A+ 3rd Flashcards

1
Q

Where do you go to set up a Proxy server for a vpn under Internet Properties?

Select the Setup button under Setup an Internet Connection.

Select the setting button under Dial-up and virtual private network settings

Select security Tab

Add VPN button under Dial-up and virtual Private Network settings

Select the LAN settings button under Local Area Network settings

Security tab and click manage certificates

A

to set up a proxy server you will select the setting button under Dial-Up and virtual Private Network Settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are working from home. Where do you go to set up a new private connection? Under Internet Properties.

Select the Setup button under Setup an Internet Connection.

Select the setting button under Dial-up and virtual private network settings

Select security Tab

Add VPN button under Dial-up and virtual Private Network settings

Select the LAN settings button under Local Area Network settings

Security tab and click manage certificates

A

To set up a new private connection , you’ll select the add VPN button under Dial-up and Virtual Private Network Settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

where do you go to review your trusted or restricted sites? Under Internet Properties.

Select the Setup button under Setup an Internet Connection.

Select the setting button under Dial-up and virtual private network settings

Select security Tab

Add VPN button under Dial-up and virtual Private Network settings

Select the LAN settings button under Local Area Network settings

Security tab and click manage certificates

A

You will select the security tab in Internet Properties pop up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where do you go to configure settings for other areas of your Local Area Network?

Select the Setup button under Setup an Internet Connection.

Select the setting button under Dial-up and virtual private network settings

Select security Tab

Add VPN button under Dial-up and virtual Private Network settings

Select the LAN settings button under Local Area Network settings

Security tab and click manage certificates

A

Select the LAN settings button under Local Area Network (LAN) Settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where do you go to configure a new internet connection?

Select the Setup button under Setup an Internet Connection.

Select the setting button under Dial-up and virtual private network settings

Select security Tab

Add VPN button under Dial-up and virtual Private Network settings

Select the LAN settings button under Local Area Network settings

A

Select the Setup button under Setup an Internet Connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you view your SSL certificates?

Select the Setup button under Setup an Internet Connection.

Select the setting button under Dial-up and virtual private network settings

Select security Tab

Add VPN button under Dial-up and virtual Private Network settings

Select the LAN settings button under Local Area Network settings

Security tab and click manage certificates

A

Security tab and click manage certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Internet Control Message Protocol (ICMP)?

The protocol that delivers status and error messages at the network layer

The directory of domain names and IP addresses

When a router converts the client’s private IP address into a valid public address

A secure tunnel through a public network that connects two ends of a private network

A

The protocol that delivers status and error messages at the network layer

ICMP (Internet Control Message Protocol), which works at the network layer, delivers status and error messages and is used by diagnostic utilities such as ping and tracert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main challenge with not having a BYOD (Bring Your Own Device) program at a place of employment?

Device types

Firmware Updates

Application Installations

Security Management

A

Security Management

Security management is a growing concern for organizations that do not have a BYOD (Bring your Own Device) program in place. As more and more personal mobile devices have made their way into the workplace, making sure that security management is in place is important. A BYOD program can address what is or isn’t allowed regarding personal mobile devices and the organizations data and network use. Without a BYOD program in place, company data may be at risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rapid elasticity cloud services refer to which dynamically allocated resource?

Storage

CPU

Network Bandwith

RAM

A

Storage

Storage space is a resource that is allocated as a rapid elasticity resource. Rapid elasticity cloud services are services that are implemented dynamically and seamlessly as needed and requested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can you determine for certain if you receive “destination unreachable” message when your ping is unsuccessful?

The switch is broken.

The physical cabling is bad.

ICMP is being blocked by a firewall.

There is no routing information.

A

There is no routing information.

“Destination unreachable” means there is no routing information (that is, the local computer or an intermediate router does not know how to get to that IP address).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In a large network, to which of the following devices would you assign a static Internet Protocol version 4 (IPv4) address?

Proxy server

Workstation

Mobile device

Unmanaged switch

A

Proxy server

A proxy server must have a static IP address. User machines are configured with the proxy’s IP address and pass Internet requests to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of memory stores address information?

DRAM

Registered

Parity checking

DDR SDRAM

A

Registered

Registered (buffered) memory has an extra component that stores address information, taking some load off the memory controller. It does not correct errors in Random Access Memory (RAM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of printer allows you to print text files to an image file format (such as a .JPEG) so that you can email an image of the text to a colleague?

Virtual printer

Laser printer

Inkjet printer

Network printer

A

Virtual printer

A virtual printer allows you to print textual files as images, as well as print to a file, PDF, or XPS for the purposes of sending a file online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Space is at a minimum in a user’s office. You have been tasked with building out the smallest system you can for this user. What motherboard form factor would you choose?

Nano-ITX

Micro-ATX (mATX)

ATX

Mini-ITX (mITX)

A

Mini-ITX (mITX)

Small Form Factor (SFF) PCs often use VIA Technologies’ mITX (Mini-ITX) form factor. mITX is 6.7” wide by 6.7” deep (170x170mm) with one expansion slot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do you need to be aware of when hot swapping a faulty RAID disk?

All RAID solutions allow hot swapping.

Hot swapping a faulty RAID disk requires you to shut down the OS.

Hot swapping uses cabled connectors.

You should not remove a healthy disk from the array.

A

You should not remove a healthy disk from the array.

When hot swapping a faulty disk, take caution not to remove a healthy disk from the array as making a mistake could cause the array to fail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following Intel CPUs are laptop only chips?

Core Duo

Core 2

Core i3

Celeron

A

Core Duo

Core Duo is an Intel brand of mobile CPU that is found only in laptops. This chip’s predecessor the Core Solo is also a laptop only chip. The Core 2 brand of chip is used in both laptops and desktops.

17
Q

You are shopping for a new tablet. You are hoping to make a purchase that includes a stylus pen. Which of the following satisfies the stylus requirement of touch sensitivity.

A

Active

An active stylus includes electronics within the stylus that enable features, such as menu options via buttons on the stylus, and touch sensitivity. A tablet would need to support an active stylus in order for one to be used with it.

18
Q

What is the drawback of only testing connections to servers by trying to use them?

It measures the RTT for latency.

It is only dependent on a working link and IP configuration.

It cannot conclude whether a problem is with an application or if it is a network fault.

It uses ICMP to requests to find out the status of hosts on the network.

A

It cannot conclude whether a problem is with an application or if it is a network fault.

One drawback of connections to servers simply by trying to use them is that there could be some sort of application fault rather than a network fault.

19
Q

Which of the following cases are used for high-end user personal computers (PCs)?

Mid tower case

Slim line case

Full tower case

Mini tower case

A

Mid tower case

Mid tower cases are used for high-end user PCs. These PCs do require extra devices and adapter cards, but not as many as a server. A tower case is designed to sit vertically on a surface, so that it is taller than it is wide.

20
Q

There is no current standard that dictates the size and form factor of fan connectors. Which of these is NOT one of the common connectors?

4-pin port

3-pin Molex KK

4-pin Molex KK

4-pin Molex

A

4-pin port

Internal USB connections are made via 9-pin headers, which accept up to two 4-pin port connections (the 9th pin is to orient the cable correctly). Fan connectors are 3-pin and 4-pin Molex KK and 4-pin Molex.

21
Q

Which of the following ports on a mobile device does Bluetooth use for communication?

A

Logical

Bluetooth uses a logical port for communications. This means that there is no actual physical port, such as a USB port to make the connection to another device.

22
Q

Which device can divide ports into Virtual Local Area Networks (VLANs)?

Unmanaged switch

Bridge

Router

Managed Switch

A

Managed Switch

A managed switch will work as an unmanaged switch out-of-the-box but an administrator can connect to it over a management port, configure security settings, and then choose options for the switch’s more advanced functionality, such as configuring VLANs.

23
Q

You have installed a Linux operating system in a virtualized environment by using Hyper-V on your Windows 10 desktop computer. You now need to configure networking so the virtual machine can communicate with other systems. What setting do you need to configure within Hyper-V settings?

Virtual switch

Gateway address

IP address

LAN adapter

A

Virtual switch

The virtual switch within Hyper-V is used to connect the guest virtual machine to the network. A virtual switch can be configured so guest virtual machines can only communicate with one another, or also with the host and the external network as well.

24
Q

What is the first thing you should test if you are experiencing problems with AC power?

The LED on the AC adapter

The outlet

The peripherals

The DC socket

A

The outlet

If you experience problems working from AC power, first test the outlet with a ““known good”” device (such as a lamp).

25
Q

Which of these would cause no image to display on a monitor?

Hardware acceleration is too high.

The monitor is in standby mode.

The refresh rate is too low.

The brightness controls are turned all the way down.

A

The monitor is in standby mode.

If there is no image displayed on the monitor, make sure that the monitor is plugged in and turned on. Check that the monitor is not in standby mode (press a key or cycle the power to the monitor to activate it).

26
Q

You need to configure a SOHO (Small Office Home Office) network to provide Internet Protocol (IP) Addresses only to devices allowed on the network. You have configured a list of devices that are allowed to access the network. Which feature should be enabled?

DNS (Domain Name System)

DHCP (Dynamic Host Configuration Protocol)

SSID (Service Set Identifier)

MAC (Media Access Control) Filtering

A

MAC (Media Access Control) Filtering

MAC (Media Access Control) Filtering refers to a security access control method whereby the MAC address, unique to each network card, is used to determine access to the network. IP addresses are assigned to network devices.

27
Q

Which command line tool shows open ports on the host?

nslookup

netstat

ping

tracert

A

netstat

The netstat tool can be used to investigate open ports and connections on the local host. You can use this tool to verify whether file sharing or email ports are open on a server and whether other clients are connecting to them.

28
Q

Modern guest virtual machine disk images created with Microsoft Hyper-V have what file extension?

vmdk

vhdx

vfd

vhd

A

vhdx

A vhdx file extension is associated with newer Hyper-V virtual machine disk images. Originally the file extension was vhd. The change between the two types brought many improvements, the most notable being a capacity increase. A vhd has a limit of 2 TB whereas a vhdx has a limit of 64 TB.

29
Q

At which of the following frequencies does a Bluetooth connected mobile device communicate?

1333 MHz

5 GHz

2133 MHz

2.4 GHz

A
  1. 4 GHz
  2. 4 GHz (Gigahertz) is the frequency in which Bluetooth operates. Many devices actually use the 2.4 GHz frequency including WiFi devices and Access Points (AP), cordless telephones, wireless video, baby monitors, and more. To prevent interference with each other, many devices allow the ability to change the channel being used within the 2.4 GHz frequency.
30
Q

In a laptop, what can be easily accessed by removing the screw plate on the back cover of the laptop?

The WiFi card

The portable battery

Peripheral devices

The digitizer

A

The WiFi card

Some Field Replaceable Units (FRUs) can be accessed easily by removing a screw plate on the back cover (underside) of the laptop. This provides access to the disk drive, optical drive, memory modules, and possibly Mini PCIe adapters such as Wi-Fi cards and modems.

31
Q

You want to build a computer that can stand upright on a desk and takes up the least amount of space possible. Which case type should you select?

Mini-ITX

HTPC

ATX mid-tower

Micro-ATX slim tower

A

Micro-ATX slim tower

Micro-ATX (Advanced Technology Extended) slim towers are designed to be able to stand upright on desks, reducing the amount of space they require.

32
Q

What service uses port 110?

HyperText Transfer Protocol (HTTP)

Domain Name System (DNS)

Secure Shell (SSH)

Post Office Protocol 3 (POP3)

A

Post Office Protocol 3 (POP3)

The Post Office Protocol 3 (POP3) uses port 110. POP3 is an Internal mail protocol for retrieving emails.

33
Q

Which of these is a cause of a computer problem?

The user cannot do work.

Get the drive replaced.

The computer is displaying a “blue screen”.

A computer has a faulty hard drive.

A

A computer has a faulty hard drive.

If a computer system has a fault in the hard disk drive, then that is a cause of a problem.

34
Q

Which of the following cloud services offers a cloud based web development and deployment platform?

PaaS

S3

SaaS

IaaS

A

PaaS

PaaS (Platform as a Service) is a cloud based offering that provides a platform for developers to create web based applications and deploy them. Examples of PaaS components would be web servers, application engines and their functionality.

IaaS (Infrastructure as a service) is a cloud based offering that provides the ability for the creation of a data center in the cloud. Examples of components in an IaaS environment would include virtual servers, switches, gateways, address pools, and more.

SaaS (Software as a Service) is a cloud based offering that provides application access to users via the Internet. Examples of popular SaaS applications are Office 365, Google Suite, SalesForce, and Zoho Office.

35
Q

Which one of these notable corporate features of Windows Pro, Enterprise, Ultimate, and Education editions encrypt all the data on a drive?

Domain network

BitLocker

Encrypting File System (EFS)

BranchCache

A

BitLocker

BitLocker enables the user to encrypt all the information on a disk drive. Encryption means that data on the device is protected even if someone steals it (so long as they cannot crack the user password).

36
Q

You need to do some application testing. You have a Windows 10 desktop and decide to use Hyper-V to create virtual environments to test the applications in. You do not want the guest virtual machines to be able to communicate with any other physical system on the network: however, communication between the guests and the hosts is allowed. Which type of virtual switch should you create in Hyper-V?

Private

External

Virtual LAN

Internal

A

Internal

An internal switch created with Microsoft Hyper-V is a switch that is usable by the guest virtual machines and the host. For example, with this type of switch a Linux guest and a Windows guest could communicate with each other and with the host, but not any other physical machines on the network.

37
Q

The Director of your company is traveling out of the country with the company laptop. Which feature will you need to configure to prevent theft of the laptop?

The LoJack tracking software

The drive lock BIOS password

The TPM security chip on the motherboard

The system BIOS password

A

The LoJack tracking software

Some laptop firmware is bundled with LoJack tracking software, essentially a security rootkit designed to prevent theft. If the laptop is reported stolen, the authorization servers can force the laptop into a locked down mode.

38
Q

Which of these cabling media types is NOT common to Local Area Networks (LANs) environments?

Straight tip

F-connector

RJ-45

SC

A

F-connector

Coax installations use screw-down F-connectors. They are an inexpensive, gendered, threaded, compression connector for radio frequency signals. A broadband cable service, for example, is likely to use the F-connector for drop cables.