Dion Practice 1

Ace your homework & exams now with Quizwiz!

Which of the following Wi-Fi channels in the 2.4 GHz frequency band are only supported in Europe and Japan due to government regulations?

13 2.3: The Wi-Fi frequency band for 2.4 GHz is split into 14 channels of 5 MHz. In the United States and Canada, channels 1-11 may be used. In Eurpoe 1-14 may be used. In Japan, 1-14 may be used. Since Wi-Fi communication requires approximately 20 MHz to operate effectively, users should set their wireless access points to channels 1, 6, and 11 to minimize interference and avoid overlapping channels.

Which of the following ports is used by LDAP by default

389 2.1: The lightweight directory access protocol (LDAP) is a protocol used to access and update information in a X.500-style network resource directory. LDAP uses port 389. The service location protocol (SLP) is a protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network. This is an alternative protocol to LDAP in newer networks. SLP uses 427. The remote desktop protocol (RDP) is a protocol used for the remote administration of a host using a graphical user interface. RDP operates over TCP port 3389. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53.

Which cellular technology is compromised of HSPA+ and EV-DO to provide higher data speeds than previous cllular protocols?

3G: 1.4: 3G cellular technology is made up of two different technologies: HSPA+ and EV-DO. HSPA+ (Evolved High-speed Packet access) is a 3g standard used fpr GSM cellular networks and can support up to a theoretical download speed of 168 Mbps and a theoretical upload speed of 34 Mbps. In the real world though HSBS reaches around 20 Mbps. EV Do is a 3G standard used for CDMA Networks amd can support up to 3.1 Mbps download. 4G cellular is made up of LTE and LTA-A. Long Term Evolution (LTE) is a packet data communications specific specification providing an upgrade path for both GSM and CDMA2000 cellular networks. LTE has a theoretical speed of 150 Mbps and a real-world speed of around 20 Mbps. LTE advanced (LTE-A) has a theoretical speed of 300 Mbps and a real-world speed of around 40 Mbps. 5G cellular technology is made up of three different types: low-band, mid-band, and high-band mmWave technology. Lowband - 55Mbps w theoretical speed of 150 Mbps. Mid range - 150 average and theoretical 1.5 gigs. High 3Gb avg and theoretic 70 Gigs.

Which of the following ports is used by the Service Location Protocol when organizing and locating printers, databases and other resources in a network?

427 2.1: The service location protocol (SLP) is a protocol or method of organizating and locating the resources such as printers, disk drives, databases, email directories, and schedulers in a network. This is an alternative protoocl to LDAP in newer networks. SLP uses port 427. HTTPS uses 443, LDAP uses 389, SMB 445

You just heard of a new ransomeware attack that has been rapidly spreading across the internet that takes advantage of a vulnerability in the Windows SMB protocol. To protect your network until Microsoft releases a security update, you want to bloc the port for SMB at your firewall to prevent bevoming a victim of this attack. Which of the following ports should you add to your blocklist?

445 2.1: Server Message block (SMB) uses ports 139 and 445, and is a network file sharing protocol that runs on top of the NetBIOS architevture in Windows environments. When the WannaCry ransomware was spreading rapidly across the internet, you could help protect your organization's network by blocking ports 139 and 445 at your firewall to prevent your machines from getting infected over the internet. Network Time Protocol (NTP) uses port 123 and is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. Internet Message Access Protocol (IMAP) uses port 143 and is an internet standard protocol used by email clients to retrieve email messages from a mail server over TCP/IP connection. System logging protocol (syslog) uses port 514 and is a way network devices can use a standard message format to communicate with a logging server. it was designed specifically to make it easy to monitor network devices. devices can use a syslog agent to send out notification messages under a wide range of specific conditions.

Which of the following type of hard disk drives would be installed in a low-end office desktop?

5400 rpm 3.3: Hard drive performance is limited based on the number of revolutions per minute (RPM) the disk can spin. If a disk can spin faster, it can retrieve or store data on the disk quicker. For low-end office desktops, using a 5,400 rpm hard disk drive to save money is acceptable. For a high-performance gaming computer, a 15,000 rpm hard disk drive or an SSD should be used instead.

During a disaster recovery, which of the following statements is true?

A virtual machine has less downtime than a physical server? 4.1: A virtual machine can usually be restored much faster than a physical server. Physical servers must be modified to fit the right drivers for the disk drives, NIC, and other necessary components whenever they must be rebuilt after a crash. Often, a new physical server will also be required to replace a faulty one, and then the right drivers are needed to ensure a smooth transition. Conversely, a virtual machine can be recreated using another instance, clone, or restoration from a backup in much less time. Therefore, the downtime associated with virtual machines and their restoral is much lower.

Molly enjoys playing an online MMORPG each day after work. To access the game, she simply enters the website address and logs in to begin playing. Today, she tried to acess the game from her laptop at work, but she couldn't launch the game. What is most likely causing the issue?

Blocklisted by firewall 4.1: The company firewall may be bloacking any gaming-related websites and applications to improve security. Adding the website or a category of websites to the firewall's blocklist would prevent all corporate users from accessing the content. When using cloud-based resources, it is important that all of the right ports and protocols are allowed through the firewall.

Which one of the following correctly indicates the circled area

CMOS battery 3.4: The area circled indicates the CMOS battery on this motherboard. The CMOS battery is used to keep power to the BIOS configurations, such as the date and time, when the power is removed from a desktop or workstation. For the exam, it is important that you can identify the different parts of the motherboard by sight.

which is the circled

CPU slot The area circled indicates the CPU clot. This is where the processor is installed into the motherboard.

Samantha, a consultant, is working onsite at a large corporation's headquarters this week. She takes out her iPad and attempts to launch an application. She notices that the application will not launch, even though she is connected to the wireless network and has properly established internet connectivity. Which of the following should she do to fix this issue and allow the application to launch properly?

Close all open applications, shut down the iPad, power on the iPad, then launch the app again 5.5: Applications often run in the background and do not get properly closed when you finish using them. This can cause them to hang and lock up when a user tries to reopen them. By closing all open applications, shutting down the iPad, then rebooting it and launching the app again will ensure that the application is freshly loaded and overcome many issues. This will ensure that the cashe is cleared before attempting to reload the application. While a factory reset and iOS reload would also work, it would take much longer and cause extensive data loss on the device.

You just rebooted your Windows 10 workstation, and the desktop's background picture looks strange. Upon closer look, you notice only a few hundred colors are being shown in the image. Which of the following settings should you reconfigure?

Color depth 5.4: Color depth is either the number of bits used to indicate the color of a single pixel in a bitmapped image or video frame buffer or the number of bits used for each color component in a single pixel. In Windows 10, you can display up to 32-bits of color depth if your monitor supports it. A larger color depth number allows for more unique colors to be displayed. If you only have 4-bit color, for example, you can only have 16 colors. With a 8-bit color depth, you can see 256 colors. Normally, most Windows systems are set ot 16-bit, 24-bit, or 32 bit

You connected your laptop to a new wireless network and received an IP address automatically, which of the following servers allowed this to occur?

DHCP server 2.4L A dynamic host configuration protocol (DHCP) server is a server configured with a range of addresses to lease. Hosts can be allocated an IP address dynamically or be assigned

A customer recently purchased a touchscreen laptop to use for her schoolwork. It has been working well for about 3 weeks, but today she has brought it into your store for repair because it is not working properly. When she touches an icon on the screen, the program fails to load. You look over the laptop, and the screen appears to be fully intact with no dark blobs or spider web cracks in the panel. You attempt to operate the laptop using the touchscreen, but it appears non-responsive to your touch. You can, however, click on the icons using the laptop's touchpads without any issues. Which of the following components MOST likely needs to be replaced?

Digitizer 1.2: The digitizer is a touch-sensitive glass panel covering the LCD in a touchscreen assembly. The digitizer is used to convert touch events to digital signals that can be interpreted as different types of input. The digitizer can be touched and inspected without taking apart the device. A liquid crystal display (LCD) panel is a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. The LCD panel is backlight by a cold cathode flourescent (CCFL) bulb. The LCD panels are used on laptops and have replaced CRT monitors as the main type of computer display screen for desktops, as well. The LCD screen is the panel that is inside the device, which displays the image. You cannot get to the LCD without taking the device aprt first. When only the touch screen is broken, you should still see what is happening on the screen, and the screen should still function as normal. When only the LCD is broken, you can still use the touchscreen, but the panel will have dark blobs or spider web cracks or both. When both LCD and touchscreen are damaged, you may still be able to use portions of the otuchscreen, and some parts of the LCD may display the image, but you will incur obvious difficultires in using the device as normal. The inverter (also known as inverter board, sfcreen inverter, or LCD inverter) is a part of the laptop s display assembly. Teh inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight. A graphics processing unit (GPU) is a microprocessor used on dedicated video adapter cards or within a CPU with integrated graphics capability to handle the mathematical calculations required to create immersive and 3D graphics.

A client reports that their workstation is continually crashing when using certain applications on their macOS system. The system will stop working and display a spinning rainbow pinwheel. Which is most likely the error?

Failure or corruption of the memory 5.2 On a Max (OS X) system, the "Pinwheel of Death" is used to indicate an error. The pinwheel appears as an endlessly spinning rainbow mouse pointer displayed on the screen. This usually occurs due to a memory failure or memory corruption in the system. The pinwheel is like the BSOD used in Windows. The Blue Screen of Death (BSOD) is a "stop screen" that appears when the Windows operation system detects a critical error and literally stops the system so that the error doesn't cause any loss of data. All operating systems have some form of "stop screen" but the Windows version got the name BSOD since it was a sceen with a full blue background and white text containing troubleshooting information and error codes

You work as a computer technician for a production company that travels worldwide while filming and editing music videos. Due to the nature of video editing, you will be building a video production workstation for the company that will have the maximum amount of RAM, an 8-core CPU, a dedicated GPU, and a redundant array of solid-state devices for storage. You are now determining which power supply to install in the system. what is the MOST important characteristic when choosing a power supply?

Input voltage 3.5: This question provides you with many details, but the key phrase in finding the answer is in the first sentence. This computer will be traveling worldwide, and the most important consideration will be the input voltage. If you choose a 120-volt power supply it would be destroyed if plugged into a 240-volt outlet (commonly used outside the United States). Conversely if you use a 240-volt power supply and plug it into a 120-volt outlet it will not function due to the low voltage. Therefore, you need to pick a power supply with dual voltage selection capability for the maximum compatibility worldwide.

You are building a virtualization environment to host several secured Linux distributions as VMs. The VMs need to have access to the local corporate network and communicate with the host operating system, the other VMs, and the internal network clients. Still, they should not have access to the internet. Which of the following types of network connections should you configure for each VM?

Internal 4.2: If you select internal, each VM can communicate between the host and the other VMs. if you select external, the VMs would have internet access. The private network connection type will create a switch that is usable only by the vms. The VMs cannot use the switch to communicate with the host. If you select localhost, each VM could only communicate with itself.

What describes an IPv6 address of ::1?

Loopback 2.5: In IPv6, ::1 is the loopback address. In IPv4, the loopback address is 127.0.0.1. The loopback address is used to send a test signal sent to a network destination to diagnose problemms. A broadcast address is an IP address that is used to target all systems on a specific subnet network instead of single hosts. A multicast address is a logical identifier for a group of hosts ina computer network that are available to process datagrams or frames intended to be multicast for a designated network service. The address shown is not a broadcast or multicast address. A public address is routable over the internet but ::1 is a loopback address and therefore not publixly routable on the internet.

Your company has recently migrated much of your data center to the cloud. Now, your boss needs a method to monitor all services used in supporting your customers to be properly billed based on their usage. Which of the following cloud computing concepts is your boss describing?

Measured services 4.1: Measured service is a term that IT professionals apply to cloud computing that references services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning. Rapid elasticity is used to describe scalable provisioning or the capability to provide scalable cloud computing services. Rapid elasticity is very critical to meet the fluctuating demands of cloud users. The downside of rapid eleasticity implementations is that they can cause significant loading of the system due to the high resource number of allocation and deallocation requests. On-demand refers to the fact that a consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use.

What type of connector provides power to an internal hard drive from the computer's power supply using a 4-pin connector.

Molex 3.1: A Molex connector provides DC power to the various drives inside a computer case. Molex and Mini-Molex are both 4-pins connectors, with Mini-Molex only being used to support floppy disk drives. The large0sized one is used for hard disk drives, CD-ROM drives, and DVD drives. SATA connectors have 15 pin and 7 pin varieties. Thunderbolt has 20 and 24 pin varieties. SCSI has 50 and 36 pin varieties.

Both Apple and Samsung have released their own version of contactless mobile payment solutions. For example, Apple Pay allows users to place their iPhone or Apple Watch within an inch of a credit card machine at a store to make a payment. Which one of the following wireless technologies do these types of payment systems rely upon?

NFC 1.3: NFC, or near-field communication is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone to establish communication by bringing them within 4cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another. Bluetotth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Infrared (IR) was a wireless networking standard supporting speeds up to about 4 Mbps with a direct line of sight for communications. Infrared sensors are used in mobile devices and with IR blasters to control appliances. While infrared (IR) used to be commonly used to connect wireless mice and keyboards to a laptop back in the 1990s, it has fallen out of favor in the last 10-15years since Bluetotth is more reliable and does not require a direct line of sight between the device and the laptop. Wi-Fi is the IEEE 802.11 standard for wireless networking based on speread spectrum radio transmission in the 2.4 GHz and 5 GHz bands. Thestandard has six main iterations (a, b, n, ac, and ax). Describing different modulation techniques, supporting distances, and data rates.

Tamera was responding to a complaint that one of the employees is having problems with the wired connection on their laptop. She investigated the issue to see why it will not connect to the network. Tamera looked at the indicator lights, but she doesn't see the blinking she expected to view. instead, she sees the light is steady. What is MOST likely the issue?

No network activity 5.7: If hte lights are steady on a network interface card (NIC), it indicates that there is no network activity. If it is blinking, this indicates that data is passing over the NIC to the network. Even if there were an incorrect TCP/IP configuration or intermittent connectivity, there would be blinking lights to indicate transmission attempts. Since this is a wired network connection, it cannot be a low RF signal as that is a wireless network problem.

Which circle lol

PCIe x1 3.4: The area circled indicates the PCIe x1 slots. PCIe (peripheral component interconnect express) is any interface standard for connecting high-speed components. Every desktop PC motherboard has some PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. PCIe x1 slots are usually used for external inpput/output devices such as network interface cards. For the exam, it is important that you can identify the different parts of the motherboard by sight.

Tim, a help desk technician, receives a call from a frantic exec who states that their company-issued smartphone was stolen during their lunch meething with a rival company's exec. Time quickly checks the MDM administration tool and identifies that the user's smartphone is still communicating with the MDM, and displays its location on a map. What should Tim do next to ensure the stolen device's data remains confidential and inaccesssible to the thief.

Perform a remote wipe of the device 1.4: To ensure the data remains confidential and is not accessed by the thief, Tim should performa remote wipe of the device from the MDM. This will ensure any corporate data is erased before anyone accesses it. Additionally, Tim could reset the device's password, but if the thief can guess or crack the password, they would have access to the data. Identifying the smartphone's IP address is not a useful step in protecting the data on the device. Additionally, devices should be encrypted BEFORE they are lost or stolen, not after. Therefore, the option to remotely encrypt the device is provided as a wrong answer and a distractor.

Which of the following types of connectors are used to terminate a CAT 5e network cable?

RJ-45 3.1: RJ-45 refers to a cable termination specification that specifies physical male and female connectors and the pin assignments of data jacks that can be used for the networks and VOIP telephone cables. RJ45 is an 8 pin / 8 position plug or jack commonly used to connect computers onto Ethernet - based local area networks (LAN) and consists of two wiring schemes: T568A and T568B. An RJ-11 connector is used to terminate cable used for phone lines. A molex connector is used to provide power to internal components of a computer from the power supply.

Which of the following is a security concern with using a cloud services provider and could result in a data breach caused by data remnants?

Rapid elasticity 4.1: Rapid elasticity can be a securty threat to your organization's data due to data remanences. Data remanence is the residual respresentation of digital data that remains even after attempts have been made to remove or erase it. So, when a cloud resource is deprovisioned and returned to the cloud service provider, it can be issued to another organization for use. if the data was not properly erased from the underlying storage, it could be exposed to the other organization. for this reason, all cloud-based storage drives should be encrypted by default to prevent data remanence from being read by others. Metered services are pre-paid, a la carte, pay per use, or committed offerings. A metered service like a database may charge its users based on the actual usage of the service resource on an hourly or monthly basis. For example, Dion Training used the AWS Lambda serverless product in some of our automation. The service charges use $.20 for every 1 million requests processed. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. on-demand refers to the fact that a consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.

A customer contacts the service desk because their laptop will not power on when plugged in, and the battery is dead. The service desk replaces its battery, connects it to a different power adapter, and the laptop works all day until the battery runs out. Now, the laptop won't turn on, and the battery won't charge. Which of the following do you recommend to solve this issue?

Replace the DC jack 5.5: The scenario indicates that the DC jack is faulty. Since the battery was replaced and the laptop continues to work, this indicates it isn't a battery issue but is, instead, most likely a DC jack issue. The DC jack often gets broken on a laptop, and if the jack is broken, the device cannot charge or receive power from the power adapter or wall outlet.

You have been asked to set up the corporate email on several mobile devices for Dion Training's employees. The employees will use their mobile devices to send their emails when out of the office. Which of the following mail protocols should you configure to allow the employees to send their mail?

SMTP 1.4: You should configure SMTP since it is the only protocol used to send emails. POP3 and IMAP are used to RECEIVE emails. HTTPS is used for web browsing, not for receiving emails. The post office protocol POP3 is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the internet using TCP port 25. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.

Which of the following statements about the 5.0 GHz wireless frequency used by Wi-Fi is correct?

The 5.0 GHz frequency is less effective at penetrating solid surfaces than 2.4 GHz 2.3: The longer wavelength of 2.4 GHz makes it better at propagating through solid surfaces than the 5.0 GHz frequency. The 2.4 GHz frequency has a longer wavelength than the 5.0 GHz frequency. The longer wavelength gives it the ability to cover a longer range using the same power output levels as the 5.0 GHz frequency. The 5.0 GHz frequency supports higher data rates than the 2.4 GHz frequency due to lower levels of congestion and interference. The 5.0 GHz frequency has more individual channels giving it less congestion and the interference than the 2.4 GHz frequency.

Your computer keeps losing track of time and date in the system. Which of the following is MOST likely causing this issue?

The CMOS battery is dead and needs to be replaced 5.2 Most motherboards (especially the older ones) have a small coin-sized battery installed on them to power the CMOS RAM when the computer is powered down. This is where the BIOS settings and the dat/time are saved when power is removed from a workstation. If a computer continually loses track of the day/time, this is a classic sign that the CMOS battery is dead and needs to be replaced. Please note that some newer motherboards have replaced the need for a CMOS battery by replacing it with an area of nonvolatile memory used instead to store the BIOS settings and the the date/time

Which of the following types of USB connections can support data rates of up to 480 Mbps?

USB 2.0 3.1: USB 2.0 can support data rates up to 40 Mbps. USB is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at a slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 2.0 and a 3.1 define 5 Gbps (superSpeed) and 10 Gpps (SuperSpeed+) rates and can deliver up to 4.5 W of power.

which of the following types of usb connections can support up to 4.5 watts of power per connected device?

USB 3.0 3.1 USB 3.0 can support up to 4.5 watts if power

A computer technician is replacing a failed power supply in a customer's gaming workstation that contains multiple hard drives and a dedicated graphics card. Which of the following are the 2 most important things for the tech to consider when selecting a power supply replacement for the system?

Wattage Rating + Number and type of connectors 3.5: The tech must ensure that they select a new power supply with a high enough wattage rating and the right number / type of connectors. Since this is a gaming workstation with several hard drives and a dedicated graphics card, it is likely to require a large wattage rating and many connectors. Wattage defines the amount of power needed to power all the hardware in the system. The number of connectors defines the number of devices that cna be powered from the power supply. The number of connectors defines the types of devices that can be powered from the power supply.

Dion Consulting Group is working with a new laptop manufacturer. The manufacturer wants to create the thinnest lightest laptops in the world. To do this, they need to choose the right technology for their displays. Which technology should Dion Consulting recommend to allow for the thinnest laptop displays?

OLED 1.2: An OLED display works without a backlight because it emits visible light. Thus, it can desplay deep black levels and be thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions (such as a daker room), an OLED screen can achieve a higher contrast ratio than an LCD, regardless of whether the LCD uses cold cathode cluorescent lamps or an LED backlight. An in-plane switching (IPS) LCD panel uses technology designed to resolve the quality issues inherent in TN panel technology, including strong viewing angle dependence and low-quality color reproduction. A liquid crystal display (LCD) panel is a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. The LCD panel is backlight by a cold cathode flrourescent (CCFL) bulb. LCD panels are used on laptops and have replaced CRT monitors as the main type of computer display screen for desktops, as well. A light-emitting diode (LED) display is an LCD panel that uses a LED backlight instead of a CCFL backlight to provide its light source.

Which of the following DC voltages are not found within a printer when the laser printer converts AC power into DC power for use?

-24 VDC 3.7: The DCPS (DC Power Supply/Source) of a laser printer is used to convert high voltage AC into lower voltage DC for the printer. The DCPS converts 115VAC or 220VAC power into +5 VDC and -5 VDC for use by the printer's logic board, and +24 VDC to power the motors that feed the paper through the printing path in the laser printer.

Your laptop currently has a 128 GB SSD installed and currently running out of internal storage space. You want to upgrade the workstation with more internal storage to store additional videos, photos, and backups. Still, you don't want to sacrifice data access speed for increased storage. Which of the following is the BEST storage solution to store more daata while maintaining fast data acess speeds?

1 TB SSD 1.1: Since you need an internal storage solution, you cannot use a NAS or SAN (since these are both network storage solutions). Instead, you have to select from the SSD or the HDD. In this question, we are primarily worried about the storage's speed being installed and not the storage size. Therefore, we should choose the 1 TB SSD (solid state drive) over the 3 TB HDD (hard disk drive) due to its faster speeds.

Which of the following ports is used by SNMP by default?

161 2.1: The simple network management protocol (SNMP) is a protocol for monitoring and managing network devices over UDP ports 161 and 162. A management system collates data sent by agents running on each device. The agents maintain a Management Information Base of configuration and usage data. An agent can also generate a trap, alerting the management system of some notable event. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53. The network basic input/output system NetBIOS/NetBIOS over TCP/IP (NetBT) is a session management protocol used to provide name registration and resolution services on legacy Microsoft networks and those using WINS. NetBIOS/NetBT operates on TCP/UDP ports 137 and 139

Which of the following is an example of a valid IPv4 address?

192.168.1.254 2.5: An IPv4 address consists of 32 bits. IPv4 addresses are written in dotted octet notation, such as 192.168.1.254. MAC Addresses are written as a series of 12 hexadecimal digits, such as 00:AB:FA:B1:07:34. IPv6 addresses are written as a series of up to 32 hexideceimal digits but can be summarized using a :: symbol. Rhe ::1 is the IPv6 address for the localhost. The other option isn't valid because it uses : instead of .

Your desktop space is running out of internal storage space. you want to upgrade the workstation with more storage to store additional videos photoso and backups. which is the following isthe best storage solution to avoid having to expand again next year while meeting your need to store more data

3 TB HDD 3.3: Since you need an internal storage solution, you cannot usea NAS or SAN (since they are both network storage solutions). Instead, you have to select from the ssd or the hdd. in this question, we are primarily worried about the size of the storage being installed and not the storage speed. therefore, we should choose the 3 TB HDD over the 1 TB SSD due to its larger size.

Which of the following ports should you unblock at the firewall if your workstation cannot access http://www.diontraining.com but can access https://www.diontraining.com?

80 2.21: HyperText Transfer Protocol (HTTP) is the basis for the World Wide Web. HTTP enables clients (typically web browsers) to request resources from an HTTP server. A client connects to the HTTP server using its TCP port (the default is port 80) and submits a resource request using a Uniform Resource Locator (URL). HTTPS (HTTP Secure) uses 443. In this question, it states that the user can access HTTPS but not HTTP, indicating that port 80 is blocked. The server message block (SMB) / common internet file system (CIFS) is a protocol used for requesting files from Windows servers and delivering them to clients. SMB allows machines to share files and printers, thereby making them available for other machines to use. Samba software allows UNIX and Linux servers or NAS appliances to run SMB services for Windows clients. SMB operates on port 445. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53.

You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the "Operating System Not found" error on your display. You verify that the boot.ini file is configured properly, but the error still appears. **What is MOST likely causing this error?**

An incompatible partition is marked as active 5.3: This issue may occur if one or more of the following conditions are true: (1) the basic input/output system (BIOS) does not detect the hard disk (2) the hard disk is damaged (3) sector 0 of the physical hard disk has an incorrect or malformed master boot record (MBR) (4) an incompatible partition is marked as active or (5) a partition that contains the MBR is no longer active The only option provided in this list that an incompatible partition is marked as active

A technician at Dion Training is troubleshooting an issue with a workstation. The technician believes that the powersupply needs to be replaced based on the symptoms they observed. What symptoms did the technician likely observe to lead them to this conclusion?

Burning smell 5.2: A burning smell is indicative of a bad power supply. A foul odor is indicative of a distended capacitor. The incorrect date/time on the workstation is indicative of a dead CMOS battery. Hardware failure or system instability can cause the computer to reboot continuously. The problem could be the RAM, hard drive, power supply, graphics card, or external devices. Based on the symptoms of a continuous reboot, the supervisor likely suspected the RAM as the cause of the issue

Which of the following types of networking hardware is used to deliver broadband internet access using a hybrid fiber-coaxial (HFC) infrastructure

Cable modem 2.2: A cable modem is a type of network bridge that provides bi-directional data communication via radio frequency channels on a hybrid fiber-coaxial (HFC), radio frequency over glass (RFoG) and coaxial cable infrastructure. Cable modems are primarily used to deliver broadband internet access as cable internet, taking advatange of an HFC and RFoG network's high bandwidth. DSL is a technology used to transmit multimedia traffic at high-bit rates over twister0pair copper wire (over ordinary telephone lines. This allows the telecommunications company to connect a user's home to the local switching center using normal telephone lines, then connect that local switching center (using a DSLAM to multiplex the connections) to the central office over a single high-speed cable (such as a fiber connection). An optical network terminal (ONT) is a device that connects fiber optics cables to other types of wiring such as Ethernet and phone lines by converting the signal from optical to electrical and vice versa. An ONT is commonly used with fiber to the house (FTTH) installations). Software-defined networking (SDN) is an approach to network managment that enables dynamic, programmatically efficient network configuration to improve network performance and monitoring, making it more like cloud computing than traditional network management. Software defined networking (SDN) uses Application Programming Interfaces (API) and compatible hardware that allows for the programming of network appliances and systems

You are installing a new projector in a customer's home theater room. After connecting the projector and powering it on, you notice some odd debris displaying on the screen. Which of the following should you do to correct this?

Clean artifacts on the protective glass 5.4: Based on the situation described, there appears to be some odd debris being displayed on the screen. This sounds like some artifacts or debris on the lens or protective glass of the projector. If this is cleaned, the image should be resolved back to a clear picture. This is the first and cheapest option to attempt. If this doesn't work then you may need to replace the bulb since a failing bulb can create artifacts, as well.

Dion Training wants to install a network cable to run a television signal between two buildings. Which of the following cable types should it utilize?

Coaxial 3.1: A coaxial cable is a cable used to transmit video, communications, and audio. A coaxial or coax cable is most commonly used as a cable to connect a TV to a cable TV service. Coaxial cables are a specialized type of copper cabling that uses a copper core to carry the electrical signal while being enclosed by plastic insulation and shielding to protect thata transmission from the effects of electromagnetic interference(EMI). Plenmum-rated cable has a special insulation that has low smoke and low flame characteristics. Plenum cable is mandated to be installed in any air handling space. Shielded cables contain a braided foil shield around the inner cabling to protect the data from the effects of electromagnetic interference (EMI). An optical fiber consists of an ultra-fine core of glass to carry the light signals surrounded by glass or plastic cladding, which guides the light pulses along the core and a protective coating. The fiber optic cable is contained in a protective jacket and terminated by a connector. Fiber optic cables use light signals to carry data across a cable at extremely high bandwidths.

What type of cloud model would allow the sharing of resources by multiple organizations to create a service that benefits all of the members?

Community cloud 4.1: A community cloud in computing is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns, whether managed internally or by a third party hosted internally or externally. Community cloud is a hybrid form of private cloud. they are multi-tenantt platforms that enable different organizations to work on a shared platform. community cloud may be hosted in a data center, owned by one of the tenants, or by a third-party cloud services provider and can be either on-site or off-site. a public cloud contains services offered by third-party providers over the public Internet and is availible to anyone who wants to use or purchase them. they may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consyme. a private cloud contains services offered either over the internet or a private internal internal netowrk and only to select users instead of the general public. a hypbrid cloud is a cloud computing environment that uses a mix of on-premisses, private cloud, and third-partty public cloud services with orchestration between these platforms. This typically involves a connection from an on-premises data center to a public cloud.

Susan, a computer technician, received a complaint from a client about an issue with their laptop. Based on the symptoms observed, she believes that there is an issue with the laptop's memory. Which of the following symptoms was MOST likely observed during their troubleshooting.

Continuous reboots 5.2: A bad or faulty RAM module can cause system reboot, diminished system performance, and slow loading of websites and programs. This gradual deterioration of performance, especially with memory- intensive programs, may indicate a problem with the latop's system memory. The system memory should be tested and replaced (if needed) to allow the laptop to begin working efficiently.

Dion Training uses a large laser printer to print documents in its office. The laser printer has recently begun creating printouts that contain a double image or ghost image appearance to them. Jason just printed out a test page. WHat is causing the ghost printing?

DRUM UNIT 5.6 Double images or ghost printing occurs when an image or text is repeated more than once on a printed page. This often occurs to an issue with the drum unit. If the drum unit is not being properly charged by the corona wire, ghost prints can become a problem with the unit.

Which of the following cloud services should an organization choose in order to deliver virtual desktops to end-users over the Internet on a per-user license basis?

DaaS 4.1: Desktop as a Service (DaaS) is a cloud computing offering where a service provider delivers virtual desktop to end-users over the Internet, licensed with a per-user subscription. DaaS is often combined with Virtual Desktop Infrastructure. Platform as a Service (PaaS) is a complete development and deployment environment in the cloud with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications. Infrastructure as a Service (IaaS) is a type of cloud computing service that offers essential compute, storage, and networking resources on-demand, on a pay-as-you-go basis from a cloud service provider. Software as a Service (SaaS) allows users to connect to and use cloud-based apps over the INternet. Common examples are email, calendering, and office tools. SaaS provides a complete software solution that you can purchase on a pay as you go basis from a cloud service provider.

The touch screen on your Windows 10 laptop is not working properly. You have been asked to troubleshoot it. What do you sheck FIRST?

Digitizer settings The digitizer is the piece of glass glued to the LCD surface used to capture TOUCH and TRANSLATE the input of the system. if the touch screen is not working but the display doesnt look cracked or broken, this is a sign the digitizer settings are incorrect or the digitizer is defective.

You are configuring a new client workstation on the network. Which type of IP address should you configure it with?

Dynamic 2.5: A dynamic IP address should be used for client workstations and devices to ensure they are easy to configure and less prone to human error. When configuring a dynamic IP address, the DHCP server should issue the IP address, subnet mask, gateway, and DNS server's IP address to the workstation or device. A static IP address should be used for servers to ensure they are easy to find, access, and manage on the network. When configuring a static IP address, you need to include the IP address, subnet mask, gateway, and DNS server's IP address. A static IP address is used when the DHCP server is disabled and clients are configured manually to join the network properly. Automatic Private IP addressing (APIPA) is a feature of windows-based operating systems that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function. When a host uses an APIPA address, it can communicate with other hosts on the same network using APIPA. Still, it cannot reach other networks or communicate with other hosts who have managed to obtain a valid DHCP lease. An APIPA address is also known as a link-local address

Johnny is trying to download a file from a remote FTP server but keeps receiving an error that a connection cannot be opened. Which of the following should you do FIRST to resolve the problem?

Ensure that port 20 is open 5.7: Executing an FTP connection from a client is a two-stage process requiring the use of two different ports. Once the user enters the name of the server and the login credentials in the FTP client's authorization fields, the FTP connection is attempted over port 21. once the connection is established, FTP send the data over port 20 back to the client from the server. For FTP to function properly, you should have both ports 20 and 21 open.

You are setting up a projector and a laptop for a big presentation in the Dion Training conference room. You start up the presentation software and mirror the laptop's display to the projector. The image on the screen from the projector is flickering intermittently, but the image on the laptop's display is working with no issues/ You attempt to change the laptop's resolution to al ower setting and higher setting, but still, the projector's flickering persists. Which of the following steps should you attempt NEXT?

Ensure the display cable is securely connected to both the laptop and the projector 5.4: A flickering image on a projector is a common issue that can occur if the display cable between the laptop and the projector is not connected securely. This is especially common with older-style display cables like VGA and DVI. Therefore, it is important to ensure a VGA or DVI cable is properly secured using the cable's thumbscrews to prevent flickering of the image.

Which of the following technologies can provide the precise latitude and longitude of a device's location when it is located outdoors?

GPS 1.4: Location services enable the device to know its position using its internal GPS receiver or its approcimate location using its cellular radio. A mobile device can use its internal GPS, cellular, bluetooth, or wi-fi radios to identify its location. A GPS (global positioning system) device is used to determine a receiver's position on the Earth based on information received from 24 GPS satellites, which operate in a constellation in Medium Orbit (MEO). The receiver must have a line-of-sight to four of the GPS satellites continuously to accurately determine its position on the earth (latitude, longitude, and altitude). The device's GPS receiver can provide an accurate location up to 10 meters. Cellular radios can provide an approximate location based upon the triangulation of your position between different cellular towers. Bluetooth can be used within a building to provide an accurate of the device within 3-4 meters. Wi-Fi positioning systems use the signal strength or angle of arrival of a signal to determine the device's location within 1-4 meters. The use of bluetooth and wi-fi to determine the device's location is known as an internal positioning system (IPS)

Which of the following is a connection-oriented protocol that utilizes TCP?

HTTPS 2.1: The transmission control protocol (TCP) is a protocol in the TCP/IP suite that operates at the transport layer to provide connection-oriented, guaranteed delivery of packets. Hosts must first establish a session to exchange data and then confirm the delivery of packets using acknowledgements when using TCP. TCP is relatively slow in comparison to UDP. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to broswers using SSL/TLS encryption over TCP port 443. The simple network management protocol (SNMP) is a protocol for monitoring and managing network devices over UDP ports 161 and 162. A management system collates data sent by agents running on each device. The agents maintain a Management Information Base of configuration and usage data. An agent can also generate atrap, alerting the managment system of some notable event such as the printer being out of paper. The trivial file transfer protocol (TFTP) is a protocol used to get a file from a remote host or put a file onto a remote host. TFTP is commonly used with embedded devices or systems that retrieve firmaware, configuration information, or a system image during the boot process. TFTP operates over UDP port 69. The dynamic host control protocol (DHCP) is a protocol used to allocate IP addresses to a host when it joins a network. DHCP utilizes UDP ports 67 and 68.

A client has a workstation with a RAID 5 configuration and reports that slower than normal performance occurs when reading/writing files to the RAID. You run a diagnostic program against the RAID, and the system passes all of the diagnositc tests without any issues. While you are running the tests, though, you heard clicking noises coming from the RAID. Which of the following is the MOST liekly cause of the slow performance being experienced by the client?

Hard Drive 5.3: Based on the symptoms described, the RAID itself is fully functional, so the RAID controller is not causing any problems. This could be caused by a failing hard drive or the system overheating due to the slow performance. Since there is a clicking noise, this is most likely a hard drive failure since a cooling fan makes a whirring or grinding noise instead. Therefore, we can assume the RAID is made up of magnetic hard drives, and one of those hard disks is starting to fail. To replace the hard drive, you need to find a comparable drive that will work in the array, reboot the computer, and enter the raid setup program to rebuild the array after replacing that hard drive. If you use a RAID 1, RAID 5, or RAID 10, the system will continue to operate normally but with slower performance until you replace the hard drive and rebuild the RAID

A computer technician is building a server that will run multiple virtual machines simultaneously. Which CPU technology should be selected so that the processor can utilize two logical cores?

Hyperthreading HyperThreading (HT) is an Intel CPU architecture implemented to expose two or more logical procesors to the OS to deliver performance benefits. This allows the system to run multiple cores for each operating system in a virtualized environment. Since the question is being asked about logical cores and not physical cores, the answer is hyperthreading and not a multi-core processor. A 32-bit CPU is a hardware item and used by low-end notebooks or thin clients. A dedicated GPU is a graphics cards and would not help running multiple virtual machines.

You have been asked to fix an old computer whose CD-ROM has stopped working. The CD-ROM drive is using a 40-pin ribbon cable, and you suspect the cable is defective. Which cable should you buy to replace the cable.

IDE 3.1: An IDE (Integrated Drive Electronics) cable is an older cable interface that used to be used for the transmission of data between the motherboard and various internal devices like hard drives and CD-ROM drives. An IDE cable is a 40-pin ribbon cable that operated at relatively slow speeds (less than 50 Mbps)> IDE cables were also known as PATA (Parallel ATA) cables, as opposed to SATA (Serial ATA) cables. You will rarely come across an IDE cable in use today, but if you are working on a very old computer in an office (legacy machine) then you may find one in use.

You have been asked to set up the corporate email on several mobile devices for Dion Training's employees. The employees will use their mobile devices to check their email when out of the office, but they will also need to check their email from their desktop computers. Which of the following mail protocols should you configure to allow the employees to receive their mail and maintain the read/unread status across all of their devices.

IMAP 1.4: You should configure IMAP because it will leave the email on the server and allow for synchronizing the mail to all devices, including each email's read state. If you configure POP3, the mail in downloaded onto the device and removed the mail from the server's mailbox by default. SMTP is used to send emails, not receive them. HTTPS is used for web browsing, not for receiving emails. The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.

You are trying to select the best devise to install to proactively stop outside attackers from reaching your internal network. Which of the following devices would be the BEST for you to select?

IPS 2.4: An intrusion prevention system (IPS) is a form of network security that detects and prevents identified threats. Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents, and capture information about them. An IPS can block malicious network traffic, unlike an IDS, which can only log them. A proxy server is a server spplication that acts as an intermediary between a client requesting a resource and the server providing that resource. System Logging Protocol (Syslog) uses port 514 and is a way network devices can use a standard message format to communicate with a logging server. It was designed specifically to make it easy to monitor network devices. Devices can use a syslog agent to send out notification messages under a wide range of specific conditions.

Jason booted up a Windows 10 laptop and noticed and noticed that the icon appears very large and the image appeared blurry. What is the most LIKELY cause of these issues?

Incorrect resolution 5.4: This is likely a screen resolution problem. Each LCD/LED has a native resolution that fits perfectly on the screen. If a resolution other than the native resolution is used, the screen could become squished, distorted, or have a black vertical or horizontal lines filling up the excess space. For example, if the computer rebooted into Safe Mode, it will default back to 800x600 pixel resolution instead of the 16:9 ratio of 1920x1080 pixels used by modern laptops. This is also referred to a VGA mode.

A network technician connects three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up, and the network technician can ping network devices in all of the office trailers. However, users are complaining that they are experiencing sporadic connectivity. What is the MOST likely cause of this issue?

Interference 5.7: Microwave links require a direct line of sight (LoS) between the antennas to maintain a strong and effective link. These line-of-sight microwave link uses highly directional transmitter and receiver antennas to communicate via a narrowly focused radio beam. Since this microwave-based network is being run n a wooded area, there are likely some trees or leaves blocking the line of sight between the antennas. To solve this issue, they should trim the trees and branches to provide a clear light of sight or move the antennas to reestablish a clear line of sight. Latency is the time delay beterrn when a packet is sent and received. While latency will increase with an obstructed microwave lin of sight, latency is an effect of the issue not the cause. Throttling is the intentional slowing or speeding of an internet service by an Internet service provider to regulate network traffic and minimize bandwidth congestion. This again is not a cause of intermittent connectivity, but would instead occur if the microwave link was overutilized beyond its SLA contract limitations. Split horizon is a form of route advertisement that prohibits a router from advertising back a route to the same interface from which it learned it. This does not affect the issues experienced with the microwave line. Another way to approach the question is to use the process of elimination: throttling slows don the speed, and latency slows down speed even further. Split horizon prevents loops, so it only makes sense that interference is the correct choice sicne interference fcan cause drops in connections in many situations.

Jason's laptop display appears to be extremely dim. He set the brightness to the highest level and attempted to adjust the control, but the image still appears extrememly dim. Jason notices that if he points his smartphone's flashlight at the screen, then he can see the image better. Which of the following components on the laptop should he replace to fix the issue?

Inverter 5.4: The inverter (also known as the inverter board, screen inverter, or LCD inverter) is a part of the laptop's display assembly. The inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight. The digitizer is a touch-sensitive glass panel covering the LCD in a touchscreen assembly. The digitizer is used to convert touch events to digital signals that can be interpreted as different types of input. A liquid crystal display (LCD) panel is a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. The LCD panel is backlight by a cold cathode fluorescent (CCFL) bulb. A graphics processing unit (GPU) is a microprocessor used on dedicated video adapter cards or within a CPU with integrated graphics capability to handle the mathematical calculations required to create immersive and 3D graphics.

You work for the city's Department of Motor Vehicles (DMV) There are five DMV locations spread across the city that you have been asked to connect with a network. You have created a list of requirements for this network, including that it must be wired and support at least 1 Gbps of bandwith. Which of the following network types would MOST likely be used for the DMV to connect their internal networks across the city securely?

MAN 2.7: A metropolitan area network (MAN) is a computer network that interconnects users with computer resources in a geographic region of the size of a metropolitan or city area. This is the most appropriate choice based on the requirements provided. MAN is a term applied to the interconnection of local area networks (LANs) or campus area networks (CANs) across a city into a single larger network. A MAN is larger than a CAN or LAN but smaller than a WAN, A local area network (LAN) is a network where all the nodes or hosts participating in the network are directly connected with cables or short-range wireless media. A wide area network (WAN) is a network that spans multiple geographic locations such as the internet. Wide area networks are often established with leased telecommunication circuits. A personal area network (PAN) is a close-range network that is usually based on Bluetooth or NFC for communications between personal devices, such as smartphones, laptops, printers, and other peripheral devices.

You are building a Desktop PC for a newly hired employee at Dion Training. The computer's motherboard doesn't have a wireless network adapter integrated into it, so you need to purchase an expansion card to provide this functionality. Which of the following motherboard connections will most likely be used to connect the wireless network adapter card?

PCIe x1 3.4: PCIe (peripheral component internet connect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has several PCIe slots you can use to add GPUs, RAID cards, network adapters, Wi-Fi cards, or SSD add-on cards. The type of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8 and x16. Network adapters and Wi-Fi network cards almost exclusively rely on PCIe x1 expansion slots or a USB connection for their connectivity. Graphics cards usually rely on a PCIe x16 expansion slot. eSATA is an external SATA port used to connect an external storage device such as a hard drive. The accelerated graphics port (AGP) is a parallel expansion card standard that was originally designed for attaching a video card to a computer system to assist in the acceleration of 3D computer graphics. AGP has been REPLACED with PCIe due to its faster speeds.

Which of the following locations are you likely to find the antenna wires located within a laptop or mobile device?

Positioned around the display pannel 1.2: The antenna wires for the wireless cards and cellular radios are usually routed around the screen within the casing of the laptop or mobile device. The antenna connections can be tricky to install/remove and are delicate. When updating or replacing a wireless or cellular card, the technician must be careful to reconnect the antenna wires and reinstall them in the proper location. External antennas are available only when connected to an external wireless card.

What describes how many times the image on the monitor changes per second?

Refresh rate 1.2: Refresh rate is defined by the vertical scan frequency of a monitor and how many times in one second an image can be redrawn on the screen. LCD monitors have a fixed refresh rate based on the specifications of their panel. Generally, a monitor is rated with a refresh rate of 60 Hz, 72 Hz, or 120 Hz, with the higher refresh rate being considered better quality and easier on the user's eyes. For high-performance gaming systems, a 120 Hz monitor is desired for smoother motion and graphics. The aspect ratio is defined as the ratio of width to height in a display. The frame rate is defined as the number of tiems the image in a video stream changes per sedcond as expresed in Hertz (Hz) or Frames per second (fps). The yaw rate is a made-up term for the exam and is used as a distractor. The resolution is the measure of the number of picture elements (pixels) that an imaging device can use to sample or display the image as measured in pizels per inch (PPI)

Which of the following requirements should you consider when selecting the type of processors, storage, and RAM to utilize in a virtualization environment?

Resource Requirements 4.2: Before you purchase a system to use as a virtualization environment, you should look at the minimum requirements for all operating systems you intend to host as guest VMs. This will ensure you can balance the performance needed and maintain a smooth-running environment without numerous conflicts or issues.

Your friend just gave you his old laptop. Whenever you turn on the laptop, though, a blank screen appears and asks you to enter an administrative password before the computer attempts to boot up. unfortunately your friend never gave you the password. which of the following actions could you take to resolve this issue and get past this password screen?

Remove the CMOS battery, wait a few minutes, reinsert the battery, then power on the laptop 5.2: This blank screen asking you for the administrative password appears to be a BIOS password required to be entered before the latop is allowed to boot from the hard disk. Your best option is to clear the CMOS forcibly to remove the BIOS password from a workstation or laptop. To clear the CMOS, you must remove the CMOS battery from your computer, wait a few minutes, reinsert the CMOS battery, and then attempt to power on the computer again. This will cause the information stored in the CMOS (for example, BIOS settings and passwords) to be erased and restored to its default configuration. Removing and reinserting the laptop's battery will not reset the BIOS password. Disconnecting and reconnecting the hard drive will not reset the BIOS password

You are troubleshooting a workstation for a customer. The workstation will not boot. When it is powered on, an error message of "OS not found" is displayed on the screen. What is MOST likely solution to fix this error?

Repair the GPT 5.3L The "OS not found" error at boot time is an indication that the MBR (Master Boot Record) or GPT (Globally Unique ID Partition Table) is corrupted or faulty. If this occurs, you should reboot into the Windows recovery mode and use the 'boot rec /fixboot' command to fix the GPT

Dion Security Group has established a Security Operations Center (SOC) that operates 24/7. They have several 65" plasma TVs at the fornt of the room that are used as computer displays to show open tickets. You turned off the televisions to clean the screens and notices that the company logo is stilll visible in each of the screens upper left corners. Which of the following should you do to correct this?

Replace the plasma TVs 5.4 The logo in the upper left corner has been burned into the display since it is a static image. This is common with plasma displays and TVs. To fix this, you need to replace the TVs. If you plan to have a lot of static content on a display, you should use an OLED or LED display instead. If burn-in was experienced on old CRT monitors, you could run a degausing program to erase the burn in. Unfortunately, this will not work for plasma LED or OLED displays tho.

circled area question

Reset Jumper 3.4: The area circled indicates the reset jumper of the motherboard. A reset jumper is a small plastic block with a metal connection inside. To reset the motherboard's BIOS, you would connect the jumper over this area to make an electrical connection between two pins. For the exam, it is important to identify diff parts of the motherboard by sight.

Which of the following virtualization concepts refers to a VM's ability to have memory allocated for its use?

Resource pooling 4.1: Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. Measured service is a term that IT professionals apply to cloud computing that references services where the pcloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning. Using a synchronization app can allow the files to be stored on both the laptop and the cloud service while maintaining the lastest verisions in both places. This allows a user to synchronize content between all of their own devices and share their cloud storage content with other users. Multiple users can simultaneously access the content to work collaboratively, or they can access it at different times. Each user's changes are typically market with a flag or color highlighting to indicate who made changes to what content. Virtual application streaming allows an application to be delivered to a workstation from the cloud.

which fiber optic connector is connector B

ST 3.1: this is an ST connector. A ST, SC, LC, or MTRJ connector is used to terminate a fiber optic cable. An ST, or straight tip, connector is a quick-release bayonet-style connector that has a long cylindrical connector. An SC, or subscriber connector, is a general-purpose push/pull style connector that has a square, snap-in connector that latches with a simple push-pull motion. SC cpmmectprs are widely used in single-mode fiber optic systems. An LC, or Lucent connector, is a small form factor connector that combine sthe transmit and receives cables into a single square, snap-in connector. The F-type connector is used with coaxial cables, not fiber optic cables

Tom is running some new Cat 5e cabling in an office building to connect a few offices. The ceiling is constructed as a drop ceiling with fluorescent lights and does not have any cable trays. Due to the proximity of the fluorescent lights to the cable being run, what type of Cat 5e cable should be run?

STP (Shielded Twisted Pair) 5.7: STP (Shielded Twisted Pair) is a type of cabling that can help prevent electrical interferences or cross-talk. A cross-talk is when electrical interference data passing through can cause CRC (Cyclic Redundancy Check) errors. A CRC is used to calculate the before and after checksum is made when transferring data. If electrical interference gets in the way, such as proximity to florescent light bulbs, it can cause data to be corrupted and produce an error. UTP (Unshielded Twisted Pair) is cheaper and easier to work with but is subject to interference. Coaxial and fiber are not types of CAT 5e cabling. Coaxial and fiber are not Cat 5E cable types and cannot be used for this network.

Which cloud computing concept is BEST described as focusing on the replacement of applications and programs on a customer's workstation with cloud-based resources?

SaaS 4.1: Software as a Service (SaaS) is ca loud computing service that enables a service provider to make applications available over the Internet to end-users. This can be calendar. scheduling, word processor, database, or other programs. Ex: GOogle Docs or Office 265. Infrastructure as a Service(IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center. Platform as a Service (PaaS) is a cloud computing service that enables consumers to rent fully configured systems that are set up for specific purposes. Desktop as a Service (DaaS) provides a full virtualized desktop environment from within a cloud-based service. This is also known as VDI (Virtualized Desktop Infrastructure) and is coming in large enterprise businesses focuesed on increasing their security and minimizing their operational expenses.

Which of the following devices have the most of the same functionality as a personal computer but can be operated with a single hand

Smartphone 1.4: a smartphone is a device with roughly the same functionality as a personal computer operated with a single hand. Most smartphones have a screen size between 4.5: and 5.7". Leading smartphones provide high-resolution screens. Smartphones have fast multicore CPUs, anywhere between 2 and 6 GB system memory, and 16 GB+ flash memory storage. They come with premium font and back digital cameras, input sensors like accelerometers, and Global Positioning System (GPS) chips. They can establish network links using Wi-Fi and a cellular data plan. A high-end smartwatch (for example, an Apple Watch) will allow the user to see their notifications, chat activity, and even make phone calls. A mid-range or low-end smartwatch will give you the ability to read notifications but may be unable to make phone cakks. A smartwatch is not a replacement for a laptop or desktop but a high-end smartphone can be.

Which of the following is used to capture the logs from different devices across the network to correlate different events across multiple servers and clients?

Syslog server 2.4: A syslog server is used to capture logs from different devices. It allows for the correlation of logs to simplify log review and an analyst's ability to respond to alerts. For example. Syslog messages can be generated by Cisco routers and switches, servers and workstations, and collected in a central database for viewing and analysis. A proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. The Domain Name System (DNS) uses port 53 and is a hierarchial and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. The Dynamic Host Configuration Protocol (DHCP) uses port 67 and is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client-server architecture.

You are attempting to troubleshoot a computer for a user. When you attempt to turn on the computer by pressing the power button the computer turns on, and the fan spins normally. There is no output displayed on the screen from the PCIe x16 video card. You turn off the computer, remove the processor and the memory, and attempt to power on the computer again. During the boot-up sequence, you do not hear any POST beep codes, but the fans still spin normally. Which of the folllowing is the *MOST likely* cause if his issue?

The power supply wattage is too low for the components in the computer 5.2: If your computer won't boot, but dans spin continuously, it indicates a problem with the power supply, the motherboard, or overheating could be occuring. When the power supply to your computer fails, it won't start or power up, but the fan spins (as desc in the question). On of the reasons your computer won't boot but the fans spin could be bad processor or memory chip. To isolate this as a reason, you should remove the processor and memory and then attempt to boot up the computer and listen for a POST beep code. in this case, we could eliminate the motherboard, processor, and memory as the issue since no POST beep codes were heard. Based on the symptoms and actions performed, it appears that the power supply is not providing enough wattage to all the components of the computer, which is why the fans are spinning (they use low wattage) while the rest of the system fails to boot.

which fiber optic connector is connector C?

This is an LC connector. An LC, or Lucent connector, is a small form factor connector that combines the transmit and receive cables into a single square snap in connector. F types are for coaxial cables not fiber optic. An SC, is a push/pull style connector the latches with a simple push pull motion that has a square snap in connector, called a subscriber connector. An ST, or straight tip, connector is a quick-release bayonet-style conector that has a long cylindrical connector.

which indicates port labled J?

USB 2.0 3.1: These ports are the USB 2.0 connections. This is indicated by their black color (instead of being red or blue for USB 3.0 ports). Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at a slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (Superspeed+) rates and can deliver up to 4.5 W of power. For the exam, it is important to identify the diff parts of a motherport's rear port cluster by sight.

You are connecting a laptop to a brand new digital high definition TV. Unfortunately, the laptop is a little outdated and only has an analog display output. Which of the following adapters could you use to convert the signal from analog to digital for use with the new television?

VGA to DVI-D 3.1: Since this quesiton asks you to select the converter that can convert a signal from analog to digital, you need to consider which of the connectors are analog and digital. S-Video, RCA, and VGA are all analog. HDMI and DVI-D are both digital. Therefore, the correct answer is VGA (Analog) to DVI-D (Digital). HDMI to VGS would by digital to analog. S-Video to RCA would be analog to analog. DVI-D to HDMI would be digital to digital.

Which of the following is the MOST dangerous type of threat when using virtualization?

VM escape 4.2: VM escape refers to malware running on a guest OS jumping to another guest or the host. As with any other software type, it is vital to keep the hypervisor code up-to-date with patches for critical vulnerabilities. VM escape is the biggest threat to virtualized systems. A virtual network interface card (vNIC) represents the configuration of a VM connected to a network. A VM can be configured to have multiple vNICs. A rogue VM is one that has been installed without authorization. VM sprawl is the uncontrolled deployment of more and more VMs.

You and your friends are hanging out in a bar downtown and notice that the entire area around the bar has a great wireless network called "Downtown Metro". This wireless network was built by the city and currently covers about 5 blocks of the downtown area. What type of network best classifies this wireless network?

WAN 2.7: A metropolitan area network (MAN) is a computer network that interconnects users with computer resources in a geographic region of the size of a metropolitan or city area. This usually works by providing municipal broadband via Wi-Fi to large parts or all of a municipal area. A wireless mesh network (WMN) is a wireless network topology where all nodes including client stations, can provide forwarding and path discovery to improve coverage and throughput compared to using just fixed access points and extenders. The typical deployment design uses hundreds of wireless access points deployed outdoors, often on poles. A local area network (LAN) is a network where all the nodes or hosts participating network are directly connected with cables or short range wireless media. A WAN spreads multiple geographic locations e.g. the internet

Dion Training has recently purchased a new wireless printer and has asked you to configure it in their office. You have installed the necessary printer drivers on your workstation and have plugged the printer into the power outlet. You just configured the printer to connect to the guest wireless network. Next, you try to print a test page, but nothing prints out. Which of the following is the most likely cause for the printer not printing the test page?

You connected the printer to the guest wireless network instead of the corporate wireless network 5.6: Most corporate wireless networks are configured as two separate networks: one for the corporate wireless network traffic and another for any guests that might connect to the wireless network while visiting your offices. These two wireless networks are isolated from each other, so if you connect the printer tot the guest wireless network then the workstations will be unable to reach the printer and print out any documents or test pages.

Which of the following is an open-source wireless communication protocol operating in the 2.4 GHz frequency band and is primarily used for home automation?

Zigbee 2.4: Zigbee is an open-source wiresless communication protocol used for home automation. Zigbee is open-source, unlike Z-WAve which is proprietary. Zigbee uses the 2.4 GHz frequency band. This higher frequency allows more data bandwidth at the expense of range than Z-Wave and the greater risk of interference from other 2.4 GHz radio communications. Zigbee supports more overall devices within a single network (65,000 compared to 232 for Z-Wave), and there is no hop limit for communication between devices. Z-Wave is a low-power wireless communications protocol used primarily for home automation. Z-Wave uses radio frequencies in the 800 MHz and 900 MHz frequency ranges. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringin them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another.

Which of the following statements about an eSATA connection is correct?

eSATA is used to add additional external storage devices 3.1: The External Serial Advanced Technology Attachment (or eSATA) is used for connecting external drives to provide additional storage. When connecting a cable to an eSATA port, you must use a shielded cable. SATA is an internal connector for adding storage, while eSATA is reserved for external use. USB 3.0 can operate at speeds up to 5 Gbps, while eSATA can operate speeds of up to 6 Gbps.

Which synchronization method doesn't work with Android devices?

iTunes 1.4: iTunes is on apple devices. android devices use google can use google workspace with gmail to sync emails and contacts. android devices can also use office 365 to sync emails, contacts, and other files if you are a microsoft subscriber. android devices can use Flickr to sync phtoos.

Jason has just returned to his office after vacation and is attempting to access diontraining.com. he receives an error that he cannot connect to the website. he then tries to connect to the company's local intranet server, which he can connect to without issues. NExt, he pings the IP address for diontraining.com and gets a successful connection. Finally, he tries to ping diontraining.com by its domain name, and then he receives an error. which of the following commands should jason enter next to try and resolve this issue?

ipconfig /flushdns 5.7: Whenever you have na issue where you can ping the server's IP but you cannot access it by its domain name it has something to do with DNS. Being able to troubleshoot issues with internext connections is an important part of being an IT technician or administrator. The ipconfig /flushdns command provides you with a means to flush and reset the contents of the DNS client resolver cache. During DNS troubleshooting, if necessary, you can use this procedure to discard negative cache entries from the cache, as wekk as any other dynamically added entries. Resetting the cache does not eliminate entries that are preloaded from the local hosts file. to eliminate those entries from the cache, remove them from the cache, remove them from the hosts.ini file instead.

wifi slow what happened

the network card droverswere updated last night


Related study sets

Communication and Net Security 2nd 40

View Set

Socialism: core ideas and principles

View Set

[LS 7B] week 8- population ecology

View Set

HESI 4 REVIEW - CRITICAL CARE - MCA 3

View Set

Dictionary/Thesaurus Illuminate Quizizz/Quizlet

View Set