Metrix Learning CompTIA A+ 220-1101 Review Questions

Ace your homework & exams now with Quizwiz!

A lightning cable uses which process to determine that it is being used with a genuine Apple product? A. Device authentication B. Pairing C. User sign-in D. Serial number identification E. MFI certification

A. Device authentication

Which feature of a multifunction device can allow an administrator to determine the details of a particular print job, such as the identity of the user who submitted the job, and the date and time? A. Print job logs B. Secured print jobs C. Print reports D. Advanced user authentication E. Basic user authentication

A. Print job logs

Which device setting determines the overall quality of a print job? A. Collate B. Dots per inch C. Duplex D. Greyscale E. Orientation

B. Dots per inch

What is the maximum wattage that can be supplied to a device using Power over Ethernet? A. 4 B. 100 C. 60 D. 7 E. 30

B. 100

Which type of USB connector was most commonly used on the device end of a printer? A. Mini B B. Micro B C. Type B D. Mini A E. Micro A F. Type A

C. Type B

Which printer cleaning and maintenance tasks should be performed most often to ensure optimal printing results? A. Print head alignment B. Cleaning print heads C. Resetting device to factory default D. Visual calibration E. Monitor calibration

A & B. Print head alignment and cleaning

An inverter provides which functionality for an LCD screen? A. Converts power for cold cathode fluorescent light (CCFL) B. Improves image quality C. Backlighting D. Reduces power usage E. Converts power for light emitting diodes (LED)

A. Converts power for a cold cathode fluorescent light (CCFL)

Which platform does not natively support the use of Syslog server? A. Microsoft B. Unix C. Linux D. Mac OS

A. Microsoft

Which types of resources would be at the level of software as a service? (Choose more than one.) A. Development studios B. Human resources management applications C. Customer relationship management applications D. Virtual networks E. Virtual appliances

B & C. Human resources management applications and customer relationship management applications

A knowledge base is typically constructed from which general components? (Choose more than one.) A. Plans B. Findings C. Escalations D. Actions E. Outcomes

B, D & E. Findings, actions and outcomes

What is the overall bus width for a system that uses single channel memory? A. 32 bits B. 64 bits C. 128 bits D. 16 bits E. 192 bits

B. 64 bits

Which diagnostic method can provide a sequence of beeps to help resolve a problem? A. Failed capacitors B. Overheating C. BIOS D. POST E. BSOD

D. POST

Othe than changing ink cartridges, which component will most likely require servicing or maintenance on an inkjet printer? A. Stepper motor B. Belt C. Stabilizer bar D. Print heads E. Imaging drum

D. Print heads

Which type of signal is not supported by a Thunderbolt cable? A. Network B. Data C. Audio D. Power E. Video

A. Network

Which component or feature refers to the type of paper typically required for an impact printer? A. Ribbon B. Thermal C. Dot-matix D. Tractor feed E. Photographic

D. Tractor feed

What is the typical transmission range of devices using NFC? A. A few feet B. 400 meters C. 30 feet D. A few kilometers E. A few inches

E. A few inches

Which print quality issue is indicated by lines appearing on the page? A. Color mismatch B. Blurring C. Outdated driver D. Smearing E. Banding

E. Banding

Which type of VDI model is being used if a user always receives the same virtual desktop when they establish their connection? A. Shared B. Pooled C. Stateless D. Non-persistent E. Dedicated

E. Dedicated

Which type of CPU socket uses flat metal contacts and a removable chip? A. ZIF B. LGA C. PGA D. BGA

B. LGA

What is the primary benefit of using shielding in twisted pair cabling? A. Increased bandwidth B. Less susceptible to interference C. Less prone to damage D. Extended cable length E. Decreased cost

B. Less susceptible to interference

Which connectivity method would be most suitable for a wireless printer that is being connected to an existing networked environment? A. 802.11 ad-hoc mode B. Ethernet C. 802.11 infrastructure mode D. Bluetooth E. USB

C. 802.11 infrastructure mode

Which type of DNS record can be used to associate more than one host name to a single IP address? A. NS B. A C. CNAME D. MX E. AAAA

C. CNAME

Which type of wireless networking device creates a new SSID in addition to the original? A. Repeater B. Router C. Extender D. Access point

C. Extender

Which types of server roles are often combined on the same server? A. Web and file B. Mail and file C. File and print D. Web and mail E. Mail and print

C. File and print

Which component of a computer will typically require the most power? A. Fan B. Optical drive C. Graphics card D. RAM E. Hard drive

C. Graphics card

For which purpose would the implementation of virtual machines typically not be used? A. Testing new software B. System backup C. Running multiple operating systems D. Data backup E. Business continuity

D. Data backup

Implementing an action plan to resolve a problem should ideally be performed at which time? A. At night B. Immediately C. After approval D. During maintenance windows E. The next day

D. During maintenance windows

Which latency value indicates the amount of time it takes before a server receives a request from a client device? A. QoS B. RTT C. Propogation D. TTFB E. Congestion

D. TTFB

Which component or feature of a CPU will allow an operating system to perceive virtual or logical processors? A. Hyper-threading B. Multi core C. Dual core D. Over-clocking E. Single core

A. Hyper-threading

Which type of DNS record is used to specify which email server will accept incoming messages? A. NS B. MX C. AAAA D. A E. TXT

B. MX

Which RAID configuration is typically implemented with 2, and only 2 disks? A. 2 B. 5 C. 1+0 (10) D. 0 E. 1

E. 1

Which type of motherboard connector supported throughput speeds of up to 64 GBps? A. PCI B. PCIe x8 C. PCIe x4 D. PCI-X E. PCIe x16

E. PCIe x16

Which type of cloud model would be most appropriate for an enterprise-level organization with a large datacenter, considering expansion by implementing additional smaller branch offices? A. Public B. Hybrid C. Private D. Community

B. Hybrid

Which component of virtualization separates the virtual machines from the underlying hardware of the host system? A. Host operating system B. Hypervisor C. Guest operating system D. Virtualization software E. Host server

B. Hypervisor

The Printer Control Language format is generally not supported by which operating system? A. Linux B. Mac C. Microsoft D. Unix

B. Mac

Redundant power supplies would typically be found in which types of systems? (Choose more than one.) A. Mobile devices B. Desktops C. Blade servers D. Laptops E. Networking equipment

C & E. Blade servers and networking equipment

Which steps of resolving a problem would be external research? (Choose more than one.) A. Determining possible links B. Considering the most obvious cause C. Consulting industry or academic literature D. Considering other possible causes E. Consulting a vendor knowledge base

C & E. Consulting industry literature or academic literature and consulting a vendor knowledge base

Which action or operation would be most effective to ensure that data is not accessed on a device that was lost or stolen? A. Device configuration B. Password enforcement C. Remote wipe D. Allow/block list E. Device tracking

C. Remote wipe

Which utility can be used to help locate or troubleshoot the cause of an IP conflict in a networked environment? A. Ping B. DNS C. DHCP D. SSID E. Tracert

A. Ping

Which issues may cause a web page only to produce a print job in the incorrect orientation? (Choose more than one.) A. Application default orientation setting B. Printer default orientation setting C. Large page elements D. Incorrect driver E. Zoom or scale settings

C & E. Large page elements and zoom or scale settings

Which processes are most likely to be performed by multifunction devices? (Choose more than one option.) A. Stapling B. Folding C. Printing D. Scanning E. Copying

C, D & E. Printing, scanning and copying

Which component of a laser printer will most commonly require replacement? A. Fusing rollers B. Laser scanning unit C. Toner cartridge D. Corona wire E. Imaging drum

C. Toner cartridge

Which type of resources would be at the level of Infrastructure as a Service? A. Virtual networks B. Software application C. Web sites D. Virtual appliances E. Mobile apps F. Virtual machines

A, D & F. Virtual networks, virtual appliances, and virtual machines

Which common printer issues would be considered to be mechanical problems? A. Incorrect driver B. Paper tray C. Paper jam D. Cable issues E. Power adapter failure

B & C. Paper tray and paper jam

Which type of internet connection currently supports the fastest speeds and most combined services? A. Cellular B. Cable C. Satellite D. Fiber Optic E. DSL

D. Fiber Optic

Which printing component is most commonly responsible for finishing issues such as inaccurate folding, tearing, curling or improper trimming? A. Incorrect tray settings B. Too many pages loaded C. Incorrect binding edge specified D. Incorrect paper type E. Too many pages accumulated in an exit tray

D. Incorrect paper type

Which issue or situation would not generate a printer error code? A. No power B. Printer not closed C. Paper jam D. Fan error E. Paper tray empty

A. No power

An image is produced by a thermal printer in which manner? A. Ink is sprayed on the paper B. Filaments are applied to the paper C. Toner is fused to the paper D. A print head strikes a ribbon E. Heat sensitive pigments are embedded in the paper

E. Heat sensitive pigments are embedded in the paper

If a user indicates that they are not able to access a resource, but you as a tech support member are able to access the same resource, in which state should you consider the issue? A. Tested B. Resolved C. Verified D. Unresolved E. Escalated

D. Unresolved

Place the 6 steps of the troubleshooting methodology in the correct sequence. A. Test theory to determine cause B. Document findings C. Verify system functionality D. Establish a plan of action E. Identify the problem F. Establish theory of probable cause

1. (E) Identify the problem 2. (F) Establish theory of probable cause 3. (A) Test theory to determine cause 4. (D) Establish a plan of action 5. (C) Verify system functionality 6. (B) Document findings

What is the minimum category of twisted pair cabling required to support 1 Gbps bandwidth? A. 5a B. 6 C. 5e D. 6a E. 5

C. 5e

Which type of display issue can temporarily leave traces of an image behind after the image has changed? A. Artifact B. Burn-in C. Corrupted color D. Faded light E. Distortion

A. Artifact

Which type of communication requires that devices be paired with each other before they can communicate? A. Public hotspot B. Bluetooth C. Near-field communications (NFC) D. Personal hotspot E. Mobile hotspot

B. Bluetooth

Which components or configuration options need to be in place to enable the scan to email feature of a multifunction device? (Choose more than one.) A. An SMTP server B. SMB to be enabled between the device and the server C. Port 25 to be enabled between the device and the server D. A shared folder E. A cloud services subscription

A & C. An SMTP server and port 25 to be enabled between the device and the server

A modular power supply offers which benefits to a computer? (Choose more than one.) A. Improved airflow B. Less expensive C. Reduced cable clutter D. More connectors E. Hard-wired connectors

A & C. Improved airflow and reduced cable clutter

Which setting for a system running Windows may allow a legacy printer to have an extended lifespan? A. Reinstalling the original driver after updating Windows B. Compatibility mode C. Using the driver from the OEM website D. Updating Windows E. Updating the driver

B. Compatibility mode

If every user connected to your network is reporting very slow speeds and poor connectivity, which step should you attempt first to resolve the problem? A. Reboot all client systems B. Update the router firmware C. Run a speed test D. Replace the router E. Reboot the router

E. Reboot the router

Which service should be restarted on a Windows computer if you suspect the print queue has stalled? A. File and print services B. The queue service C. The printer service D. The log service E. The spooler service

E. The spooler service

What is the most likely outcome when a system is booted if the voltage switch on the power supply is set to 220 volts, but the incoming power is only 110 volts? A. The system will overheat B. The system will boot, but then shut down C. The system will operate normally D. The system will operate, but slowly E. The system will not boot

E. The system will not boot

Which statement correctly aligns with how virtual machine resource requirements should be determined? A. Virtual machines require fewer resources than physical systems B. Allocate only what the physical host system requires, plus enough to run the virtualization software C. Virtual machines require minimal resources, allocate only what the physical host system requires D. Virtual machines require more resources than physical systems E. Virtual machines require the same resources as physical systems

E. Virtual machines require the same resources as physical systems

Which value represents the threshold for an acceptable level of network jitter? A. Below 40 ms B. Below 10 ms C. Below 50 ms D. Below 20 ms E. Below 30 ms

E. Below 30 ms

At which voltage does DDR5 memory operate? A. 1.8V B. 1.2V C. 1.1V D. 2.0V E. 2.5V

C. 1.1V

At which voltage do system components such as chipset, DIMMs and expansion cards operate? A. 15 B. 5 C. 2 D. 3.3 E. 12

D. 3.3

After testing a theory and evaluating the results, the issue is not resolved, what is the next course of action? A. Develop a new theory B. Verify your results C. Develop a plan of action D. Escalate the issue E. Submit your plan for approval

A. Develop a new theory

Which scenarios may increase the frequency of paper jams? (Choose more than one.) A. Incorrect paper size B. Incorrect driver C. Too many jobs in the print queue D. Damp paper E. Misaligned print heads

A & D. Incorrect paper size and damp paper

Which statement correctly describes the characteristics of rapid elasticity? A. A resource that can dynamically and automatically adjust its resource configuration based on demand B. An administrator deprovisioning additional resources to a system or service based on usage history C. A resource that can send alerts to an administrator when resources are low D. A resource that can survive the loss of any given component E. An administrator provisioning additional resources to a system or service based on usage history

A. A resource that can dynamically and automatically adjust it's resource configuration based on demand

Which disk utility or method can be used to restore or repair critical boot files on a storage drive? A. Bootrec B. CHKDSK C. FOMAT D. SMART E. DISKPART

A. Bootrec

If your wireless network is experiencing interference from another wireless in close proximity, which option is most likely to reduce the level of interference? A. Changing the transmission channel or frequency of your router B. Moving your wireless router farther from the other network C. Changing the security settings of your router D. Moving your wireless router closer to the other network E. Placing barriers between your networks

A. Changing the transmission channel or frequency of your router

Automatic document feeders can be used to enhance the performance of which processes other than feeding in multiple sheets of paper to a multifunction device? (Choose more than one.) A.Scanning to the cloud B. Rapid collection of information C. Scanning to a shared folder D. Rapidly digitizing information E. Scanning to email

B & D. Rapid collection of information and rapidly digitizing information

Which statements correctly characterize the 20-pin motherboard power adapter? (Choose more than one.) A. It is the replacement for the 24-pin connector B. It is the replacement for the P8 and P9 connectors C. It provides more power than the 24-pin connector D. It had a detachable 4-pin section E. It provides less power than the 24-pin connector

B & E. It is the replacement for the P8 and P9 connectors and provides less power than the 24-pin connector

The Platform as a Service cloud computing model would be best suited to which type of environment? A. A team of very mobile users who need centralized access to customer management applications B. A development environment with minimal infrastructure in place C. A start-up sales-based environment with no infrastructure in place D. A mid-sized environment looking to add more servers without purchasing new hardware E. A large datacenter with enterprize level infrastructure already in place

B. A development environment with minimal infrastructure in place

Other than replacing the filament in a 3-D printer, which maintenance task will likely be performed most often? A. Leveling the print bed B. Cleaning the nozzles C. Adjusting belt tension D. Checking guides E. Changing the cooling fans

B. Cleaning the nozzles

Which component or characteristic of a service or a solution is addressed and/or removed when a high-availability solution is implemented? A. Failure detection B. Single point of failure C. Recovery D. Resiliency E. Failover

B. Single point of failure

Which statements correctly apply to a cloud-based resource that is shared externally? A. The resource will only reside on the external user's premesis B. The resource can be accessed by internal or external users C. The resource will only reside on the external user devices D. The resource resides within the cloud subscription of the sharing organization E. The resource can be accessed only by external users

B. The resource can be accessed by internal or external users D. The resource resides within the cloud subscription of the sharing organization

Security consideration for a virtualized environment should be approached from which perspective? A. Treat the host system as the only security concern B. Treat each virtual machine, and the host system as independent security concerns C. Treat each virtual machine as an independent security concern D. Treat all virtual machines as a single security concern E. Treat the host system and all virtual machines as a single security concern

B. Treat each virtual machine, and the host system as independent security concerns

Which type of test page will provide information such as the driver version and date being used? A. A page produced directly from the device B. An alignment page from the device C. A page from within the printer interface of the operating system D. A document from within a software application such as a word processor

C. A page from within the printer interface of the operating system

What is the most likely cause of a mobile device losing connectivity to other devices and/or networks? A. Battery issue B. Unresponsive touchscreen C. Accidental activation of airplane mode D. Too many running apps E. Overheating

C. Accidental activation of airplane mode

Which type of report can provide a breakdown of both usage and billing when using measured and metered services? A. Licensing B. Application usage C. Chargeback and showback D. Server resources E. Storage resources

C. Chargeback and showback

The 80 PLUS certification of a power supply is a measure of which characteristic? A. Output voltage B. Wattage C. Efficiency D. Amperage E. Input voltage

C. Efficiency

A print server component allows or enables a multifunction device to perform which tasks? A. Print local jobs for the print server only B. It allows users to connect to the device wirelessly C. It allows for multiple jobs from multiple users to be submitted and managed D. It enables the multiple functions of print, scan, copy and fax E. It allows for the device to connect to the network using an IP address

C. It allows for multiple jobs from multiple users to be submitted and managed

If a DDR3 memory module is labeled "DDR3-1600", to which value does the 1600 refer? A. Version B. Clock speed C. Million transfers per second (MT/s) D. Physical size E. Bandwidth(

C. Million transfers per second (MT/s)

Which statements correctly identify reasons why the image on your display monitor may not match the image of a print job? (Choose more than one.) A. Monitors use the CMYK color palette, while printers use the RGB color palette B. Monitors don't truly produce white as a color C. Printers don't truly produce white as a color D. Monitors use the RGB color palette, while printers use the CMYK color palette E. Printers don't truly produce black as a color F. Monitors don't truly produce black as a color

C. Printers don't truly produce white as a color D. Monitors use the RGB color palette, while printers use the CMYK color palette F. Monitors don't truly produce black as a color

Which feature, or service can be used to allocate more network bandwidth to Voice over IP applications? A. A faster internet connection B. Jitter buffer C. Quality of service (QoS) D. Packet loss E. Latency

C. Quality of Service (QoS)

After identifying all causes of a problem, which step should you follow? A. Escalate the problem B. Consider infrastructure changes C. Rank probable causes D. Break the problem down into smaller steps E. Consider environmental changes

C. Rank probable causes

A firmware update might be able to address or correct issues with which components of the printing process? A. The driver B. The operating system of the host computer C. The printing device D. The printer software applications supplied by the vendor E. The software applications being used to submit print jobs

C. The printing device

During your investigation of a device that has lost its connectivity to your wireless network, you discover the adapter has been assigned an IP address of 169.254.50.80. What does this indicate about the status of your network or the device? A. The signal strength is too low B. The device and the access point are set to use different frequencies C. There was a problem with the DHCP server D. The equipment from the service provider has failed E. The adapter on the device is being managed by conflicting applications

C. There is a problem with the DHCP server

What level of frequency and duration indicates that port flapping is happening on a network device? A. Three times a second, for at least one minute B. Three times an hour C. Three times a minute, for at least one hour D. Three times a second, for at least ten seconds E. Three times a day

D. Three times a second, for at least ten seconds

Which type, or specification of cabling must be used if the cable is being run between the ceiling of one level and the floor of another? A. Cat 5 B. Cat 5e C. Coaxial D. Cat 6 E. Plenum

E. Plenum

Which types of video cables and connectors are also capable of carrying audio signals? (Choose more than one.) A. DisplayPort B. DVI-A C. DVI-I D. VGA E. HDMI

A & E. DisplayPort and HDMI

Which 802.11 standards used the 5GHz band to transmit and receive? (Choose more than one.) A. n B. ac C. g D. a E. b

B & D. ac and a

Which type of expansion cards would likely be found in professional situations where the integrated components would not be sufficient? (Choose more than one.) A. Network interface card B. Sound card C. Video card D. Modem E. USB expansion

B and C. Sound card and video card

What is the overall bus width for a system that uses triple channel memory? A. 128 bits B. 192 bits C. 32 bits D. 64 bits E. 256 bits

B. 192 bits

Routers operate at which level of the OSI model? A. 5 - Session B. 3 - Network C. 4 - Transport D. 1 - Physical E. 2 - Data link

B. 3 - Network

For a GPS device to reliably and accurately report its location, how many satellite signals must be acquired? A. 2 B. 4 C. 1 D. 5 E. 3

B. 4

Which statement correctly applies to a trusted platform module (TPM)? A. An external device used to provide encryption and security B. An integrated component used to provide encryption and security C. A method of protecting the boot integrity of a system D. A method of being able to track a device if stolen E. A method of ensuring that unauthorized users do not make changes to BIOS/UEFI configuration

B. An integrated component used to provide encryption and security

An integrated Wi-Fi antenna in a laptop is typically implemented in which manner? A. Built-in to the body B. Built-in to the display C. Mini PCI Express D. USB adapter E. Mini PCI

B. Built-in to the display

Which statement correctly applies to a stateful firewall? A. A firewall capable of detecting and preventing intrusions B. A firewall that uses pre-configured rules only C. A firewall capable of inspecting packets to intelligently determine context D. A hardware device that helps to secure a network E. A software application that helps to secure individual computers

C. A firewall capable of inspecting packets to intelligently determine context

A USB Standard-B Plug would most commonly be found plugged into which device? A. Mobile phone B. Digital camera C. Printer D. Laptop E. External storage

C. Printer

What is the standard number of wire pairs supported in a single block or bank of a 110 punchdown block? A. 16 B. 8 C. 100 D. 110 E. 25

E. 25

What is the maximum bandwidth for the latest edition of DDR memory? A. 12,800 MBps B. 12,000 Mbps C. 6400 MBps D. 25,600 Mbps E. 25,600 MBps

E. 25,600 MBps

What is the maximum storage capacity for a typical compact disc (CD)? A. 144 megabytes B. 17 gigabytes C. 25 gigabytes D. 4.7 gigabytes E. 650 - 700 megabytes

E. 650 - 700 megabytes

Which channels are recommended to use for a wireless device using the 2.4GHz transmission band? A. 1, 6 and 11 B. 2, 7 and 12 C. 36 D. 100 E. 40

A. 1, 6 and 11

Over which port does the hyper-text transfer protocol (HTTP) operate? A. 80 B. 21 C. 53 D. 22 E. 25

A. 80

Which mobile device synchronization method is proprietary to Microsoft? A. ActiveSync B. CarPlay C. Cloud sync D. Desktop synchronization E. Bluetooth

A. ActiveSync

Which statements are generally applicable to Intel processors when compared to AMD processors? (Choose more than one.) A. Can result in a higher operating cost B. More compatible with other components C. Produce less heat D. Comsume less power E. Usually less expensive

A. Can result in higher operating costs B. More compatible with other components C. Produce less heat

An RJ-11 connector would likely be found in use with which devices or services? (Choose more than one.) A. DSL internet B. Ethernet networks C. Modems D. Fiber optic networks E. Cable internet F. Phones

A. DSL internet C. Modems F. Phones

If a byte is written to an ECC memory module that has four-bit values set to 1, and four set to 0, which type of parity information will be used? A. Even parity B. Odd parity C. No parity D. Split parity

A. Even parity

Which performance indicator of a webcam refers to how rapidly it can capture images? A. 1080p B. Megapixels C. Resolution D. Frame rate E. Shutter speed

A. Frame rate

Which motherboard form factor was offered in four different sizes of Mini, Nano, Pico and Mobile? A. ITX B. ATX C. Micro ATX D. Mini ATX

A. ITX

Which type of device would generally not be regarded as an IoT device? A. Laptop computer B. Refridgerator C. Television D. Light switch E. Thermostat

A. Laptop computer

Which of the following characteristics would not be attributed to a solid-state drive? A. Less expensive B. Less noise C. Faster boot times D. Smaller size E. Faster file transfers

A. Less expensive

Which type of connector may have been more expensive to implement on a fiber optic cable itself, but could result in cost savings due to its more efficient size? A. Lucent connector B. Straight tip C. Square connector D. Subscriber connector

A. Lucent connector

Which action or operation is not performed by an optical network terminal? A. Modulating or demodulating signals B. Providing internet access to client systems C. Terminating incoming cable connections D. Providing wireless connections to client systems E. Providing ethernet connections to client systems

A. Modulating or demodulating signals

A 20-pin Molex connector would be used to supply power to which component of a desktop computer? A. Motherboard B. Optical drive C. Graphics card D. CPU E. Hard drive

A. Motherboard

Which component of the AAA framework would you be using if your organization required users to enter a password and swipe a fingureprint when logging in? A. Multi-factor authentication B. Authentication C. Accounting D. Authorization

A. Multi-factor authentication

Which system component or process represents a diagnostic routine that is performed each time a system boots up? A. POST B. BIOS C. UEFI D. TPM E. CMOS

A. POST

When troubleshooting a lost Bluetooth connection between a smartphone and a portable speaker, a user reports that the connection was working, but when they went to another room in the house with their smartphone the connection was lost. What is the most likely cause of the dropped connection? A. The user roamed too far from the speaker B. Interference C. The speaker lost power D. The user accidentally chose the "Forget this device" option E. The devices became unpaired

A. The user roamed too far from the speaker

What would be a primary consideration if you are using a USB to ethernet adapter on a network that provides 1 Gbps bandwidth? A. The version of the USB interface B. The connector type for the ethernet cable C. The power rating of the USB interface D. If the adapter uses a shielded cable E. The USB connector type

A. The version of the USB interface

Which statements correctly differentiate the 2.4GHz transmission band from the 5GHz band? A. 5GHz transmission carry farther than 2.4 GHz B. 2.4GHz transmission can penetrate through obstacles more easily than 5GHz C. 5GHz transmission can penetrate through obstacles more easily than 2.4GHz D. 2.4GHz transmission carry farther than 5GHz E. 5GHz transmissions are more susceptible to interference F. 2.4GHz transmissions are more susceptible to interference

B, D & F. 2.4GHz transmissions can carry farther and penetrate through obstacles more easily than 5GHz, but are also more susceptible to interference.

Which steps of replacing a hard disk drive, or a solid-state drive should be performed during the preparation stage? (Choose more than one) A. Use an anti-static wristband B. Create a recovery disk C. Back up data D. Remove the old drive E. Power down the computer

B. Create a recovery disk C. Back up data

Which statement most accurately defines the configuration, or the features of a virtual local area network? A. A means to resolve IP addresses to names B. Network divisions configured by using software on switches C. A method of automatically distributing IP addresses to client systems D. A private connection between two points using the internet as a means to connect E. A means to connect an internal network to an external network such as the internet

B. Network divisions configured by using software on switches

Which component, or type of mobile display would more commonly be found in devices such as smartphones and tablets, as opposed to laptop computers? A. LCD display B. OLED display C. Webcam D. Antenna E. Microphone

B. OLED display

Which type of heat sink would generally provide the most effective level of cooling? A. Passive heat sink B. Refrigerated C. Liquid cooled D. Active heat sink E. Air conditioning

B. Refrigerated

Which type of wiring standard completely reverses the pin configuration from one end of the cable to the other, so that wires 1 to 8 connect respectively to pins 8 to 1? A. Straight-through B. Rollover C. Crossover D. T-568A E. T-568B

B. Rollover

Which type of hard drive cable was not commonly used in desktop systems, but was often used in network servers? A. IDE B. SCSI C. EIDE D. SATA1 E. SATA2

B. SCSI

Which type of fiber optic cabling is best suited to very long runs with very few bends or turns? A. Single mode - graded index B. Single mode - step index C. Multi-mode - graded index D. Multi-mode - step index

B. Single mode - step index

Which type of VPN would be best suited when two branch offices with many users need to maintain a persistent connection to each other? A. Site-to-host B. Site-to-site C. Host-to-site D. Host-to-host

B. Site-to-site

Which characteristic about a wireless signal would you be unable to determine by using a WiFi analyzer? A. The frequency being used B. The password or passphrase C. The network name D. The channels being used E. The effective coverage area

B. The password or passphrase

Which characteristics of a port replicator would typically be considered as advantageous as compared to a docking station? (Choose more than one) A. They are proprietary devices and will generally perform better B. They are lighter and more portable C. They are more universal D. They improve video and audio quality E. They can convert connection types

B. They are lighter and more portable C. They are more universal E. They can convert connection types

If your system supports quad channel memory, and you have six physical memory modules, which is the optimal channel configuration that should be used? A. Quad channel B. Triple channel C. Single channel D. Double channel E. Not supported

B. Triple channel

Which type of USB connector does not differentiate between the computer end and the device end? A. Mini B. Type C C. Micro D. Type B E. Type A

B. Type C

At which layers of the OSI model do network interface cards operate? A. Network B. Application C. Data link D. Transport E. Physical

C & E. Data link and physical

Which statements are correct about TCP vs. UDP? (Choose more than one.) A. UDP uses a three-way handshake and acknowledgments B. TCP is fast and reliable, UDP is slow and unreliable C. TCP uses a three-way handshake and acknowledgments D. TCP is slower, but more reliable E. UDP is faster, but less reliable

C, D & E. TCP uses a three-way handshake and acknowledgments and is slower, but more reliable. UDP is faster, but less reliable.

Which statement best describes the functionality of a patch panel? A. A device used to connect networks together B. A device used to connect individual computers together C. A device used to terminate network cables in a central location D. A device that provides network security E. A device used to extend the range of a wireless network

C. A device used to terminate network cables in a central location

Which type of LCD technology is generally considered to have the highest overall picture quality? A. Vertical alignment (VA) B. Transistor translator logic (TTL) C. In-plane switching (IPS) D. Super plane to line switching (PLS) E. Twisted nematic (TN)

C. In-plane switching (IPS)

Long-range fixed wireless networking is commonly implemented in which configurations? A. Satellite-to-ground B. Host-to-site C. Point-to-point D. Host-to-host E. Ground-to-satellite

C. Point-to-point

Which factors would be advantageous for migrating from a hard disk drive to a solid-state drive? (Choose more than one) A. Solid-state drives are less expensive B. Solid-state drives offer higher capacity C. Solid-state drives produce less noise D. Solid-state drives perform better E. Solid-state drives require more power

C. Solid-state drives produce less noise D. Solid-state drives perform better

Which device or process allows a laptop to use the cellular connection of a smartphone to gain access to the internet? A. 5G B. SIM C. Tethering D. Airplane mode E. GSM

C. Tethering

An F connector would most likely be used with which device? A. UPS B. iPhone C. Video surveillance camera D. iPad E. Portable speaker

C. Video surveillance camera

In which scenario would you be most likely to use a punchdown tool? A. When you need to install a connector on the end of a cable B. When you need to remove the protective jacket of a cable C. When you need to connect bare wires to a patch panel D. When you need to verify if a cable is broken E. When you need to identify unknown endpoints of a cable run

C. When you need to connect bare wires to a patch panel

In which use cases would you most likely benefit from virtual memory? A. When your system is using a multi-boot configuration B. When your system has several hard drives installed C. When your system does not have enough RAM installed D. When your system has too much RAM installed E. When you're working on a virtual machine

C. When your system does not have enough RAM installed

Bluetooth transmissions generally tend not to interfere with Wi-Fi communications for which reasons? (Choose more than one.) A. Bluetooth uses microwave transmission instead of radio B. Bluetooth uses the 5GHz band C. Bluetooth signals are typically much stronger than Wi-Fi D. Bluetooth uses frequency hopping E. Bluetooth signals are typically much weaker than Wi-Fi

D & E. Bluetooth uses frequency hopping and it's signals are typically much weaker than Wi-Fi.

What is the most common platter rotation speed for a hard drive found in a desktop computer? A. 5400 RPM B. 20,000 RPM C. 10,000 RPM D. 7200 RPM E. 15,000 RPM

D. 7200 RPM

A stylus is most likely to be used with which type of device? A. Webcam B. Speakers C. Headset D. Drawing pad E. Payment card reader

D. Drawing pad

Which statement correctly identifies what will happen to a packet that enters a hub? A. It will be examined for a destination MAC address and be passed to another segment if required. B. It will be forwarded to only the intended recipient. C. It will be examined for a destination IP address and be passed to another network if required. D. It will be forwarded out to every other port. E. It will be boosted in strength only.

D. It will be forwarded out to every other port.

A SODIMM is most likely to be found in which type of system? A. Desktop client B. Mobile phone C. Network server D. Laptop E. Tablet

D. Laptop

Which security feature was more commonly implemented in devices such as vehicles to allow them to be tracked if stolen? A. BIOS security B. TPM C. BIOS password D. LoJack E. Secure Boot

D. LoJack

A digitizer performs which task in image processing? A. Produces analog output, from analog input B. Produces analog output, from digital input C. Produces digital output, from digital input D. Produces digital output, from analog input

D. Produces digital output, from analog input

Which type of physical component would be used for the Random-Access Memory for a laptop? A. DIMM B. DC jack C. System board D. SODIMM E. CPU

D. SODIMM

255.255.255.0 would represent which value of a complete IP address configuration? A. DNS server B. APIPA address C. Default gateway D. Subnet mask E. IP address

D. Subnet mask

The number expressed after the two letters in the name of a D-sub miniature connector indicates which characteristic? A. Gender B. The version C. The number of devices it supports D. The number of pins or sockets E. The shell size

D. The number of pins or sockets

Which type of packet is the last one issued between a DHCP client and a server when an IP address configuration is being negotiated? A. Discover B. Select C. Offer D. Request E. Ack

E. Ack

Which aspect of picture quality is always higher with an OLED screen, due to the inability of an LCD screen to produce this feature? A. Realistic color B. Brightness C. Contrast - producing true white D. Color volume E. Contrast - producing true black

E. Contrast - producing true black

Crimping refers to which process? A. Plugging a cable into a recepticle B. Connecting bare wire ends to a patch panel C. Removing outer protective casing of a cable D. Removing the individual jacket of each wire inside a cable E. Installing a physical connector onto bare wire ends

E. Installing a physical connector onto bare wire ends

Which component of a DHCP implementation determines the validity period of an IP address configuration? A. Reservation B. Discover C. Scope D. Request E. Lease

E. Lease

Which type of internet appliance or device might be implemented for a service that is becoming overwhelmed by client requests? A. IPS B. IDS C. Firewall D. Proxy server E. Load balancer

E. Load balancer

Which factor would be considered to represent the most significant risk to an organization's network when using a legacy system or device? A. Cost B. Maintaining compliance C. Migrating data D. Lack of support E. Maintaining security

E. Maintaining security

Which type of architecture or connection method uses a 54-pin edge connector to host devices? A. Mini PCI B. Bluetooth C. Cellular D. USB Wi-Fi adapter E. Mini PCI Express

E. Mini PCI Express

If your system supports dual channel memory, and has four physical slots, in which configuration should the memory modules be installed if you only have two modules? A. Both in channel A B. Only one in channel B C. Both in channel B D. Only one in channel A E. One in channel A, and one in channel B

E. One in channel A, and one in channel B

Software defined networking is conceptually similar to which other type of computing architecture? A. Network security B. Virtual private networks C. Cloud computing D. Wireless networking E. Virtual machines

E. Virtual machines

Which method of biometric security is typically considered to be the easiest to circumvent? A. Fingerprint scanner B. Iris scanner C. Facial recognition D. Retinal scanner E. Voice recognition

E. Voice recognition

In which scenario would you be most likely to use a toner and probe? A. When you need to verify if a cable is broken B. When you need to install a connector on the end of a cable C. When you need to connect bare wires to a patch panel D. When you need to verify the internal wiring of a cable E. When you need to identify unknown endpoints of a cable run

E. When you need to identify unknown endpoints of a cable run

In which scenario would you be most likely to use a loopback plug tool? A. When you need to identify unknown endpoints of a cable run B. When you need to test if a cable is broken C. When you need to install a connector on the end of a cable D. When you need to connect two bare wire ends to each other E. When you need to test if the physical interface of a switch is functioning

E. When you need to test if the physical interface of a switch is functioning

A DSL modem operates over which physical medium? A. Coaxial cabling B. Ethernet cabling C. Wireless D. Fiber optic cabling E. Phone cabling

E. Phone cabling

Which type of network configuration would be comprised of only a few devices used by an individual? A. WAN B. WLAN C. PAN D. MAN E. LAN

C. PAN


Related study sets

accounting test 3 chapter 7 review questions

View Set

7. Additional Principles of Experimental Design (Quiz)

View Set

CH 28 - Child, Older Adult, and Intimate Partner Violence

View Set

barron's psych practice questions pt.2

View Set

Large Group 1- Pre-renal Azotemia

View Set

Renaissance art forms (Chiaroscuro,Sfumato,Unione and Cangiante)

View Set

Chapter 52: Assessment: Endocrine System

View Set

Acute Final- No Select All That Apply

View Set