A+ 4th Flashcards

1
Q

list the storage devices from least Volatile(requires power to save data) to most.

HDD

CPU Cache

Removable Storage

Ram

SSD

A

Least to Most

Removable Storage

HDD

SSD

RAM

CPU Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of portable storage media type is most commonly used in modern mobile devices including smartphones, tablets, drones, and cameras?

Compact Flash

microSD

USB Flash Drive

MultiMediaCard

A

microSD

A microSD card is the smallest and most modern flash memory storage type being commonly used in modern devices for the storage of photos and media. Capacity and speed of a microSD card can vary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of server provides an access control system for the network?

DNS server

Authentication Server

Mail server

DHCP server

A

Authentication Server

An authentication server is one that consolidates authentication services across multiple access devices, such as switches, routers, and access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following methods of network access control involves using a secure server room and/or lockable hardware cabinets?

Physical port security

MAC Filtering

Port-based Network Access Control

Firewalls

A

Physical port security

Access to the physical switch ports and switch hardware should be restricted to authorized staff, using a secure server room and/or lockable hardware cabinets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which cloud deployment type is targeted towards only a certain group of users?

Hybrid

Community

Private

Public

A

Community

Community clouds are available only to a certain group. Individuals using a cloud application for project purposes is an example of a community cloud.

Public clouds are available to anyone. A service freely available to the general public is a public cloud example.

Hybrid clouds are a combination of public and private cloud type. An example of hybrid cloud usage can be the use of public cloud storage services for an internal private cloud application.

Private clouds are available within an organization. An organization’s Intranet is an example of a private cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which protocol defines how a client can query and update network resources?

Lightweight Directory Access Protocol (LDAP)

Common Internet File System (CIFS)

File Transfer Protocol (FTP)

Simple Network Management Protocol (SNMP)

A

Lightweight Directory Access Protocol (LDAP)

WHAT YOU NEED TO KNOW
The Lightweight Directory Access Protocol (LDAP) defines how a client can access information, perform operations, and share directory data on a directory server. Network resources are objects within the directory, which is like a database.

Common Internet File System (CIFS), also known as Server Message Block (SMB), is the application protocol underpinning file and printer sharing on Windows networks.

File Transfer Protocol (FTP) allows a client to upload and download files from a remote server. It is widely used to upload files to websites.

The Simple Network Management Protocol (SNMP) is a framework for management and monitoring network devices. SNMP consists of a management system and agents.

previous
finish review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following connectors can have audio and video pass through it?

Digital Visual Interface (DVI)

RGB (Red, Green, and Blue)

High Definition Multimedia Interface (HDMI)

Video Graphics Array (VGA)

A

High Definition Multimedia Interface (HDMI)

The High Definition Multimedia Interface (HDMI) is the most widely used graphic device interface. HDMI supports both video and audio digital streams, plus remote control and digital content protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have a single user who cannot connect to the Internet, but the user can connect to all internal servers, printers, and internal web servers. What should you check as the probable cause?

Check the user’s access credentials on the router.

Call your Internet provider to see if the user’s computer has been denied Internet access.

Check the user’s browser’s proxy settings.

Check to see if the user has both Wi-Fi and a wired connection are enabled.

A

Check the user’s browser’s proxy settings.

This problem likely resides with the browser’s proxy settings configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user is experiencing an error with an application and wants to recreate the issue for you to see. What can you do to accomplish this without traveling to the user’s location?

Instruct the user to send a request for remote assistance using Windows Remote Assistance tool.

Use SSH to connect securely to the user’s computer and examine the application logs remotely.

Use a Remote Desktop Connection to the user’s computer.

Run a Telnet program to connect to the Telnet Daemon on the user’s computer.

A

Instruct the user to send a request for remote assistance using Windows Remote Assistance tool.

Remote Assistance allows a user to ask for help from a technician or co-worker. The “helper” can then connect and join the session while the user is still logged into the machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In Windows Firewall properties, how can you prevent a specific port from receiving traffic?

Use the “Allow” state for outbound connections and create a rule to block the port.

Use the “Block” state for inbound connections and create a rule to block the port.

Use the “Block” state for outbound connections and create a rule to allow the port.

Use the “Allow” state for inbound connections and create a rule to block the port.

A

Use the “Allow” state for inbound connections and create a rule to block the port.

When using the “Allow” state for inbound connections, you must create rules for any incoming connections you wish to block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What could a loud noise coming from a computer fan indicate?

There is a driver problem.

The hard drive is failing.

The computer is not getting power.

The computer is too cold.

A

There is a driver problem.

A fan that sounds noisy may be spinning too fast because its driver software is not controlling it properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are working on a project that requires virtualizing an operating system (OS) for an end user to test an application. It has been requested that you use a type-2 hypervisor to accomplish this. Which of the below would fulfill that requirement?

KVM

VMWare ESX

Oracle VM Server

Microsoft Hyper-V

A

KVM

KVM is an open-source Linux-based type-2 hypervisor that is used with most Linux operating systems including Ubuntu, Debian, and SUSE. A type-2 hypervisor installs on top of a host operating system and does not have direct access to the underlying hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the best solution to fix slow disk performance?

Add more RAM.

Replace the hard drive.

Use the Disk Cleanup program to free up space.

Upgrade the hard drive.

A

Add more RAM

Slow disk performance is often a bottleneck for modern computer systems. In this case the best solution may be to add more RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are in the process of moving a virtualized environment from an old host computer to a new host computer. You are using VMWare Workstation for the virtualization. You have forgotten where you have saved the guest virtual disk image files on the old host computer. What file extensions can you search for so you may copy the disk images to the new host computer?

vhdx

vhd

vfd

vmdk

A

VMDK

A vmdk file is a virtualization storage format that is associated with VMWare Workstation and ESX server products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of the International Mobile Equipment Identity (IMEI) number on a mobile phone?

It can uniquely identify the subscriber’s network using the Global System for Mobile Communications (GSM) network.

It can identify the location of the device to determine the best available radio tower and satellite.

It can uniquely identify the device in the Equipment Identity Register (EIR) database.

It can identify the manufacturer and equipment serial number of the device.

A

It can uniquely identify the device in the Equipment Identity Register (EIR) database.

The IMEI number is a unique identifier for mobile phones. For a mobile phone to connect to and be identified by a cellular network, the IMEI number is registered by the service provider in the EIR database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is an example of an IaaS (Infrastructure as a Service) service?

Dropbox

AWS

Google App Engine

Cisco WebEx

A

AWS

AWS (Amazon Web Services) is a popular IaaS service. AWS contains many sub-services that can be further individually categorized into other cloud types of service such as SaaS (Software as a Service) and Paas (Platform as a Service).

17
Q

With Microsoft Hyper-V, different types of virtual switches can be created. Which switch type is only usable by the guest virtual machines on the Hyper-V host?

Teamed

Internal

Private

External

A

Private

A private switch created with Microsoft Hyper-V is a switch that is only usable by the guest virtual machines. For example, with this type of switch a Linux guest and a Windows guest could communicate with each other but not with the host or any other physical machines on the network.

An internal switch created with Microsoft Hyper-V is a switch that is usable by the guest virtual machines and the host. For example, with this type of switch a Linux guest and a Windows guest could communicate with each other and with the host, but not any other physical machines on the network.

An external switch created with Microsoft Hyper-V is a switch that is usable by the guest virtual machines and the host. For example, with this type of switch a Linux guest and a Windows guest could communicate with each other, the host, and any other physical machines on the network.

Teamed refers to virtually teaming physical network cards together and does not apply to creating a Hyper-V virtual switch.

18
Q

Which of the following is a feature of USB on the Go (OTG)?

It allows for connections to multiple peripherals at once.

It allows for faster data rates than a typical USB connection.

It allows for rapid charging at 5V.

It allows a port to function as a host or a device.

A

It allows a port to function as a host or a device.

USB on the Go (OTG) is a feature that allows for a mobile device port to function as a host or a device. As an example, the smartphone can function as a host when a keyboard is connected and as a device when it is connected to a PC.

19
Q

Which DVI (Digital Visual Interface) configuration has a bandwidth of 7.4 Gbps (Gigabits per second)?

DVI-A

DVI-D dual link

DVI-D single link

DVI-I single link

A

DVI-D dual link

DVI-D (Digital Visual Interface – Digital) dual link has a bandwidth of 7.4 Gbps (Gigabits per second) and can transmit HDTV (High Definition Television) at 85 fps (frames per second) but supports digital equipment only, as noted by the -D in the name of the configuration.

20
Q

Which of the following system form-factors is NOT used for embedded and portable computers?

Mobile-ITX

Micro-ATX

Pico-ITX

Nano-ITX

A

Micro-ATX

Micro-ATX is a system form-factor for small desktop PC systems that support a 9.6 x 9.6” (244 x 244 mm) system board.

21
Q

How do you configure a proxy server in Windows?

Select the “Obtain an IP address automatically” option on the General tab of the IPv4 Properties dialog.

Click the LAN Settings button on the Connections tab of the Internet Options dialog.

Click the Add VPN button on the Connections tab of the Internet Options dialog.

Define an alternative IP configuration on the Alternate Configuration tab of the IPv4 Properties dialog

A

Click the LAN Settings button on the Connections tab of the Internet Options dialog.

To configure a proxy server in Windows, click the LAN Settings button and check the box to use a proxy server. Then, you can enter the address and port for the proxy server.

22
Q

Where is the memory controller located in a Core 2 Duo system?

On the CPU

On memory

Within the PCIe controller

Within the chipset

A

Within the Chipset

On Core 2 Duo, Quad, and Extreme systems, the memory controller is located within the chipset and is known as the Memory Controller Hub (MCH) by Intel, but it is also referred to as the northbridge.

23
Q

When you bootup your brand-new computer, you hear a single short beep, but the screen is blank. You are using a “known-good” monitor that is connected properly and turned on. What could be the problem?

There is a system memory problem.

There is a problem with the graphics card.

There is a problem with the motherboard.

There is a problem with the Real Time Clock battery.

A

There is a problem with the graphics card.

If the screen is blank on bootup but you hear a single beep, check the monitor is turned on and connected properly. Try testing the monitor with a different computer. If the monitor is OK, try replacing the graphics adapter.

24
Q

The video card on your computer only has a single, 24-pin grey output, but you want to connect it to an HD TV. Which adapter should you use to connect your computer’s digital signal to your HD TV’s to display video?

Thunderbolt to DVI adapter

DVI to HDMI adapter

DVI to VGA converter

USB A to USB B adapter

A

DVI to HDMI adapter

You would use a DVI to HDMI adapter. The connector on your video card may not always be shown in a grey color, but a 24-pin digital signal would be a DVI-D (dual link) port that can connect your computer’s digital signal to an HD TV’s.