A+ Core 1 Practice Test Flashcards

1
Q

A vast majority of rural residents in the United States still use this internet connection type that utilizes the public switched telephone network (PSTN).

Wi-Fi

WISP

DSL

Satellite

A

DSL

A digital subscriber line (DSL) uses the higher frequencies available in copper telephone lines as a communications channel. The two major “flavors” of this type of connection are asymmetrical and symmetrical.

Various satellite internet solutions are available to rural residents, but they do not utilize the PSTN infrastructure.

A wireless internet service provider (WISP) uses ground-based long-range fixed access wireless technology. The WISP installs and maintains a directional antenna to bridge the customer’s network and the service provider.

Wi-Fi is the brand name for the IEEE 802.11 standards used to implement wireless local area networks (WLANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Microsoft Word crashes every time it opens, but otherwise, the computer runs fine. What is a reasonable proposed solution?

Replace the RAM.

Replace the PSU.

Uninstall and reinstall the program.

Dust the fan.

A

**Uninstall and reinstall the program **

Application crashes are difficult to diagnose, but if only a single program continues to crash, it is likely a corrupted program problem. The simplest fix would be to uninstall and then reinstall the program.

A faulty power supply unit (PSU) would result in the entire computer having problems, not just a single program.

Dust buildup can cause overheating in a fan system, but overheating would affect the whole computer, not just one program.

Replacing the random access memory (RAM) would solve a memory problem, but since only one program has issues, it is likely a corrupted program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A system administrator implemented a physical device that expedites cryptographic operations and manages cryptographic keys. What is this device the system administrator implemented?

TPM

Boot options

HSM

Secure boot

A

HSM

A hardware security module (HSM) is a secure USB key or thumb drive used to store cryptographic material.

A trusted platform module (TPM) is a specification for hardware-based storage of digital certificates, cryptographic keys, and hashed passwords.

Boot options define how the system firmware searches devices for a boot manager. It is one of the most important parameters in a system setup.

Secure boot is a unified extensible firmware interface (UEFI) feature designed to prevent a computer from being hijacked by malware. Under secure boot, the computer firmware configuration has cryptographic keys that can identify trusted code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What voltage range do appliances such as dryers, heavy-duty power tools, and oven ranges require?

220V

115V

120V

110V

A

220V

220V is a requirement for appliances because of the high-power range needed to supply them. The power requirement for 200V would be 900 watts of power. This range is typically in commercial applications for large motors and other equipment.

110V is present mainly in portable electronics and small appliances. 110V is typically safer to work with because of the fewer volts.

115V is similar to 110V and rated on a low range that would not support the appliances.

120V is in the same low range as 110V and 115V. 110V, 115V, and 120V have tests to operate at a lower voltage.

The reason that large appliances like clothes dryers, central A/C, and electric ranges is most economic. The units consume a lot of power (Watts). Power can be calculated as Voltage * Current. Bigger wires are required to carry higher currrents. Bigger wires contain more copper. More copper in a wire means you pay more per foot. Therefore in is economical to reduce the amount of current in a circuit. Since Voltage * Current = Power, with two appliances consuming the same amount of power, the one connected to the higher voltage will required less current and smaller wires.
Example: 2 dryers each 4400 Watts. Dryer 1 operates on 110V and dryer 2 operates on 220V.
Dryer 1 requires 4400W / 110 v = 40 Amps
Dryer 2 requires 4400W / 220V = 20 Amps
Both dryers will dry the clothes in the same amount of time, but dryer 2 will work on half the current and, therefore, require smaller, less expensive wires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A smartphone user tries to connect a new set of earbuds. What is the first step that the user does with the phone?

Enable Bluetooth.

Find a device for pairing.

Enable pairing.

Perform a PRL update.

A

Enable Bluetooth.

A Bluetooth wireless radio creates a short-range personal area network (PAN) to share data and connect to peripherals. Bluetooth needs to be enabled before pairing can begin.

To connect a peripheral device via Bluetooth, the Bluetooth radio on each device must be put into discoverable mode, which is also known as pairing mode.

Once a phone has Bluetooth and pairing mode enabled, a list of nearby devices will be listed for connecting. Selecting a device will begin the pairing process.

Information that a cellular radio needs to connect to a network is provided as a preferred roaming list (PRL). An update would update the list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An important part of testing a new application is running it under several different OSs and resource constraints so the developer can be sure it will work for all customers regardless of their system. What term is used to identify the application testing described in this question?

Cross-platform virtualization

Resource requirements

Sandbox

Test development

A

Cross-platform virtualization

Cross-platform utilization tests software applications under different OSs and resource constraints and is important to ensure the application is compatible across several different environments.

A sandbox is an isolated environment to analyze viruses, worms, and Trojans in a space that prevents the researcher’s computer and network from becoming infected.

Test development often uses virtual desktop platforms based on some guest OS hypervisor.

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A technician working on a 3-D printer needs to change out a part. The part is either 1.75 mm or 3mm and requires that the extruder be heated to the appropriate temperature to pull as much of the old part out as possible and finally push the new part through. What is this part?

Gear

Filament

Resin

Print bed

A

Filament

Filament supplies the ‘ink’ of a 3-D printer. The filament spools require careful storage once opened. They should be kept free from heat and humidity.

Stereolithography uses liquid plastic resin or photopolymer to create cured objects using an ultraviolet laser.

The print bed is one of the main components of a fused deposition model (FDM) 3-D printer. Print bed, also known as the build plate, is a flat glass plate that extrudes the material. The bed must be level for each print job, which is usually automated.

Gears enable the precise positioning of the extruder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A consumer buys the cheapest laptop that they can possibly find. Which component did the consumer choose not to include in the laptop that would help drive down the cost?

Microphone

Speaker

Webcam

Touchpad

A

Webcam

While just about every laptop has one, it is possible to buy a laptop without a built-in webcam. While the cost-saving may not be significant, having one less component drives down the cost.

Speakers are standard on any modern laptop. Even a budget laptop will include a set of built-in speakers.

A microphone is a standard internal device on a laptop. Even a budget laptop will include a microphone.

A touchpad is a standard component on any laptop. As mouse input is required, even a budget laptop will include a touchpad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What problem does a screensaver help prevent?

Fuzzy image

Dim image

Stuck pixels

Display burn-in

A

Display burn-in

When the same static image displays for an extended period, it can damage the monitor’s picture elements, causing a ghost image to “burn” permanently onto the display. An animated screensaver can help prevent this problem.

If the output resolution does not match the display device’s native resolution, then the image will appear fuzzy.

Incorrect settings or a failed backlight can cause a dim image. Adjusting the brightness and contrast of a display can help fix a dim image.

A flat-panel monitor defect may cause individual pixels to be “stuck” or “dead.” If a digital display panel has stuck pixels, and the panel is not replaceable under warranty, then software utilities are available to reactivate pixels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A new IT support technician troubleshoots a user’s report of intermittent network connectivity. After inspecting the workstation, they see a label above the station’s RJ-45 port wall connection. This label is likely to identify what device?

Patch panel

Hub

Firewall

Switch

A

Patch panel

In most types of office cabling, the computer is connected to a wall port and via cabling running through the walls to a patch panel.

A switch is an intermediate system used to establish contention-free network segments at OSI layer 2 (Data Link). A port on a patch panel will connect into a switch to provide office network connectivity.

A hub is a legacy network hardware device that implemented the 10BASE-T and 100BASE-T Ethernet cabling designs. Hubs were used to provide multiple connections to computers in a small area and are inefficient at network management.

A basic firewall has rules that list source or destination network addresses and protocol types and whether to allow or block traffic that matches the rule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A government organization uses an application that must be accessed via Citrix XenApp. What is the software delivery model being used in this scenario?

Legacy software/OS

Test development

Cross-platform virtualization

Application virtualization

A

Application virtualization

Application virtualization means that the client either accesses a particular application hosted on a server or streams the application from the server for local processing. Most application virtualization solutions are based on the Citrix XenApp.

Cross-platform utilization tests software applications under different OSs and resource constraints and is important to ensure the application is compatible across several different environments.

Legacy software applications and operating systems may not perform well if a user’s system has been upgraded.

Test development often uses virtual desktop platforms based on some sort of guest OS hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What characteristics of Wi-Fi 6 (802.11ax) allow for increased bandwidth and support for modern networks? (Select all that apply.)

Uplink and downlink MU-MIMO

Typically supports up to four simultaneous clients

Designed to work in both the 2.4 GHz and 5 GHz bands

Orthogonal frequency division multiple access

A

Uplink and downlink MU-MIMO

Designed to work in both the 2.4 GHz and 5 GHz bands

Orthogonal frequency division multiple access

Wi-Fi 6 works in both the 2.4 GHz and 5 GHz bands. There is emerging development for operation over the 6 GHz band as well (Wi-Fi 6e).

Wi-Fi 6 also adds support for uplink multi-user, multiple input, multiple output (MU-MIMO) along with downlink MU-MIMO. This allows MU-MIMO-capable clients to send data to the access point simultaneously.

Orthogonal frequency division multiple access (OFDMA) can work alongside MU-MIMO to improve client density—sustaining high data rates when more stations connect to the same access point.

Wi-Fi 5 supports up to four simultaneous clients over 5 GHz only, and Wi-Fi 6 can support up to eight clients, giving it better performance in congested areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A user’s Bluetooth keyboard is no longer working after a year. What steps will fix this problem? (Select all that apply.)

Replace the computer battery.

Replace the keyboard battery.

Pair the devices.

Install drivers.

A

Replace the keyboard battery
Pair the Devices

A wireless keyboard uses a disposable battery for power. After a year, it is likely the battery has run down and needs replacing.

Bluetooth works by pairing two devices. Steps to pair devices will vary, but the user will need to place the keyboard and device in pairing mode. After successful pairing, the user should verify functionality.

Generally, computers do not need Bluetooth drivers installed on them, and this device was working recently.

The computer battery is not the problem. However, the user needs to replace the keyboard battery in this case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An on-premises data center is moving to a cloud model to take advantage of the many benefits cloud computing offers. One of the most important benefits of this specific data center is handling changes to demand in real-time without degrading services. Which of the following is the most important benefit of migrating this data center to the cloud?

Metered utilization

Shared resources

Rapid elasticity

High availability

A

Rapid Elasticity

Rapid elasticity refers to the system’s ability to handle changes to demand in real-time without loss of service or performance. Rapid elasticity allows a system to reduce costs when demand is low.

Metered utilization is the per-use billing for resources consumed by the cloud, making cloud offerings cheaper or more expensive for an organization, depending on their resource consumption.

Shared resources are incorrect. To meet availability, scalability, and elasticity requirements, cloud providers must be able to provision and de-provision resources automatically through the pooling of shared resources and virtualization.

High availability means that the service experiences very little downtime. Downtime can occur as a result of scheduled maintenance and unexpected outages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A startup company does not have the capital to invest in infrastructure to host their website, nor do they have the capital to hire engineers to manage their cloud environment. At this point, strict access control is not a concern for the startup, but they do not want to share resources with other organizations. Which cloud implementation will best suit the startup’s needs?

Hybrid cloud

Community cloud

Private cloud

Public cloud

A

Public cloud

Public cloud will best meet the startup’s needs because it offers subscriptions and pay-as-you-go finances and can even provide lower-tier services free of charge. Public clouds are also offered over an internet connection by cloud service providers (CSPs).

Private cloud is unnecessary for the startup’s use case because they do not require strict access control in their operations.

Community cloud is incorrect because the startup does not want to share resources with other organizations.

A hybrid cloud is not the best answer because there is potential for resources to be shared among multiple organizations and the requirement to maintain data on-premises, which the startup cannot afford.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A server system uses a method where each transfer performs a hash calculation on the data value and stores it as an 8-bit checksum. This can detect and correct single-bit errors and allow the PC to continue functioning normally. What is this method called?

SODIMM

Virtual RAM

ECC RAM

Dual-channel

A

ECC RAM

A technician uses error correction code (ECC) RAM for workstations and servers that require high reliability.

Virtual RAM, also called virtual memory, is not just used to supplement RAM with swap space.

Small outline DIMM (SODIMM) is the smaller form factor packaged for laptop RAM. The memory typically fits into slots that pop up at a 45-degree angle to allow the chips to be inserted or removed.

Dual-channel memory controllers effectively have two 64-bit pathways through the bus to the CPU, meaning that they can send 128 bits of data per transfer rather than 64 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What might be diagnosed by no LED status indicators on a drive?

Bad sectors

Faulty disk

Keyboard issue

Corrupted boot sector

A

Faulty disk

No LED status indicator lights could indicate that the whole system might not be receiving power or that the individual disk could be faulty.

A read/write error can indicate faulty sectors in a hard disk drive (HDD). Likewise, a power failure or a mechanical fault can damage a sector. If the technician runs a test utility, such as the chkdsk command, and chkdsk locates more bad sectors each time the technician runs the test, it is a sign that the disk is about to fail.

During power-on self-test (POST), three long beeps will indicate a keyboard issue.

The error message, “Boot device not found,” would indicate a corrupted boot sector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A technician troubleshoots a laptop’s direct connectivity to the organization’s access points connected to an internal network. Troubleshooting starts by removing a screw-down panel to access and examine internal components. Which components does the technician test?

Mini PCIe

mSATA

Wireless card

Modem

A

Wireless card

A wireless card is an internal component of a laptop that provides Wi-Fi connection capabilities. A wireless card would be seated within the laptop and have an antenna connection.

A modem is a communication device; however, it is not the correct component in this case. The modem would not connect to an access point as detailed in the scenario.

A mini peripheral component interconnect express (PCIe) card is a form factor that many adapter cards use. These form factors include wireless cards, Bluetooth cards, and more.

A mini serial advanced technology attachment (mSATA) card is a storage device, like a solid-state drive (SSD). An mSATA uses far less power and has a smaller footprint than a traditional SSD drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What features of the cloud allow multiple users to simultaneously access content and work collaboratively while tracking edits by each user?

High availability

File synchronization

Community cloud

Shared resources

A

File synchronization

File synchronization is an advantage of cloud storage that replicates files between data centers and different devices such as PCs and smartphones. Cloud storage also allows multiple users to access content to work collaboratively simultaneously.

To meet availability, scalability, and elasticity requirements, cloud providers must be able to provision and de-provision resources automatically through the pooling of shared resources and virtualization.

A community cloud is a cloud environment deployed for shared use by cooperating tenants. These tenants usually have similar security and operating concerns.

High availability means that the service experiences very little downtime. Downtime can occur because of scheduled maintenance and unexpected outages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Users at an organization prefer that any mobile devices deployed for company use have location services disabled. IT administrators agree and configure which option?

Global Positioning System

Preferred roaming list

Global System for Mobile Communication

Mobile data options

A

Global Positioning System

Global Positioning System (GPS) is a means of determining the device’s latitude and longitude based on information received from orbital satellites via a GPS sensor.

Global System for Mobile Communication (GSM) allows subscribers to use a removable subscriber identity module (SIM) card to use an unlocked handset with their chosen network provider.

Information that a cellular radio needs to connect to a network is provided as a preferred roaming list (PRL).

Mobile data options allow a user to enable or disable Wi-Fi, cellular service, Bluetooth, and all services together (known as airplane mode).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A large real estate agency has acquired a new service from their cloud provider called desktop as a service (DaaS). The service will enable the real estate agents to use virtual machines to load their desktops. Which option best describes the service the real estate agency has begun using?

Virtual desktop infrastructure (VDI) on-premises

VDI in the cloud

Public cloud

Private cloud

A

VDI in the cloud

Virtual desktop infrastructure (VDI) in the cloud is often referred to as desktop as a service (DaaS) and enables users to load their desktops from a virtual machine hosted in the cloud.

Virtual desktop infrastructure (VDI) on-premises means that the virtualization server hosting the virtual desktops has been provisioned on the same local network as the clients.

A public cloud is a cloud service offered over the internet by cloud providers to customers who share resources with other customers and pay on a subscription or pay-as-you-go basis.

Private cloud is completely private to and owned by the organization that pays for the service. The private cloud does not provide VDI services alone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A company meets with an IT consultant about building a small data center within their facility. The company would house all its servers in this data center, and each server would have local disks set up for all the servers and PCs to share over the network. The consultant would question this method and suggest installing which storage solution into the data center?

SAN

LAN

PAN

SCSI

A

SAN

A storage area network (SAN) provisions access to a configurable pool of storage devices that application servers can use, isolated from the main network. It is only accessed by servers, not by client PCs and laptops. This would be the best solution for a data center build.

A local area network (LAN) consists of computers connected by cabling and one or more network switches installed at a single geographical location.

Small Computer System Interface (SCSI) is a legacy standard for physically connecting and transferring data between computers and peripheral devices.

A personal area network (PAN) refers to using wireless connectivity to connect to devices at a range of a few meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How can a technician diagnose capacitor swelling?

Slow computer

System diagnostics

Computer that is hot to the touch

Physical inspection

A

Physical inspection

Capacitors are barrel-like components that regulate the flow of electricity to system chips. Swollen, bulging, or emitting any residue indicates damaged or failed capacitors. The only sure way to diagnose this is visual.

A computer that is hot to the touch can indicate overheating, not capacitor swelling.

A sluggish computer can result from many different problems and is not a diagnostic indicator of capacitor swelling.

System diagnostics can help diagnose software and some hardware problems, and it can also point towards capacitor swelling. However, a physical inspection will still be necessary.

previous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A network engineer must set up an office’s new wireless access points (APs). After installing the access points, the engineer must ensure they set up the radio signals correctly and that all office areas receive the most efficient signal possible. What tool will the engineer utilize?

Loopback plug

Cable tester

Toner probe

Wi-Fi analyzer

A

Wi-Fi analyzer

A network engineer can install Wi-Fi analyzer software to record the AP’s associated statistics and detect other access points in the vicinity. This can configure the proper signal strength and channels.

A cable tester is a pair of devices attached to each end of a cable. It tests a patch cord or is connected via patch cords to a wall port and patch panel port to test the permanent link.

A toner probe detects the signal and follows the cable over ceilings and through ducts, or identifies it from the rest of the bundle. This is strictly for physical cabling.

A loopback plug tests a network interface card (NIC) or switch port. This does not test any wireless metric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A user decides to take a coffee break so the cleaning crew can do their job. After returning, the computer has power but no internet. What is a possible cause?

The cleaners accidentally unplugged the Ethernet cable.

Unclear, escalate to a supervisor.

The latest OS update corrupted their Ethernet adapter.

The whole building has lost internet.

A

The cleaners accidentally unplugged the Ethernet cable.

When gathering the initial information, asking about recent changes can narrow down the problem. For example, the internet was working, but after the cleaners left, it was not working, which narrowed the problem down significantly. Vacuums or brooms can easily unplug Ethernet cords.

Although operating system updates can cause problems, there was no indication that an operating system update occurred during a coffee break.

If the whole building had lost internet services, there would be more complaints from users. An issue with the internet is unlikely to be the problem.

Although escalating to a supervisor is a valid resolution method, the technician must first perform basic troubleshooting steps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

While trying to set up for a presentation, the wall-mounted display will not mirror the laptop display. The technician traces the long HDMI cable to find that it runs on the floor, and it is evident that users have repeatedly run over it. What will likely fix the problem?

Replace the PSU.

Plug the cable securely in.

Use a new HDMI cable.

Turn on the laptop.

A

Use a new HDMI cable.

A cable that has physical damage will likely be the cause of the problems. Replacing the high-definition multimedia interface (HDMI) cable and finding another way to run the wires to avoid damage in the future will likely solve this problem.

A faulty power supply unit (PSU) on the laptop would not cause problems displaying on a second monitor.

The damaged HDMI cable will likely still not work, even if plugged in securely on both ends.

The laptop is already on since the display on the laptop is visible and not correctly mirroring on the display monitor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A technician uses a storage device containing non-volatile flash memory to replace the hard drive since the speed is much greater. What is this called?

SSD

NVMe

mSATA

M.2

A

SSD

A solid-state drive (SSD) uses flash memory technology to implement persistent mass storage. Flash memory performs much better than the mechanical components used in hard drives. Devices are produced in a standard width of 2.5 inches.

A mini-serial ATA (mSATA) allows a technician to plug an SSD packaged as an adapter card into the motherboard’s combined data and power port.

NVMe (NVM express) can be packaged for installation to a PCIe slot as an expansion card or an M.2 slot.

The M.2 adapter card form factor is considerably smaller than a PCIe adapter and is oriented horizontally rather than vertically, so the interface is often used on laptops and PC motherboards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An IT administrator noticed that the company needs a more secure way to create and store data. What should the IT administrator implement?

HSM

Boot options

TPM

Secure boot

A

TPM

A trusted platform module (TPM) is a specification for hardware-based storage of digital certificates, cryptographic keys, and hashed passwords.

A hardware security module (HSM) is a secure USB key or thumb drive used to store cryptographic material.

Secure boot is a unified extensible firmware interface (UEFI) feature designed to prevent a computer from being hijacked by malware. Under secure boot, the computer firmware configuration has cryptographic keys that can identify trusted code.

Boot options define how the system firmware searches devices for a boot manager. It is one of the most important parameters in a system setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A network engineer gets a report that a growing number of wireless devices cannot obtain an IP address from the Wi-Fi network. They can see the network name (SSID) and authentication is successful, but devices say that they cannot obtain an address. What is most likely the problem?

The VLAN for the wireless network cannot be accessed.

The DHCP server has run out of reservations.

DHCP has no more addresses available.

There is no DNS (A) record for the devices.

A

DHCP has no more addresses available.

This problem is due to the Dynamic Host Configuration Protocol (DHCP) having no more addresses available to clients. To solve this, they should extend the scope or shorten the lease time to allow for more address availability.

If users can see and authenticate to the wireless network, access to a virtual LAN (VLAN) is not the problem. The devices can communicate enough to authenticate.

Although a DHCP server may have some reservations for specific hosts, most reservations would not typically take up the entire scope. Adjusting the lease and scope would be the solution in this case.

A device would not have a domain name system (DNS) A record until it obtained an IP address.

A DHCP server is configured with a ‘POOL’ of available I/P addresses if can lease out. When all the addresses in the pull are used, it is called ‘pool exhaustion”. Some remedies would beto:

  1. Expand the pool of I/P addresses from which to choose (might not be possible)
  2. Shorten the lease time when an address is assigned.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A network administrator noticed that latency has been higher than their service-level agreement (SLA) covers for quite some time. What should they do?

Check cabling and NICs.

Diagnose with a certifier.

Implement QoS.

Contact the ISP.

A

Contact the ISP.

If high latency is persistently higher than an agreed service level, contact the internet service provider (ISP) to resolve the issue.

There could be a termination or external interference problem. An advanced type of cable tester called a “certifier” can report detailed information about cable performance and interference.

VoIP call quality can only really be established by using a quality of service (QoS) mechanism across the network.

Port flapping means that the network interface card (NIC) or switch interface transitions continually between up and down states. This is often caused by bad cabling or external interference or a faulty NIC at the host end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A technician upgrades the memory in a laptop computer. Which interface does the memory have?

PCIe

mSATA

SODIMM

M.2

A

SODIMM

A smaller form factor called small outline DIMM (SODIMM) packages laptop random access memory (RAM). The memory typically fits into slots that pop up at a 45-degree angle.

A technician can provision a solid-state drive (SSD) in an adapter card form factor. These often use an M.2 interface. An M.2 port is oriented horizontally.

The mini serial advanced technology attachment (mSATA) form factor allows an SSD packaged as an adapter card to plug into the motherboard’s combined data and power port.

Modern SSDs often use the peripheral component interconnect express (PCIe) bus directly. Where SATA uses the advanced host controller interface (AHCI) to communicate with the bus, PCIe-based SSDs use the non-volatile memory host controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A computer has no display on the screen, and it makes continuous beeps after booting. What is the likely problem?

Keyboard issue

Faulty screen

Power supply error

System memory problem

A

System memory problem

Not all modern computers use power-on self-test (POST) beep codes, but it is a valuable diagnostic tool. For example, the continuous beep code indicates a problem with system memory modules or memory controllers. This problem can stop the computer from booting or from displaying properly.

The system will indicate a keyboard issue by three long beeps, and the technician can generally solve it by removing whatever is depressing a key.

A faulty screen would result in a blank screen, but it does not give the POST beep code.

A power supply error results in either repeating short beeps or the computer is failing to initiate POST at all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A user has a TV connected as a presentation monitor but cannot play audio through the TV. The technician has verified that the cables are good and has chosen the correct output. What might fix the problem?

Adjust resolution.

Change to a DVI cable.

Adjust contrast.

Unmute the TV.

A

Unmute the TV.

There are several avenues to adjust the volume in this setup. The simplest answer may be a muted TV. Finding the remote or on-screen menu to unmute the TV may solve the problem.

Adjusting the resolution will fix a fuzzy picture and has nothing to do with audio issues.

Adjusting the contrast will assist when the screen is too dim, but it does not relate to audio issues.

A digital visual interface (DVI) cable would be incorrect since DVI, and video graphics array (VGA) cables do not carry audio signals. Therefore, the user needs a high-definition multimedia interface (HDMI) or DisplayPort cables to carry both audio and video in the same cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A user contacts an IT help desk to report a problem with a laptop computer. The complaint is that the laptop is very hot to the touch when typing. The user also states that the laptop does not sit correctly as the bottom of the laptop has a slight bulge. Which component does the help desk technician determine to be the problem?

SSD

Battery

Memory

Keyboard

A

Battery

Laptop computers use removable, rechargeable Lithium-ion (Li-ion) battery packs. Li-ion batteries are typically available in 6-, 9-, or 12-cell versions. A problematic battery can overheat and expand.

A keyboard is an input device. Therefore, a laptop keyboard does not usually overheat. However, the user noticed heat coming from the laptop in this case.

Small outline dual inline memory modules (SODIMMs) package the laptop’s double data rate synchronous dynamic random access memory (DDRx SDRAM). Laptop RAM can become very hot; however, it would not cause the battery to expand.

A solid-state drive (SSD) does not get as hot as a traditional magnetic drive. Even so, an SSD would not cause the battery to expand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

An employee uses a device that gives them authentication to release the print job. What is this device?

User authentication

Print server

Badging

Audit log

A

Badging

Badging means the print device has a smart card reader. An employee must present an ID badge to the reader to start the print job.

A print server is a hardware and firmware that allows client computers to connect directly over the network without going via a server computer.

An audit log can identify printed documents that have gone missing or identify the unauthorized release of information.

A company can configure user authentication on a print share. User authentication means that the printer sharing server or print device will only accept print jobs from authorized user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A computer monitor’s display is so dim it is almost invisible. What is the likely problem?

Dead pixels

Incorrect cables

Failed display backlight

Incorrect resolution

A

Failed display backlight

If a display’s image is so dim that it is almost invisible, the backlight has probably failed. The technician will need to replace the backlight or get it repaired under warranty.

The image will appear fuzzy if the output resolution does not match the display device’s native resolution. This fuzzy resolution typically happens if the video card’s driver is faulty or incorrectly configured.

Dead pixels occur when individual pixels stay black. A technician generally cannot fix dead pixels.

Incorrect cables can cause many problems, from flickering screens to audio problems. However, in this case, it is unlikely to be the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

After discovering an unlabeled wall port in an office, a technician would like to label it appropriately. Not knowing where the permanent link patches into specifically, they know which IT closet it would run to, as all the other permanent links in the same area run to the same closet. When connecting a laptop, there appears to be a successful connection. Which tool would be most helpful for the technician to use?

Punchdown tool

Cable tester

Cable stripper

Toner probe

A

Toner probe

A toner probe detects the signal and follows the cable over ceilings and through ducts, or identifies it from the rest of the bundle. A technician uses this along with a tone generator, applying a continuous audio signal on the cable.

A punchdown tool fixes each conductor into an insulation displacement connector (IDC).

A cable stripper scores the outer jacket just enough to remove it.

A cable tester is a pair of devices designed to attach to each end of a cable. It tests a patch cord or is connected via patch cords to a wall port and patch panel port to test the permanent link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A user reports that their PC can not access the internet and internal network resources. The user also reports that the internet is intermittent throughout the day. A technician confirmed that the Ethernet cable is connected securely to the PC and the wall port. What tool should an engineer bring with them to investigate this further?

Punchdown tool

Cable tester

Snips

Cable stripper

A

Cable tester

A cable tester is a pair of devices that attach to each end of a cable. It tests a patch cord or connects via patch cords to a wall port and patch panel port to test the permanent link.

A punchdown tool fixes each conductor into an insulation displacement connector (IDC). There is no punching down wires into a block in this scenario. This will only be required if the cable tester shows a fault in the permanent link.

A cable stripper scores the outer jacket just enough to remove it.

Snips would cut the cable and trim the ripcord and the start filler inside the cable, should this process be necessary after testing the patch cable and permanent link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A network administrator is looking at a user’s box which seems to have intermittent connectivity issues. Which of the following should they do first?

Analyze network congestion.

Check the physcial cords.

See if it received a DHCP lease.

Check nominal link speed.

A

Check the physcial cords.

The first step in resolving a no or intermittent connectivity issue is to check that the patch cords are properly terminated and connected to the network ports.

If a user reports slow speed, establish that there is a link speed problem by checking the nominal link speed and using a utility to measure transfer rate independent of specific apps or network services.

Jitter is typically caused by network congestion affecting packet processing on routers and switches.

In Windows, a limited connectivity message specifically means that the host can establish a physical connection to the network but has not received a lease for an IP configuration from a Dynamic Host Configuration Protocol (DHCP) server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which type of DDR RAM have non-ECC and ECC types?

DDR4

DDR3

DDR5

SODIMM

A

DDR5

Double Data Rate 5 (DDR5) implements a form of error checking internally to the module. This is not the same as the ECC implemented by the memory controller, where the CPU communicates the error information. This can come as a non-ECC or ECC.

DDR4 is a synchronous dynamic random-access memory with a high bandwidth interface and a transfer rate of 12.8 to 25.6 GB/s and a maximum size of 32 GB.

DDR3 is a synchronous dynamic random-access memory with a high bandwidth interface and a transfer rate of 6.4to 17.066 GB/s and a maximum size of 8 GB.

Small outline DIMM (SODIMM) is the smaller form factor packaged for laptop RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

An organization rolls out a security update that utilizes either a contactless smart card reader or a fingerprint scanner for login to mobile devices. What type of security implementations is the organization allowing for user logins? (Select all that apply.)

Wi-Fi 6

Bluetooth

Near-field

Biometrics

A

Near-field &
Biometrics

A biometric sensor allows users to record a template of a feature of their body that is unique to them. On a laptop, this is typically a fingerprint scanner.

A near-field communication (NFC) scanner is an authentication mechanism. It may also pair peripheral devices or establish a connection to a smart device.

Smart card readers do not use Bluetooth and typically connect peripheral devices to PCs and mobiles. Smart card readers also share data between two systems.

Wi-Fi 6 works in both the current 2.4 GHz and 5 GHz bands and adds support for a new 6 GHz frequency band. However, it is not applicable in this scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A government organization wants to develop their own application to process information, but they do not want to be responsible for maintaining the hardware or the database platform that the application runs on. Additionally, the organization does not want to be burdened with maintaining the integrity and availability of the database platform because they will be very busy with other responsibilities. Which service would be best for the government organization to pursue?

Shared resources

Infrastructure as a service (IaaS)

Platform as a service (PaaS)

Community cloud

A

Platform as a service (PaaS)

Platform as a service (PaaS) is correct. PaaS would provide IT hardware and the database platform on top of the hardware, but the customer must develop their app to run on top of the platform. The service provider will maintain the integrity and the availability of the platform for the customer.

Infrastructure as a service (IaaS) is incorrect because it will only provide IT hardware management for the customer.

Software as a service (SaaS) is incorrect because the organization will be developing its application.

Shared resources are not a service that can be purchased. Service providers can provide services using shared resources to lower the cost to the customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A developer asks that any network requests made to the host name dev23.company.net get directed to a specific IP address of 10.130.25.15. What type of record will the developer need to create?

(MX) record

(AAAA) record

(A) record

(TXT) record

A

(A) record

In the Domain Name System (DNS), an A record resolves a host name to an IPv4 address. This will be the record type that the developer will need to create on the DNS server.

In the Domain Name System (DNS), an AAAA record resolves a host name to an IPv6 address. The IP address in this scenario is IPv4.

A mail exchange (MX) record will identify an email server for the domain so that other servers can send messages to it.

A TXT record stores any free-form text that they may need to support other network services. They are most commonly used to verify email services and block the transmission of spoofed and unwanted messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A user complains their phone is not responding to touch. What is the likely culprit?

Faulty digitizer

Faulty battery

Damaged port

Overheating phone

A

Faulty digitizer

A touch screen can also be referred to as a digitizer due to the way it converts analog touch input to digital software instructions. A faulty digitizer will cause the touch screen to stop working.

When a phone no longer holds a charge for a reasonable amount of time, the user should suspect a faulty battery. The issue can be a damaged battery or it is simply at the end of its life.

The main symptom of overheating will be that the device is almost too hot to touch. As well, overheating can sometimes cause the phone to turn off.

A damaged port will have intermittent or no connectivity. This issue can occur when charging or using other accessories, such as headphones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A technician suspects a mobile device to have liquid damage. What should the technician do first?

Request a warranty replacement.

Power off the device.

Replace the screen.

Replace the battery.

A

Power off the device.

The technician should power off the device to avoid further damage and remove any excess liquid. Next, the technician must disassemble the device to dry the internal components when exposed to liquid.

The technician will need to replace the battery when a device has liquid damage; however, this is not the first step.

Sometimes liquid damage can result in seeing liquid under the screen. This does not necessarily mean that the screen needs replacing; sometimes, it just needs to dry out.

Depending on the warranty policy, a warranty replacement for water damage to a mobile device may be appropriate. However, the first step will be to power down the device before moving forward.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A company is looking for computers with accelerated graphic capabilities and large, high-resolution monitors. Which of the following would meet the company’s needs?

Workstation

Mobile

Desktop

Server-class

A

Workstation

The workstation is a high-performance PC, such as one used for software development or graphics/video editing. Any business PC or network client can be a workstation.

Desktop is shorthand for a basic PC used at home or in the office. Computer cases sit horizontally on a desk rather than the vertical towers or all-in-one configurations used today.

Server-class computers must manage more demanding workloads than most desktops and operate to greater reliability standards.

Mobiles use Advanced RISC Machine (ARM)-based central processing units (CPUs) that prioritize power and thermal efficiency plus weight over pure performance. Mobile CPUs tend to use different socket form factors to desktops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A company looks into security controls for an entryway into a building. The chosen solution will use a chip for data transmission and another chip for receiving data over the air. Which solution uses this technique?

Retina scanner

Biometrics

Keypad

Near-field

A

Near-field

Near-field communication (NFC) technology allows very short-range data transmission (less than 1 foot) to activate a receiver chip in the contactless reader. For example, a smart proximity card uses NFC.

Biometrics refers to authentication while using a person’s traits. Biometrics include fingerprint readers and voice recognition.

A retina scanner is a biometric authentication device that uses a scan of an individual’s eye to allow access to a location or system. The individual’s retina pattern must match the biometric authentication device to gain access to a location or system.

A keypad is a hardware device that uses a combination of digits and a passcode for entry access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What measures the PSU to meet the combined power requirements of the PC’s components?

Redundant power supply

Wattage rating

Modular power supply

Heat sink

A

Wattage rating

The wattage rating measures the power supply unit’s (PSU’s) output capability. Depending on the model, CPUs can range from 17 W to over 100 W. The power output is not the same as the PSU’s power from grid power.

A redundant power supply requires a compatible motherboard. This configuration is more common in server systems than on desktop PCs. Typically, each PSU plugs into a backplane on a server and is hot-swappable.

A modular power supply has power connector cables that are detachable from the unit.

A heat sink is a block of copper aluminum with fins. The fins expose a larger surface area to the air around the component to achieve a cooling effect by convection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A technician wants to install a non-standard program on a user’s computer to solve a problem. What does the technician need to consult before installing the program?

The user

Vendor solutions

Social media

Corporate policies

A

Corporate policies

Before making any changes to a system, consult the corporate policies and procedures. For example, some systems allow installing all software, while others have limited lists of accepted programs to install on the user’s computers.

Before posting any information on social media, it is imperative to get permission from supervisors. In this case, any answers received from social media would likely not apply to the particular system.

Before bringing a possible solution to the user, ensure that the solution falls within the acceptable corporate policies and procedures.

Vendor-specific documentation can provide possible solutions to a problem, but that solution is not relevant if it falls outside the corporate policies and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A user notices that their laser printer is not working and is causing an error. When the technician looks at the printer, they notice that the user was using thick paper, causing a part of the printer to overheat. Which part of the printer has overheated?

Fuser unit

Pickup roller

Transfer roller

Developer roller

A

Developer roller

The paper passes through the fuser assembly after passing through the transfer assembly. The fuser unit squeezes the paper between a hot roller and a pressure roller so that the toner melts onto the paper’s surface.

The transfer roller applies a positive charge to the underside of the paper. This causes the toner on the drum to be attracted to the paper. This avoids the paper sticking to the drum or curling as it enters the fuser unit.

The pickup roller turns against the paper stack, pushing the paper into a feed and separation roller assembly.

The developer roller is a magnetized roller located very close to the photosensitive drum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A basic firewall configuration has rules, referred to as network access control lists (ACLs). What are the basic properties needed for a firewall ACL to implement the desired security features configured? (Select all that apply.)

Block/Allow property

MAC address

Protocol

Source and destination network/device

A

Block/Allow property, Protocol, and Source and destination network/device

The ACL requires source and destination network or device for the firewall to know what networks and devices are allowed to communicate with each other.

A protocol needs to be defined in an ACL to narrow the scope of network traffic managed by the ACL.

The network technician can set the ACL to either allow or block specific protocols and traffic between various sources and destination networks and devices.

Firewalls typically manage network traffic at a different layer in the Open Systems Interconnection (OSI) model, and MAC addresses are usually not found in traditional firewall ACLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A laptop user has a slim laptop that has very few external ports. As there is no Ethernet port on the laptop, it only uses wireless. The user would like a low-cost solution that allows for an Ethernet connection when not traveling. What does IT purchase for the user?

Lightning cord

Serial connection

Docking station

Port replicator

A

Port replicator

A port replicator either attaches to a special connector on the back or underside of a laptop or is connected via USB. It provides a full complement of ports for devices such as keyboards, monitors, mice, and network connections.

A docking station is a sophisticated port replicator. When docked, a portable computer can function like a desktop machine or use additional features, such as a full-size expansion card.

Most iPhone and iPad Apple devices use the proprietary Lightning connector. This would be for connecting an iOS device for purposes including charging.

Serial is one of the oldest and simplest computer interfaces. While not many mobile devices have hardware serial ports, the software serial port is often used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Users at an organization rely heavily on attending online meetings with clients and customers. The IT department purchases new laptops for these users to support conferencing needs. What component does IT ensure the laptop has when the specification is 1080p?

Webcam

Microphone

Headset

Speaker

A

Webcam

A webcam allows for video recording or web conferencing and can also take still pictures. A good external or internal webcam will have a 1080p resolution.

Mobile devices feature integrated audio/video input and output devices. For example, a microphone records audio for voice calling and web conferencing.

Speakers produce audio output. Speakers can be an internal or external component and can vary in sound quality.

An external headset or earbud set provides both a speaker microphone and headphone speakers. Wired headsets use either the 3.5 mm audio jack or a USB/Lightning connector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A user has a known problem with a system that is solvable by deleting the local user profile. However, what is the next step before moving forward with that solution?

Perform a backup.

Formulate a new theory.

Check corporate policies.

Implement a plan of action.

A

Perform a backup.

Deleting the local user profile will remove any information saved to the desktop, so the technician must backup any information saved on it.

Checking corporate policies is a good solution when implementing any changes to a system, but deleting a local user profile does not rise to the level of installing a program or changing network settings.

If the initial solution of deleting the local user profile does not work, then it would be time to formulate a new theory. However, since the technician has not yet tested the initial theory and solution, formulating a new theory is premature.

The technician already has a plan of action, so a new plan of action is not necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

An automobile allows for connecting a smartphone or tablet for entertainment and audio purposes. Pairing the two occurs with which technology?

Wi-Fi

Hotspot

Bluetooth

NFC

A

Bluetooth

A Bluetooth wireless radio creates a short-range personal area network (PAN) to share data with a PC, connect to a printer, and even connect to automobiles. The connection occurs through what is known as pairing.

Many mobile devices have near-field communication (NFC) chips built in. NFC allows for very short-range data transmission (up to about 20 cm/8 in.) to activate a receiver chip in a contactless reader.

A smartphone or tablet can be configured as a personal hotspot to share its cellular data connection with other computer devices.

Every laptop, smartphone, and tablet supports a Wi-Fi radio. While some automobiles also offer built-in Wi-Fi, this technology is not used to pair two devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

user has a newly issued smartphone that has corporate communication software installed. What can the user expect to sync while using Microsoft Exchange?

Contacts

Email

Texts

Calendar

A

Email

Most email systems store messages on the server, and the client device is used to manage them. A client device that uses technology such as ActiveSync can store a local copy.

A contact is a record with fields for name, address, email address(es), phone numbers, notes, and more. Contacts are synced with Exchange ActiveSync.

A calendar item is a record with fields for appointment or task information, such as subject, date, location, and participants. Calendars are synced with Exchange ActiveSync.

Texts are messages that are sent via cellular service. While there are sync methods available, they are not synced with Exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A consumer that is new to iOS devices does not understand what type of cable is required to charge a new iPhone. The consumer would like an extra cable to keep in a home office. What type of proprietary cable does the consumer look to purchase?

Serial

Lightning

USB

LCD

A

Lightning

Most iPhone and iPad Apple devices use the proprietary Lightning connector. Some of the latest iPad models, such as the iPad Pro, use USB-C.

Modern Android-based smartphones and tablets use the USB-C connector for wired peripherals and charging. The Micro-B USB and Mini-B connector form factors are only found on old devices.

Serial is one of the oldest and simplest computer interfaces. While not many mobile devices have hardware serial ports, the software serial port is often used for programming and connectivity.

Most mobile devices use a flat-panel screen technology based on a type of liquid crystal display (LCD). A liquid crystal display is not a cable type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A user noticed that their PC is generating more heat than can be removed, and the one component designed to draw cool air from the low vents in the front of the case over the motherboard is not working. What is the impacted component?

Heat sink

Fan

Liquid-base cooling system

Thermal paste

A

Fan

A fan improves airflow that helps to dissipate heat. Fans provide the power supply and chassis exhaust points.

A heat sink is a block of copper or aluminum with fins. The fins expose a larger surface area to the air around the component to achieve a cooling effect by convection.

Thermal paste glues the heat sink to the surface of the chip to ensure the best transfer of heat by eliminating small air gaps.

A liquid-based cooling system refers to a system of pumping water around the chassis. The water loop/tubing and pump push the coolant added via the reservoir around the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

While trying to resolve a computer that will not boot, a technician notices that the monitor’s LED indicators are not on. Both devices plug into the same power strip. What could be the problem?

The PSU is not working.

The PSU cable is not plugged in.

There is a wider power failure.

The power strip is off.

A

The power strip is off.

Although the other answers are plausible reasons why a computer may not get power, the details in the scenario point towards a simple answer, the power strip is likely off, or the outlet is not working.

A wider power failure would explain why the computer is not booting, but there is no indication that the lights are off in the room.

An unplugged cable or a cable not completely plugged in should be the first thing to check. However, since the monitor is also not getting power, this is unlikely the cause.

The power supply unit (PSU) not working would be the last thing to investigate. The technician needs to eliminate the simpler answers first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What does SMART measure as a performance indicator?

POST

IOPS

BSOD

RAID

A

IOPS

Self-Monitoring, Analysis, and Reporting Technology (SMART) tools measure input/output operations per second (IOPS), comparing them against manufacturer baselines to determine if a drive is failing.

A Redundant Array of Independent Disks (RAID) array is generally a collection of storage devices meant to protect against data loss. RAID has nothing to do with SMART performance measures.

System firmware performs the power-on self-test (POST) that checks whether the system hardware is present and working.

Blue screen of death (BSOD) is the Windows proprietary crash screen that typically indicates a system memory fault, a hardware device/driver fault, or corruption of operating system files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A systems engineer is doing an internal audit of their virtual environment before an annual inspection and is making sure that all the virtual machines are up to date on patches. What could the systems engineer consult to verify which patches need to be on each machine?

Security requirements

Test development

Legacy software/OS

Resource requirements

A

Security requirements

Security requirements are correct because patching is a part of ensuring a system is secure against the latest vulnerabilities.

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

Test development often uses virtual desktop platforms that are based on some sort of guest OS hypervisor.

Legacy software applications and operating systems may not perform well if a user’s system has been upgraded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What are generic approaches to solving an IT problem?

Avoid, repair, remove

Repair, replace, workaround

Escalate to a supervisor.

Reimage and start over.

A

Repair, replace, workaround

Three generic approaches to solving IT problems are repair, replace, and workaround. Not all problems are critical, and technicians can find workarounds. Depending on the balance between cost and time, repairing or replacing parts can be the best answer.

Avoiding a problem does not fix them. Repairing the problem can be a viable solution, but removing the problem may not resolve it.

Escalating to a supervisor does not solve problems; it just moves the responsibility.

Reimaging computers is a valid solution to a problem but is not a generic way to describe different approaches to solving IT problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A student borrows an external hard drive from a friend but cannot see the drive in Windows Explorer. The friend’s computer is a Mac. What is the problem?

Incompatible file structures

Bad sectors

Faulty connectors

Faulty boot sector

A

Incompatible file structures

Mac and Windows file systems are not natively compatible with each other. The Windows device will not recognize the Mac-formatted external drive.

A faulty boot sector can be a problem if the boot drive does not initiate. In this example, this is a secondary external drive, which does not need to boot the operating system.

When trying to open or save a file, bad sectors can cause the error message, “Cannot read from the source disk.”

The external drive still needs to connect to the computer and could possibly be faulty. However, the incompatibility between file systems is still the most likely problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

This protocol makes a secure connection to the graphical interface of another computer and uses TCP port 3389.

Trivial File Transfer Protocol

Server Message Block

Remote Desktop Protocol

Simple Network Management Protocol

A

Remote Desktop Protocol

Remote Desktop Protocol (RDP) makes a secure connection to the graphical desktop of a remote computer and uses TCP port 3389.

Simple Network Management Protocol (SNMP) queries status information from network devices and uses UDP port 161. SNMP traps information sent to a management server utilizing UDP port 162.

Server Message Block (SMB) is the application protocol underpinning file and printer sharing on Windows networks. SMB usually runs directly over TCP port 445.

Trivial File Transfer Protocol (TFTP) is a simplified form of FTP supporting only file copying and uses UDP port 69.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

A computer monitor keeps flickering. The technician has checked the connectors and replaced the cords, yet the problem continues. The technician connects the display to another computer, and the flickering problem is gone. What is the likely problem?

Incorrect resolution

Incorrect contrast controls

Failing display

Faulty video card

A

Faulty video card

A faulty or overheating video card could cause a flickering screen. Attaching the display device to a different computer isolates the cause of the issue.

Since the flickering stopped when connected to a different computer, the display is not the problem. If the display were failing, it would also likely include bright or dim bands or lines and bright spots at the edge of the screen.

An incorrect resolution will cause a blurry image but not a flickering image.

Incorrect contrast controls can cause a dim image, but not a flickering image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What kind of storage media can have grinding and clicking as a diagnostic tool?

NVRAM

HDD

RAM

SSD

A

HDD

A hard disk drive (HDD) has moving platters and arms. These mechanical parts can start making grinding or clicking noises as they fail.

A solid-state device (SSD) does not have moving parts. Instead, SSD uses flash memory technology to implement persistent mass storage. As a result, risks from failure due to mechanical shock and fear are generally lower.

Random access memory (RAM) does not have moving parts to fail. RAM is the nonpersistent memory used for running programs and open data files.

Non-volatile read access memory (NVRAM) does not have moving parts to fail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A technician builds a computer using the most common form factor measuring 12 x 9.6 inches and has up to seven expansion slots. What form factor is the technician using?

BTX

SAN

ATX

ITX

A

ATX

An advanced technology extended (ATX) specifies the standard form factor for most desktop PC motherboards.

Information technology extended (ITX) has two designs: the mini-ITX and the mobile-ITX. The mini-ITX is 6.7 inches square with one expansion slot. Technicians can mount most mini-ITX boards in ATX cases.

A storage area network (SAN) is more flexible and reliable than using local disks on each server machine. It provides access to a configurable group of storage devices that application servers can use.

A balanced technology extended (BTX) improves ATX since it has better airflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

An IT technician installs a solid-state drive (SSD) into a motherboard connector that enables high-performance storage and is oriented horizontally. What has the IT technician installed?

M.2

SATA

eSATA

PCI

A

M.2

M.2 adapters can be of different lengths. The adapter card is inserted at an angle and then pushed into place and secured with a screw.

Serial advanced technology attachment (SATA) ports connect to one or more fixed drives. Technicians can also use SATA to connect removable drives, such as tape and optical drives.

External SATA (eSATA) is a standard for attaching external drives, with a 2 m (78 in.) cable.

A peripheral component interconnect (PCI) is a legacy bus type superseded by PCI Express. PCI ports can be included on a PCIe motherboard to support legacy adapter cards, but PCI cards cannot fit into PCIe slots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A tier one helpdesk technician receives a corporate cellphone with a broken screen. What is the first step?

Replace the charging cable.

Replace the screen.

Open the phone to check for liquid damage.

Check if the phone is under warranty.

A

Check if the phone is under warranty.

Mobile devices are easy to drop, and screens can crack or shatter. This is likely to require warranty or professional services to repair it.

If there are no visible cracks, the screen or digitizer may have been damaged by liquid. But the screen is visibly cracked in this question.

Mobile devices are likely to require warranty or professional services to replace parts, such as a broken screen. Replacing parts outside the warranty can void the contract.

If a cellphone is having trouble charging, then replacing the charging cable can help isolate the problem. There is no indication of a charging problem in the scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A cloud service provider (CSP) works with several organizations to establish new cloud deployments that best match their needs. Each organization has similar security needs and is open to sharing resources with other organizations to save money. Which cloud deployment sounds best for the CSP’s new customers?

Private cloud

Hybrid cloud

Community cloud

Public cloud

A

Community cloud

The community will be the best deployment model for the CSP’s new customers. A community cloud allows several organizations to share the costs of either a hosted private or fully private cloud by pooling resources for common concerns, such as standardization and security policies.

Private cloud is incorrect because it does not allow for sharing cloud resources with organizations.

Hybrid cloud deployment is not the best choice for the CSP’s new customers because the customers want to share resources full-time.

The public cloud is incorrect because the CSP’s customers still want a private cloud to share with organizations with the same security concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What characteristics of Wi-Fi 5 (802.11ac) allow for increased bandwidth and support for modern networks? (Select all that apply.)

SELECT ALL THAT APPLY

Designed to work in both the 2.4 GHz and 5 GHz bands

Designed to work only in the 5 GHz band

Downlink MU-MIMO

Typically supports up to four simultaneous clients

A

Designed to work only in the 5 GHz band

Downlink MU-MIMO
**
Typically supports up to four simultaneous clients**

Wi-Fi 5 works only in the 5 GHz band. A dual-band access point can use its 2.4 GHz radio to support clients on legacy standards (802.11g/n), but it will not support Wi-Fi 5 on that 2.4 GHz band.

In Wi-Fi 5, downlink multi-user, multiple input, multiple output (DL MU-MIMO) allows the access point to use its multiple antennas to simultaneously send data to up to four clients.

Wi-Fi 5 allows up to eight streams, though most Wi-Fi 5 access points only support 4x4 streams in practice.

Wi-Fi 6 works in both the 2.4 GHz and 5 GHz bands. This is not a characteristic of Wi-Fi 5.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

A technician needs a connector that offers high-speed standards that specify a data rate of 480 Mbps shared between the devices attached to the same host controller. What connector should the technician use?

Lightning port

HDMI

USB 3.0

USB 2.0

A

USB 2.0

USB 2.0 is half-duplex, which means that each device can send or receive, but not simultaneously.

USB 3.0 has new versions of Type A, Type B, and Type B Micro connectors with additional signaling and wires. This allows a device to send and receive simultaneously.

The Lightning port is found only on Apple’s mobile devices. The Lightning connector is reversible. The user needs a suitable adapter cable to connect such a device as a Lightning-to-USB A or Lightning-to-USB C.

A high-definition multimedia interface (HDMI) can rate as either standard or high speed. It provides high resolutions, such as 4K and 8K, and gaming features, such as the ability to vary the monitor refresh rate to match the frame rate of the video source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Each Ethernet network interface card (NIC) port has a unique hardware/physical identifier used for network routing and switching. What is this unique hardware or physical identifier?

Service set identifier

Media access control address

VLAN ID

Internet protocol address

A

Media access control address

Every NIC port has a unique hardware/physical address, called the media access control (MAC) address. Each frame of Ethernet data identifies the source MAC address and destination MAC address in a header field.

The core protocol in TCP/IP is the Internet Protocol (IP), which provides network and host addressing and packet forwarding between networks. This is not specific to the hardware.

A service set identifier (SSID) is a character string that identifies a particular wireless LAN (WLAN).

VLAN IDs are on network switch ports for traffic management and network segmentation. These are assigned by software and not native to the hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

A user reports that their reporting resource is not working. They mentioned an error message that they did not write down but are certain that a “HTTP request failed” was a part of the error. What specialized support team will the user contact to resolve this issue?

Mail server team

File server team

Print server team

Web server team

A

Web server team

A web server provides client access using HTTP or its secure version (HTTPS). Given the limited information, this would be the first team to reach out to.

Mail servers primarily use Simple Mail Transfer Protocol (SMTP), which specifies how the user delivers an email from one mail domain to another domain.

Print servers rely heavily on Server Message Block (SMB) protocol for file and printer sharing on a Windows network.

File servers also rely heavily on Server Message Block (SMB) protocol for file and printer sharing on a Windows network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

The software-defined networking (SDN) model consists of multiple layers for networking functions that can be accessed and managed via scripting and automation. Which of the following are layers within the SDN model? (Select all that apply.)

SELECT ALL THAT APPLY

Application layer

Infrastructure layer

Control layer

Internet layer

A

Application layer
Infrastructure layer
Control layer

The application layer applies business logic to decide how to prioritize and secure traffic and where to switch the traffic.

The control layer is the principal innovation of SDN as it interfaces between the application and infrastructure layers and acts as a controller for the automation of networking functions via APIs.

The infrastructure layer contains the devices (physical or virtual) that handle the actual forwarding (switching and routing) of traffic.

The Internet Protocol (IP) layer is a function of the Open Systems Interconnection (OSI) model that provides packet addressing and routing within a network of networks. Though this functions within the SDN, it is not a main software-defined networking layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

A technician uses an interface that enables storage access and transport to deliver high throughput and fast response time. What is this called?

HDD

NVMe

SSD

mSATA

A

NVMe

NVMe (NVM express) can be packaged for installation to a PCIe slot as an expansion card or an M.2 slot.

A solid-state drive (SSD) uses flash memory technology to implement persistent mass storage. Flash memory performs much better than the mechanical components used in hard drives.

A hard disk drive (HDD) stores data on metal or glass platters coated with a magnetic substance. Desktops use a width of 3.5 inches, and a laptop uses 2.5 inches.

A mini-serial ATA (mSATA) allows a technician to plug an SSD packaged as an adapter card into the motherboard’s combined data and power port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What can a technician use on a 20-pin main power connector for the motherboard? (Select all that apply.)

SELECT ALL THAT APPLY

8-pin x2 and 4-pin x1

4-pin x5

20-pin

24-pin

A

20-pin
24-pin

The technician can use a 20-pin main power adapter for the motherboard. This is the adapter that was specifically made for it.

A 24-pin adapter supplies power to the motherboard but can connect in a 20-pin. In most cases a 24-pin adapter has 4 pins that are detachable. This is not always 100% the case though.

4-pin x5 adapters would not work with the 20-pin main power connector. 4-pin connectors typically connect to case fans and other accessories devices.

A technician cannot use 8-pin x2 and 4-pin x 1. 8-pin for all multi-core processors use this connector since some power supplies have two 4-pin connectors that they can use side by side.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

A managed service company works with a client to enumerate and gather all the detailed events, errors, and notifications produced from various network devices. What solution would the company suggest in this particular case?

Syslog appliance

AAA server

Load balancer

Remote Desktop Protocol

A

Syslog appliance

Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de-facto standard for logging events from distributed systems. A Syslog collector usually listens on UDP port 514.

Remote Desktop Protocol (RDP) is Microsoft’s protocol for operating remote GUI connections to a Windows machine. RDP uses TCP port 3389.

An authentication, authorization, and accounting (AAA) server is the authentication server positioned within the local network. With AAA, the network access appliances do not store any authentication credentials.

A load balancer distributes client requests across server nodes in a farm or pool. A technician can use it when multiple servers provide the same function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

This protocol makes files available for download across a network and uses ports 20 and 21.

Telnet

File Transfer Protocol

Simple Mail Transfer Protocol

Secure Shell

A

File Transfer Protocol

File Transfer Protocol (FTP) makes files available for download across a network. It utilizes two ports. TCP Port 21 establishes the connection between two computers (control connection), and TCP port 20 is the port the file(s) are transferred across (data connection).

Secure Shell (SSH) makes a secure connection to the command-line interface of a remote server and uses TCP port 22.

Telnet makes an unsecured connection to the command-line interface of a remote server and uses TCP port 23.

Simple Mail Transfer Protocol (SMTP) transfers email messages across a network and uses TCP port 25.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What type of printer uses a heating element to create the image on the paper?

Laser

Inkjet

Thermal

Impact

A

Thermal

A thermal printer is a general term for any device that uses a heating element to create paper images. Thermal printers have a heat-sensitive print that the paper is friction-fed through the print mechanism when in the feed assembly.

Laser printers are the most popular printer technologies for office applications because they are inexpensive, quiet, and fast.

Inkjet printers typically create good-quality color output, such as photo printing. Inkjet is cheap to buy but expensive to run.

Impact printer strikes an inked ribbon against the paper to leave marks. The most common type is the dot matrix printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

A technician notices that the printer’s output was not as expected and needs to check the printer’s control panel to investigate the problem. What does the technician need to check?

Maintenance kit

Developer roller

Calibration

Toner

A

Calibration

Calibration is how the printer determines the appropriate print density or color balance. Most printers calibrate themselves automatically.

A maintenance kit is a replacement feed roller, transfer roller, and fuser unit. The printer’s internal copy count of the number of printed pages guides the replacement kit.

Toner is composed of a fine compound of dyestuff and wax or plastic particles. The toner carries the same negative charge polarity as the drum.

The developer roller is very close to the photosensitive drum. The toner is fed evenly onto a magnetized developed roller from a hopper.

82
Q

Which mechanism has performance ratings of 5,400 rpm, 7,200 rpm, 10,000 rpm, and 15,000 rpm?

HDD

RAID

SSD

mSATA

A

HDD

A hard disk drive (HDD) stores data on metal or glass platters coated with a magnetic substance. The top and bottom of each platter are accessed by its own read/write head, moved by an actuator mechanism.

A redundant array of independent disks (RAID) is an array that appears as a single storage resource or volume and can be partitioned and formatted like any other drive.

A mini-serial ATA (mSATA) allows a technician to plug an SSD packaged as an adapter card into the motherboard’s combined data and power port.

A solid-state drive (SSD) uses flash memory technology to implement persistent mass storage. Flash memory performs much better than the mechanical components used in hard drives.

83
Q

A user is trying to connect a gaming console to a television. What type of connector should the user utilize?

Adapter

Lightning port

HDMI

USB 3.0

A

HDMI

A high-definition multimedia interface (HDMI) is the most widely used video interface. HDMI supports both video and audio. The user would utilize this because it is ubiquitous in consumer electronics.

USB 3.0 has new versions of Type A, Type B, and Type B Micro connectors with additional signaling and wires.

An adapter cable has connectors for two different cable types at the end. An active adapter uses circuitry to convert the signal.

A Lightning port is found only on Apple’s mobile devices. The Lightning connector is reversible. The user needs a suitable adapter cable to connect such a device as a Lightning-to-USB A or Lightning-to-USB C.

84
Q

A developer uses a design that implements a system-on-chip (SoC) that controls video, sound, networking, and storage as part of the CPU. What is the developer using?

ARM

Intel

M.2

AMD

A

ARM

Advanced RISC machines (ARM) is a processor architecture based on a 32-bit reduced instruction set computer. Developers use ARMS in the current generation of Apple hardware, most Android smartphones and tablets, most Chromebooks, and some Windows tablets and laptops.

Intel is known as integrated electronics that design internal CPU architectures, an x86 PC processor. A CPU implements an instruction by obtaining it from memory, using its ALU to perform an action, and then storing the result in memory.

Advanced Micro Devices (AMD) manufacture and design the x86 PC processor.

M.2 adapters can be of different lengths. The adapter card is inserted at an angle and then pushed into place and secured with a screw.

85
Q

A user is trying to send the audio and video from their computer to a large panel display, but the audio will not play through the large display. The user has a VGA cable connected to the display. What would fix this problem?

Change the audio source in the OS.

Adjust the speaker volume.

Change to an HDMI cable.

Unmute the large display.

A

Change to an HDMI cable.

A video graphics array (VGA) cable does not carry audio. If the ports allow it, changing to a high-definition multimedia interface (HDMI) cable is the easiest solution.

If the speaker volume is too low, either on the computer or on the display, that could be the problem. But the VGA cable is not capable of sending audio.

When correctly cabled, there are several ways that audio can be muted, and all must be checked.

When correctly cabled, the audio source may need to be changed in the OS to have the correct output.

86
Q

A new IT support technician troubleshoots a user’s report of intermittent network connectivity. After inspecting the workstation, they see a label above the station’s RJ-45 port wall connection. This label is likely to identify what device?

Hub

Patch panel

Firewall

Switch

A

Patch panel

In most types of office cabling, the computer is connected to a wall port and via cabling running through the walls to a patch panel.

A switch is an intermediate system used to establish contention-free network segments at OSI layer 2 (Data Link). A port on a patch panel will connect into a switch to provide office network connectivity.

A hub is a legacy network hardware device that implemented the 10BASE-T and 100BASE-T Ethernet cabling designs. Hubs were used to provide multiple connections to computers in a small area and are inefficient at network management.

A basic firewall has rules that list source or destination network addresses and protocol types and whether to allow or block traffic that matches the rule.

87
Q

An IPv6 address is composed of which two main parts? (Select all that apply.)

SELECT ALL THAT APPLY

Dynamic address

Interface ID

Static address

Network ID

A

Interface ID
Network ID

An IPv6 address is in two main parts. The first 64 bits are a network ID.

An IPv6 address is in two main parts. The second 64 bits designate a specific interface.

Using static addressing requires an administrator to visit each computer to enter the configuration information for that host manually. This is traditionally only used for IPv4 addresses.

A host can receive its IP address, subnet mask, default gateway, and DNS server addresses from a Dynamic Host Configuration Protocol (DHCP) server as an alternative to static configuration. This is also used traditionally with only IPv4 addresses.

https://www.professormesser.com/free-a-plus-training/220-1101/220-1101-v

88
Q

One of two monitors remains a blank screen after a user logs onto the system. The technician suspected an unplugged monitor, but it was connected. What is the next step in troubleshooting?

Establish a new probable cause.

Identify the problem.

Document the changes.

Escalate the problem.

A

Establish a new probable cause.

After the first theory does not work, establish a new probable cause of the problem. Start with basic information, including verifying that the monitor is receiving power.

Escalating the problem to a supervisor is a valid route, but not in this case. The technician has not exhausted all reasonable troubleshooting options.

The problem is that the second monitor has a blank screen, which the technician has already identified. Identifying the problem is the first troubleshooting step.

Documenting the changes is the last step in the troubleshooting methodology, including a verified working solution.

89
Q

A technician has tested a computer with extended read/write times and found it to have IOPS reduced from vendor baselines. What should the technician do next?

Replace the drive.

Make data backups.

Change the power cord.

Change the PSU.

A

Make data backups.

A computer experiencing extended read/write times and a technician diagnosing it with reduced input/output operations per second (IOPS), has a failing drive. However, the drive has not yet failed, so the first thing to do is perform data backups.

Replacing the drive immediately will result in full data loss. However, the drive has not failed yet, so the technician should back up the data before replacing the drive.

The technician should replace the power supply unit (PSU) when it is overheating or not delivering consistent power.

The technician should replace a frayed power cord when the cord is no longer working.

Microsoft recommends using the DiskSpd (https://aka.ms/diskspd) utility

90
Q

Which of the following allows reducing the number of cables to the minimum required to minimize clutter within the chassis and improve airflow and cooling?

Modular power supply

Thermal pad

Heat sink

Redundant power supply

A

Modular power supply

A modular power supply has power connector cables that are detachable from the unit.

A redundant power supply requires a compatible motherboard. This configuration is more common in server systems than on desktop PCs. Typically, each PSU plugs into a backplane on a server and is hot-swappable.

A heat sink is a block of copper aluminum with fins. The fins expose a larger surface area to the air around the component to achieve a cooling effect by convection.

A thermal pad is a solid compound at room temperature but softens when heated.

91
Q

Which application protocol underpins file and printer sharing on Windows networks and usually runs directly over the TCP/445 port?

Network Basic Input/Output System

File Transfer Protocol

HyperText Transfer Protocol

Server Message Block

A

Server Message Block

Server Message Block (SMB) is the application protocol underpinning file and printer sharing on Windows networks. SMB usually runs directly over TCP port 445.

Network Basic Input/Output System (NetBIOS) allows computers to address one another by name and establish sessions for other protocols, such as SMB. This uses UDP port 137 for name services and TCP port 139 for session services.

The File Transfer Protocol (FTP) allows clients to upload and download files from a network server. It uploads files to websites and utilizes TCP ports 20 and 21.

HyperText Transfer Protocol (HTTP) is usually used to serve HTML web pages or applications hosted on a web server and typically operates over TCP port 80.

previous

https://www.professormesser.com/free-a-plus-training/220-1101/220-1101-v

92
Q

The technician can hear the computer’s fan spinning, but no output displays on the laptop. What would be the first troubleshooting technique?

Replace the CPU chip with a known good one.

Replace the battery.

Connect an external monitor to check the screen.

Open the laptop and check all cabling.

A

Connect an external monitor to check the screen.

The fan spinning indicates that the device is getting power. The blank screen could indicate a faulty screen, or the computer could not initiate a power-on self-test (POST). Connecting an external monitor will indicate which direction to go.

Replacing the central processing unit (CPU) chip is premature if the technician has not ruled out a faulty screen.

If a user has not recently performed on the laptop, then internal cable problems are unlikely to be a problem.

The spinning fan indicates the computer is getting power, so the battery is not the most likely problem.

93
Q

A remote user contacts the IT desk to report that they accidentally dropped a mobile device. It is no longer responsive when trying to tap on icons. Which component is likely damaged and is causing the problem?

Display panel

Digitizer

Tempered glass

Protective glass

A

Digitizer

A touch screen can also be referred to as a digitizer due to the way it converts analog touch input to digital software instructions. The digitizer is sandwiched between a layer of protective glass and the display panel.

A display panel is only a single layer within the screen assembly for a mobile device. A display sits below the digitizer.

Protective glass covers the digitizer on a mobile device. The protective glass and digitizer usually adhere together.

The touchscreen itself is covered by a thin layer of scratch-resistant, shock-resistant tempered glass, such as Corning’s Gorilla Glass.

94
Q

A company offers a bring your own device (BYOD) program at work. Several users approach the company in an effort to receive reimbursement for changing personal phones to the company’s carrier. This will be done by swapping out a subscriber identity module (SIM) card in devices with which network type?

NFC

LTE

GSM

CDMA

A

GSM

Global System for Mobile Communication (GSM) allows subscribers to use a removable subscriber identity module (SIM) card to use an unlocked handset with their chosen network provider.

Long-term evolution (LTE) provides an upgrade from CDMA. All 4G and 5G cellular data connections require a SIM card.

Code division multiple access (CDMA) means that the handset is directly managed by the provider and there is no removable SIM card.

Near-field communications (NFC) allow a mobile device to use a close-range service such as contactless payments.

95
Q

A network engineer completes a site survey in an office for wireless connectivity. Given that the signal needs to get through several walls, what wireless frequency band would best suit the engineers’ needs?

Bluetooth

2.4 GHz

Near-field communication

5 GHz

A

2.4 GHz

The 2.4 GHz standard is better at propagating through solid surfaces, thus giving it the most extended signal range.

The 5 GHz standard is less effective at penetrating solid surfaces and therefore does not support the maximum ranges achieved with 2.4 GHz standards.

Bluetooth is a short-range, wireless radio-network transmission medium that normally connects two personal devices, such as a mobile phone and a wireless headset.

Near-field communication (NFC) is the standard for two-way radio communications over very short (around four inches) distances, facilitating contactless payment and similar technologies.

96
Q

What are the main components of authentication, authorization, and accounting that securely and adequately connect devices to a network? (Select all that apply.)

SELECT ALL THAT APPLY

DHCP server

Network access server/point

AAA server

Supplicant

A

Network access server/point
AAA server
Supplicant

The supplicant is the device requesting access, such as a user’s PC or laptop.

Network access servers (NAS) or network access points (NAP) are network access appliances, such as switches, access points, and VPN gateways. These are also called AAA clients or authenticators.

The AAA server is the authentication server positioned within the local network. With AAA, the network access appliances do not store any authentication credentials.

The Dynamic Host Configuration Protocol (DHCP) server issues network configuration to clients to communicate on the network. This is not a part of the AAA process specifically.

97
Q

A user complains their phone is frozen. They can hard reset it, but nothing works on the screen. What should the technician focus on?

Ports

Battery

Malware

Digitizer

A

Digitizer

For a mobile phone, the touchscreen is the main input. If the digitizer is damaged, it will mimic a frozen device. Replacing the digitizer will solve the problem.

A problematic battery can cause overheating or the inability to hold a charge. Neither are the problems in the scenario.

Whenever a device does not function as expected, malware should be suspected. Malware can be challenging to diagnose, and hardware problems should be ruled out first.

Physically damaged ports will cause intermittent or no connection. This can occur while trying to charge a device or listen to audio.

98
Q

A technician receives a ticket on a proprietary internal system. What would be the best place to start researching possible solutions?

Search an internal ticketing system.

Search through textbooks.

Ask a supervisor.

Search the internet.

A

Search an internal ticketing system.

Colleagues, or an internal ticketing system, will give the most relevant information to specific systems and sets of problems that users have. Well-documented internal tickets will generally contain solutions to the most common problems.

A textbook is generally outdated for specific technology solutions and would not contain information about a proprietary system.

A supervisor is a useful resource but should not be the first person to ask. The technician should complete documentation of all attempts at solutions and searches before escalating tickets.

Searching the web is a great research step, but the technician should perform it after first checking if any internal documentation is available.

99
Q

A user needs to be sure that their phone is connected to a cellular service appropriately. What step can assist with this process?

Use multifactor authentication.

Use location services.

Perform a PRL update.

Recognize data caps.

A

Perform a PRL update.

Information that a cellular radio needs to connect to a network is provided as a preferred roaming list (PRL). An update would update the list.

Multifactor authentication means that the user must submit at least two different kinds of credentials. This would be used to authenticate access to a system but not to ensure cellular connectivity.

When a user utilized a mobile device with a data connection, a data cap should be recognized. This means being aware of how much data is allowed with a paid plan and how much data costs over the cap.

Using location services is not related to being connected to a cellular network. Location services use Wi-Fi and GPS to determine a device’s location.

100
Q

A user has a known problem with a system that is solvable by deleting the local user profile. However, what is the next step before moving forward with that solution?

Formulate a new theory.

Implement a plan of action.

Check corporate policies.

Perform a backup.

A

Perform a backup.

Deleting the local user profile will remove any information saved to the desktop, so the technician must backup any information saved on it.

Checking corporate policies is a good solution when implementing any changes to a system, but deleting a local user profile does not rise to the level of installing a program or changing network settings.

If the initial solution of deleting the local user profile does not work, then it would be time to formulate a new theory. However, since the technician has not yet tested the initial theory and solution, formulating a new theory is premature.

The technician already has a plan of action, so a new plan of action is not necessary.

101
Q

A traveling salesperson receives an old hand-me-down laptop to use while a new one is on back-order. The salesperson complains that the laptop’s visuals and brightness are horrible. An IT technician states that the fluorescent backlight is failing. What powers the backlight?

TFT

Digitizer

IPS

Inverter

A

Inverter

An inverter component is used to convert from the DC power supplied by the motherboard to the AC power for the bulb. Older laptops might use an inverter component to power a fluorescent backlight.

A touch screen can also be referred to as a digitizer because of the way it converts analog touch input to digital software instructions.

In-plane switching (IPS) is a display technology that uses crystals that rotate rather than twist. The main benefit is to deliver better color reproduction at a wider range of viewing angles.

In the types of flat panels used for computer and mobile device displays, the liquid crystal elements and transistors are placed on a thin film transistor (TFT).

102
Q

A system administrator implemented a physical device that expedites cryptographic operations and manages cryptographic keys. What is this device the system administrator implemented?

TPM

Secure boot

Boot options

HSM

A

HSM

A hardware security module (HSM) is a secure USB key or thumb drive used to store cryptographic material.

A trusted platform module (TPM) is a specification for hardware-based storage of digital certificates, cryptographic keys, and hashed passwords.

Boot options define how the system firmware searches devices for a boot manager. It is one of the most important parameters in a system setup.

Secure boot is a unified extensible firmware interface (UEFI) feature designed to prevent a computer from being hijacked by malware. Under secure boot, the computer firmware configuration has cryptographic keys that can identify trusted code.

103
Q

A software development company uses a system to allow developers to log into any computer throughout the building and load their unique desktop environment. The IT department decided to manage these servers in the data center located in the basement of the company’s office building. What system is the software development company leveraging?

VDI in the cloud

Platform as a service (PaaS)

Virtual desktop infrastructure (VDI) on premises

Infrastructure as a service (IaaS)

A

Virtual desktop infrastructure (VDI) on premises

Virtual desktop infrastructure (VDI) on-premises is correct because the developers log into virtual machines that load the users’ computer images. The servers are hosted on the same network as the clients.

VDI in the cloud is incorrect because the servers hosting the virtual machines in the cloud mean that the servers are not hosted on the same network as the clients.

Platform as a service (PaaS) is incorrect because PaaS is typically a solution that would deploy hardware and applications platforms for the clients to use.

Infrastructure as a service (IaaS) is incorrect because IaaS is deploying IT hardware through a service provider.

104
Q

A contractor working for a managed services company works fully remote from their residence. They have multiple desktops, printers, and even some Wi-Fi access points set up. What type of network is this considered?

WAN

MAN

WLAN

SOHO

A

SOHO

A small office home office (SOHO) LAN is a business-oriented network, potentially using a centralized server in addition to client devices and printers, but often using a single networking appliance to provide LAN and Internet connectivity.

A wide area network (WAN) spans multiple geographic locations. One example of a WAN is the internet, a global network of networks.

A wireless local area network (WLAN) uses radios and antennas for data transmission and reception. Though there are some Wi-Fi access points, not all devices are wireless.

A metropolitan area network (MAN) can mean a specific network type covering an area equivalent to a city or other municipality.

105
Q

This protocol makes files available for download across a network and uses ports 20 and 21.

Simple Mail Transfer Protocol

File Transfer Protocol

Secure Shell

Telnet

A

File Transfer Protocol

File Transfer Protocol (FTP) makes files available for download across a network. It utilizes two ports. TCP Port 21 establishes the connection between two computers (control connection), and TCP port 20 is the port the file(s) are transferred across (data connection).

Secure Shell (SSH) makes a secure connection to the command-line interface of a remote server and uses TCP port 22.

Telnet makes an unsecured connection to the command-line interface of a remote server and uses TCP port 23.

Simple Mail Transfer Protocol (SMTP) transfers email messages across a network and uses TCP port 25.

106
Q

A user noticed that their PC is generating more heat than can be removed, and the one component designed to draw cool air from the low vents in the front of the case over the motherboard is not working. What is the impacted component?

Heat sink

Liquid-base cooling system

Fan

Thermal paste

A

Fan

A fan improves airflow that helps to dissipate heat. Fans provide the power supply and chassis exhaust points.

A heat sink is a block of copper or aluminum with fins. The fins expose a larger surface area to the air around the component to achieve a cooling effect by convection.

Thermal paste glues the heat sink to the surface of the chip to ensure the best transfer of heat by eliminating small air gaps.

A liquid-based cooling system refers to a system of pumping water around the chassis. The water loop/tubing and pump push the coolant added via the reservoir around the system.

107
Q

A systems engineer is doing an internal audit of their virtual environment before an annual inspection and is making sure that all the virtual machines are up to date on patches. What could the systems engineer consult to verify which patches need to be on each machine?

Resource requirements

Test development

Security requirements

Legacy software/OS

A

Security requirements

Security requirements are correct because patching is a part of ensuring a system is secure against the latest vulnerabilities.

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

Test development often uses virtual desktop platforms that are based on some sort of guest OS hypervisor.

Legacy software applications and operating systems may not perform well if a user’s system has been upgraded.

108
Q

A systems engineer is building a virtual machine to run a service with 8 dual-core CPUs and 500 GB of random access memory to function properly. Where would these two hardware requirements be listed?

Security requirements

Test development

Legacy software/OS

Resource requirements

A

Resource requirements

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

Security requirements are incorrect because the amount of central processing units (CPUs) and random access memory (RAM) a system needs will not impact the security of a system.

Legacy software/OS is incorrect because a list of legacy software and OSs would not encompass hardware like CPU and RAM.

Test development often uses virtual desktop platforms based on some guest OS hypervisor.

109
Q

A video gamer is using a product designed to record footage from computer games. What is this called?

Sound card

Capture card

Video card

NIC

A

Capture card

Capture cards record video input and save it as a movie or streaming media file. Some work with PC games, while others record from a game console or live camera high-definition multimedia interface (HDMI) sources, such as a camcorder or security camera.

Video cards generate the signal to drive a monitor or projector. Low-end graphics adapters are likely to be included with the motherboard chipset or as part of the CPU itself.

A sound card records input from a microphone. Audio playback occurs via speakers or headphones connected to sound cards.

The network interface card (NIC) hardware component on a computer provides a network connection.

110
Q

A user complains that their laptop does not hold a charge for more than 30 minutes, even after charging all night. They also mention that there is an error message when they restart their computer that states something about power. What is likely the problem?

Physically damaged charging port

Swollen battery

Poor battery health

Underpowered adapter

A

Underpowered adapter

AC adapters can get mixed up. If an underpowered adapter is used, the laptop will display a warning at boot. Using the wrong adapter can cause problems, such as the battery not completely charging.

As batteries age, they no longer hold a charge and need to be replaced. This would be the best answer except that the boot error points to another problem.

A swollen battery indicates a problem with the battery’s charging circuit. This can be diagnosed by the keyboard or trackpad being pushed up or the laptop wobbling when sitting on a flat surface.

Charging ports can be damaged by improper insertion and removal of the connectors. Signs of this are no charging or intermittent charging.

111
Q

A growing company is looking to move away from an outside vendor for payment processing and would like to do it in-house. As a part of securing the data on these computers, what foundational infrastructure solution should the company implement to keep this data separate from the rest of the company’s internal network?

Virtual LAN

DHCP scope

Virtual private network

DNS (A) record

A

Virtual LAN

A virtual LAN (VLAN) is a logical network segment using a feature of managed switches to segregate network traffic. This would be the first step to separating network traffic for the given scenario.

A virtual private network (VPN) enables mostly remote hosts to connect to the LAN without being physically installed at the site.

In the Domain Name System (DNS), an A record resolves a host name to an IPv4 address. This would not provide any added security.

A dynamic host configuration protocol (DHCP) scope is a range of consecutive IP addresses in the same subnet that a DHCP server can lease to clients. The company may not use this if all the hosts have static addresses.

112
Q

A user is trying to print visual graphics for an upcoming meeting, but the paper is coming out faded. What should they check first?

Toner cartridge

Orientation

Creased paper

Paper weight

A

Toner cartridge

For faded or faint prints, if a simple cause such as the user choosing an option for low density (draft output) can be discounted, then this is most likely to indicate that the toner cartridge needs replacing.

If paper is not feeding into the printer check that the paper is not creased, damp, or dirty.

If the printer is feeding multiple sheets also check the paper size and weight.

For incorrect page orientation, the paper size and orientation must be set correctly for the print job or the finishing/binding will be aligned to the wrong edge.

113
Q

An iPhone user needs to charge their phone and notices that it only uses a certain type of connector. What type of connector does the iPhone use?

Lightning port

Thunderbolt

USB

SATA

A

Lightning port

A Lightning port is found only on Apple’s mobile devices. The Lightning connector is reversible.

Universal Serial Bus (USB) is the standard meaning of connecting most peripheral device types to a computer. A host controller manages USB.

Thunderbolt displays interfaces like the DisplayPort or HDMI and a general peripheral interface like USB.

SATA (serial advanced technology attachment) is the standard means of connecting internal storage drives within a desktop PC. STAT uses cables of up to 1 m terminated with compact 7-pin connectors. Each SATA host adapter port supports a single device.

114
Q

A company receives a new printer that needs assembly. What factors should the company consider when assembling it? (Select all that apply.)

Set up location

Overload output trays

Correctly unboxing

Pixel dimension

A

Set up location

Correctly unboxing

Set up location should be used when deploying a new printer. The printer must have a power outlet and potentially a network data port. The printer needs to be accessible to its users.

Correctly unboxing should be used when setting up the printer. Many printers are heavy and may require two persons to lift safely. A printer should normally be left acclimate after removing the packaging materials.

Pixel dimensions are multiple dots that produce one pixel quoted in pixels per inch to avoid confusion.

Overload output trays will cause paper jams If the output tray is in low capacity, which could quickly happen in a busy office.

115
Q

A RAID array cannot boot, and the technician cannot reach the configuration utility. There have been no recent changes to the array. What is the likely problem?

Disk failure

Misconfiguration

Controller failure

Failed RTC battery

A

Controller failure

If the redundant array of independent disks (RAID) array cannot boot, the first step is to use the configuration utility to verify the status. If the system cannot reach it, then the controller likely failed.

Single disk failure would not stop the booting process from happening. RAID arrays operate so that a single disk can fail and not cause any data loss.

Misconfiguration can always be a problem, but no recent changes occurred in this case. If it was booting fine before and no configurations have changed, then misconfiguration is highly unlikely to be the problem.

A failed real-time clock (RTC) battery will cause an incorrect date or time but would not stop a RAID array from booting.

116
Q

A laptop user at a company asks the IT department for computer equipment. In addition to an external monitor, the user would like to take advantage of an expansion card. What does IT purchase for the user?

Serial interface

Laptop ports

Docking station

Port replicator

A

Docking station

A docking station is a sophisticated port replicator. When docked, a portable computer can function like a desktop machine or use additional features, such as a full-size expansion card.

A port replicator either attaches to a special connector on the back or underside of a laptop or is connected via USB. It provides a full complement of ports for devices such as keyboards, monitors, mice, and network connections.

Serial is one of the oldest and simplest computer interfaces. While not many mobile devices have hardware serial ports, the software serial port is often used.

Laptops ship with standard wired ports for connectivity. The ports are usually arranged on the left and right edges.

117
Q

What hardware on a client’s computer allows a device and printer to connect over a network?

Print server

Printer share

Secured prints

Audit log

A

Print server

A print server is a hardware and firmware that allows client computers to connect directly over the network without going via a server computer.

The print share model describes how multiple client devices access the printer. Ordinary users can connect to a network printer if the print server administrator grants permission to use it.

Secured print is held on the print device until it authenticates directly with the print devices. This mitigates the risk of intercepting confidential information from the output tray before the user has had time to collect it.

An audit log can identify printed documents that have gone missing or identify the unauthorized release of information.

118
Q

A flat panel monitor has several black dots. After extensive troubleshooting, it appears to be a display problem. What can fix this?

Change the bulb.

Adjust brightness and contrast controls.

Adjust the resolution.

Check for warranty replacement.

A

Check for warranty replacement.

A flat-panel monitor defect may cause individual pixels to be “stuck” or “dead.” A technician can sometimes fix stuck pixels using a software program. However, a technician cannot usually fix dead pixels (solid black) and should submit the monitor for warranty replacement (if available).

Adjusting the brightness and contrast of a display can help fix a dim image, but not dead pixels.

Adjusting the resolution can resolve a fuzzy image, but it cannot fix dead pixels.

Flat-panel monitors generally do not have a replaceable bulb. However, some projectors may have a replaceable bulb.

119
Q

A company plans on upgrading a fleet of mobile phones. Upon inspection, the phones that will be retired do not utilize a SIM card. What does the company learn about the phones that have been in use?

The phones are 4G.

The phones are CDMA.

The phones are 3G.

The phones are LTE.

A

The phones are CDMA.

3G defines Universal Mobile Telecommunications Service (UMTS) on a Global System for Mobile Communications (GSM) handset or Evolution-Data Optimized (EV-DO) on CDMA networks, working at up to around 3 Mb/s.

Code division multiple access (CDMA) means that the handset is directly managed by the provider and there is no removable SIM card.

Long-term evolution (LTE) provides an upgrade from CDMA. All 4G and 5G cellular data connections require a SIM card.

4G phones use a SIM card and have a maximum downlink of 300 Mb/s in theory, with around 20–90 Mb/s typical of real-world performance.

120
Q

While trying to diagnose an intermittent shutdown problem, a technician watches while the user reproduces the error. Before the computer shuts down, it gives the BSOD. How is this helpful in diagnosing the problem?

BSOD means that memory needs replacing.

BSOD displays error codes.

BSOD shows software corruption.

BSOD indicates power supply unit (PSU) needs replacing.

A

BSOD displays error codes.

The blue screen of death (BSOD) is Windows proprietary crash screen. BSOD contains an error code and a QR code to the memory dump. A technician can search error codes online for more information.

A faulty power supply unit (PSU) can cause intermittent restarts, but the BSOD does not necessarily indicate that the power supply is the problem.

Memory problems can cause intermittent restarts, but the BSOD does not necessarily mean a memory problem.

Software corruption can cause intermittent restarts, but a BSOD does not necessarily mean it is software corruption. The error code on the BSOD will give further information.

121
Q

A company is looking for computers with accelerated graphic capabilities and large, high-resolution monitors. Which of the following would meet the company’s needs?

Desktop

Mobile

Server-class

Workstation

A

Workstation

The workstation is a high-performance PC, such as one used for software development or graphics/video editing. Any business PC or network client can be a workstation.

Desktop is shorthand for a basic PC used at home or in the office. Computer cases sit horizontally on a desk rather than the vertical towers or all-in-one configurations used today.

Server-class computers must manage more demanding workloads than most desktops and operate to greater reliability standards.

Mobiles use Advanced RISC Machine (ARM)-based central processing units (CPUs) that prioritize power and thermal efficiency plus weight over pure performance. Mobile CPUs tend to use different socket form factors to desktops.

122
Q

A vast majority of rural residents in the United States still use this internet connection type that utilizes the public switched telephone network (PSTN).

Wi-Fi

DSL

WISP

Satellite

A

DSL

A digital subscriber line (DSL) uses the higher frequencies available in copper telephone lines as a communications channel. The two major “flavors” of this type of connection are asymmetrical and symmetrical.

Various satellite internet solutions are available to rural residents, but they do not utilize the PSTN infrastructure.

A wireless internet service provider (WISP) uses ground-based long-range fixed access wireless technology. The WISP installs and maintains a directional antenna to bridge the customer’s network and the service provider.

Wi-Fi is the brand name for the IEEE 802.11 standards used to implement wireless local area networks (WLANs).

123
Q

A display manufacturer produces a new low-cost flat screen for budget conscious shoppers. The display uses a technology that does not require a backlight as each individual pixel is self-illuminating. Which technology does the display use?

Organic LED

Liquid crystal display

Thin film transistor

Light-emitting diodes

A

Organic LED

In an organic LED (OLED) display, or technically an advanced matrix OLED (AMOLED), each pixel is generated by a separate LED. This means that the panel does not require a separate backlight.

An LCD must be illuminated to produce a clear image. In a TFT, the illumination is provided by an array of light-emitting diodes (LEDs).

Most mobile devices use a flat-panel screen technology based on a type of liquid crystal display (LCD). A liquid crystal is a compound whose properties change with the application of voltage.

In the types of flat panels used for computer and mobile device displays, the liquid crystal elements and transistors are placed on a thin film transistor (TFT).

124
Q

If a computer produces digital art, what special process will it require?

Color calibration

Adjust resolution

Use a screensaver.

Adjust brightness and contrast controls.

A

Color calibration

Color calibration is the process of adjusting screen and scanner settings to balance color input and output. A technician should configure color settings with the assistance of a color profile.

Incorrect settings or a failed backlight can cause a dim image. Adjusting brightness and contrast controls can resolve any problems with dim images.

A user needs to adjust the resolution for a display if it is fuzzy. An image appears fuzzy if the output resolution does not match the display device’s native resolution.

When the same static image displays for an extended period, it can damage the monitor’s picture elements, causing a ghost image to “burn” permanently onto the display. An animated screensaver can help prevent this problem.

125
Q

An artist looks to achieve greater precision when creating digital drawings. Which input device will help achieve this goal?

Trackpad

Touchpad

Touch pen

Touch screen

A

Touch pen

Most drawing pads and some touch screens can be used with a touch pen or stylus rather than fingers. A stylus allows for more precise control and can be used for handwriting and drawing.

A trackpad acts as an input device and is a larger-format device attached as a peripheral rather than built into a laptop.

A touch screen is also referred to as a digitizer because of the way it converts analog touch input to digital software instructions. A digitizer sits above a display panel.

A touchpad is a navigation device that is built into laptops and acts as a mouse.

126
Q

A support technician replaces a Wi-Fi card in a laptop. The following day, the laptop user states that the company’s Wi-Fi network signal is weaker than it was before. What does the technician find to be the likely problem?

The Wi-Fi is not compatible with the new card.

The antenna is not connected.

The Wi-Fi card is not seated properly.

The incorrect software drivers are installed.

A

The antenna is not connected.

When replacing a Wi-Fi card, it is important to remember to connect the antenna. The connection is usually a wire with a terminating end that snaps onto the card.

A Wi-Fi card is seated into a laptop and is usually a peripheral component interconnect express (PCIe) type connector. Having the card seated incorrectly would render the Wi-Fi card unrecognizable and not function at all.

Devices within a computer require software drivers to function. Since the system identified the card properly, then the support technician installed the correct drivers.

There are varying specifications for Wi-Fi. Since the Wi-Fi is receiving a signal, the Wi-Fi card is compatible with the company’s Wi-Fi system.

127
Q

A student borrows an external hard drive from a friend but cannot see the drive in Windows Explorer. The friend’s computer is a Mac. What is the problem?

Faulty connectors

Bad sectors

Faulty boot sector

Incompatible file structures

A

Incompatible file structures

Mac and Windows file systems are not natively compatible with each other. The Windows device will not recognize the Mac-formatted external drive.

A faulty boot sector can be a problem if the boot drive does not initiate. In this example, this is a secondary external drive, which does not need to boot the operating system.

When trying to open or save a file, bad sectors can cause the error message, “Cannot read from the source disk.”

The external drive still needs to connect to the computer and could possibly be faulty. However, the incompatibility between file systems is still the most likely problem.

128
Q

A user replaces an older laptop that has a thin film transistor (TFT) display that uses crystals that rotate. Which TFT technology does the display use?

In-plane switching (IPS)

Vertical alignment (VA)

Twisted nematic (TN)

Organic LED (OLED)

A

In-plane switching (IPS)

In-plane switching (IPS) uses crystals that rotate rather than twist. The main benefit is to deliver better color reproduction at a wider range of viewing angles.

Twisted nematic (TN) crystals twist or untwist in response to the voltage level. This is the earliest type of TFT technology and might still be found in budget displays.

Vertical alignment (VA) uses crystals that tilt rather than twist or rotate. This technology supports a wide color gamut and the best contrast-ratio performance.

In an organic LED (OLED) display, or technically an advanced matrix OLED (AMOLED), each pixel is generated by a separate LED.

129
Q

What are the manufacturers’ specific recommendations for cleaning and maintaining laser printers? (Select all that apply.)

SELECT ALL THAT APPLY

Use a domestic vacuum.

Wipe with a soft cloth.

Use a compressed air blaster.

Use a toner-safe vacuum.

A

Wipe with a soft cloth.

Use a toner-safe vacuum.

Wipe dust and toner away from the printer interior or exterior with a soft cloth. The soft cloth can be damp to clean the exterior surface.

Use a toner-safe vacuum to get rid of the printer interior or exterior dust.

A technician should not use a compressed air blaster to clean a laser printer since it risks blowing the toner dust into the room.

A technician should not use a domestic vacuum cleaner because the toner is conductive and can damage the motor. Toner is also so fine that it will pass straight through the dust collection bag and back into the room.

130
Q

What universal serial bus (USB) does a technician use that allows a device to send and receive simultaneously?

USB Type A

USB 2.0

USB Type B

USB 3.0

A

USB 3.0

USB 3.0 is a new type of connector form factor and has upgraded transfer rates which are full-duplex.

USB 2.0 is a high-speed standard that specifies a data rate of 480 Mbps shared between all devices attached to the same host controller. The USB 2.0 is half-duplex, which means that each device can send or receive, but not simultaneously.

USB 2 Type B connects to large devices. The connector and port are square, with a beveled top.

USB 2 Type A connects to the host and some types of peripheral devices. The connector and port are flat rectangle-shaped. A technician should insert the connector with the USB symbol facing up.

131
Q

A computer monitor keeps flickering. The technician has checked the connectors and replaced the cords, yet the problem continues. The technician connects the display to another computer, and the flickering problem is gone. What is the likely problem?

Incorrect contrast controls

Failing display

Faulty video card

Incorrect resolution

A

Faulty video card

A faulty or overheating video card could cause a flickering screen. Attaching the display device to a different computer isolates the cause of the issue.

Since the flickering stopped when connected to a different computer, the display is not the problem. If the display were failing, it would also likely include bright or dim bands or lines and bright spots at the edge of the screen.

An incorrect resolution will cause a blurry image but not a flickering image.

Incorrect contrast controls can cause a dim image, but not a flickering image.

132
Q

What kind of storage media can have grinding and clicking as a diagnostic tool?

SSD

HDD

NVRAM

RAM

A

HDD

A hard disk drive (HDD) has moving platters and arms. These mechanical parts can start making grinding or clicking noises as they fail.

A solid-state device (SSD) does not have moving parts. Instead, SSD uses flash memory technology to implement persistent mass storage. As a result, risks from failure due to mechanical shock and fear are generally lower.

Random access memory (RAM) does not have moving parts to fail. RAM is the nonpersistent memory used for running programs and open data files.

Non-volatile read access memory (NVRAM) does not have moving parts to fail.

133
Q

A technician wants to install a non-standard program on a user’s computer to solve a problem. What does the technician need to consult before installing the program?

Social media

The user

Vendor solutions

Corporate policies

A

Corporate policies

Before making any changes to a system, consult the corporate policies and procedures. For example, some systems allow installing all software, while others have limited lists of accepted programs to install on the user’s computers.

Before posting any information on social media, it is imperative to get permission from supervisors. In this case, any answers received from social media would likely not apply to the particular system.

Before bringing a possible solution to the user, ensure that the solution falls within the acceptable corporate policies and procedures.

Vendor-specific documentation can provide possible solutions to a problem, but that solution is not relevant if it falls outside the corporate policies and procedures.

134
Q

Users reported an incident where they could not connect to network shares on a specific file server but could utilize all other resources and the internet. After logging into the server locally to check, it seems to be up and connected to the network. There is no response after going to a user’s station and using the ping command to contact the server by the documented IP address. What should be the issue to investigate next?

Check to see if the user workstation has been given an APIPA address.

Check the server’s IP address. It may have a DHCP-provisioned address instead of a static address.

Check the user’s default gateway to ensure it can communicate to remote networks.

Ensure the server has a Class A IPv4 address.

A

Check the server’s IP address. It may have a DHCP-provisioned address instead of a static address.

If the server locally appears online and connected, it has an address, but likely one provisioned from DHCP if workstations cannot ping the server by the documented IP address.

The user workstation would not likely reach all other resources if it had an APIPA address.

If the user station can connect to other resources, especially the internet, there is likely no issue with the gateway.

It may not be a Class A address, depending on the type of network structure. A technician can also use class B and C addresses for private addressing.

135
Q

A server system uses a method where each transfer performs a hash calculation on the data value and stores it as an 8-bit checksum. This can detect and correct single-bit errors and allow the PC to continue functioning normally. What is this method called?

Virtual RAM

SODIMM

ECC RAM

Dual-channel

A

ECC RAM

A technician uses error correction code (ECC) RAM for workstations and servers that require high reliability.

Virtual RAM, also called virtual memory, is not just used to supplement RAM with swap space.

Small outline DIMM (SODIMM) is the smaller form factor packaged for laptop RAM. The memory typically fits into slots that pop up at a 45-degree angle to allow the chips to be inserted or removed.

Dual-channel memory controllers effectively have two 64-bit pathways through the bus to the CPU, meaning that they can send 128 bits of data per transfer rather than 64 bits.

136
Q

What type of printer uses a heating element to create the image on the paper?

Inkjet

Impact

Thermal

Laser

A

Thermal

A thermal printer is a general term for any device that uses a heating element to create paper images. Thermal printers have a heat-sensitive print that the paper is friction-fed through the print mechanism when in the feed assembly.

Laser printers are the most popular printer technologies for office applications because they are inexpensive, quiet, and fast.

Inkjet printers typically create good-quality color output, such as photo printing. Inkjet is cheap to buy but expensive to run.

Impact printer strikes an inked ribbon against the paper to leave marks. The most common type is the dot matrix printer.

137
Q

What symptom only points to a mechanical fault?

Read/write failure

No LED status lights

Bootable device not found

Grinding noise

A

Grinding noise

A hard disk drive (HDD) has moving pieces that generally make a low-level sound when accessed. A loud or grinding noise, or any clicking sound, is a sign of a mechanical problem.

The error message, “Bootable device not found” could indicate a physical problem, but it is just as likely to be a corrupted boot disk sector (software problem).

Bad sectors in an HDD typically cause read/write failures when trying to open or save a file. Power failures or mechanical faults can cause read/write failures.

No light-emitting diode (LED) status indicators can mean the whole system is not receiving power or an individual disk unit is faulty.

138
Q

A user receives a loaner Android mobile phone for use while traveling on business. To charge the device, which traditional cable type will the user need?

Serial

HDMI

Lightning

USB

A

USB

Modern Android-based smartphones and tablets use the USB-C connector for wired peripherals and charging. The Micro-B USB and Mini-B connector form factors are only found on old devices.

Most iPhone and iPad Apple devices use the proprietary Lightning connector. Some of the latest iPad models, such as the iPad Pro, use USB-C.

Serial is one of the oldest and simplest computer interfaces. While not many mobile devices have hardware serial ports, the software serial port is often used for programming and connectivity.

A high-definition media interface (HDMI) port is a multimedia port used for connecting computers and other devices to a display for audio/video purposes.

139
Q

Users at an organization rely heavily on attending online meetings with clients and customers. The IT department purchases new laptops for these users to support conferencing needs. What component does IT ensure the laptop has when the specification is 1080p?

Speaker

Headset

Microphone

Webcam

A

Webcam

A webcam allows for video recording or web conferencing and can also take still pictures. A good external or internal webcam will have a 1080p resolution.

Mobile devices feature integrated audio/video input and output devices. For example, a microphone records audio for voice calling and web conferencing.

Speakers produce audio output. Speakers can be an internal or external component and can vary in sound quality.

An external headset or earbud set provides both a speaker microphone and headphone speakers. Wired headsets use either the 3.5 mm audio jack or a USB/Lightning connector.

previous

140
Q

A user’s laptop screen is very dim. However, the image becomes bright when the technician attaches an external monitor. What is the problem?

Backlight

Video configuration

Malware

Battery

A

Backlight

When a backlight fails, the screen will be very dim. The technician has verified that the graphics card is working by connecting the external monitor. Replacing a laptop backlight is generally a warranty repair.

A faulty battery will cause overheating or an inability to hold a charge. A battery exhibiting poor health will not hold a charge.

The image will appear fuzzy if the output resolution does not match the display device’s native resolution.

The technician should always consider malware when a device acts unexpectedly. However, the technician should not assume malware is the culprit until ruling out hardware problems.

141
Q

A technician working on a 3-D printer needs to change out a part. The part is either 1.75 mm or 3mm and requires that the extruder be heated to the appropriate temperature to pull as much of the old part out as possible and finally push the new part through. What is this part?

Print bed

Resin

Filament

Gear

A

Filament

Filament supplies the ink of a 3-D printer. The filament spools require careful storage once opened. They should be kept free from heat and humidity.

Stereolithography uses liquid plastic resin or photopolymer to create cured objects using an ultraviolet laser.

The print bed is one of the main components of a fused deposition model (FDM) 3-D printer. Print bed, also known as the build plate, is a flat glass plate that extrudes the material. The bed must be level for each print job, which is usually automated.

Gears enable the precise positioning of the extruder.

142
Q

A user complains that their monitor dims every day at 5:30pm. What could fix this problem?

Adjust resolution.

Adjust contrast.

Turn off the auto-dim feature.

Submit display for warranty repair.

A

Turn off the auto-dim feature.

Modern operating systems have settings for adaptive brightness, auto-brightness, or eye-saving features that reduce brightness and contrast. These can be turned on at a certain time of the day and can also be turned off if the user prefers.

If the image is almost invisible, the display’s backlight has probably failed and needs to be submitted for warranty repair.

Adjusting the contrast can help if the display is problematic all day, but the display is only a problem after 5:30pm.

Adjusting the resolution fixes a fuzzy image and would not help with a timed brightness problem.

143
Q

What information would help diagnose an intermittent shutdown problem?

What the computers sounds like

Circumstance when shutdown occurs

User’s contact information

The LED status lights

A

Circumstance when shutdown occurs

Intermittent shutdowns are difficult to pinpoint a specific cause, but with as many specifics as possible, it can narrow down the cause. For example, what the user is doing when the computer shuts down would be helpful information.

The user’s contact information is important to continue to respond to a ticket, but this will not directly help diagnose the problem.

If loud noises come from the computer, this can indicate a mechanical hard drive disk failure. However, a quiet computer makes it difficult to solve the problem.

LED status lights can indicate if the machine is getting power, and some vendors have LED error codes. This does not help unless it is related to when the computer shuts down.

144
Q

A penetration tester must infiltrate a company’s facility to capture all the network traffic from a particular set of PCs over a physical network cable. The tester can only access the intermediate distribution frame (IDF) closets into which all devices are patched. What tool can the tester utilize to accomplish their goal?

Toner probe

Cable tester

Wi-Fi analyzer

Network tap

A

Network tap

A network tap intercepts the signals passing over a cable and sends them to a packet or protocol analyzer. Taps are either powered or unpowered. There are passive and active capture types.

A Wi-Fi analyzer records statistics for the access point (AP) that the client is currently associated with and detects any other access points in the vicinity.

A toner probe detects the signal and follows the cable over ceilings and through ducts, or identifies it from the rest of the bundle.

A basic cable tester is a pair of devices attached to each cable end. It tests a patch cord or wall ports and panel patch ports connected via patch cords to test the permanent link.

An intermediate distribution frame (IDF) is a free-standing or wall-mounted rack for managing and interconnecting a telecommunications cable between end-user devices and the main distribution frame (MDF).
A main distribution frame (MDF) is the primary hub or demarcation point (demarc) that interconnects private or public IT and telecommunication lines coming into a building to an internal network via any number of intermediate distribution frames (IDFs).

145
Q

A technician installs a mechanism to a 5.25-inch drive bay and it connects to the motherboard by serial advanced technology attachment (SATA) data and power connectors. What is this mechanism?

Optical drive

HDD

RAID

M.2

A

Optical drive

Optical drives rate according to their data transfer speed. An optical drive can perform recording/rewriting that markets with three speeds.

A redundant array of independent disks (RAID) is an array that appears as a single storage resource or volume and can be partitioned and formatted like any other drive.

A hard disk drive (HDD) stores data on metal or glass platters coated with a magnetic substance. The top and bottom of each platter are accessed by its own read/write head, moved by an actuator mechanism.

The M.2 adapter card form factor is considerably smaller than a PCIe adapter and is oriented horizontally rather than vertically, so the interface is often used on laptops and PC motherboards.

146
Q

An IT technician installs a solid-state drive (SSD) into a motherboard connector that enables high-performance storage and is oriented horizontally. What has the IT technician installed?

eSATA

SATA

PCI

M.2

A

M.2

M.2 adapters can be of different lengths. The adapter card is inserted at an angle and then pushed into place and secured with a screw.

Serial advanced technology attachment (SATA) ports connect to one or more fixed drives. Technicians can also use SATA to connect removable drives, such as tape and optical drives.

External SATA (eSATA) is a standard for attaching external drives, with a 2 m (78 in.) cable.

A peripheral component interconnect (PCI) is a legacy bus type superseded by PCI Express. PCI ports can be included on a PCIe motherboard to support legacy adapter cards, but PCI cards cannot fit into PCIe slots.

147
Q

A company asked a network engineer to provide a solution that will allow a hosted application to be highly available if one or more servers are offline. They have plenty of resources to provide a cluster of servers that can run the application. Still, the company is looking for direction on making the application seamlessly available to customers. What solution would the engineer implement for this request?

Web server

Load balancer

Proxy server

Spam gateway

A

Load balancer

A load balancer can distribute client requests across server nodes in a farm or pool. The company can use a load balancer in any situation where multiple servers provide the same function.

A proxy server takes a full HTTP request from a client, checks it, then forwards it to the destination server on the internet. This activity would not be the solution for the given request.

A web server provides client access using HTTP or its secure version (HTTPS). This is likely the type of servers in the mentioned cluster hosting the application.

Spam gateways verify the authenticity of mail servers and have filters that can identify spoofed, misleading, malicious, or otherwise unwanted messages.

148
Q

An IT support specialist updated all the information systems in the office last week and the users are complaining that the routinely used applications no longer work. What is most likely the issue breaking the applications?

Legacy software/OS

Test development

Security requirements

Resource requirements

A

Legacy software/OS

Legacy software applications and operating systems may not perform well if a user’s system has been upgraded.

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

Security requirements are incorrect because the question does not mention anything security-related.

Test development often uses virtual desktop platforms based on some sort of guest OS hypervisor. This environment protects a live environment from any potential coding issues.

An information system is a combination of software, hardware, and telecommunication networks to collect useful data, especially in an organisation.

149
Q

Which of the following causes the ink in an inkjet printer to break up into small pumps, which give an electrical charge (piezoelectric) when they leave the print head and can either stick to the paper or fall off?

Imaging drum

Transfer roller

Thermal method

Epson design

A

Epson design

Epson design, the nozzle contains a piezoelectric element, which changes shape when a voltage is applied. The steady stream is the ink sent through the print head, and the ink that falls off is recycled.

The thermal method is when the ink at each nozzle in the print head is heated, creating a bubble. When the bubble bursts, it sprays ink through the nozzle and draws more ink from the reservoir.

The imaging drum is a round rotating cylinder conditioned by the primary charge roller (PCR) in a laser printer.

Transfer roller applies a positive charge to the underside of the paper in a laser printer.
HP printer use heaters that cause bubbles of ink to explode.

150
Q

What can a cloud developer use to analyze viruses, worms, and Trojans without infecting their computer and network?

Test development

Sandbox

Cross-platform virtualization

Resource requirements

A

Sandbox

A sandbox is an isolated environment to analyze viruses, worms, and Trojans in a space that prevents the researcher’s computer and network from becoming infected.

Test development often uses virtual desktop platforms based on some guest OS hypervisor.

Cross-platform utilization tests software applications under different OSs and resource constraints and is important to ensure the application is compatible across several different environments.

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

151
Q

This protocol transfers email messages across a network and uses TCP port 25.

Telnet

SSH

FTP

SMTP

A

SMTP

Simple Mail Transfer Protocol (SMTP) transfers email messages across a network and uses TCP port 25.

File Transfer Protocol (FTP) makes files available for download across a network. It utilizes two ports. TCP Port 21 establishes the connection between two computers (control connection), and TCP port 20 is the port the file(s) are transferred across (data connection).

Telnet makes an unsecured connection to the command-line interface of a remote server and uses TCP port 23.

Secure Shell (SSH) makes a secure connection to the command-line interface of a remote server and uses TCP port 22.

152
Q

What tool is also known as a universal serial bus (USB) drive, thumb drive, or pen drive?

Flash drive

HDD

Optical drive

Memory card

A

Flash drive

Flash drives are flash memory boards with a USB connector and protective cover.

Optical drives rate according to their data transfer speed. An optical drive can perform recording/rewriting and markets with three speeds.

Memory card is a form factor used in consumer digital imaging products, such as digital still and video cameras, and to expand smartphone and tablet storage.

A hard disk drive (HDD) stores data on metal or glass platters coated with a magnetic substance. The top and bottom of each platter are accessed by its own read/write head, moved by an actuator mechanism.

153
Q

What format uses a system of mirrors that reflects the illuminated image of the object onto a lens that uses a prism to split the image into its component RGB colors?

SMB

Flatbed scanner

ADF

OCR

A

Flatbed scanner

A flatbed scanner works by shining a bright light at the object placed on a protective glass surface. This information creates a bitmap file of the object.

The Server Message Block (SMB) protocol means the scan generates as a file on a shared network folder. Each user must have permission to write to the share.

Optical character recognition (OCR) is software that can convert scanned text into digital documents ready for editing.

An automatic document feeder (ADF) passes paper over a fixed scan head. This is a more efficient way of scanning multi-page documents.

154
Q

What is a physical indicator of overheating?

Burning smell

Blank screen

LED status lights

Grinding noises

A

Burning smell

Excessive heat can easily damage a computer. A burning smell will almost always indicate that something (probably the power supply) is overheating. Shut down the system immediately and investigate the problem.

Grinding or clicking noises generally indicate a mechanical problem with the hard drive disk (HDD), not overheating problems.

LED status lights can indicate if the computer is getting power or other diagnostic codes. They do not indicate overheating.

A blank screen can indicate anything from no power to a faulty screen. A blank screen does not directly point to overheating problems.

155
Q

After discovering an unlabeled wall port in an office, a technician would like to label it appropriately. Not knowing where the permanent link patches into specifically, they know which IT closet it would run to, as all the other permanent links in the same area run to the same closet. When connecting a laptop, there appears to be a successful connection. Which tool would be most helpful for the technician to use?

Toner probe

Punchdown tool

Cable tester

Cable stripper

A

Toner probe

A toner probe detects the signal and follows the cable over ceilings and through ducts, or identifies it from the rest of the bundle. A technician uses this along with a tone generator, applying a continuous audio signal on the cable.

A punchdown tool fixes each conductor into an insulation displacement connector (IDC).

A cable stripper scores the outer jacket just enough to remove it.

A cable tester is a pair of devices designed to attach to each end of a cable. It tests a patch cord or is connected via patch cords to a wall port and patch panel port to test the permanent link.

156
Q

A network engineer is designing an enterprise network for their firm’s new office. This focus on security will require the engineer to consider what fundamental concept when combining wired and wireless devices in an enterprise local area network?

IEEE 802.11

Segmentation

Wi-Fi

Firewall

A

Segmentation

Segmentation separates devices in various ways to better manage network traffic. Personal wireless devices are constantly coming and going, and it is best to have that section of a network segregated from the rest of the LAN.

IEEE 802.11 is better known by its brand name, Wi-Fi. This is just a set of standards used in implementing a wireless local area network (WLAN).

Wi-Fi is the brand name for the IEEE 802.11 standards used to implement wireless local area networks (WLANs).

Though some companies may use firewall solutions between internal network segments, this is not typical. Firewall technologies can give network engineers granular control over network traffic flow within an enterprise LAN.

Principle of least privilege

157
Q

A large store chain is eager to reduce the cost of maintaining their servers but is unsure what the best method would be for their use case. The major requirements for the chosen solution are that the store chain needs to own its cloud infrastructure (without sharing with another organization) to maintain maximum privacy and security of the data. Which cloud computing option best meets the store chain’s major requirements?

Private cloud

Public cloud

Hybrid cloud

Community cloud

A

Private cloud

The private cloud meets the store chain’s two major requirements because it gives organizations greater control over the privacy and security of their data stored in the cloud.

The public cloud is incorrect because there are risks regarding performance and security. The public cloud is a shared resource with other organizations, and a cloud service provider (CSP) runs it.

A hybrid cloud is incorrect because some cloud functions can be done via a public cloud, creating potential vulnerabilities to privacy and security.

Community cloud is incorrect because it requires the store chain to share a hosted private or a fully private cloud with other organizations.

158
Q

What software delivery method enables programmers and application administrators to ensure that the application used by clients is always updated with the latest code?

Application virtualization

Sandbox

Legacy software/OS

Cross-platform virtualization

A

Application virtualization

Application virtualization is a software delivery method that enables programmers and application administrators to ensure that clients’ applications are always updated with the latest code.

Cross-platform utilization tests software applications under different OSs and resource constraints and is important to ensure the application is compatible across several different environments.

A sandbox is an isolated environment to analyze viruses, worms, and Trojans in a space that prevents the researcher’s computer and network from becoming infected.

Legacy software applications and operating systems may not perform well if a user’s system has been upgraded.

159
Q

This can be used individually or in conjunction with other configurations to effectively verify email services and block the transmission of spoofed and unwanted messages. (Select all that apply.)

SELECT ALL THAT APPLY

Sender Policy Framework

Domain-based Message Authentication, Reporting, and Conformance

Virtual private network

DomainKeys Identified Mail

A

Sender Policy Framework

Domain-based Message Authentication, Reporting, and Conformance

DomainKeys Identified Mail

The Sender Policy Framework (SPF) record—there must be only one per domain—identifies the hosts authorized to send email from that domain.

DomainKeys Identified Mail (DKIM) uses cryptography to validate the source server for a given email message. This can replace or supplement SPF.

The Domain-based Message Authentication, Reporting, and Conformance (DMARC) framework ensures that the developer effectively utilizes SPF and DKIM. A DMARC policy publishes as a domain name system (DNS) TXT record.

A virtual private network (VPN) enables hosts to connect to the LAN without being physically installed at the site.

160
Q

What is the typical use for virtual desktop platforms based on guest OS hypervisor?

Cross-platform virtualization

Resource requirements

Legacy software/OS

Testing and development

A

Testing and development

Desktop virtual platforms, usually based on guest OS, are typically used for testing and development.

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

Cross-platform utilization tests software applications under different OSs and resource constraints and is important to ensure the application is compatible across several different environments.

Legacy software applications and operating systems may not perform well if a user’s system has been upgraded.

161
Q
A
162
Q

There are strict requirements for signal strength to minimize interference in the unlicensed long-range fixed wireless spectrum. What are the main components of these requirements? (Select all that apply.)

SELECT ALL THAT APPLY

Effective isotropic radiated power

Antenna gain

Transmit power

IEEE 802.11

A

Effective isotropic radiated power

Antenna gain

Transmit power

Transmit power is the fundamental strength of the radio, measured in dBm (decibel-milliwatts). Regulatory requirements limit the power output to minimize the potential for conflicts.

Antenna gain is the amount that a signal boosts by directionality—focusing the signal in a single direction rather than spreading it over a wide area. A technician would measure gain in decibels isotropic (dBi).

Effective isotropic radiated power (EIRP) is signal strength from a transmitter, measured as the sum of transmit power, antenna cable/connector loss, and antenna gain, expressed in dBm (decibel-milliwatts).

The Institute of Electrical and Electronics Engineers (IEEE) 802.11 standards have two main frequencies, 2.4 GHz and 5 GHz. These do not factor into signal transmission power.

163
Q

While diagnosing a computer that is not powering on, the technician has established that the wall socket is working correctly since there is a fully plugged power cord. What would be a reasonable next step?

Use another power cable.

Disconnect the plug-in graphics card.

Check the system configurations.

Plug in a known working monitor.

A

Use another power cable.

After the troubleshooting steps listed, the next reasonable step would be to replace the power cord with a known good cord. If there is a problem with the cord, and the computer boots with a known good cord, then that was the issue.

After checking the power cord, disconnect any extra devices. For example, the power supply unit (PSU) might be underpowered for the external device.

For diagnosing blank screen problems, plug in a known good external monitor. However, it is not appropriate when the computer is not getting power.

Checking system configurations can help diagnose application crashes or intermittent restarts, but it is not possible if the computer is not getting power.

164
Q

A company has found that specific departments are more productive when working from home as remote workers. The company would like to implement this ability and has reached out to a network security firm. What foundational infrastructure solution should the company implement to allow remote workers to access all the needed resources from their laptops at home?

Virtual private network

Virtual LAN

DNS (AAAA) records

Mail exchange records

A

Virtual private network

A virtual private network (VPN) enables hosts to connect to the LAN without being physically installed at the site. This would be the first foundational step to implement in the given scenario.

A virtual LAN (VLAN) is a logical network segment using a feature of managed switches to segregate network traffic. Though the company may use this as a layer of security, it would not be foundational.

A mail exchange (MX) record identifies an email server for the domain so that other servers can send messages to it.

In the Domain Name System (DNS), an AAAA record resolves a host name to an IPv6 address. This would not help with granting remote workers access to resources.

165
Q

A computer has multiple hard drives installed, but the second hard drive does not show up in Windows Explorer. What is a possible problem?

Cable or connector fault

Overheating

Corrupted boot sector

Bad sectors

A

Cable or connector fault

Suppose the system boots, but a second fixed disk or removable drive does not appear in File Explorer. The technician should first check that the system has initialized and formatted with a partition structure and file system. If the system does not detect the disk by a configuration tool, such as Windows Disk Management, the technician will suspect that there is a hardware or cable/connector fault.

The computer booted up correctly, so a corrupted boot sector is not the problem.

Overheating is generally detected from the computer becoming hot to the touch.

Bad sectors occur when parts of a hard disk drive (HDD) fail, resulting in read/write failures and not the inability to see a hard drive in the OS.

166
Q

A government organization uses an application that must be accessed via Citrix XenApp. What is the software delivery model being used in this scenario?

Test development

Cross-platform virtualization

Application virtualization

Legacy software/OS

A

Application virtualization

Application virtualization means that the client either accesses a particular application hosted on a server or streams the application from the server for local processing. Most application virtualization solutions are based on the Citrix XenApp.

Cross-platform utilization tests software applications under different OSs and resource constraints and is important to ensure the application is compatible across several different environments.

Legacy software applications and operating systems may not perform well if a user’s system has been upgraded.

Test development often uses virtual desktop platforms based on some sort of guest OS hypervisor.

167
Q

A company has a structured cable system installed by a technician. The technician uses a permanent cable that terminates to wall ports and patch panels. What is this mechanism called?

T568A

RJ11

Punchdown block

RJ45

A

Punchdown block

A punchdown block is a mechanism used to terminate wires. A technician can use RJ45 to terminate twisted pair cabling for Ethernet.

RJ45 connectors are also known as “8P8C.” Each conductor is a four-pair Ethernet cable that is color-coded.

RJ11 typically terminates a two-pair cable used in the telephone systems and with DSL modems.

T568A is a twisted pair that a technician can use in the TIA/EIA-568. In T568A, the technician wires pin 1 to green/white, wires pin 2 to green, wires pine 3 to orange/white, and wires pin 6 to orange.

168
Q

A startup company does not have the funds or the time to buy and configure their computer resources, so they pay a service provider to deploy IT resources such as servers, load balancers, and storage components. What service is the startup company paying for?

Platform as a service (PaaS)

Infrastructure as a service (IaaS)

Software as a service (SaaS)

Shared resources

A

Infrastructure as a service (IaaS)

Infrastructure as a service (IaaS) is correct. IaaS is a means of provisioning IT hardware and the internet links they require, as needed from a service provider’s data center.

Software as a service (SaaS) is incorrect. SaaS is a means of purchasing software licenses for a given number of users and does not include IT hardware resources.

Platform as a service (PaaS) is incorrect. PaaS is incorrect because the question does not mention that the company needs IT hardware resources and multi-tier web applications and database platforms on top of the provided IT hardware resources.

Shared resources are not a service that can be purchased. Service providers can provide services using shared resources to lower the cost to the customer.

169
Q

When a user downloads a Microsoft Store application, where does the application run to prevent the app from making system-wide changes and prevent a faulty store app from “crashing” the entire OS?

Resource requirements

Cross-platform virtualization

Sandbox

Test development

A

Sandbox

A sandbox is an isolated environment where Microsoft Store apps run to prevent the app from making system-wide changes and prevent a faulty store app from “crashing” the entire OS.

Test development often uses virtual desktop platforms based on some sort of guest OS hypervisor.

Cross-platform utilization tests software applications under different OSs and resource constraints and is important to ensure the application is compatible across several different environments.

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

170
Q

What can a cloud developer use to analyze viruses, worms, and Trojans without infecting their computer and network?

Resource requirements

Cross-platform virtualization

Test development

Sandbox

A

Sandbox

A sandbox is an isolated environment to analyze viruses, worms, and Trojans in a space that prevents the researcher’s computer and network from becoming infected.

Test development often uses virtual desktop platforms based on some guest OS hypervisor.

Cross-platform utilization tests software applications under different OSs and resource constraints and is important to ensure the application is compatible across several different environments.

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

171
Q

Each Ethernet network interface card (NIC) port has a unique hardware/physical identifier used for network routing and switching. What is this unique hardware or physical identifier?

Media access control address

VLAN ID

Service set identifier

Internet protocol address

A

Media access control address

Every NIC port has a unique hardware/physical address, called the media access control (MAC) address. Each frame of Ethernet data identifies the source MAC address and destination MAC address in a header field.

The core protocol in TCP/IP is the Internet Protocol (IP), which provides network and host addressing and packet forwarding between networks. This is not specific to the hardware.

A service set identifier (SSID) is a character string that identifies a particular wireless LAN (WLAN).

VLAN IDs are on network switch ports for traffic management and network segmentation. These are assigned by software and not native to the hardware.

172
Q

A user is having trouble with their laser printer and notices that the light from the laser is not shining on this part of the printer. What part of the printer has a photosensitive surface?

Imaging drum

Transfer roller

Toner

Developer roller

A

Imaging drum

An imaging drum is in the charging stage of the laser printer. The imaging drum is a round rotating cylinder conditioned by the primary charge roller (PCR).

The toner is charged with a high negative charge and applies to the drum. The laser toner consists of a fine compound of dyestuff and wax or plastic particles.

The developer roller is very close to the photosensitive drum. The toner carries the same negative charge polarity as the drum.

Transfer roller applies a positive charge to the underside of the paper. This causes the toner on the drum to be attracted to the paper.

173
Q

A holiday decor store typically runs its cloud infrastructure privately, but its servers get bogged down by transactions during the peak holiday season. To mitigate any revenue losses, the store must outsource processing power to an outside cloud service provider to help support the increased sales volume. What cloud deployment model does the holiday decor store utilize?

Private cloud

Community cloud

Hybrid cloud

Public cloud

A

Hybrid cloud

Hybrid cloud deployment is what the holiday decor store utilizes because it allows the store to utilize their private cloud infrastructure during non-peak sales times and then incorporate a public cloud for support during peak sales times.

Private cloud is incorrect because it does not allow the decor store to outsource resources during peak sales.

The public cloud is incorrect because it does not allow the decor store the opportunity to use its internal cloud infrastructure.

Community is not the best answer because the decor store does not want to share resources with other organizations year-round.

174
Q

A user finished setting up their new laptop on the latest Windows operating system and is currently setting up print capabilities. They go to pick up the paper from the printer but everything comes out garbled. What should they troubleshoot first?

Clean the rollers

Toner fuser

Creased paper

Drivers

A

Drivers

Garbled print typically occurs because of a fault in rendering the print job somewhere in the path between the application, printer driver, page description language, and print device.

Vertical or horizontal lines marks that appear in the same place are often due to dirty feed rollers or a damaged or dirty photosensitive drum.

Toner not fused to paper has symptoms of output that smudges easily. This indicates that the fuser needs replacing.

Most paper jams arise because the media (paper or labels) are not suitable for the printer or because a sheet is creased, folded, or not loaded properly in the tray.

175
Q

A user contacts an IT help desk to report a problem with a laptop computer. The complaint is that the laptop is very hot to the touch when typing. The user also states that the laptop does not sit correctly as the bottom of the laptop has a slight bulge. Which component does the help desk technician determine to be the problem?

SSD

Battery

Memory

Keyboard

A

Battery

Laptop computers use removable, rechargeable Lithium-ion (Li-ion) battery packs. Li-ion batteries are typically available in 6-, 9-, or 12-cell versions. A problematic battery can overheat and expand.

A keyboard is an input device. Therefore, a laptop keyboard does not usually overheat. However, the user noticed heat coming from the laptop in this case.

Small outline dual inline memory modules (SODIMMs) package the laptop’s double data rate synchronous dynamic random access memory (DDRx SDRAM). Laptop RAM can become very hot; however, it would not cause the battery to expand.

A solid-state drive (SSD) does not get as hot as a traditional magnetic drive. Even so, an SSD would not cause the battery to expand.

176
Q

What does the Microsoft Windows “Programs and Features” applet allow the user to manage?

Security requirements

Resource requirements

Legacy software/OS

Test development

A

Legacy software/OS

Legacy software applications can be managed through the Microsoft Windows “Programs and Features” applet.

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

Security requirements are incorrect because the amount of central processing units (CPUs) and random access memory (RAM) a system needs is not going to impact the security of a system.

Test development often uses virtual desktop platforms based on some sort of guest OS hypervisor.

177
Q

An online retailer uses the cloud to host its infrastructure because the cloud provider guarantees 99.999% service uptime. What benefit of using the cloud has the online retailer been guaranteed?

High availability

Rapid elasticity

Metered utilization

Shared resources

A

High availability

High availability means that the service experiences very little downtime. Downtime can occur because of scheduled maintenance and unexpected outages.

Rapid elasticity refers to the system’s ability to handle changes to demand in real-time without loss of service or performance. Rapid elasticity allows a system to reduce costs when demand is low.

Metered utilization is the per-use billing for resources consumed by the cloud, making cloud offerings cheaper or more expensive for an organization, depending on their resource consumption.

Shared resources are incorrect. To meet availability, scalability, and elasticity requirements, cloud providers must be able to provision and de-provision resources automatically through the pooling of shared resources and virtualization.

178
Q

A technician is working on a blank computer monitor problem. The monitor power cord is plugged in and receiving power. What is the next step to check?

Check for physical damage.

Check monitor input settings.

Check if the monitor connects to the computer.

Check the PSU.

A

Check if the monitor connects to the computer.

A systematic approach to troubleshooting helps save time and effort. After verifying that the monitor is getting power, checking that the monitor connects to the computer is the next logical step.

The power supply unit (PSU) is a component on the computer that can cause intermittent issues if it is failing. There is no indication that the PSU is the problem here.

Incorrect monitor input settings can cause a blank screen but the technician should follow the step verifying that the monitor connects to the computer first.

Physical damage to a computer can cause problems, but there is no indication that this could be the problem and is not a logical next step.

previous

179
Q

A user complains that a laptop is slow. A technician concludes that the best solution is to remove the current mechanical disk drive with a faster solid-state drive. The technician opts to back up the user data and install a fresh operating system on a new drive. Which approach defines the technician’s steps?

Migration

Replacement

Upgrade

Clone

A

Replacement

A replacement drive approach only has the data backed up from the old drive. The technician then fits the new drive to the laptop and reinstalls all software. Then the technician can restore user data from the backup.

An upgrade is a general term, and with software, an upgrade occurs between software versions. With hardware, newer hardware replaces older hardware. While a hardware upgrade occurs in the scenario, it does not define the technician’s steps.

Migration means using backup software to create an image of the old drive and storing it on a USB or other type of media.

Cloning a disk is similar to migration in that it makes a copy of an entire drive to another storage device.

180
Q

A network engineer must set up an office’s new wireless access points (APs). After installing the access points, the engineer must ensure they set up the radio signals correctly and that all office areas receive the most efficient signal possible. What tool will the engineer utilize?

Toner probe

Wi-Fi analyzer

Cable tester

Loopback plug

A

Wi-Fi analyzer

A network engineer can install Wi-Fi analyzer software to record the AP’s associated statistics and detect other access points in the vicinity. This can configure the proper signal strength and channels.

A cable tester is a pair of devices attached to each end of a cable. It tests a patch cord or is connected via patch cords to a wall port and patch panel port to test the permanent link.

A toner probe detects the signal and follows the cable over ceilings and through ducts, or identifies it from the rest of the bundle. This is strictly for physical cabling.

A loopback plug tests a network interface card (NIC) or switch port. This does not test any wireless metric.

181
Q

A technician replaced a failed drive in a RAID array and noticed a severely degraded performance. What is the problem?

Takes resources to rebuild the array.

There is a cable problem.

There is a faulty disk.

The controller is failing.

A

Takes resources to rebuild the array.

After replacing the failed disk in the redundant array of independent disks (RAID) array, the performance of the array degrades for some time since the array is rebuilding and the system is writing several gigabytes of data onto the new drive.

If the controller were failing, replacing the failed disk or boot into the RAID array would not have been possible.

A cable problem would not cause degraded performance. However, a cable problem would likely cause the system not to read the new disk at all.

The technician has already replaced the faulty disk. Furthermore, failing disks generally fail slowly over time, not immediately, causing substantial performance issues.

182
Q

Which of the following network scan services must the multi-function device (MFD) configure with the path to a suitable file server and shared folder?

Scan to email

Flatbed scanner

SMB

Scan to cloud

A

SMB

The Server Message Block (SMB) protocol means the scan generates as a file on a shared network folder. Each user must have permission to write to the share.

Scan to email is when the scan generates as a file attachment to an email message. The MFD configuration has the IP address of a Simple Mail Transfer Protocol (SMTP) server.

Scan to cloud is when the scan is uploaded as a file to document storage and sharing accounts in the cloud. Cloud services such as OneDrive or Dropbox will generally be available as options on the MFD.

A flatbed scanner works by shining a bright light at the object placed on a protective glass surface.

183
Q

An electrical wiring vendor is working with a company building a new office building. Regarding copper network cabling, what may be considered common 802.3 Ethernet standards used for this project? (Select all that apply.)

SELECT ALL THAT APPLY

1000BASE-LX

10GBASE-T

1000BASE-T

100BASE-T

A

10GBASE-T

1000BASE-T

100BASE-T

100BASE-T refers to Fast Ethernet over copper twisted pair cabling. Fast Ethernet works at 100 Mbps. Though becoming rarer, the application of the network may only require this speed.

1000BASE-T refers to Gigabit Ethernet over copper twisted pair cabling. Gigabit Ethernet works at 1000 Mbps (or 1 Gbps). 1000BASE-T is the mainstream choice of standard for most LANs.

10GBASE-T refers to a copper cabling standard working at 10 Gbps. This would be the desired application for network applications that require speed.

1000BASE-LX refers to a fiber optics cabling standard working at 1000 Mbps (or 1 Gbps). Though this option provides a standard speed, this option is costly due to the fiber optic cabling.

184
Q

A new IT support technician troubleshoots a user’s report of intermittent network connectivity. After inspecting the workstation, they see a label above the station’s RJ-45 port wall connection. This label is likely to identify what device?

Patch panel

Hub

Switch

Firewall

A

Patch panel

In most types of office cabling, the computer is connected to a wall port and via cabling running through the walls to a patch panel.

A switch is an intermediate system used to establish contention-free network segments at OSI layer 2 (Data Link). A port on a patch panel will connect into a switch to provide office network connectivity.

A hub is a legacy network hardware device that implemented the 10BASE-T and 100BASE-T Ethernet cabling designs. Hubs were used to provide multiple connections to computers in a small area and are inefficient at network management.

A basic firewall has rules that list source or destination network addresses and protocol types and whether to allow or block traffic that matches the rule.

185
Q

A network administrator is looking at a user’s box which seems to have intermittent connectivity issues. Which of the following should they do first?

Analyze network congestion.

See if it received a DHCP lease.

Check the physcial cords.

Check nominal link speed.

A

Check the physcial cords.

The first step in resolving a no or intermittent connectivity issue is to check that the patch cords are properly terminated and connected to the network ports.

If a user reports slow speed, establish that there is a link speed problem by checking the nominal link speed and using a utility to measure transfer rate independent of specific apps or network services.

Jitter is typically caused by network congestion affecting packet processing on routers and switches.

In Windows, a limited connectivity message specifically means that the host can establish a physical connection to the network but has not received a lease for an IP configuration from a Dynamic Host Configuration Protocol (DHCP) server.

186
Q

A technician responds to a computer intermittently shutting down and finds that the tower has a personal heater blowing on it. What is a likely problem?

Unstable power supply

Overheating

Hard drive failure

Malware

A

Overheating

The computer is overheating. Even with all the fans working properly, computers cannot have personal space heaters blowing directly on them. Redirecting the heater should resolve the problem.

Intermittent shutdowns can be an indicator of malware, but the physical details in this example do not point to malware as the problem.

A power supply unit (PSU) that is not delivering stable power can cause intermittent shutdowns, but this does not seem to be the problem here. Instead, the space heater is the apparent problem.

Hard drive failure can result in intermittent shutdowns and is diagnosed with OS tools, such as the chkdsk command. However, this is unlikely to be the problem in this case.

187
Q

A technician needs a connector that offers high-speed standards that specify a data rate of 480 Mbps shared between the devices attached to the same host controller. What connector should the technician use?

HDMI

USB 2.0

USB 3.0

Lightning port

A

USB 2.0

USB 2.0 is half-duplex, which means that each device can send or receive, but not simultaneously.

USB 3.0 has new versions of Type A, Type B, and Type B Micro connectors with additional signaling and wires. This allows a device to send and receive simultaneously.

The Lightning port is found only on Apple’s mobile devices. The Lightning connector is reversible. The user needs a suitable adapter cable to connect such a device as a Lightning-to-USB A or Lightning-to-USB C.

A high-definition multimedia interface (HDMI) can rate as either standard or high speed. It provides high resolutions, such as 4K and 8K, and gaming features, such as the ability to vary the monitor refresh rate to match the frame rate of the video source.

188
Q

A projector made a popping noise during a presentation, and then the display went out. What will fix the problem?

Use a new HDMI cable.

Use a new bulb.

Change the display source.

Plug cables in securely.

A

Use a new bulb.

Projector bulbs will have a limited lifetime and will need replacing periodically. The popping sound, followed by the display no longer working, points directly at a burned-out bulb as the problem.

Physical cabling problems can cause display issues, but in this case, nothing relating to the cabling changed when the display failed. Instead, it was clearly the bulb from the popping noise.

Changing the display source can fix display issues, but the display failing in the middle of a presentation does not point to the display source as the problem.

Physical cabling problems can cause display issues, and half plugged-in cables can cause intermittent display issues.

189
Q

An infrastructure engineer requests that a specific computer always gets a particular IP address when it connects to the network. They do not keep proper records of IP addresses, so they would rather not set the host’s IP with a static address. What can the engineer use to ensure this host gets the requested address?

DHCP reservation

DHCP scope

DHCP client

DHCP lease

A

DHCP reservation

A Dynamic Host Configuration Protocol (DHCP) reservation is a configuration that assigns a reserved or persistent IP address to a given host based on its hardware (MAC) address or other ID.

A DHCP lease is an address configuration assigned by a DHCP server to a client for a limited time. The client is given any available address in the current DHCP scope.

A DHCP scope is a range of consecutive IP addresses in the same subnet that a DHCP server can lease to clients.

A DHCP client is a host computer that sends a request over UDP port 68 for a DHCP server to accept and reply with IP address configuration. The DHCP reply takes place over UDP port 67.

190
Q

A support desk technician must make a custom-length Ethernet patch cable for a user’s desk setup. What tool do they need to create this cable? (Select all that apply.)

SELECT ALL THAT APPLY

Cable stripper

Snips

Crimper

Punchdown tool

A

Cable stripper

Snips

Crimper

A crimper is a tool used to fix a male jack to a patch cord. The support technician would do this to both ends of the custom cable.

A cable stripper is a tool that would score the outer jacket just enough to remove it.

Snips are needed to cut the custom length cable to size and trim the ripcord and the start filler inside the cable. Sometimes snips are integrated on cable stripper tools and can be singular in function.

A punchdown tool fixes each conductor into an insulation displacement connector (IDC). This would not be used in this scenario, as there is no punching down of wires into a block.

191
Q

A managed service company works with a client to enumerate and gather all the detailed events, errors, and notifications produced from various network devices. What solution would the company suggest in this particular case?

AAA server

Syslog appliance

Remote Desktop Protocol

Load balancer

A

Syslog appliance

Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de-facto standard for logging events from distributed systems. A Syslog collector usually listens on UDP port 514.

Remote Desktop Protocol (RDP) is Microsoft’s protocol for operating remote GUI connections to a Windows machine. RDP uses TCP port 3389.

An authentication, authorization, and accounting (AAA) server is the authentication server positioned within the local network. With AAA, the network access appliances do not store any authentication credentials.

A load balancer distributes client requests across server nodes in a farm or pool. A technician can use it when multiple servers provide the same function.

192
Q

Which of the following allows printers to connect using a Plug and Play that installs the driver automatically?

USB

Wireless

Ethernet

RJ45 port

A

**USB **

USB connects the device plug to the printer’s USB port and the host plug to a free port on the computer.

Wireless has two interfaces, Bluetooth and Wi-Fi. Bluetooth allows access by using the print device control panel to make it discoverable Then, the Bluetooth page adds the device. Wi-Fi uses two ways infrastructure mode and Wi-Fi direct.

An engineer can configure Ethernet to obtain an Internet Protocol (IP) configuration from a Dynamic Host Configuration Protocol (DHCP) server or they can manually configure this.

RJ45 port is used with an Ethernet network adapter to connect a printer to a computer.

193
Q

What component in a fused deposition model (FDM) 3-D printer is usually heated to prevent the material from warping?

Filament

Print bed

Fan

Extruder

A

Print bed

Print bed, also known as the build plate, is a flat glass plate that extrudes the material. The bed is heated to prevent the plastic from cooling too quickly and creating a product warp.

Filament supplies the ink of a 3-D printer. The filament spools require careful storage once opened. They should be kept free from heat and humidity.

The extruder is the equivalent of a print head in an inkjet. A motor in the extruder draws filament from the “cold end” to the nozzle. It is then melted and squeezed onto the object.

The fan cools the melted plastic where necessary to shape the object correctly.

194
Q

IT systems administrators for a company have been busy configuring a fleet of new smartphones for users. Instructions that the administrators follow to configure the devices include using a host address and entering a domain as an optional parameter. Which corporate email service does the company use?

Microsoft 365

Gmail

Microsoft Exchange

Google Workspace

A

Microsoft Exchange

To manually configure a Microsoft Exchange account, parameters such as a host address as well as the choice of whether to use transport layer security (TLS) are required. There is often also an optional field for a domain, but this is usually left blank.

A Microsoft digital identity is used to access cloud subscriptions for the Office productivity software suite and the OneDrive cloud storage service which are known as Microsoft 365. The configuration only uses a username and password.

With Google Workspace, a Google account grants access to Google’s Workspace productivity software and other Google services. Configuration does not use a domain.

A Gmail account is a free account used with the Google Workspace landscape. Configuration does not use a domain.

195
Q

A smartphone user tries to connect a new set of earbuds. What is the first step that the user does with the phone?

Perform a PRL update.

Enable Bluetooth.

Find a device for pairing.

Enable pairing.

A

Enable Bluetooth.

A Bluetooth wireless radio creates a short-range personal area network (PAN) to share data and connect to peripherals. Bluetooth needs to be enabled before pairing can begin.

To connect a peripheral device via Bluetooth, the Bluetooth radio on each device must be put into discoverable mode, which is also known as pairing mode.

Once a phone has Bluetooth and pairing mode enabled, a list of nearby devices will be listed for connecting. Selecting a device will begin the pairing process.

Information that a cellular radio needs to connect to a network is provided as a preferred roaming list (PRL). An update would update the list.

196
Q

A user had lost several mobile devices in the past. Each device had a basic password which put company data at risk. The user has a new phone and uses which method of increased security to log in?

Device pairing

Two-factor authentication

Corporate application

Location services

A

Two-factor authentication

Two-factor or multifactor authentication means that the user must submit at least two different kinds of credentials. This would be used to authenticate access to a system with a higher level of security than a single method.

Four types of credentials that identify you:
1. Something you know - password, PIN
2. Something you are - Biometric ( Fingerprint, Retina scan)
3. Something you have - Smart phone, ID card
4. Somewhere you are Geofencing

Corporate applications refer to applications running on the device. This does not pertain to gaining access to the device.

To connect a peripheral device via Bluetooth, the Bluetooth radio on each device must be put into discoverable mode, which is also known as pairing mode. This would not increase security.

Using location services is not related to being connected to a cellular network. Location services use Wi-Fi and GPS to determine a device’s location.

197
Q

Which of the following would be acceptable combinations to satisfy Two-Fatcor Authentication?
SELECT ALL THAT APPLY

Password and PIN

RSA Token and RFID card

Retina scan and PIN

Magnetic ID card and Password

A

Retina scan and PIN
Magnetic ID card and Password

Password and PIN are both things you know.
RSA Token and RFID card are both things you have. Neither combination satisfies two factors.

198
Q
A
199
Q
A
200
Q
A
201
Q
A