31-58 Flashcards

1
Q

What three values must be added to the IPv4 properties of a NIC in order for a computer to have basic connectivity with the network?

A

subnet mask, default gateway, IP address (The IP address, subnet mask, and default gateway address values should be added to the NIC properties in order for the computer to have basic network connectivity. This can be done either statically or dynamically with DHCP. An additional value that should be present if the computer is to be used to connect to the Internet is the DNS server value. A computer automatically attempts to locate a DHCP server if configured to do so. A DHCP server address is not used. Finally, NAT is configured on a router, not on a computer host, and speed and duplex settings are NIC hardware settings and not IPv4 properties of the NIC.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A device has an IPv6 address of 2001:0DB8:75a3:0214:0607:1234:aa10:ba01 /64. What is the host identifier of the device?

A

0607:1234:aa10:ba01 (An IPv6 address is made up of 128 bits that are represented as eight blocks of four hexadecimal digits that are called hextets. Because each hexadecimal digit represents four bits, each hextet represents 16 bits. The /64 network prefix indicates that the first 64 bits, or first four hextets, represent the network portion of the address. Because there are 128 bits in an IPv6 address, this leaves the last 64 bits, or last four hextets, to represent the host identifier. The value for the last four hextets is 0607:1234:aa10:ba01.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can a user prevent specific applications from accessing a Windows computer over a network?

A

Block specific TCP or UDP ports in Windows Firewall (Network applications have specific TCP or UDP ports that can be left open or blocked in Windows Firewall. Disabling automatic IP address assignment may result in the computer not being able to connect to the network at all. Enabling MAC address filtering is not possible in Windows and would only block specific network hosts, not applications. Changing default usernames and passwords will secure the computer from unauthorized users, not from applications.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the six stages of the troubleshooting process (in order) (theres 6 steps)

A
  1. Identify the problem
  2. Establish theory of probable cause
  3. Test the theory to determine the cause
  4. Establish the plan of action to resolve the problem and implement the solution
  5. Verify full system functionality if applicable, implement preventive measurements
  6. Document findings, actions, and outcomes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A technician has been asked to configure Wi-Fi calling on a corporate mobile device. In which situation would this feature be most advantageous?

A

when in an area with poor cellular coverage (Wi-Fi calling is not supported on all mobile devices, but when enabled, it uses a Wi-Fi network to make voice calls. It is very useful in areas with poor cellular coverage.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which statement is true about laptops?

  1. Most of the internal components that are designed for laptops cannot be used for desktops.
  2. Laptop motherboards have standard form factors.
  3. Laptops use fewer components than desktops use.
  4. Laptop CPUs do not use cooling devices.
A

the first one (Most of the internal components that are designed for laptops cannot be used for desktops.)
because laptop internal components are designed with a small form factor and are proprietary. Although a laptop CPU uses less power, it needs a cooling device (heat sink and fan).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which standard provides a bridge between laptop hardware and the operating system and a way for technicians to configure power management schemes to get the best performance?

A

ACPI (The Advanced Configuration and Power Interface (ACPI) standard has specific sleep states that can be assigned to a device in order to conserve power. PCIe is a motherboard interface. Bluetooth and 802.11 are wireless standards.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which two laptop components are considered replaceable by the customer.

A

battery, RAM (Customer-replaceable units (CRUs) do not typically require a lot of technical skill to replace. RAM and a battery are two examples of a CRU. In contrast, a field-replaceable unit (FRU), such as a display, motherboard, keyboard, or touchpad, commonly requires a technician to install.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user wants to synchronize some apps, movies, music, and ebooks between mobile devices. What are the two types of connections used to synchronize this type of data?

A

Wi-Fi
USB
Because of the amount of data transferred during video synchronization, synchronization occurs through either a Wi-Fi connection or a wired USB connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make?

A
  1. Inkjet printers are less expensive as an initial purchase than laser printers.
  2. The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user chooses the collate option and prints two copies of a three-page document. What is the order in which the pages are printed?

A

pages 1, 2, 3, 1, 2, 3 (The collate feature enables a printer to sort multiple copies of a document with the proper page order for each copy.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A color laser printer is used to print documents with graphics and photographs. Users are complaining that printing takes too long. Which component of the printer should be upgraded in order to improve printing performance?

A

RAM (Because documents with graphics and photographs generate much larger print jobs, the printing process will run more efficiently if the printer memory is adequate to store the entire job before the job starts.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What service is available for Windows to provide software print server services to MAC OS clients?

A

Bonjour Print Server (Bonjour Printer Server from Apple comes with MAC OS X and is a free download for Windows users to be used as a software print server. Airport Extreme, a dedicated print server, and a PC with a printer attached serving as a print server are all hardware print sharing solutions.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which three components are typically found in laser printer maintenance kits?

A

fuser assembly, pickup rollers, transfer rollers (Laser printer maintenance kits typically contain components that wear and can be installed with minimal disassembly of the printer. Corona wires are internal components that would require a trained technician to replace. Paper trays are components that are not typically replaced during maintenance, but would be replaced any time if damaged.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technician is installing a new printer in a cool, damp environment. After the printer cabling is done, and the software and print driver are installed, the printer test page jams. What is the most likely cause of the print failure?

A

too much humidity ( Paper jams are commonly caused when the paper being used is dirty, affected by humidity, or is the wrong type of paper for the printer.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?

A

Virtualization technology can run several different operating systems in parallel on a single CPU.

17
Q

How does virtualization help with disaster recovery within a data center?

A

Hardware does not have to be identical. (Disaster recovery is how a company goes about accessing applications, data, and the hardware that might be affected during a disaster. Virtualization provides hardware independence which means the disaster recovery site does not have to have the exact equipment as the equipment in production. Server provisioning is relevant when a server is built for the first time. Although data centers do have backup generators, the entire data center is designed for disaster recovery. One particular data center could never guarantee that the data center itself would never be without power.)

18
Q

Which two hypervisors are suitable to support virtual machines in a data center?

A

VMware ESX/ESXi, Microsoft Hyper-V 2012
(VMware ESX/ESXi and Microsoft Hyper-V 2012 are Type 1 hypervisors that have direct access to the hardware resources. Type 1 hypervisors are more efficient than hosted architectures, and enable greater scalability, performance, and robustness. They are used to support enterprise VMs in data centers. Oracle VM VirtualBox, VMware Fusion, and Microsoft Virtual PC are host based Type 2 hypervisors.)

19
Q

A web designer accesses a company Windows 10 computer remotely. The designer often needs to simultaneously open multiple applications, such as a web page editor and a graphics editor. Rather than opening them in multiple windows, the designer opens them in different virtual desktops. What technology is being used by the designer?

A

Windows Virtual Desktop (Windows 10 has a feature called Windows Virtual Desktop (WVD). A user can create multiple virtual desktops and navigate among them easily. This feature reduces the clutter on a desktop of Windows caused by opening multiple applications. With WVD, a user can have each application open in a separate desktop.)

20
Q

Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?

A

PaaS (Platform as a service (PaaS) provides a collaborative environment where multiple developers can create software and host an application through a Cloud provider.)

21
Q

Which statement describes a feature of SDRAM?

It requires constant power to function.
Its connector always has 240 pins.
It can process overlapping instructions in parallel.
It is able to support two writes and two reads per CPU clock cycle.

A

It can process overlapping instructions in parallel. (SDRAM ( Synchronous Dynamic RAM) works in synchronization with the memory bus and has higher transfer rates because it can process overlapping instructions in parallel.)

22
Q

what type of memory matches the description?
connector with 288 pins, has advanced error correction.
connector has 184 pins, can support 2 writes and 2 reads per CPU clock cycle.
240 pin connector, consumes 1.5 v of power.
240 pin connector, consumes 1.8 v of power

A

DDR4 SDRAM
DDR SDRAM
DDR3 SDRAM
DDR2 SDRAM

23
Q

A technician is troubleshooting a server that displays the error message “RAID not found” after a power outage over the weekend. What is a possible cause for this?

A

The external RAID controller is not receiving power. (The loss of the RAID controller can be caused by the external RAID controller not receiving power, incorrect BIOS settings, failure of the RAID controller or incorrect drivers for the RAID controller.)

24
Q

A customer brings in a laptop with a touch screen that is not working correctly. The touch screen either does not respond at all or provides unusual or inaccurate responses. What is a possible cause for such behavior?

A

Too many apps are open. (A touch screen that is unresponsive or inaccurate can be caused by dirt or grease on the screen, the screen protector, or apps consuming too many resources.)

25
Q

What are two security risks associated with sharing printers in a corporate environment?

A

user authentication, cached files
(Three security concerns related to shared printers include (1) cached print files could contain sensitive data; (2) user authentication is needed to control access to the printer; and (3) print jobs could be read by others, intercepted, copied, or modified. Although the names of documents can be viewed in the print queue, document viewing is not possible. Dumpster diving and shoulder surfing are security concerns whether the printer is shared or not.)

26
Q

Which change management process component is concerned with the business processes that are affected by changes?

A

assessment ( There are several change management process components that help changes, installations, and upgrades go more easily. The assessment component identifies the business processes that are affected and the costs and resources required.)

27
Q

give a possible solution to the following:

  1. Motherboard capacitors are distended, swollen, emitting residue, or bulging
  2. The user can hear the fans spinning but the PC will not start and there are no beeps from the speaker
  3. After upgrading the single core CPU to a dual core CPU only one CPU graph is seen in the task manager
  4. The computer does not display any video after installing a new PCIe video card
A
  1. Replace the motherboard
  2. Check to faulting cable, damaged or mis-seated CPU or other motherboard component prior to replacing the motherboard, if required
  3. Update the BIOS firmware
  4. Connect the auxillary power cable for the adapter card
28
Q

A technician is upgrading many PCs used within the company. How should the technician dispose of an old battery or a broken monitor or an old power supply, or old RAM or motherboard or hard drive? :)

A

Recycle following local regulations.