A+ 2nd test Flashcards

1
Q

Which protocol defines how a client can query and update network resources?

File Transfer Protocol (FTP)

Simple Network Management Protocol (SNMP)

Lightweight Directory Access Protocol (LDAP)

Common Internet File System (CIFS)

A

The Lightweight Directory Access Protocol (LDAP)

The Lightweight Directory Access Protocol (LDAP) defines how a client can access information, perform operations, and share directory data on a directory server. Network resources are objects within the directory, which is like a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What speed does Thunderbolt 3 support?

10 Gbps

20 Gbps

5 Gbps

40 Gbps

A

40 Gbps

Thunderbolt 3 doubles the speed of the prior version 2 by supporting speeds of up to 40 Gbps over a short high-quality cable (up to 0.5 m / 1.6 ft). Thunderbolt 3 uses a USB-C connector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What service uses port 80?

Post Office Protocol 3 (POP3)

HyperText Transfer Protocol (HTTP)

Domain Name System (DNS)

Secure Shell (SSH)

A

HyperText Transfer Protocol (HTTP)

The HyperText Transfer Protocol (HTTP) uses port 80. HTTP enables clients (typically web browsers) to request resources from an HTTP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the first thing you should do if you are experiencing battery problems with your laptop?

Expose the battery to extreme heat.

Use a “known good” battery.

Test the power circuitry on the motherboard.

Check if the battery is correctly inserted.

A

Check if the battery is correctly inserted.

If working from the battery, first check that it is inserted correctly and seated properly in its compartment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the defining quality of a network-based printer?

It uses 802.11x technology and manages its own print queue.

It connects directly to a specific computer.

It uses Bluetooth technology to connect to other computers.

It is managed by a network computer called a print server.

A

It is managed by a network computer called a print server.

The defining aspect of a network-based printer is that it is managed by a network computer called a print server. The print server holds the print queue, not the networked printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of having an accelerometer in a laptop?

To provide navigation

To orient the screen

To protect the hard drive

To overclock the CPU

A

To protect the hard drive

A laptop may have an accelerometer built in. This hardware technology detects if the laptop has suddenly dropped by using a sensor to detect sudden rapid movement such as a free fall. As a result, the hard drive will stop spinning and it will use measures to prevent itself from crashing and failing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the first thing you should do when troubleshooting the built-in display on a laptop?

Send it to get it repaired.

Connect the laptop to an external monitor.

Check that the cutoff switch is not stuck.

Check if the settings are in energy saving mode.

A

Connect the laptop to an external monitor.

When troubleshooting the built-in display, first check that the video card is good by using an external monitor. Toggle the appropriate Fn key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You need to build out the networking for your small local business. You have purchased a core switch and will pull home runs to each of the devices. What type of cabling will you use to connect your network?

Use a RG-6 patch cable.

Use a RJ-11 cable.

Use a RG-59 patch cable.

Use a RJ-45 cable.

A

Use a RJ-45 cable.

A RJ-45 (Registered Jack) connector is used with twisted pair cable for Ethernet local area networking products with RJ-45 ports, such as the core switch you have installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following ACPI (Advanced Configuration and Power Interface) power modes would cut power to most of a laptop’s devices and peripherals, but would maintain power to system memory to save the system’s state when the battery may be running low?

Hibernate

Standby

Energy Star

ACPI Mode S4

A

Standby

Standby mode cuts power to most devices and peripherals on a system and suspends the system to RAM. These means that power is provided to memory in order to save the system’s current state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are building a new server and need to ensure that it has the highest achievable disk fault tolerance. Which type of RAID (Redundant Array of Independent Disks) do you need?

RAID 10

RAID 1

RAID 0

RAID 5

A

RAID 10

RAID 10 is a combination of both RAID 0 (Striping without Parity) and RAID 1 (Mirroring). This configuration provides a high level of fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of networking problem does encryption help resolve?

Unsecured traffic is easily intercepted by authorized devices snooping on the network.

Hackers are easily able to determine the internal IP address scheme of a network.

Network admins need to manually configure Transmission Control Protocol/Internet Protocol (TCP/IP) information on every client device.

Users are experiencing lag in time-sensitive applications such as video chat and streaming.

A

Unsecured traffic is easily intercepted by authorized devices snooping on the network.

Encryption scrambles the messages being sent over a network so that anyone intercepting them is not able to capture any valuable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following authentication methods allows for Single Sign On (SSO) on a network?

Username/password

Host-based authentication

Public key authentication

Kerberos

A

Kerberos

Kerberos allows Single Sign On (SSO) on a network that runs the Kerberos authentication protocol. Windows Active Directory domain networks use Kerberos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following cloud services offers application hosting with web based management and access for users?

PaaS

SaaS

IaaS

Elastic

A

SaaS

SaaS (Software as a Service) is a cloud based offering that provides application access to users via the Internet. Examples of popular SaaS applications are Office 365, Google Suite, SalesForce, and Zoho Office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is true about identifying the cause of a problem?

There is always only one cause to every problem.

The solution to a problem will never cause additional problems.

It is better to be methodical, than to resolve the problem quickly.

You must balance being methodical with being efficient.

A

You must balance being methodical with being efficient.

In the real world, you often must balance being methodical (so that possible causes are not overlooked) with being efficient (so that the problem can be solved quickly).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A user has lost the charging cable for their company issued Android smartphone. You are tasked with providing them with a replacement. The user has requested to make the cable work with their device without an adapter. While you would need to know the specific make and model of the device to supply the correct charging cable, you can immediately rule out one of the following cables:

Micro-USB

Mini-USB

USB Type B

USB Type C

A

USB Type B

USB Type B connectors are typically utilized for connecting devices such as printers and while they can provide power to devices, they are not used with Android devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are installing a Redundant Array of Independent Disks 1 (RAID 1) and want to ensure that the controller card is not a single point of failure. What technique do you need to employ in this configuration?

Disk partitioning

Disk mirroring

Disk duplexing

Disk striping

A

Disk duplexing

In a RAID 1 configuration, data from an entire partition is duplicated on two identical drives through duplexing.

17
Q

Which of these is a type of fiber optic connector?

F-connector

RJ-45

Straight tip

BNC

A

Straight tip

A straight tip connector (ST connector) is a connector used in fiber-optic cables that utilizes a bayonet-style plug and socket; used mostly for multi-mode networks. The ST connector setup allows for unidirectional communication, so two ST connectors and two fiber cables are used for bidirectional communication.

18
Q

Which of these is true about Solid State Disks (SSDs)?

SSD’s only use mSATA or m.2 connectors.

SSDs utilize faster spinning platters.

SSDs use magnetic disk technology.

SSDs use flash memory.

A

SSDs use flash memory.

Solid State Drives (SSDs) use flash memory technology offering much faster performance and less weight and power consumption than Hard Disk Drives (HDDs). SSDs are now the mainstream choice for laptops.

19
Q

What is the main connection difference between USB-A and other versions of USB?

The connector is square with a beveled top.

The connector is small and beveled.

The connector is a large flat rectangle.

The connector is small, flat and reversible.

A

The connector is a large flat rectangle.

You use USB Type A to connect to a host. The connector and port are shaped like large flat rectangles.

20
Q

Which of the following is used to distinguish between the host number and the network number?

Broadcast address

Subnet mask

Default gateway

IPv4

A

Subnet mask

A subnet mask (or netmask) is used to distinguish these two components within a single IP address. It is used to “mask” the host ID portion of the IP address and thereby reveal the network ID portion.

21
Q

How can you verify whether a solution you apply fixes a problem?

Substitute the part for a “known good” one.

Eliminate any factors that could cause the problem.

Re-establish a new theory.

Document the outcomes.

A

Substitute the part for a “known good” one.

A basic technique when troubleshooting a cable, connector, or device is to have a ““known good”” duplicate to hand. This approach very quickly identifies ““non-causes.””

22
Q

Which of the following Hypervisors is included with Linux distributions?

KVM

VMWare Fusion

ESXi

Hyper-V

A

KVM

KVM is a virtualization hypervisor that is included with Linux distributions. It is an open source type-2 hypervisor. A type-2 hypervisor requires an underlying operating system and does not have direct access to the host system’s hardware.

23
Q

Which type of server provides an access control system for the network?

DHCP server

Authentication Server

Mail server

DNS server

A

Authentication Server

An authentication server is one that consolidates authentication services across multiple access devices, such as switches, routers, and access points.

24
Q

Under 802.1X, what is the term for the switch that waits for the device to send authentication data?

PNAC

Authenticator

Authenticating server

Supplicant

A

Authenticator

The authenticator is the switch that enables the Extensible Authentication Protocol over LAN (EAPoL) protocol and waits for the device to supply the authentication data.

25
Q

You are troubleshooting printer connectivity to the network. Where can you look for multiple failed print jobs?

In the Printer Spooler Properties

In the printer server logs

In the security group permissions

In the print queue

A

In the printer server logs

When troubleshooting printer connectivity to the network, you should check for multiple failed jobs in the print server’s log, look up error codes, or look through the logs from the device itself.

26
Q

Which of the following storage technologies is used by hard disk drives?

Optical

Impact

Magnetic

Solid-state

A

Magnetic

Magnetic storage or magnetic recording is the storage of data on a magnetized medium. Magnetic storage is one of the most affordable ways to store large amounts of data on hard disk drives.

27
Q

Which port is typically known as a serial port?

SCSI

COM1

DVI

LPT1

A

COM1

COM1 (communications port 1) is a serial port; it sends or receives one bit at a time, up to 115,200 Kilobits Per Second (Kbps). A typical example is the 9-pin male D-shell (DB-9).

28
Q

What do the terms “cloud printing” and “remote printing” refer to?

The ability to print from a mobile device that normally doesn’t have print capabilities

The ability to send a print job to a printer that is directly connected to the local machine

The ability to manage a networked printer with a dedicated computer called a print server

The ability to print documents in a digital format such as a Portable Document Format (PDF)

A

The ability to print from a mobile device that normally doesn’t have print capabilities

As the prevalence of mobile devices continues to increase, the ability to print from mobile devices that don’t usually have the ability to print is becoming more important. This is referred to as remote printing or cloud printing.

29
Q

What is the best solution if a single app you downloaded on your mobile device is not responding?

Perform a factory reset.

Perform an app reset.

Perform a “hard” reset.

Perform a “soft” reset.

A

Perform an app reset.

If a single app is not responding, the best solution is usually to perform an app reset.

30
Q

What service uses port 22?

Post Office Protocol 3 (POP3)

Secure Shell (SSH)

HyperText Transfer Protocol (HTTP)

Domain Name System (DNS)

A

Secure Shell (SSH)

Secure Shell (SSH) over TCP port 22 is used to securely connect to a remote host (typically via a terminal emulator) and was designed to replace programs such as Telnet and FTP.

31
Q

A user is requesting to be able to virtualize a Windows 10 Professional workstation on their computer. You learn that the user has an Apple computer. Which virtualization solution do you choose to install?

Hyper-V

VMWare Workstation

VMWare Fusion

ESXi

A

VMWare Fusion

VMWare Fusion is type-2 virtualization hypervisor that can be used to run guest operating systems on an Apple computer. A type-2 hypervisor requires an underlying operating system and does not have direct access to the host system’s hardware.

32
Q

Which DVI (Digital Visual Interface) configuration has a bandwidth of 7.4 Gbps (Gigabits per second)?

DVI-D dual link

DVI-A

DVI-I single link

DVI-D single link

A

DVI-D dual link

DVI-D (Digital Visual Interface – Digital) dual link has a bandwidth of 7.4 Gbps (Gigabits per second) and can transmit HDTV (High Definition Television) at 85 fps (frames per second) but supports digital equipment only, as noted by the -D in the name of the configuration.

33
Q

Which type of RAID level does NOT offer protection from a single drive failure?

RAID 10

RAID 1

RAID 0

RAID 5

A

RAID 0

RAID 0 (Striping without Parity) is not fault-tolerant. If one drive fails, all data in the RAID 0 array is lost requiring data to be recovered from a backup. It should not be used for mission-critical systems.

RAID 5 (Striping with Distributed Parity) writes error checking information across all the disks in the array. If a single disk fails, enough information is spread across the remaining disks to allow the data to be completely reconstructed.

RAID 10 is a combination of both RAID 0 (Striping without Parity) and RAID 1 (Mirroring). This configuration offers excellent fault tolerance as one disk in each mirror can fail and the array will still function.

RAID 1 (Mirroring) duplicates the data disk to a second disk. If one disk fails (degrading the array), the other takes over.

34
Q

An ordinary office environment needs computers that have multiple user account settings where each user is allocated private data storage. What type of workstations would you build for this environment?

Build a CAM workstation.

Build a thin client.

Build a virtualization workstation.

Build a thick client.

A

Build a thick client.

A thick (or standard) client is an ordinary “office” PC. It will be used to run locally installed desktop
Applications. A thick client can be configured with multiple user accounts with each having its own private data storage folders.
35
Q

You plan on purchasing a Windows 10 desktop to virtualize two Linux operating systems for web development purposes. You are in the market for a machine with an Intel processor. What CPU virtualization feature will you look for when shopping?

VT

AMD-X

Xeon

Multiple cores

A

VT

VT (Virtualization Technology) is an Intel technology that is included in many CPUs. Within a system BIOS, VT can be enabled or disabled. With VT enabled, virtualization platforms can take advantage of features that allow guest virtual machines to use a host CPU as if it were a dedicated CPU.