at the end to allow the removal of stuck staples. The main issue with hole punching is exceeding the maximum number of sheets. Make sure print jobs are sent in batches of less than the maximum permissible sheet count.

An artist looks to achieve greater precision when creating digital drawings. Which input device will help achieve this goal?

Touch pen Most drawing pads and some touch screens can be used with a touch pen or stylus rather than fingers. A stylus allows for more precise control and can be used for handwriting and drawing.

What are the manufacturers' specific recommendations for cleaning and maintaining laser printers? (Select all that apply.)

Use a toner-safe vacuum, Wipe with a soft cloth. Wipe dust and toner away from the printer interior or exterior with a soft cloth. The soft cloth can be damp to clean the exterior surface. Use a toner-safe vacuum to get rid of the printer interior or exterior dust.

A software development company uses a system to allow developers to log into any computer throughout the building and load their unique desktop environment. The IT department decided to manage these servers in the data center located in the basement of the company's office building. What system is the software development company leveraging?

Virtual desktop infrastructure (VDI) on premises Virtual desktop infrastructure (VDI) on-premises is correct because the developers log into virtual machines that load the users' computer images. The servers are hosted on the same network as the clients.

Users at an organization rely heavily on attending online meetings with clients and customers. The IT department purchases new laptops for these users to support conferencing needs. What component does IT ensure the laptop has when the specification is 1080p?

Webcam A webcam allows for video recording or web conferencing and can also take still pictures. A good external or internal webcam will have a 1080p resolution.

A user has intermittent problems with a program, and the technician has determined two courses of action. The first solution would take several hours of work and may resolve the problem. The second solution is to reimage the computer. What is the best solution?

After backing up the data, reimage the computer. Business considerations need to be taken into account when resolving IT problems. However, if reimaging the computer has a high likelihood of fixing the problem, then this is the simplest, most time-effective solution.

A user's phone charge only lasts two hours. The phone is new and has not suffered any damage. What should the user check next?

Battery utilization If a battery is new and the phone has not suffered damage, the next step is to check battery utilization. Battery utilization will indicate if a particular app is draining the battery excessively.

What information would help diagnose an intermittent shutdown problem?

Circumstance when shutdown occurs Intermittent shutdowns are difficult to pinpoint a specific cause, but with as many specifics as possible, it can narrow down the cause. For example, what the user is doing when the computer shuts down would be helpful information.

A server system uses a method where each transfer performs a hash calculation on the data value and stores it as an 8-bit checksum. This can detect and correct single-bit errors and allow the PC to continue functioning normally. What is this method called?

ECC RAM A technician uses error correction code (ECC) RAM for workstations and servers that require high reliability.

A smartphone user tries to connect a new set of earbuds. What is the first step that the user does with the phone?

Enable Bluetooth. A Bluetooth wireless radio creates a short-range personal area network (PAN) to share data and connect to peripherals. Bluetooth needs to be enabled before pairing can begin.

A user noticed that their PC is generating more heat than can be removed, and the one component designed to draw cool air from the low vents in the front of the case over the motherboard is not working. What is the impacted component?

Fan A fan improves airflow that helps to dissipate heat. Fans provide the power supply and chassis exhaust points.

This protocol provisions secure websites and services and uses port 443.

HyperText Transfer Protocol Secure HyperText Transfer Protocol Secure (HTTPS) delivers secure websites and services and uses TCP port 443. Data encrypts over this connection between the client and server.

What does SMART measure as a performance indicator?

IOPS Self-Monitoring, Analysis, and Reporting Technology (SMART) tools measure input/output operations per second (IOPS), comparing them against manufacturer baselines to determine if a drive is failing.

A technician researches flat-screen displays to find the perfect model for a conference room. The screen should feature a high viewing angle as the conference room is wide. Which technology does the technician look for when purchasing a flat-screen display?

IPS In-plane switching (IPS) uses crystals that rotate rather than twist. The main benefit is to deliver better color reproduction at a wider range of viewing angles. Most IPS panels support 178/178 degree horizontal and vertical viewing angles.

Which of the following would a technician use in small, low-power motherboards?

ITX Information technology eXtended (ITX) has two designs: the mini-ITX and the mobile-ITX. The mini-ITX is 6.7 inches square with one expansion slot. Technicians can mount most mini-ITX boards in ATX cases.

A technician receives an urgent call that computers are shutting down and goes to the affected office. The lights in the office are off. What question could quickly ascertain the problem?

Is the power off? When troubleshooting, the technician should take care not to overlook the obvious. From the description, the computers in the office are turning off since the power in the office seems to be off. Restoring power will be the first step before anything else can occur.

What would cause a central processing unit (CPU) to make only minor changes to the CPU internals that significantly improve performance and increase speed?

Multicore Multicore is a design that allows each core to communicate with the others, allowing the processing tasks to be divided and assigned properly. The multicore acts as a single unit. This allows for it to be more efficient.

A technician uses an interface that enables storage access and transport to deliver high throughput and fast response time. What is this called?

NVMe NVMe (NVM express) can be packaged for installation to a PCIe slot as an expansion card or an M.2 slot.

A technician installs a mechanism to a 5.25-inch drive bat and it connects to the motherboard by serial advanced technology attachment (SATA) data and power connectors. What is this mechanism?

Optical drive Optical drives rate according to their data transfer speed. An optical drive can perform recording/rewriting that markets with three speeds.

What types of components provide input and output functions for a personal computer? (Select all that apply.)

Peripheral device, System case WHAT YOU NEED TO KNOW Peripheral devices typically perform the input function (keyboard, mouse, microphone, and camera), output (monitor and speakers), or external storage. System case houses the internal components, including the motherboards, central processing unit (CPU), system memory modules, adapter cards, fixed disks, and power supply unit.

A large store chain is eager to reduce the cost of maintaining their servers but is unsure what the best method would be for their use case. The major requirements for the chosen solution are that the store chain needs to own its cloud infrastructure (without sharing with another organization) to maintain maximum privacy and security of the data. Which cloud computing option best meets the store chain's major requirements?

Private cloud The private cloud meets the store chain's two major requirements because it gives organizations greater control over the privacy and security of their data stored in the cloud.

An electrical wiring vendor is working with a company building a new office building. Regarding copper network cabling, what may be considered common 802.3 Ethernet standards used for this project? (Select all that apply.)

10GBASE-T, 1000BASE-T, 100BASE-T 100BASE-T refers to Fast Ethernet over copper twisted pair cabling. Fast Ethernet works at 100 Mbps. Though becoming rarer, the application of the network may only require this speed. 1000BASE-T refers to Gigabit Ethernet over copper twisted pair cabling. Gigabit Ethernet works at 1000 Mbps (or 1 Gbps). 1000BASE-T is the mainstream choice of standard for most LANs. 10GBASE-T refers to a copper cabling standard working at 10 Gbps. This would be the desired application for network applications that require speed.

A user complains their phone is frozen. They can hard reset it, but nothing works on the screen. What should the technician focus on?

Digitizer For a mobile phone, the touchscreen is the main input. If the digitizer is damaged, it will mimic a frozen device. Replacing the digitizer will solve the problem.

A basic firewall configuration has rules, referred to as network access control lists (ACLs). What are the basic properties needed for a firewall ACL to implement the desired security features configured? (Select all that apply.)

Block/Allow property, Protocol, Source and destination network/device The ACL requires source and destination network or device for the firewall to know what networks and devices are allowed to communicate with each other. A protocol needs to be defined in an ACL to narrow the scope of network traffic managed by the ACL. The network technician can set the ACL to either allow or block specific protocols and traffic between various sources and destination networks and devices.

A technician needs to upgrade components in a laptop. Which component can the technician install without the use of tools?

Battery Laptop computers use removable, rechargeable Lithium-ion (Li-ion) battery packs. Some batteries require the use of tools to access, while many batteries are easily removable with a spring lock mechanism on the back of the laptop.

A support desk technician must make a custom-length Ethernet patch cable for a user's desk setup. What tool do they need to create this cable? (Select all that apply.)

Cable stripper, Snips, Crimper A crimper is a tool used to fix a male jack to a patch cord. The support technician would do this to both ends of the custom cable. A cable stripper is a tool that would score the outer jacket just enough to remove it. Snips are needed to cut the custom length cable to size and trim the ripcord and the start filler inside the cable. Sometimes snips are integrated on cable stripper tools and can be singular in function.

A network administrator is looking at a user's box which seems to have intermittent connectivity issues. Which of the following should they do first?

Check the physcial cords. The first step in resolving a no or intermittent connectivity issue is to check that the patch cords are properly terminated and connected to the network ports.

Which type of DDR RAM have non-ECC and ECC types?

DDR5 Double Data Rate 5 (DDR5) implements a form of error checking internally to the module. This is not the same as the ECC implemented by the memory controller, where the CPU communicates the error information. This can come as a non-ECC or ECC.

An infrastructure engineer requests that a specific computer always gets a particular IP address when it connects to the network. They do not keep proper records of IP addresses, so they would rather not set the host's IP with a static address. What can the engineer use to ensure this host gets the requested address?

DHCP reservation A Dynamic Host Configuration Protocol (DHCP) reservation is a configuration that assigns a reserved or persistent IP address to a given host based on its hardware (MAC) address or other ID.

A user complains the cursor on their laptop jumps around on its own. This is especially bad while they are typing. What could solve this problem? (Select all that apply.)

Disable the touchpad, Configure input options. On a laptop, if the touchpad sensitivity is too high, typing can cause vibrations that move the cursor. If the touchpad is not needed, it can be disabled. There is generally a function key that will disable the touchpad. The touchpad sensitivity can be turned down by installing up-to-date drivers and configuring input options.

A tablet user connects a Bluetooth keyboard. What would be expected in the pairing process?

Enter a PIN. When connecting devices with Bluetooth, a security measure of entering a PIN code is usually part of the process.

What tool is also known as a universal serial bus (USB) drive, thumb drive, or pen drive?

Flash drive Flash drives are flash memory boards with a USB connector and protective cover.

A company offers a bring your own device (BYOD) program at work. Several users approach the company in an effort to receive reimbursement for changing personal phones to the company's carrier. This will be done by swapping out a subscriber identity module (SIM) card in devices with which network type?

GSM Global System for Mobile Communication (GSM) allows subscribers to use a removable subscriber identity module (SIM) card to use an unlocked handset with their chosen network provider.

A technician responds to a computer intermittently shutting down and finds that the tower has a personal heater blowing on it. What is a likely problem?

Overheating The computer is overheating. Even with all the fans working properly, computers cannot have personal space heaters blowing directly on them. Redirecting the heater should resolve the problem.

A systems engineer is doing an internal audit of their virtual environment before an annual inspection and is making sure that all the virtual machines are up to date on patches. What could the systems engineer consult to verify which patches need to be on each machine?

Security requirements Security requirements are correct because patching is a part of ensuring a system is secure against the latest vulnerabilities.

A company receives a new printer that needs assembly. What factors should the company consider when assembling it? (Select all that apply.)

Set up location, Correctly unboxing Set up location should be used when deploying a new printer. The printer must have a power outlet and potentially a network data port. The printer needs to be accessible to its users. Correctly unboxing should be used when setting up the printer. Many printers are heavy and may require two persons to lift safely. A printer should normally be left acclimate after removing the packaging materials.

What are the main components of authentication, authorization, and accounting that securely and adequately connect devices to a network? (Select all that apply.)

Supplicant, AAA server, Network access server/point The supplicant is the device requesting access, such as a user's PC or laptop. Network access servers (NAS) or network access points (NAP) are network access appliances, such as switches, access points, and VPN gateways. These are also called AAA clients or authenticators. The AAA server is the authentication server positioned within the local network. With AAA, the network access appliances do not store any authentication credentials.

A support technician replaces a Wi-Fi card in a laptop. The following day, the laptop user states that the company's Wi-Fi network signal is weaker than it was before. What does the technician find to be the likely problem?

The antenna is not connected. When replacing a Wi-Fi card, it is important to remember to connect the antenna. The connection is usually a wire with a terminating end that snaps onto the card.

A manager uses a dot matrix printer that uses specific types of paper. Which of the following papers does the printer use? (Select all that apply.)

Tractor-fed paper, Impact paper Impact paper makes multiple copies of a document in the same pass. A sheet of impact paper is between each sheet of plain paper, and when the print head strikes, the same mark remains on each sheet. Tractor-fed paper has removable, perforated side strips. The holes in these strips secure over studded rollers at each end of the platen.

While diagnosing a computer that is not powering on, the technician has established that the wall socket is working correctly since there is a fully plugged power cord. What would be a reasonable next step?

Use another power cable. After the troubleshooting steps listed, the next reasonable step would be to replace the power cord with a known good cord. If there is a problem with the cord, and the computer boots with a known good cord, then that was the issue.

According to the CompTIA Troubleshooting methodology, what is the next step after implementing a fix?

Verify that it worked. After applying a fix, verify that it works. Verification tests can be as simple as doing a test print from the computer. This verifies that the solution fixed the problem and did not inadvertently cause other problems.

A RAID array cannot boot, and the technician cannot reach the configuration utility. There have been no recent changes to the array. What is the likely problem?

Controller failure If the redundant array of independent disks (RAID) array cannot boot, the first step is to use the configuration utility to verify the status. If the system cannot reach it, then the controller likely failed.

This can be used individually or in conjunction with other configurations to effectively verify email services and block the transmission of spoofed and unwanted messages. (Select all that apply.)

DomainKeys Identified Mail, Domain-based Message Authentication, Reporting, and Conformance, Sender Policy Framework The Sender Policy Framework (SPF) record—there must be only one per domain—identifies the hosts authorized to send email from that domain. DomainKeys Identified Mail (DKIM) uses cryptography to validate the source server for a given email message. This can replace or supplement SPF. The Domain-based Message Authentication, Reporting, and Conformance (DMARC) framework ensures that the developer effectively utilizes SPF and DKIM. A DMARC policy publishes as a domain name system (DNS) TXT record.

There are strict requirements for signal strength to minimize interference in the unlicensed long-range fixed wireless spectrum. What are the main components of these requirements? (Select all that apply.)

Effective isotropic radiated power, Transmit power, Antenna gain Transmit power is the fundamental strength of the radio, measured in dBm (decibel-milliwatts). Regulatory requirements limit the power output to minimize the potential for conflicts. Antenna gain is the amount that a signal boosts by directionality—focusing the signal in a single direction rather than spreading it over a wide area. A technician would measure gain in decibels isotropic (dBi). Effective isotropic radiated power (EIRP) is signal strength from a transmitter, measured as the sum of transmit power, antenna cable/connector loss, and antenna gain, expressed in dBm (decibel-milliwatts).

This part of an IP address configuration allows a host to communicate with a remote network, most notably the internet. Otherwise, the host will only communicate with the local network without this.

Gateway address The default gateway is the IPv4 router address, such as 192.168.0.1. This setting is not compulsory, but failure to enter a gateway would limit the host to only communicate on the local network.

An IT support specialist updated all the information systems in the office last week and the users are complaining that the routinely used applications no longer work. What is most likely the issue breaking the applications?

Legacy software/OS Legacy software applications and operating systems may not perform well if a user's system has been upgraded.

A technician reimaged an infected computer. What will the technician do to avoid this problem from happening again?

Make sure that antivirus is running and updating. To fully solve a problem, implement preventative measures. For example, after clearing a virus from a computer, make sure that antivirus software is running and updating before returning the computer to the user.

A user complains that their phone restarts unexpectedly. However, after trying to isolate the problem, the technician has no idea what is causing the unexpected restarts. What should the technician always consider?

Malware Whenever a device does not function as expected, the technician should always consider malware. Malware or rogue apps are likely to try to collect data in the background. As a result, the device can become unresponsive, and force system crashes.

A company is building a new office space and data center. They would like network segmentation to ensure that only certain servers and workstations can access sensitive data. What type of devices will be the foundation of that type of network?

Managed switches Managed switches have internal software that configures security settings and chooses options for the switch's more advanced functionality, such as VLANs, to enable the segment of network devices and traffic.

A growing company is looking to move away from an outside vendor for payment processing and would like to do it in-house. As a part of securing the data on these computers, what foundational infrastructure solution should the company implement to keep this data separate from the rest of the company's internal network?

Virtual LAN A virtual LAN (VLAN) is a logical network segment using a feature of managed switches to segregate network traffic. This would be the first step to separating network traffic for the given scenario.

A technician needs to add a more secure and reliable additional memory space that assigns memory locations to process in 4 kilobytes chunks called pages. What can the technician use?

Virtual RAM Virtual RAM, also known as virtual memory, is not just used to supplement RAM with swap space.

A company has found that specific departments are more productive when working from home as remote workers. The company would like to implement this ability and has reached out to a network security firm. What foundational infrastructure solution should the company implement to allow remote workers to access all the needed resources from their laptops at home?

Virtual private network A virtual private network (VPN) enables hosts to connect to the LAN without being physically installed at the site. This would be the first foundational step to implement in the given scenario.

A user had lost several mobile devices in the past. Each device had a basic password which put company data at risk. The user has a new phone and uses which method of increased security to log in?

Two-factor authentication Two-factor or multifactor authentication means that the user must submit at least two different kinds of credentials. This would be used to authenticate access to a system with a higher level of security than a single method.

A technician needs a connector that offers high-speed standards that specify a data rate of 480 Mbps shared between the devices attached to the same host controller. What connector should the technician use?

USB 2.0 USB 2.0 is half-duplex, which means that each device can send or receive, but not simultaneously.

What universal serial bus (USB) does a technician use that allows a device to send and receive simultaneously?

USB 3.0 USB 3.0 is a new type of connector form factor and has upgraded transfer rates which are full-duplex.

A user complains that their laptop does not hold a charge for more than 30 minutes, even after charging all night. They also mention that there is an error message when they restart their computer that states something about power. What is likely the problem?

Underpowered adapter AC adapters can get mixed up. If an underpowered adapter is used, the laptop will display a warning at boot. Using the wrong adapter can cause problems, such as the battery not completely charging.


Related study sets

A&P: Chapter Eight Multiple Choice

View Set

MARKETING FINAL Chapter 14-19 multiple choice

View Set

Algorithms: Design and Analysis, Part 1 - Universal Hashing

View Set

Cognitive,social and physiological determinants of emotional state #4

View Set