A+ Flashcards

1
Q

Order these technologies from lowest throughput to highest:

A. SATA revision 3.0
B. Satellite Networking
C. USB 3.0
D. One stream of 802.11ac
E. 1000BASE-T
A

lowest to highest

B. Satellite networking: 50 Mbit/s
D. One stream of 802.11ac: 866.7 Mbit/s
E. 1000BASE-T 1Gbit/s
C. USB 3.0 5 Gbit/s
A. SATA revision 3.0 6 Gbit/s
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Each time a computer starts, it shows a date and time error. Which of the following would be the most likely reason for this issue.

A. Certificate error
B.  Incorrect time zone setting
C. Bluetooth not connected
D. Bad motherboard battery
E. Network disconnected
A

D. Bad motherboard battery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A smartphone has been configured to retrieve email messages over tcp/110. which of the following would most likely be using this configuration?

A. SMTP
B. POP3
C. outlook.com
D. S/MIME
E. IMAP4
A

B. POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following would be there best way to create a wire map of an ethernet cable?

A. Multimeter
B. Loopback plug
C. Punch-down tool
D. WiFI analyzer
E. Crimper
A

A. Multimeter

  • checks ac voltage
  • dc voltage
  • continuity
  • one probe on a cable on one side, and the other end on the other side. If it makes a noise, those wires are connected
  • can easily create a wire map with how the wire goes all the way through
  • pin to pin connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A system admin has connected an external USB drive to a computer to transfer some documents. When booting the computer, the system tries to boot from the external drive and gives an error message. Which of the following would be the BEST way to prevent the USB drive from booting?

A. Modify the BIOS to boot from the internal hard drive
B. Modify the boot order in Windows Disk management
C. Rebuild the MBR on the external hard drive
D. Disable the external drive in Device Manager

A

A. Modify the BIOS to boot from the internal hard drive

The boot order is managed in the system BIOS, and one way to avoid the computer from attempting to boot from an external storage device is to move the internal driver to have a higher boot priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of storage would include both a spinning drive and memory

A. SSD
B. EEPROM
C. NVMe
D. Blu-ray
E. SSHD
A

E. SSHD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is used to manage a virtual machine platform and guest operating systems?

A. UEFI BIOS
B. Hypervisor
C. Resource Pooling
D. SaaS
E. Emulator
A

B. Hypervisor

  • virtual machine manager
  • manages the virtual platform and guest operating systems
  • may require a cpu that supports virtualization
  • hardware management
  • cpu
  • networking
  • security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A system administrator is configuring an IoT device using a direct wireless connection to the device. Which of the following would describe this connection?

A. 802.1X
B. Bonjour
C. Centronics
D. TIA 568B
E. Ad hoc
A

E. Ad hoc

  • when you do not have an access point you need to communicate directly to the device
  • IoT
  • no keyboard input on a garage door opener
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List the protocol (tcp or udp) and the port number:
A. Automatically assign an IP address (two ports)
B. Retrieve an email to a mobile phone using POP3
C. Resolve the IPD address of www.professormesser.com
D. Manage the console of a remote device (insecurely)
E. Control the mouse on a remote Windows computer

A
A. DHCP UDP/67 and UDP/68
B. TCP/110 POP3
C. UDP/53 (DNS)
D. Telnet TCP/23
E. TCP 3389 (RDP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user is not able to send emails from their mobile phone. Which of the following would be the MOST likely problem?

A. IMAP4
B. SMB
C. SMTP
D. POP3
E. AFP
A

C. SMTP

  • Simple mail transfer protocol
  • Send mail from a device to a mail server
  • or between mail servers
  • you usually must send from a local or trusted device
  • Authentication usually required
  • may be different credentials than the incoming mail
  • port numbers
  • SMTP (no authentication, relatively unused): tcp/25
  • SMTP with authentication: tcp/587
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A hospital uses a wireless network using 2.4 GHz with a maximum throughput of 54 Mbit/s. Which standard is the hospital using?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
E. 802.11ac
A

C. 802.11g

  • an “upgrade to 802.11b
  • june 2003
  • operates in the 2.4 GHz range
  • 54 megabits per second (Mbit/s)
  • same as 802.11a (but a little bit less throughput)
  • backwards compatible with 802.11b
  • same frequency conflict problems as 802.11b
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A user has powered on their computer and received the message “Operating system not found.” A check of the system shows that the hard drive cables are properly connected. Which of the following would be the NEXT best troubleshooting step?

A. Boot to safe mode
B. Replace the boot drive
C. Restore from a known good backup
D. Check for removable drives

A

D. Check for removable drives
-If a USB storage device is connected to a computer and the BIOS is checking USB devices before the primary storage drive, the “operating system not found” error could appear with some USB devices. To avoid this error, the boot order in the BIOS can be changed, or the USB device can be disconnected during the boot process and reconnected after the operating system has started.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of these technologies is used by ECC to identify errors?

A. Striping
B. Multi-channel
C. DDR
D. Mirroring 
E. Parity
A

E. Parity

  • even parity
  • the parity bit makes an even number
  • see parity in notes for graphic chart with numbers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of these cloud models provides only CPU, storage, memory, and network access?

A

D. IaaS

  • infrastructure as a service
  • sometimes called hardware as a service (HaaS)
  • outsource your equipment
  • you’re still responsible for the management
  • and security
  • your data is out there, but more within your control
  • Web server providers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A drive in RAID 1 array has failed. Which of the following would return the array to a fully operational state?

A. Replace all drives and restore from backup
B. Replace the bad drive and resync
C. Replace all drives and resync
D. Replace the bad drive and restore from backup

A

B. replace the bad drive and resync

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A phone has received a tower update over the existing cellar network connection. Which of the following would BEST describe this update?

A. PRL
B. IMEI
C. iOS
D. IMSI
E. PRI
A

A. PRL

  • phone updates
  • preferred roaming list
  • CDMA networks (i.e., Verizon, sprint)
  • allows your phone to connect to the right tower
  • can be updated over the air (OTA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A company is using pre-built modules on a cloud service provider to create a customer inventory application. Which of the following would BEST describe this implementation?

A. IaaS
B. Peer-to-peer
C. SaaS
D. Hybrid
E. PaaS
A

E. PaaS

  • platform as a service
  • no servers, no software, no maintenance team, no HVAC
  • someone else handles the platform, you handle the development
  • you don’t have direct control of the data, people, or infrastructure
  • trained security professionals are watching your stuff
  • put the building blocks together
  • develop your app from what’s available on the platform
  • salesforce.com
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A user is authenticating to a VPN concentrator. Which of the following ports would be MOST likely be used?

A. tcp/389
B. tcp/548
C. tcp/22
D. tcp/3389
E. udp/161
A

A. tcp/389

  • LDAP (lightweight directory access protocol)
  • store and retrieve information in a network directory
  • commonly used in Microsoft active directory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A system admin is configuring an IoT device using a direct wireless connection the device. Which of the following would describe this connection?

A. 802.1x
B. Bonjour
C. Centronics
D. TIA 568B
E. Ad hoc
A

E. Ad hoc

  • wireless device sharing
  • ad hoc mode
  • no access point
  • direct link between wireless devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When a user starts their computer, the screen remains blank and the computers beeps twice. Which of these would be the most likely cause of this issue?

A. The boot device is not connected
B. The memory is faulty
C. The operating system has become corrupted
D. The PC is infected with malware

A

B. The memory is faulty
-The POST (power on self test) is the initial hardware check that occurs during the startup process. If a major hardware component is faulty, the computer will beep and a message will be displayed on the screen. If the issue is related to a critical component, the computer will not be able to display a message on the screen and instead will beep a certain number of times as a code to specify the error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A cloud application is designed to add and remove resources as the load changes. Which of the following would describe this characteristic?

A. Fault tolerant
B. Rapid elasticity
C. Metered
D. community
E. Resource pooling
A

B. Rapid elasticity

  • scale up and scale down as needed
  • seamless to everyone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A user is sending a job to the printer, but the printer is not responding to any print requests. Which of the following would be the first step when troubleshooting this issue?

A. Update the printer driver
B. Perform a test print from the printer
C. Change the printer configuration from PostScript to PCL
D. Replace the fuser
E. Upgrade the printer firmware
A

B. Perform a test print from the printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A system admin has upgraded a system by replacing a single memory module with two separate modules. Which of the following would describe this upgrade?

A. Multi-channel
B. RAID 1
C. Multi-core
D. ECC
E. Hyper-threading
A

A. Multi-channel

  • Memory module = RAM stick
  • single channel to dual-channel upgrade
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Sort these technologies from lowest throughput to highest:

A. One stream of 802.11n
B. SATA revision 2.0
C. Thunderbolt v3
D. 100BASE-T
E. USB 3.0
A
D. 100BASE-T: 100 Mbps/sec
A. One stream of 802.11n: 150Mbps/sec
B. SATA revision 2.0: 3 Gbps/sec
E. USB 3.0: 5 Gbps/sec
C. Thunderbolt v3: 40 Gbps/sec
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following would be MOST likely used in a warehouse for tracking and locating pallets of inventory?

A. Bluetooth
B. 802.11
C. RFID
D. Zigbee
E. NFC
A

C. RFID

  • It’s everywhere
  • access badges
  • inventory/assembly line tracking
  • pet/animal identification
  • anything that needs to be tracked
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following customer computer systems would require the MOST amount of memory?

A. Thin client
B. Graphics editing
C. Network attached storage
D. Thick client
E. Virtualization workstation
A

E. Virtualization workstation

  • MAX RAM!!!
  • Every OS needs its own memory
  • it adds up quickly
  • Max CPU cores
  • constant processing
  • need an efficient CPU
  • most virtualization apps
  • most virtualization app can use multiple cores
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The printer in the accounting department has stopped all printing processes. The print queue shows that there are seven jobs in the queue that are waiting to be printed. Which of the following would be the BEST next troubleshooting step?

A. Send a test job to the printer and move it to the top of the queue
B. Restart the printer’s spooler
C. Install an updated version of the printer driver
D. Delete everything in the queue and resend the print jobs

A

B. Restart the printer’s spooler
-the print spooler is the software responsible for storing print jobs and sending them to the printer. If the printer spooler has failed or has stopped, then none of the print jobs will be sent to the printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A company is using pre-built modules on a cloud service provider to create a custom inventory application. Which of the following would BEST describe this implementation?

A. IaaS
B. peer-to-peer
C. SaaS
D. Hybrid
E. PaaS
A

E. PaaS
•No servers, no software, no maintenance team, no HVAC
•someone else handles the platform, you handle the development
•you don’t have direct control of the data, people, or infrastructure
•Put the build blocks together
•develop your app from what’s available on the platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A user has just received a new laptop, but the display appears fuzzy and not as sharp as an external LCD monitor. Which of the following would be the most like cause of this issue?

A. Incorrect resolution
B. Bad inverter
C. Incorrect BIOS configuration
D. fast startup is enabled
E. Bad video cable
A

A. Incorrect resolution

  • flickering, color patterns incorrect
  • you can almost work with this
  • check the cable pins
  • especially if missing a color
  • Distorted image and geometry
  • check the OS refresh rate and resolution settings
  • need to match the display specs
  • native res is important on LCD displays
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Four business associates are connecting to the internet using the wireless connection of a single mobile phone. Which of the following would describe this connection type?

A. Tethering
B. Lightning
C. USB hub
D. Hotspot
E. Thunderbolt
A

D. Hotspot

  • turn your phone into a WiFi hotspot
  • your own personal wireless router
  • extend the cell data network to all of your devices
  • dependent on phone type and provider
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A user’s application makes changes to a router configuration while the application is active. Which of the following describes this functionality?

A. P2P
B. NAT
C. UPnP
D. MAC filtering
E. WPA2
A

C. UPnP
•Allows network devices to automatically configure and find other network devices
• zero configuration
•Applications on the internal network can open inbound ports using UPnP
•No approval needed
•Used for many peer-to-peer (P2P) applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A network outage has taken the DHCP server offline. Which of the following could be assigned to local devices?

A. 169.254.77.250
B. 192.168.101.88
C. 10.54.177.68
D. 172.16.120.121
E. 127.0.0.120
A

A. 169.254.77.250 - look for 169 if you’re offline
Automatic private ip addressing (APIPA)
•a link-local address
•no forwarding by routers
•IETF has reserved 169.254.0.0 through 169.254.255.255
•first and last 256 addresses are reserved
•functional block of 169.254.1.0 through 169.254.254.255
•Automatically assigned
•Uses ARP to confirm the address isn’t currently in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A network connection in a conference room was installed years ago, and there’s no documentation for the cable run. Connecting a device to the cable results in a successful Ethernet connection, so the other end of the cable should terminate somewhere in the wiring closet. Which of these tool would be the BEST choice to find the other end of the network connection?

A. Cable tester
B. Tone generator
C. Multimeter
D. Crimper

A

B . Tone generator
• A tone generator is used to produce an analog tone on the cable, and an inductive probe is used to “listen” for the tone on the other end of the cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following BEST describes the software that manages virtual machines?

A. BIOS
B. SaaS
C. VDI
D.Cache
E. Hypervisor
A
E. Hypervisor 
•Virtual machine manager
	•manages the virtual platform and guest operating systems
•May require a CPU that supports virtualization 
	•can improve performance 
•Hardware management
	•cpu
	•networking
	•security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
A network admin is installing a RAID 10 array. What is the minimum number of drives required to build this array?
A. 2
B. 3
C. 4
D. 8
E. 10
A

C. 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A user would like to send and recieve Gmail messages from their mail client instead of a browser. Which of the following would provide this functionality?

A. IMAP
B. SNMP
C. HTTPS
D. RDP
E. LDAP
A

A. IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following might be used to provide connectivity to an iOS device? Pick TWO.

A. USB-C
B. Thunderbolt
C. USB Micro-B
D. Lightning
E. USB type B
A

A. USB-C

D. Lightning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Match these network protocols to their function (not all functions will be used)

  1. FTP
  2. Telnet
  3. DNS
  4. SMB

A. Print to a shared windows printer
B. Determine the IP address of profesormesser.com
C. Authenticate a login to a VPN concentrator
D. Transfer mail between two organizations
E. View the terminal of a remote device
F. Encrypt all communication in a browser
G. Transfer a file from Windows to Linux

A
  1. G
  2. E
  3. B
  4. A

extra credit C. LDAP
D. SMTP
F. HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A network administrator has configured a RAID array with two drives that contain identification information. Which of the following describes this RAID type.

A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
E. RAID 11
A
B. RAID 1
•File blocks are duplicated between two or more physical drives
-great for redundancy 
-every file is duplicated
-required disk space is doubled
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

An accounting department processes the company payroll by logging into a third party website and adding the employee work hours. Which if the following would BEST describe this system?

A. PaaS
B. HaaS
C. SaaS
D. DaaS
E. IaaS
A

C. SaaS
•On-demand software
•no local installation
•Why manage your own email distribution, or payroll?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

During normal operations, the fans in a computer become progressively louder before the system abruptly powers off. Which of the following would be the most likely cause of this issue?

A. Bad capacitor
B. Faulty RAM
C. Overheating
D. Faulty SSD
E. Network congestion
A

C. Overheating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A user has requested a port replicator for their laptop. Which of the following would be the MOST likely reason for this request?

A. Connect to a wireless printer
B. Enable cloud file sync
C. Add USB interfaces 
D. Improve network throughput 
E. Increase total RAM
A

C. Add USB interfaces
•similar to docking station
•does not commonly have an expansion card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
Which of the following would be the best choice for a video editing workstation?
A. SSD
B. High-end cooling
C. Gigabit NIC
D. TV tuner
E. RAID array
A

A. SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A client computer is not able to properly resolve an IP address. Which of the following tools would be the BEST for troubleshooting this issue?

A. nslookup

b. netstat
c. traceroute
d. ping

A

A. nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Match the function to the windows utility. Some utilities will not have a match.

  1. Locate an app error message from two days ago
  2. Identify high CPU utilization across a 24 hour period
  3. Disable the print spooler
  4. Validate a RAM module upgrade
A. Memory diagnostics
B. Print management
C. Event viewer
D. Local users and groups
E. Services
F. Performance monitor
G. Device manager
A
  1. C
  2. F
  3. E
  4. A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following would be considered a method of certificate-based authentication?

A. CAC
B. Token generator
C. Fingerprint
D. GPS coordinates 
E. PIN
A

A. CAC

-common access card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

An application has stopped working after a recent update. Which of the following would be the best FIRST step to resolve this issue?

A. Reinstall windows
B. Recover from a known good backup
C. Run SFC
D. Run an application repair
E. Disable all startup services
A

D. Run an application repair

  • application issues
  • problems with app files or configurations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
Which of these would be the BEST way to protect a user's credit card info?
A. PCI DSS
B. GDPR
C. PHI encryption
D. Hashing
A

A. PCI DSS

  • payment card industry data security standard (PCI DSS)
  • standard for protecting credit cards
  • 6 control objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which of the following will launch windows 10 safe mode during boot?

A. Restart from Task Manager
B. Hold shift while clicking restart
C. Press F1 while booting
D. Update the BIOS boot order 
E. Rename the Windows profile
A

B. Hold shift while restarting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

From the command line, determine the PID for winlogin.exe

A

> tasklistPID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A technician has replaced the batteries in a UPS. Which of the following would be the BEST source of disposal information?

A. EULA
B. SDS
C. MDF
D. NDA
E. BIOS
A

B. SDS

-(MSDS) Material Safety Data sheets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A system admin needs to update the drivers in a windows image file. Which of the following would be the BEST choice for this task?

A. nslookup
B. sfc
C. dism
D. gpupdate
E. robocopy
A

C. dism
•deployment Image Servicing and Management
-Manage Windows imaging format (WIM) files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Disable a group of Active Directory Accounts

A. PowerShell
B. Javascript
C. VB Scripting
D. Python
E. Shell Script
A

A. PowerShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Modify a web page based on the client device

A. Python
B. Shell Script
C. JavaScript
D. VB scripting
E. PowerShell
A

C. Javascript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Modify Formulas in a group of spreadsheets

A. VB scripting
B. Python
C. JavaScript
D. PowerShell
E. Shell script
A

A. VB scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

add a new security policy to a firewall

A. Javascript
B. Python
C. Shell script
D. Powershell
E. VB Scripting
A

B. Python

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Perform a periodic backup of a Linux web server

A. JavaScript
B. Shell script
C. PowerShell
D. Python
E. VB scripting
A

B. Shell script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which of these UE regulations allows users to control their personal data?

A. HIPAA
B. GDPR
C. DRM
D. PCI DSS
E. EULA
A

B. GDPR
•EU regulation
•data protection and privacy for individuals in the EU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A desktop tech needs to confirm the version and edition of a Windows 10 desktop. Which of the following control panel applets would be the BEST choice for this task?

A. User Accounts
B. System
C. Device manager
D. Performance settings
E. Programs and features
A

B. System
•Computer information
•including version and edition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A user has modified their MAC address to gain access to a wireless network. Which of the following would BEST describe this attack type/

A. Social engineering
B. Spoofing
C. Zero-day
D. Brute force
E. Denial of service
A

B. Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A system admin suspects that malware may be installed on a user’s workstation. Which of the following would be the BEST next step in the malware removal process?

A. Disable System restore
B. Educate the end user
C. Boot into Safe Mode
D. Quarantine the infected system
E. Update the anti-malware signatures
A

D. Quarantine the infected system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

George, a sales manager, has recently replaced a broken mobile phone with a newer version. After receiving the new phone, he restored all of his apps and data from a recent backup. However, when he attempts to download any new email messages he receives a message, “Unable to decrypt email”. Which of the following steps should a tech follow to resolve this issue?

A. Install the latest operating system patches
B. Delete the email app and reinstall
C. Restart the phone
D. Install the user’s private keys

A

D. Install the user’s private keys
•A user’s private keys are used to decrypt any messages that have been encrypted with the corresponding public keys. Install these private keys onto the mobile device will allow the user to view their encrypted email messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q
Which of the following remote access technologies would be considered least secure?
A. RDP
B. SSH
C. Telnet
D. IPsec
E. VNC
A

C. Telnet

•SSH is what you should be using instead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A windows 10 workstation contains a share name ending in a dollar sign. Which of the following would best describe this share?

A. Publicly writable
B. Available on the local device
C. Contains encrypted files
D. administratively hidden
E. A shared printer
A

D. Administratively hidden
•Hidden shares (i.e., C$) created during install
-local shares are created by users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Match the Linux utility to the description

A. Change the login credentials for a specific user
B. Create a disk image of a Linux partition
C. View the process ID for an application
D. Install a specific utility

  1. apt-get
  2. sudo
  3. vi
  4. chmod
  5. ps
  6. passwd
  7. dd
A

A. passwd
B. dd
C. ps
D. apt-get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What Linux utility would you use to change the login credentials for a specific user?

A

passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Which Linux utility would you use in order to create a disk image of a linux partition?

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Which Linux utility would you use in order to view the process ID for an app?

A

ps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Which Linux utility would you use in order to to install a specific utility?

A

apt-get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A help desk tech needs to view and modify info on a linux desktop. Which of these would be the best way to provide this functionality?

A. RDP
B. Telnet
C. PowerShell
D. VNC
E. SSH
A

D. VNC (virtual network computing)

  • remote frame buffer (RFB) protocol
  • linux version of RDP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Where are CA certificates stored on a macOS system?

A. iCloud
B. Spotlight
C. Mission Control
D. Finder
E. Keychain
A
E. Keychain
•Passwords, notes, certificates
•Integrated into the OS
•Passwords and Secure Notes are encrypted with 3DES
•Login password is the key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

A network admin would like to require authentication to the Active Directory database before a user can connect to the wireless network. Which of these technologies would be the BEST choice for this requirement?

A. 802.1X
B. TKIP
C. AES
D. WPA2
E. CCMP
A

A. 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A windows app has crashed, but the user did not make a note of the error message. Which of these would provide additional information about the crash?

A. Task manager
B. Defender
C. Event viewer
D. BOOTREC
E. Device manager
A

C. Event viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

A windows admin would like to test the audio output on a user’s laptop. Which of the following would be the BEST way to perform this test?

A. mstsc
B. dxdiag
C. msinfo32
D. regedit
E. services.msc
A

B. dxdiag

  • DirectX diagnostic tool
  • Multimedia API
  • 3d graphics, audio, input options
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Match the windows utility to the description

A. Repair logical file system errors
B. Modify Windows Imaging Format files
C. Push policy settings to a computer or user
D. Duplicate files across servers

  1. sfc
  2. format
  3. gpupdate
  4. dism
  5. shutdown
  6. chkdsk
  7. robocopy
A

A. chkdsk: even checks all parts of spinning drive to make sure all sectors are good
B. dism: functions that can help you add/remove/modify/manage image files
C. gpupdate: global policy updates; managed with this and other gp utilities
D. robocopy:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Which of the following is the last step in the malware removal process

A. Enable System Restore
B. Download signature and engine updates
C. Educate the end user
D. Quarantine infected systems
E. Scan and remove malware
A

C. Educate the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which of the following scripting languages would be the BEST choice for managing Windows 10 workstations on an active directory domain?

A. VBScript
B. Python
C. Shell scripts
D. Javascript
E. PowerShell
A

E. PowerShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

A windows system admin would like to create a report showing the available drive space on a computer sampled every 15 minutes for two days. Which of the following would be the BEST way to provide this report?

A. Performance Monitor
B. Disk management
C. Task Manager
D. Services
E. Reliability monitor
A

A. Performance monitor
•Gather long-term stats
•control panel / admin tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Which of the following would be the BEST way to prevent unauthorized logins to a tablet computer?

A. Full device encryption
B. Frequent Patching
C. Biometrics
D. Run an anti-virus app
E. Enable cloud-based backups
A

C. Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Put these malware removal best practices in order:

A. Quarantine infected systems
B. Schedule scans and run updates 
C. Educate the end user
D. Disable system restore
E. Identify malware symptoms
F. Remediate 
G. Enable system restore
A
E. Identify malware symptoms
A. Quarantine infected systems
D. Disable system restore 
F. Remediate 
B. Schedule scans and run updates
G. Enable system restore
C. Educate the end user 

After that, nuke it all and start fresh with a known good backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of the following would be the BEST way to manage a group of one hundred Windows 19 computers?

A. Workgroups
B. RDP
C. Safe mode
D. Active directory
E. SSH
A

D. Active directory

  • Windows networks can be centrally managed
  • Active directory domain services (AD DS)
  • create and delete accounts
  • add and remove users to/from domain
  • reset passwords and unlock accounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

A windows 10 computer has stopped updating information on the screen and appears to be hung. Which of the following would be the BEST next troubleshooting step?

A. Unplug the computer and restart
B. Launch Task manager
C. Ping the computer from another device

A

B. Launch task manager

83
Q

Which of the following would be the BEST way to automate the Linux OS

A. PowerShell
B. Javascript
C. VBScript
D. Shell Script

A
D. Shell script
•Scripting the unix/linux shell
-automate and extend the command line
-starts with a shebang or hash-bang #!
-often has a .sh file extension
84
Q

A system admin is installing a new server into the metal racks in a data center. During the install process, the administrator can feel a faint tingling sensation when mounting the server. Which of the following safety systems should be tested and verified FIRST?

A. Equipment grounding
B. Lighted exit signs
C. Cable management
D. Waste disposal regulations

A

A. Equipment grounding
-electrical safety is one of the highest priorities because of its association with personal safety. Before a single computer can be turned on, the facility has to be properly grounded and the power systems must be installed properly,

85
Q
Which macOS tool would be the best choice for automated backups
A. Keychain
B. Time Machine
C. Mission control
D. Spotlight
E. Boot Camp
A

B. Time machine

  • automatic and easy to use
  • familiar finder UI
86
Q

A windows admin would like to encrypt a single file on an NTFS volume. Which of the following would be the BEST choice for this task?

A. BitLocker
B. Active directory
C. SFC
D. EFS
E. chkdsk
A

D. EFS

  • encrypting file system
  • on NTFS
  • encrypt at the filesystem level
87
Q

During startup, a Windows 10 computer enters Safe Mode instead of the normal desktop. Which of the following would be the BEST way to correct this issue?

A. Run Startup Repair
B. Rebuild the BCD
C. Reseat all adapter cards
D. Start in VGA mode
E. Restart the DHCP server
A

A. Run Startup Repair

  • Missing NTLDR: main windows boot loader is missing
  • Missing upgrading system: boot config data may be incorrect
  • Boots to safe mode: windows is not starting normally
88
Q

Which of these features can support multiple macOS desktops?

A. Time machine
B. Finder
C. Gestures
D. iCloud
E. Spaces
A

E. Spaces

89
Q

Match the command to the description

A. Edit a text file 
B. Restore an image of a partition
C. View the currently running services
D. View the network configuration
E. Change the permissions of a file
F. Copy a file from one location to another
  1. cp
  2. ifconfig
  3. dd
  4. chmod
A
  1. cp: F copy a file from one location to another
  2. ifconfig: D view the network configuration
  3. dd: B Restore an image of a partition
  4. chmod: E change the permissions of a file (changing the mode of a file)
90
Q

Which of the following will launch Windows 10 safe mode during boot?

A. Restart from task manager
B. Hold shift while clicking restart
C. Press f1 while booting
D. Update the BIOS boot order
E. Rename the Windows profile
A

B. Hold shift while clicking restart

91
Q

A user is encrypting a small folder of files on their windows SSD. Which of the following is being used for this security?

A. BitLocker
B. Active directory 
C. EFS
D. FAT32
E. UEFI
A

C. EFS

92
Q

At the Linux command line, display all of the files in the current folder.

professor@Odyssey log %

A

you would use the ls (list everything here) command

> professor@Odyssey log % ls

Will work in Linux, one of the most common commands in Linux. Remember there’s more than one way to do anything in Linux.

Lots of command line info for Linux in test.

93
Q

A system admin needs to install a Telnet client on a windows 10 computer. Which of the following would provide this functionality?

A. Programs and features
B. Device manager
C. Internet options
D. User Accounts
E. Administrative tools
A

A. Programs and features

  • Installed apps
  • Can also click turn windows feature on or off
  • can select from big list to turn on (lots are turned off)
  • windows comes with a Telnet server and client feature

Why it’s not E. Admin tools. You would think, but it’s not one of the admin tools. More core installation, think software.

94
Q

The access point at a SOHO has an option configured for WPS. Which of these would be the most likely reason for this configuration?

A. Application monitoring
B. MAC filtering
C. SSID suppression 
D. Automatic IP addressing
E. Wireless authentication
A

E. Wireless authentication

  • WPS wi-fi protected setup
  • originally called wi-fi simple config
  • allows “easy” setup of a mobile device
  • a pass phrase can be complicated to a novice
  • creating a pre-shared key WPK

Problem with WPS/Just disable it/usually comes this way

  • not great security
  • made it easier to connect
  • significant security concerns
  • difficult to stop brute force
95
Q

A system admin is troubleshooting a slow Windows system. Which of the following would provide real-time info on system performance?

A. Safe mode
B. Reliability monitor 
C. Task manager
D. Startup repair
E. Event viewer
A

C. Task manager

96
Q

A company is negotiating the purchase of an enterprise software license. Which of the following would contain the terms of this license?

A. DRM
B. EULA
C. NDA
D. FOSS
E. SLA
A

B. EULA
End user license agreement
-specifically for enterprise type systems
-rules and regulations from manufacturer
-what you can and can’t do with the software
-legal dept almost always needs to be involved
-come up with just the right agreement
-looking for a piece removed, certain phrase included.

97
Q

A system admin needs to track ongoing memory usage on a server for seven days. Which of the following would provide the BEST solution?

A. Task manager
B. Performance monitor 
C. Reliability monitor
D. Services
E. System information
A

B. Performance monitor

  • gather long-term stats
  • control panel/admin tools
98
Q

A Windows admin would like to test the audio output on a user’s laptop. Which of the following would be the BEST way to perform this test?

A. mstsc
B. dxdiag
C. msinfo32
D. regedit
E. services.msc
A

B. dxdiag

  • DirectX Diagnostic Tool
  • Manage your directX installation
  • Multimedia API
  • 3d graphics
  • audio
  • input options
99
Q

A user is complaining that the battery in their two-year old mobile phone is not maintaining a charge for more than a few hours. Which of the following would be the BEST way to resolve this issue?

A. Replace the battery
B. Disable all wireless radios
C. Replace the system certificates
D. Disable the backlight
E. Disable the audio output 
D. Disable the backlight
A

A. Replace the battery

100
Q

Which of the following would BEST regulate the storage and use of PII on a company website?

A. PCI DSS
B. EULA
C. HIPAA
D. AUP
E. GDPR
A

E. GDPR

101
Q

Which of the following would be the BEST way to view virtual memory settings in Windows 10?

A. Disk management
B. System Properties
C. Devices and Printers
D. Network and sharing center
E. Programs and features
A

B. System properties

-Performance options-Advanced tabs

102
Q

Which of the following would be the BEST way to securely manage the console of a Linux server across the network?

A. VNC
B. Telnet
C. RDP
D. SNMP
E. SSH
A

E. SSH (Secure shell)

  • encrypted console communication tcp/22
  • looks and acts the same as Telnet tcp/23
103
Q

Match the utility to the description:

  1. cd
  2. diskpart
  3. taskkill
  4. gpupdate
A. Prepare a drive before storing files
B. Terminate an active process
C. List all files on a drive
D. Update the driver on a Windows image
E. Manage Active Directory computers
F. Move to a different working directory
G. Manage the configuration of a volume
A
  1. cd: F. Moves to a different working directory
  2. diskpart: G. Manage the configuration of a volume
  3. taskkill : B. Terminate an active process
  4. gpupdate: E. Manage active directory computers

format: A. prepare a drive before storing files
dir: C. List all files on a drive
dism: D. Update the drives on a Windows image

104
Q

A Linux admin is using the iwconfig command at a server prompt. Which of the following would be the MOST likely reason for this?

A. Update an application to a newer version
B. Change the ownership of a file
C. View a wireless network configuration
D. Modify the write permissions of a directory
E. View all running processes

A

C. View a wireless network configuration

105
Q

A SOHO user is connecting a new laptop to the wireless networking using a PIN. Which of the following would BEST describe the technology used for this process?

A. WEP
B. WPA
C. WPS
D. WAN
E. WAP
A

C. WPS

106
Q
Where is the BIOS stored on a standard PC?
A. RAM
B. ROM
C. HDD
D. SSD
A

B. ROM
-Rom was created as a read-only type of memory. Storing your BIOS on the ROM of your PC ensures that your computer can successfully boot up, and that no modifications can be made to prevent your system for loading.

107
Q

Which of these is NOT a valid reason to install a new expansion card in your PC?

A. to add a VGA connection
B. to increase the number of network interfaces
C. to boost CPU performance
D. to connect an extra monitor

A

C. To boost CPU performance
-Expansion cards are primarily installed to add additional capabilities to your computer, such as adding another connector type for a second monitor, or adding another network connection.

108
Q
  1. Which type of RAID array provides zero redundancy?

A. RAID 5
B. RAID 1
C. RAID 0
D. RAID 10

A

C. RAID 0
-Provides striping of data across multiple drives, but does not mirror data onto any of the drives, providing zero redundancy.

109
Q

What is the name for modifying the contents of the BIOS?

A. PXE Boot
B. Overclocking
C. Clocking
D. Flashing

A

D. Flashing

110
Q

Which of the following is NOT a standard rotational speed found on a hard drive?

A. 10,000
B. 5,400
C. 7,200
D. 5,200

A

D. 5,200

-Standard drive disks move at a rotational speed of 5400, 7200, or 10000 revolutions per minute (rpm).

111
Q

What is the purpose of a heat sink on a motherboard?

A. to provide a protective covering for hot components on the motherboard
B. to protect you from touching hot parts on the motherboard
C. To pull the heat out of a very hot device to dissipate the heat
D. to provide a centralized location for all of the hot components on the motherboard

A

C. To pull the heat out of a very hot device it dissipate the heat
-Heat sinks are designed to sit on top of a very hot component, such as a CPU, and draw the heat away towards its fins. Cool air is then blown past these fins, allowing heat to be absorbed into the air flow.

112
Q

Bob has had his computer for a while and was just bragging to his friend about how reliable it was. The next morning, he goes to power on his computer, and nothing happens. He checks and makes sure all cords are plugged in, but still no luck. What could be the issue?

A. No power
B. Not enough memory to turn on
C. Overheating
D. An unexpected shutdown

A

A. No power
-A computer with no power will not turn on. This could be caused by issues with the power supply inside the computer case, or issues with power coming from the outlet. Even if the cords is plugged in, either of these locations could be lacking in power, thus there would be no transfer of power.

113
Q

Which two SATA-based formats does a laptop SSD come in?

A. 1.5 and 2.5 inch
B. 1.8 inch and 2.5 inch
C. 2.5 and 3.5 inch
D. 1.8 inch and 3.5 inch

A

B. 1.8 inch and 2.5 inch
-The two SATA formats used for SSD laptops include a 1.8 inch and 2.5 inch. These is also a newer format that is non-SATA based, which uses the M.2 motherboard socket

114
Q

Which display technology creates images by shining a light through liquid crystals?

A. LED
B. OLED
C. fluorescent
D. LCD

A

D. LCD

-LCDs (liquid crystal displays) work by shining a backlight through liquid crystals to create an image on the screen

115
Q

Which part of a computer is used with older display technology to convert DC power to AC power?

A. Inverter
B. digitizer
C. converter
D. VGA

A

A. Inverter
-Used with older tech to convert the DC power inside your computer into AC power that can be used for the display. This is found with older displays that use CCFL (cold cathode fluorescent lamps).

116
Q

What type of IP address is 192.168.15.211

A. a private IPv4 address
B. a public IPv6 address
C. a private IPv6 address
D. a public IPv4 address

A

A. 192.168.15.211 is a private IPv4 address.

  • IPv4 addresses follow the format of four decimal octets. IPv6 format is eight hexadecimal quartets. IP addresses that begin with 192.168 are in the RFC1918 set of private addresses.
  • IPv4 separated by periods
  • IPv6 separated by colons
117
Q

When you manually configured TCP/IP settings on a computer in a SOHO network, what address should you enter as the default gateway address?

A. The internal address of the internet router
B. the network address of the local LAN
C. It should be left blank.
D. the IP address of that computer

A

A. The internal address of the internet router
-The default gateway address is the address that a computer sends traffic to if it has no other route in its routing table. That would apply to most Internet addresses, so the default gateway is the device that sends traffic out to the Internet: the internet router.

118
Q

Hannah’s new clothing business is experiencing rapid growth, and she has planned to open 300 new retail locations within the next 5 years. All of these locations will need multiple public IP addresses per store, butt, currently, they only have four public addresses. She would like to implement a new scheme, where she would not have to worry about being limited by IP addresses n the foreseeable future. What addressing scheme would you recommend?

A. IPv4 addressing
B. IPv6 addressing
C. VPN tunnels
D. VLANs

A

B. IPv6
-IPv4 has been exhausted for quite some time now.
IPv6 has a possible 340 undecillion addresses.
- Most ISPs have IPv6 enabled equipment already in operation

119
Q

David is installing a new Web server at the office, but doesn’t want DHCP giving it a new IP address every time he has to reboot it for maintenance. What kind of address should David assign to the new Web server?

A. DNS
B. Dynamic
C. Static
D. DHCp

A

C. Static

  • manually assigned and entered on a device. Will effectively disable DHCP.
  • Should also reserve the IP address in the DHCP pool as good practice to prevent it from being leased to another device.
120
Q

In a windows environment, this protocol is often associated with Active Directory for central management of a user database. What is this protocol called?

A. Domain controller
B. LDAP
C. Exchange
D. Office 365

A

B. LDAP (lightweight directory access protocol)

  • works in conjunction with active directory to provide user authentication and management in a network.
  • It is the successor to the DAP (directory access protocol)
121
Q

A network engineer is looking for a provider that will allow her to move her organizations servers, routers, firewalls, and switches to the cloud. This provider would essentially act as her organizations virtual data center. What type of cloud provider does this network engineer need to find?

A. SaaS
B. IaaS
C. NaaS
D. PaaS

A

B. IaaS (infrastructure-as-a-service)

  • cloud model that allows organizations to move their entire infrastructure to the cloud.
  • Infrastructure includes items such as routers, switches, firewalls, and servers.
122
Q

Jamie is a software developer. She is great at writing code, but she doesn’t know much about setting up or managing networks and servers. Jamie just wants to be able to write her code and manager application while someone else owns and maintains the servers and networking equipment. What type of cloud provider would work best for Jamie?

A. SaaS
B. PaaS
C. IaaS
D. DaaS

A

B. PaaS (Platform-as-a-service) companies provide platforms for software developers to build, create, and maintain their applications. The PaaS provider handles everything on the back-end, including setup and maintenance of servers and networking equipment.

123
Q

The program Dropbox is an app that is accessible to anyone over the open Internet. This means that Dropbox is an example of which of these cloud types?

A. Public cloud
B. Community cloud
C. Hybrid cloud
D. Private cloud

A

A. Public cloud
- Public cloudy refers to anything that is delivered across the open internet. When someone uses the term the cloud, they are often referring to the public cloud.

124
Q

A very large enterprise has decided that they would like to make the move to cloud computing. However, they need to ensure that there is no risk of their data being accessed by others. The company is willing to spend as much money as it takes to ensure their data is secure and entirely owned by themselves. Which of the following cloud implementations would be the best choice for this organization?

A. Secured cloud
B. Confidential cloud
C. Hybrid cloud
D. Private cloud

A

D. Private cloud
-While private clouds are the most expensive of the cloud implementation options, they are also the most secure. If an organization has high security concerns, and can afford a private cloud, it is the best option.

125
Q

An organization would like to move to the cloud. They have some data is extremely sensitive, but they also have a lot of data that isn’t private at all. They know that they would not be able to afford to move all of their data to a private cloud, but they would like a way to keep their sensitive data secure. What is the best option for this organization?

A. Community cloud
B. Combined cloud
C. Mixed cloud
D. Hybrid cloud

A

D. Hybrid Cloud
- Due to the high price of creating and maintaining a private cloud, many organizations use a hybrid cloud. A hybrid cloud combines public, community, and private clouds to meet unique requirements.

126
Q

One perk of virtualization is the ability to quickly add and remove servers depending on your needs at the time. What is the term used to describe this?

A. Rapid elasticity
B. Rapid extensibility
C. Rapid availability
D. Rapid flexibility

A

A. Rapid elasticity
-Rapid elasticity is used to describe the flexibility of virtualization, which allows for users to add and remove servers as they need them

127
Q

A user who travels extensively with her laptop needs to protect sensitive data stored on her hard drive. To ensure the data is secure, which feature of Windows Ultimate will allow encryption of the entire drive.

A. Share
B. BitLocker
C. Lojack
D. EFS

A

B. BitLocker
- With windows ultimate and enterprise editions, as well as Windows 8 and 8.1, Bitlocker, allows users to encrypt the entire drive protecting the data from loss or theft

128
Q

A user enters the Windows command line prompt to create a new directory. What is the command to accomplish this?

A. MKD
B. MD
C. MK
D. DIR

A

B. MD / MKDIR
-The command to create a new directory in Windows from the command line prompt is MD (MakeDirectory) or MKDIR. Both of these commands will work the same

129
Q

A user needs to load Windows 10 onto a notebook that was running Windows 7; this will be a new installation, not an upgrade. Since the notebook has no CD/DVD, the user has the image of the operating system stored on a USB flash drive. What must be done to the system prior to loading from the flash drive?

A. Windows 10 does not support booting from a thumb drive
B. The boot sequence in system BIOS must be adjusted, making the USB the first device in the boot order.
C. Memory must be increased
D. Windows License must be entered.

A

B. The boot sequence is system BIOS must be adjusted, making the USB the first device in the boot order.

  • When the system boots, it boots in the order listed in BIOS, so the thumb drive must be shown as the first device.
130
Q

A PC has been configured as a print server that will be available 24 hours a day. In order to save power, the PC should be powered off when not in use. What feature of the Network Interface Card allows for a powered down or sleeping PC to power on when a print job is received?

A. Sleep
B. WakeUp
C. Wake-on-LAN
D. Hibernate

A

C. Wake-on-LAN
•When a PC is configured to use Wake-on-LAN, it will power on when a print job is being sent. •There is a similar feature available for modems that allows the PC to be powered up when the modem determines a call is being received.
•This is Wake-ON-Ring, often used when PCs are configured to receive Faxes.

131
Q

A company with a very small local area network has grown to the point where statically assigning IP addresses and other NIC parameters have become impossible to manage. What steps can a network administrator take to simplify the process of configuring network interface cards?

A. Incorporate a DHCP server into the the network
B. Incorporate a file server into the network
C. Incorporate a client redirect or
D. Incorporate a DNS server into the network.

A

A. Incorporate a DHCP server into the network
- A DHCP (dynamic host configuration protocol) server is used to automatically configure the parameters need by a network interface card when a PC is first booted up. It provides central management of IP address allocation.

132
Q

A user notices that her hard drive is beginning to run out of space, so she plans on replacing it with a larger drive. Until then she wants to eliminate any temp files from her hard drive. What utility should she use to accomplish this?

A. Disk defrag
B. fdisk
C. Disk Cleanup
D. Cleanup

A

C. Disk cleanup
•The disk cleanup utility is used to delete temp files from a hard drive.
•To access, from start enter disk cleanup

133
Q

What best describes the purpose of electrical grounding?

A. A way to provide an alternate method for devices to transport and receive electricity.

B. a way to safely provide electricity to the ground for wireless charging

C. A new method created for powering redundant server farms

D. A way to transport excess electrical discharge away from the connected components

A

D. A way to transport excess electrical discharge away from the connected components.
-prevents the electrical spike from causing damage directly to the connected device.

134
Q

What item can you use to BEST reduce the risk of ESD when taking apart a machine?

A. Compressed air
B. steel toe boots
C. ESD straps and mat
D. ESD glasses

A

C. ESD straps and mat

135
Q

There is smoke coming from a server in the network room. What should you use to put out the fire?

A. Wet fire traps
B. a class C fire extinguisher
C. dry fire traps
D. wet chemicals

A

B. a class C fire extinguisher

  • for electrical fires, you should always use special dry fire prevention or extinguishing chemicals.
  • Carbon dioxide is one of those chemicals
136
Q

Who administers SDS (safety data sheets)?

A. FCC
B. OSHA
C. EPA
D. FBI

A

B. OSHA

137
Q

How should the humidity levels be set in the room where network equipment is stored?

A. Very high
B. Balanced
C. at typical room settings
D. very low

A

B. balanced

  • For storing active electronic equipment, it is wise to balance humidity levels as best as possible, which will avoid too much condensation or too much static discharge.
  • Consult SDS
138
Q

What should of vacuum should you use to clean out the printer?

A. Laser vacuum
B. Specialized anti-static vacuum
C. Dell all-in-one vacuum
D. fireproof vacuum

A

B. Specialized anti-static vacuum

  • When working inside computers or other electrical devices, only specialized vacuums should be used.
  • These devices are specially made so that they do no damage your electrical components.
139
Q

How can you tell how much of a surge can be handled by a surge suppressor?

A. Spike rating
B. dB rating
C. capacitor A level
D. joule rating

A

B. joule rating

  • The amount of surge a suppressor can handle will be measured in joules.
  • A higher rating in this category will equate to being able to protect more effectively against higher voltages on the line.
140
Q

A form of malware that has the ability to replicate without any intervention is referred to as a ___.

A. botnet
B. trojan horse
C. crawler
D. worm

A

D. worm

-worms are similar to viruses, except that they can replicate on their own without any human intervention

141
Q

There are devices on your network that don’t belong to you, and you think your neighbor somehow figured out the password. You just started using this device yesterday, what important security step did you forget to complete when setting up the router?

A. Lock your router in a secured location.
B. Change the public IP address
C. Change default usernames and passwords
D. Download the new firmware

A

C. Change default usernames and passwords

142
Q

When someone is assigned on the rights and privileges necessary to do her job, this is referred to as _____.

A. Controlled access
B. admin privilege
C. principle of least privilege
D. Super user

A

C. Principle of least privilege
-allows users enough flexibility to perform their job, but prevent them from accessing areas they are not allowed to access, is referred to as the principle of least privilege.

143
Q

While working on the help desk, you receive a phone call from a user who frantically tells you she can’t log in to her account because she has forgotten her password. Suppose the user in an impostor, what form of fraudulent activity is she using to obtain access to the system?

A.lying
B. Phishing
C. social engineering
D. VPN

A

C. social engineering

  • attempting to gain access to a company’s network or facility by manipulating people inside the organization is known as social engineering.
  • One example of this is finding out information about employees by looking up their names, finding out the names of their pets, special interests, and using that information to guess at passwords.
144
Q

An admin needs more security than is available with just a login and password on her mobile devices, and wants to add another layer of security. How can she accomplish this?

A. By logging in on the hour
B. By adding multi-factor authentication
C. by encrypting log names
D. by requiring a higher level password

A

B. By adding multi-factor authentication

-could be biometrics, token, or a callback number

145
Q

One form of malware is disguised as an app that users unwittingly download and run which leads to a virus. This form of malware is referred to as ____.

A. Phishing
B. Adware
C. Trojan Horse
D. Latching

A

C. Trojan Horse

  • a virus attached to a seemingly innocuous app. When the app is run, it infects the system which often opens the system for even more viruses
  • unlike some viruses, a trojan does not replicate itself
146
Q

A user is experiencing multiple pop-ups when opens his computer web browser. What type of malicious software could account for this?

A. first-day attack
B. worm
C. adware
D. Trojan horse

A

C. Adware

-any software program in which advertising banners are displayed while the program is running is referred to as adware

147
Q

A user complains that his disk drive appears to be running very slowly and it is beginning to affect the system speed. He checked and the hard drive is less than half full. What suggestions can you make to help speed up his hard drive?

A. Run fdisk
B. Defragmentation the solid-state drive
C. Move some of his very large files to a network drive.
D. Defragment the hard drive

A

D. Defragment the hard drive
-there is a good chance that the files on his drive have become fragmented. The user should defragment the drive, unless he is using a soli-state drive (SSD), which should never be defragmented.

148
Q

A user is complaining about a burning smell coming from their computer case. Which of the following should be the FIRST troubleshooting step for this issue?

A. Check the logs for any significant events
B. Remove the cover and visually inspect the system
C. disconnect the power source
D. Reboot the system into Safe mode
E. Perform a hardware diagnostic

A

C. disconnect the power source

149
Q

A network admin is installing a POTS modem for a console at a remote site. What type of cable interface would this modem require for connectivity to the POTS line?

A. RJ11
B. RJ45
C. USB
D. BNC
E. TRS
A

A. RJ11

  • analog modem, DSL line
  • usually telephone connection
150
Q

When a SIM is moved from one mobile device to another, all incoming calls will follow the SIM. Which of the following allows this capability?

A. PRL
B. IMEI
C. PRI
D. VPN
E. IMSI
A

E. IMSI

  • International mobile subscriber identity
  • identifies the user of a mobile network
  • can be provisioned in the SIM card

IMEI
-identifies a physical mobile device

PRL updates
-preferred roaming list

PRI updates

  • product release instructions
  • radio settings - ID numbers, network codes, country codes, etc.

both PRL and PRI are updated over the air

151
Q

Which of these would be the BEST way to check to continuity of the wires inside on an ethernet patch cable?

A. Punch-down tool
B. Toner probe
C. PING
D. Cable tester
E. Loopback plug
A

D. Cable tester

  • relatively simple
  • continuity test
  • can break tool into two parts
  • works even if ends of cable are far away form each other

-can identify missing pins
-or crossed wires
-not usually used for frequency testing
•crosstalk, signal loss, etc.

152
Q

A system admin needs to check the power that a desktop power supply provides to the PCI Express slots. Which of these voltages would be the most important to check?

A. 120 V
B. 12 V
C. 5V
D. 240 V
E. 3.3V
A

B. 12 V
-PCIe adapters, hard drive motors, cooling fans, most modern components

5V some motherboard components
-many use 3.3 V

153
Q

A system admin would like to move all desktop computers to a centralized cloud-managed solution. Which of the following would be the best choice?

A. VDI
B. SaaS
C. IaaS
D. VPN
E. PaaS
A

A. VDI (virtual desktop infrastructure) in the cloud

  • users connect to a pre-built desktop
  • access from almost any OS
  • windows, mac OS, Linux, iOS, Chromebook, web browser
154
Q

A macOS user in shipping and receiving is randomly seeing the spinning wait cursor during the work day. The cursor spins for 30 seconds before returning control to the user. Which of these would be the most likely cause of this issue?

A. Application bug
B. Bad display
C. congested network
D. Bad capacitor
E. POST error
A

A. Application bug

  • spinning wait cursor in macOS X
  • feedback that something is happening
  • could also be hardware or slow paging to disk
155
Q

A laptop display is showing a black screen, and nothing is shown on the screen during the startup process or when Windows is loaded. Which of these would be the best way to determine if the backlight is the issue?

A. Point a flashlight at the screen
B. Disable video hardware acceleration
C. Install updated video drivers
D. Boot from the Windows installation media
E. Change the video output selection in this BIOS

A

A. Point a flashlight at the screen

156
Q

What is the most common type of memory found in a typical PC?

A. RAM
B. Flash
C. ROM
D. CMOS

A

A. RAM
-All applications and programs must be loaded into RAM to access them. This makes RAM a prime target for upgrades to increase the number or size of items it can hold.

157
Q

Where is the BIOS stored on a standard PC?

A. RAM
B. SSD
C. HDD
D. ROM

A

D. ROM
-ROM was created as a ready-only type of memory. Storing your BIOS on the ROM of your PC ensures that your computer can successfully boot up, and that no mods can be made to prevent your system from loading.

158
Q

Cory lands on an official-looking web page telling him that a virus has been detected on his computer. The web page appears to be scanning the local computer and often reports multiple found infections. What type of malware is being described?

A. Anti IPS
B. Anti IDS
C. Rogue Antivirus
D. Software corruption

A

C. Rogue Antivirus

159
Q

Lenny wants to connect his bluetooth speakers to his PC. He believes he’s followed all instructions, but the speakers don’t seem to be working. When he checks the PC’s device manager the speakers do not appear. What should he try first?

A. Ensure Bluetooth is turned on for both devices
B. Power cycle PC
C. Power cycle speakers
D. Uninstall and reinstall speakers

A

A. Ensure bluetooth is turned on

160
Q

Janis is the system admin for her company. She onboards five new employees daily. She always makes new users sign documentation outlining what is acceptable behavior while using company devices. What type of document are new users signing?

A. AEU
B. AUP
C. APU
D. ATE

A

B. AUP

Acceptable use policy

161
Q

Marcus just procured 1,000 laptops, 500 routers, 432 printers and 900 smart phones. He ensures that all devices work properly and have no damage. He lists each device and its monetary value. What is Marcus currently doing?

A. Bard code listing
B. Device setup
C. Asset management
D. None of these

A

C. Asset management

162
Q

Mathis, a project manager, is currently doing a walkthrough on a new building site. The sit is still under construction with work being done around the clock. As a safety precaution what should Mathis equip while doing the walkthrough?

A. Hard hat and air filter mask
B. Goggles and hearing protection
C. Watch and air filter mask
D. Air filter mask and carbon dioxide monitor
E. A & B
A

E. A & B

163
Q

Jamal is a Tier 1 IT specialist for Lion Pharmaceuticals. The company recently upgraded 135 employees work cellphones. What would be a best practice for Jamal when it comes to disposing of the Cell Phones?

A. Wipe all data from cellphones and take to a local recycling center
B. Smash all phones and throw in a dumpster
C. Remove sim cards, wipe phones, and smash phones
D. Keep all phones in a secure server room.

A

A. Wipe all data from cellphones and take to a local recycling center.

164
Q

Which of the following wireless security protocols has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws?

A. WPA2
B. AES
C. EAP
D. WEP

A

D. WEP

165
Q

Jerold is setting up a way of processing emails to organize them according to specified criteria. He wants to reduce the amount of spam emails that users are receiving. What is Jerold most likely setting up?

A. Email filter
B. Email segmentation
C. Email proliferation
D. None of the above

A

A. Email filter

166
Q

A cyber security professor is describing a type of malware to his class. He tells the class this type of malware is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not other wise allowed (for example, to an unauthorized user) and often masks its existence. What type of malware is being described?

A. MITM
B. Worm
C. Trojan
D. Rootkit

A

D. Rootkit

167
Q

Which of the following ports are used for FILE transfers? Choose TWO.

A. 20
B.443
C. 993
D. 80
E. 21
A

A. 20
and
E. 21
-both for FTP

Wrong answers:
B. 443: is being used by HTTPS and this port is used for secure web browser communication

C. 993: is used in order to use IMAP securely

D. 80: is being used by the internet communication protocol, Hypertext transfer protocol or HTTP

168
Q

You would like to troubleshoot a desktop computer that beeps during the boot process and the screen remains dark. Which of the following would be the BEST next troubleshooting step?

A. Document the findings
B. Check the results
C. Establish a theory
D. Implement a solution

A

C. Establish a theory

1-identify the problem 
2-Establish a theory of probable cause
3-test the theory
4-establish a plan of action and implement the solution
5-verify full system functionality 
6-document the findings
169
Q

John, the network admin, would like to connect five offices together that are located in different countries. Which of the following would BEST describe this type of connection?

A.NAT
B.LAN
C.SAN
D.PAN
E.WAN
A

E.WAN
-long geographical distance

wrong answers:
A. NAT: network address translation is used to change the source or destination IP (internet protocol) address as it traverses the network. NAT functionality is usually configured in a router or firewall.

B. LAN is being used in order to establish a connection in your building or home

C. SAN: storage area network is a network-connected storage array.

D. PAN: is considered to be a network designed for a small area and is usually being used to pair bluetooth devices such as headsets or speakers.

170
Q

You are at your office and your are trying to print a document on your laser printer from a specific app. When you verify the laser printer, everything seems to be in good working order, but when you are trying to send a print job, there is no output. All of your other colleagues are able to print on the same device without any issues. Choose from the following list your next BEST troubleshooting step.

A. Unplug printer
B. Restart computer
C. Restart print spooler
D. Verify that the correct printer has been selected in the app

A

C. Verify that the correct printer has been selected in the app

171
Q

A desktop computer has been built using an SSD Nvme, the max amount of RAM, and a High-end graphics card. Which of the following options would BEST describe the use of this device?

A. touch screen kiosk

b. thin client
c. nas device
d. cad/cam workstation

A

D. CAD/CAM workstation
-device that is used in the design of graphical content that places a heavy load on the graphics card and the RAM. An SSD would also be helpful because of its high speeds for reading and writing on the storage device.

172
Q

What is the process of controlling network access to destination websites based on the URL called?

A. NAS
B. MAC filtering
C. Whitelisting
D. QoS

A

C. Whitelisting

  • tool used to protect business computer networks
  • compliments anti-virus and firewalls.
  • blocks unauthorized software until it is specifically authorized to connect to the network
173
Q

Your manager asked you to buy a new 3d printer. What should you consider adding to your order, to avoid placing another different order and lose time.

A. Imaging drum
B. Fuser
C. Ink cartridges
D. Plastic filament

A

D. Plastic filament
-used by 3d printers in order to melt the plastic and create 3d Objects

wrong answers:

A. Imaging drum: heart of the laser printer or the copier. It transfers the print image, consisting of toner, onto the paper

B. A fuser unit is a pair of heated rollers within the printer that fuses the toner onto the paper being printed on.

C. An ink cartridge is a component of an inkjet printer that contains the ink that is deposited onto paper during printing.

174
Q

Sarah is working on an important project on her laptop and all of sudden the display image becomes very dim and very hard to see. She tries to adjust the laptop’s brightness and contrast settings, but it doesn’t resolve her issue. Which of the following components is more likely at fault?

A. Memory modules
B. Inverter
C. HDD
D. Digitizer
E. LCD panel
A

B. Inverter
-normally used on a Cold cathode fluorescent lamp (CCFL) display and it converts the DC power to AC power. If the laptop had a bad inverter, then the information on the screen would be almost impossible to read because of this missing backlight.

175
Q

Which of the following devices will MOST likely be using an 802.11 connection

A. Hub
B. Switch
C. WAP
D. Bridge

A

C. WAP
-Wireless access point that bridges the 802.11 wireless network together with a wired ethernet network.

wrong answers:
A Hub is a device that connects multiple ethernet devices together, but no wireless communication.

A switch also provides connectivity for wired ethernet devices and allows for additional network configuration and monitoring options

A bridge is a class of network device that’s designed to connect networks at OSI level 2, which is the data link layer of a local-area network (LAN)

176
Q

Jennie was notified that a laptop is not booting. There are no system lights, sounds, or display when the power button is pressed. Which of the following should Jennie attempt first in the troubleshooting process?

A. Connect an external monitor
B. Boot the system from a removable boot drive.
C. Disconnect the AC and battery power and hold the power button for several seconds.
D. Remove any hard drives or optical drives, RAM, and any wireless cards or USB devices from the laptop

A

C. Disconnect the AC and battery power and hold the power button for several seconds

177
Q

Which of the following would be the most important factor consider when building a virtualization workstation?

A. High-end graphics card with onboard memory
B. Compact form factor
C. Dual monitor support
D. Max RAM and CPU cores

A

D. Max RAM and CPU cores

178
Q

Angela requests that the desktop system she is buying is able to be used at her vacation home in another country, as well as at home in the US. The tech is aware that the country mentioned has different power requirements. Which of the following should Angel ensure the desktop contains?

A. Dual-voltage options
B. UPS
C. Inverter
D. Micro-atx connector

A

A. Dual-voltage options

179
Q

Jasmine is asked to install Microsoft office directly onto Erin’s computing device. Jasmine notifies erin that office cannot be installed directly on that device. Which of the following device types does the customer most likely have?

A. Mac
B. Thick client
C. Thin client
D. Phablet

A

C. Thin client

  • doesn’t usually have a detailed oriented setup or platform
  • no office on thin client, probably be put on a thick client
  • minimum amount functionality
180
Q

Danielle reports that her company laptop cannot pick up a wireless connection. However, users working on their laptops in the common areas have internet connectivity. Which of the following is the most likely cause?

A. Weak RF signals
B. Out of date ethernet driver
C. Enabled MAC filtering
D. Duplicate ID addresses

A

A. Weak RF signals

181
Q

Albert just installed a new SOHO router. Whenever a new user comes online and begins streaming media, Browsing slows down for the other users. Which of the following settings can Albert adjust so the experience is Universal for all users?

A. DSL
B. QoS
C. VNC
D. WAN

A

B. QoS

182
Q

The owner of Jazzy Paint has three locations throughout the greater Chicago area. All locations need a minimum speed of 1GBPS. What type of network is Jazzy Paint most likely a part of?

A. MAN
B. PAN
C. WLANQ
D. CAN

A

C. MAN

-Metropolitan area network

183
Q

Password trouble tickets have risen by 20%. How can system admins reduce the amount of password related trouble tickets?

A. Implement password expiration
B. Biometrics
C. Single Sign On
D. RFID key FOB

A

C. Single Sign On

-people only have to remember one password

184
Q

Maria is a help desk lead for tech terror inc. She is on a call when the device hard drive she’s working on begins to make a loud clicking noise. What is the first thing Maria should do.

A. Inform the owner the HDD is most likely going to fail and to ask if she can backup all data
B. Hit hardrive with rubber mallet until clicking stops
C. Move to a VDS
D. Reset KVM switch

A

A. Inform the owner the HDD is most likely going to fail and to ask if she can backup all data

185
Q

Larry is using a web based calendar. Which model is Larry using?

A. DAAS
B. PASS
C. IAAS
D. SAAS

A

D. SaaS

186
Q

Your handheld tablet is no longer responding to your input when touched. What is the first thing you should check?

A. Power button
B. Dust on screen
C. Digitizer settings
D. Battery corrosion

A

C. Digitizer settings

187
Q

Mario’s phone will not charge when he connects his USB charger. When he uses wireless charging the phone begins charging. When he uses the USB charger on other devices, they charge just fine. What should be the first thing Mario does to charge his phone with the usb charger?

A. Try another cable
B. Just charge the phone wirelessly
C. Clean out his phones charging port
D. Configure phone for usb fast upload

A

C. Clean out the phones charging port!

188
Q

Some guy is doing a ram upgrade on his friends computer. He unplugged the PC, took out the old ram, put in the new ram, closed the PC and plugged it back in…then left. Did he follow all troubleshooting steps?

A. Yes
B. No, he forgot to identify the problem
C. No, he didn’t verify full system functionality
D. No, he did not test his theory

A

C. No, he didn’t verify full system functionality

189
Q

Darryl has a big presentation that he’s nervous about. He turns on the projector to begin his presentation, after a few slides the projector bulb turns off. What should a tech do to resolve the issue?

A. Replace the projector bulb and cooling fan.
B. Allow projector to cool for 45 mins.
C. Power cycle the projector
D. Replace projector linens booster

A

A. Replace the projector bulb and cooling fan

190
Q

Romel currently works at might mufflers in Las Vegas. He wants to make it very difficult to gain access to the managers office for intruders. Which would be the MOST EFFECTIVE?

A. Traditional lock and key
B. Fiberglass door with locking mechanisms
C. Bio Metric Lock
D. None of the above

A

C. Biometric lock

191
Q

Cable locks are a form of “logical” security

True or false

A

False

it would be a form of physical, whereas a firewall would be a form of logical security

192
Q

A prolific hacker sends an email to hundreds of employees titled “employee satisfaction survey. Body of the email asks probing questions about the employee and guarantees one full day off if it is completed immediately. This would be best described as?

A. Social engineering
B. Rootkit preattack
C. Trojan Horse
D. All of the above

A

A. Social engineering

193
Q

Giving full control to users makes a system admin’s job easier and is inherently more secure

true or false

A

false

194
Q

Jake runs a small I.T. firm. He wants to minimize the amount of devices purchased for employees. Of the following which would suite his needs best?

A. VDI
B.BODYE
C. BOYE
D. BYOD

A

D. BYOD

195
Q

Karen notices that her windows 7 machine has slowed down. Seems every time she tries to open anything it’s taking double the amount of time it use to. What can Karen do to remedy the situation?

a. Reformat her hard drive
b. Change boot order
c. defrag the hard drive
d. partition drive

A

C. defrag the hard drive

196
Q

Jim gets a notification that updates will be installed on next start up. If Jim wants the updates to be installed as soon as possible he should…

A. Reboot
B. Power down
C. Reset BIOS
D. Install patches

A

A. Reboot

197
Q

Lenny has intermittent connectivity on his work laptop. A push notification states he and another machine have duplicate IP’s. What most likely has happened

A. DNS Spoof
B. DHCP load balance
C. IP address conflict
D. Static ICP

A

C. IP address conflict

198
Q

Samantha wants to reduce the time it takes for her profile to load. Samantha is using a windows 8 machine with 16gb of ddr4 ram. What’s the first thing Samantha should do? Choose two

A. Disable startup apps
B. Replace RAM with dual channel
C. Disable unused services
D. Throttle CPU

A

A. and C.

Disable startup apps and unused services

199
Q

Janis has a CD with windows 7 OS that she wants to install on her XP machine. How can she boot from this CD upon startup.

A. Disable BIOS
B. Update boot order
C. Run XP in windows 7 mode
D. Update C: drive chmod

A

B. Update boot order

200
Q

Carl updates the drivers for his mouse, restarts his machine then goes to the store. Once he comes back home he hops onto his machine. The mouse seems to jump around the screen and is appear at times. What’s the first thing carl should do?

A. Roll up mouse drives
B. Rollup CPU drivers
C. Reduce GHZ output
D. Roll back drivers

A

D. Roll back drivers

201
Q

Larry can barely see the text on his smartphone screen. He needs to send a very important email in the next 10 minutes. What should he do first/

A. Reset his phone
B. Turn up brightness
C. Uninstall email app
D. Restart OS

A

B. Turn up brightness

202
Q

Susan is visiting Seattle for a real estate conference. She tries to connect to the wi-fi but gets disconnect seconds after connecting. Of the following what most likely is happening?

A. Hotspot duplication
B. Device saturation
C. WPA2 vortex
D. OS opt out

A

B. Device saturation

203
Q

Lin is waiting at a bust stop in Chicago. He wants to buy a few last minute Christmas gifts, he proceeds to take out his phone. He tries to use the touch screen but it is unresponsive. What most likely is the issue?

A. Wearing insulated gloves
B. Cold temperatures induce screen freeze
C. His phone needs an update
D. None of the above

A

A. He is wearing insulated gloves

204
Q

Ronnie wakes up for work at 6am. He takes his fully charged phone off the charger and is out the door by 7:30. He arrives to work at 9 and notices his phone only has a 15% charge? What should Ronnie try to fix the issue?

A. Factory reset
B. Closed unused apps
C. Replace the battery
D. Turn off GPS

A

B. Replace the battery