after exam a Flashcards

1
Q

what is the throughput of Thunderbolt 3?

A

40 gigabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the throughput of SATA Revision 3?

A

6 gigabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is throughput?

A

the amount of material or items passing through a system or process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the throughput of USB 3.0?

A

5 gigabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is 1000BASE-T?

A

1000BASE-T is Gigabit Ethernet – 1 gigabit is 1,000 megabits per second (Mbps) on copper cables, using four pairs of Category 5 (Cat5) unshielded twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT IS THE THROUGHPUT OF 1000BASE-T?

A

1 gigabit per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the throughput of 802.11g?

A

54 megabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what port is reserved for snmp?

A

udp 161 & 162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what port is reserved for LDAP?

A

tcp 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does raid stand for?

A

Redundant Array of Independent Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the raid levels?

A
  • RAID 0 – Striping
  • RAID 1 - Mirroring
  • RAID 5 – Striping with Parity
  • Nested RAID - RAID 1+0 (a.k.a. RAID 10) - A stripe of mirrors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What level of raid is this description?

 • File blocks are split between two or more 
       physical drives
• High performance
• Data written quickly
• No redundancy
• A drive failure breaks the array
A

RAID 0 - Striping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is raid 0 known as?

A

striping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What level of raid is this description?

• File blocks are duplicated between two or more
physical drives
• High disk utilization
• Every file is duplicated
• Required disk space is doubled
• High redundancy
• Drive failure does not affect data availability

A

RAID 1 - Mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is RAID 1 known as?

A

Mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What level of raid is this description?

  • File blocks are striped
  • Along with a parity block
  • Requires at least three disks
  • Efficient use of disk space
  • Files aren’t duplicated, but space is still used for parity
  • High redundancy
  • Data is available after drive failure
  • Parity calculation may affect performance
A

AID 5 – Striping with parity

17
Q

what level of raid is described below?

  • The speed of striping, the redundancy of mirroring
  • The best of both worlds
  • Need at least 4 drives
A

RAID 10 (1+0) – A stripe of mirrors

18
Q

what is raid 10 known as?

A

RAID 10 (1+0) – A stripe of mirrors

19
Q

A system administrator has connected an external USB drive to a
computer to transfer some documents. When booting the computer, the
system tries to boot from the external drive and gives an error message.
Which of the following would be the BEST way to prevent the USB drive
from booting?

❍ A. Modify the BIOS to boot from the internal hard drive
❍ B. Modify the boot order in Windows Disk Management
❍ C. Rebuild the MBR on the external hard drive
❍ D. Disable the external drive in Device Manager

A

A. Modify the BIOS to boot from the internal hard drive

20
Q
Which of the following would be MOST likely found on a DVD-ROM?
❍ A. Document archive
❍ B. Operating system boot files
❍ C. RAID parity files
❍ D. BIOS configurations
A

A. Document archive

21
Q

A technician is connecting a laptop to an LCD projector in a conference
room. The display on the laptop works properly, but the projector image
is constantly flickering and pixelating. The technician has modified the
resolution and refresh rates, but the projector image continues to flicker.
Which of the following would be the BEST next troubleshooting step?
❍ A. Replace the video cable
❍ B. Disable the laptop display
❍ C. Replace the projector bulb
❍ D. Power cycle the projector

A

The Answer: A. Replace the video cable
A display issue associated with flickering and poor video quality would
commonly point to the connection between the video adapter and the
display device. In the case of an LCD (Liquid Crystal Display) projector,
there’s sometimes a very long (and very worn) cable that can cause signal
issues to show on the projected image

22
Q

A system administrator is building a server for a data center in another
country. The server will manage a print queue and provide a local storage
partition for temporary file transfers. Which of the following power
supply specifications will be the MOST important for this server?

❍ A. Voltage input options
❍ B. Number of PCIe connectors
❍ C. Modular cabling
❍ D. Fan noise rating

A

A. Voltage input options

Connecting to the power source in a different country is an important
consideration when selecting a power supply. If the voltage specifications
are incorrect, the server may not operate at all or components in the server
may be damaged. Many servers use auto-switching power supplies are
compatible with the power systems in other countries.

23
Q

A network administrator is troubleshooting a network outage, and she
believes that the issue is related to a bad switch. The old switch is replaced
with a newer model and the cabling is moved to the new switch. Which
of the following should be the NEXT troubleshooting steps? (Choose
TWO)

❍ A. Test the theory
❍ B. Verify full system functionality
❍ C. Establish a plan of action
❍ D. Identify the problem
❍ E. Document the findings
A

The Answers: B. Verify full system functionality, and
E. Document the findings
Once the theory has been tested, a plan of action has been determined,
and the plan has been implemented, it’s important to verify that full
system functionality has been restored. After all of this work, it’s useful to
document the problem, the proposed solutions, and the ultimate fix. This
problem might occur again, and it would be useful to have some historical
documentation on how to address the issue.

24
Q

The internal Bluetooth adapter of a laptop has failed, and the user would
like to get a repair estimate. Which of the following would be the BEST
way to determine an accurate price of an exact replacement?
❍ A. Research online forums
❍ B. Determine the purchase price of a USB to Bluetooth adapter
❍ C. Disassemble the laptop case and document the process
❍ D. View the Bluetooth information in Network settings

A

C. Disassemble the laptop case and document the process
Although the operating system driver can sometimes provide details about
what’s inside, they often can hide details about the specific hardware. The
only way to know the exact make and model of the Bluetooth adapter is
a physical examination. Some laptops are easier to open than others, so
it’s useful to document the process used to gain access to the Bluetooth
hardware.

25
An application developer needs to test an application across all of the operating systems used by the company. Each operating system will be tested individually in a lab environment. The company would like to minimize any additional hardware purchases for this project. Which of the following would be the BEST way to test this application? ❍ A. Purchase a system that is configured just above the hardware requirements for the highest-end operating system. Create separate VMs for each operating system. ❍ B. Purchase individual test computers that match the hardware requirements for each OS. Install different operating systems on each test computer. ❍ C. Designate existing user workstations to be used as testing systems. Run all application tests during non-working hours. ❍ D. Purchase a system that matches the minimum hardware requirements for the highest-end operating system. Create a system image for each operating system and reimage the computer between tests.
The Answer: A. Purchase a system that is configured just above the hardware requirements for the highest-end operating system. Create separate VMs for each operating system. Creating virtual machines for these tests would be a great way to minimize hardware costs, and the machine used for the testing should be able to properly virtualize the testing OS while the host OS is running. Purchasing a system that is slightly more powerful than the highest-level operating system configuration should cover any technical requirements.
26
What is the minimum category of unshielded copper cable that would run a 10 gigabit per second Ethernet link with a fifteen meter distance? ❍ A. Category 5 ❍ B. Category 6 ❍ C. Category 5e ❍ D. Category 6A
The Answer: B. Category 6 The physical characteristics of networking cables are separated into categories. A category 6 cable can support a ten gigabit per second 10GBASE-T network to a distance of thirty-seven to fifty-five meters. The incorrect answers: A. Category 5 Category 5 copper cables can support a one gigabit per second 1000BASE-T network up to one hundred meters. Ten gigabit per second speeds are not support over category 5 cable. C. Category 5e Category 5e (enhanced) is a minor update to category 5, and the Ethernet standards supported for a category 5e cable are identical to those of a category 5 cable. Therefore, category 5e copper cables can support a one gigabit per second 1000BASE-T network up to one hundred meters in length. D. Category 6A Category 6A (augmented) cables can support ten gigabit per second 10GBASE-T connections to a distance of one hundred meters.
27
An engineer has manually configured IP addresses for a small office that uses a cable modem for Internet connectivity. However, none of the devices configured with a manual IP address are able to browse Internet websites. All devices are connected to the cable modem with twisted-pair Ethernet cables. This is the configuration of one device: IP address: 192.168.1.7 Subnet mask: 255.255.255.0 Default gateway: 192.168.1.1 DNS: 192.168.1.7 The engineer can successfully ping the local IP address and the default gateway address. Which of the following should be the NEXT troubleshooting step? ❍ A. Check for duplicate IP addresses ❍ B. Replace the Ethernet cable ❍ C. Check the DNS configuration ❍ D. Replace the cable modem
The Answer: C. Check the DNS configuration One of the most noticeable of the IP (Internet Protocol) configuration settings was that the DNS (Domain Name Service) server IP address was configured to be the same as the local device. Since DNS servers are commonly separate (and often remote) devices, it would be unusual to see a DNS configured with the same IP address of the local device. The next step should be to confirm the DNS settings with the local network administrator.
28
A system administrator created a series of VMs that will use a portion of a server's available physical memory. Which of the following describes this cloud computing characteristic? ❍ A. Resource pooling ❍ B. Rapid elasticity ❍ C. Metered ❍ D. On-demand
The Answer: A. Resource pooling Resource pooling places all of the computing resources in one place, and then distributes from the pool when needed. A VM (Virtual Machine) manager using a portion of available physical memory is taking advantage of resource pooling. The incorrect answers: B. Rapid elasticity Rapid elasticity is the characteristic of scaling up or down cloud resources with demand. More resources will be made available during busy times, and those resources will be seamlessly removed when the demand is low. C. Metered Metered resources are measured based on usage. As more information is uploaded, stored, and downloaded, the costs are tracked and billed accordingly. D. On-demand Cloud computing allows the users to create or remove resources at any time, or on-demand. This flexibility allows organizations to quickly react to changes, deploy updates, and remove excess resources
29
A server administrator has been asked to troubleshoot a system that has been slowing down over time. While examining the computer, the administrator can hear a series of clicks from the inside of the case. Which of the following should be the FIRST step to address this issue? ❍ A. Replace the motherboard ❍ B. Power the system off and back on ❍ C. Replace the hard drive ❍ D. Perform a full backup of the server ❍ E. Replace the power supply
D. Perform a full backup of the server A clicking noise indicates some type of hardware issue with the computer, so the first step would be to confirm that a recent backup is available for all of the data on this system. If the computer fails completely, at least the data will be secure.
30
A manager is able to receive email messages on their tablet, but they’re having problems configuring the tablet to send email messages. Which of the following should be the FIRST troubleshooting step? ❍ A. Check the SMTP settings ❍ B. Check the IP address configuration ❍ C. Send a test message using web-based email ❍ D. Check the IMAP settings
The Answer: A. Check the SMTP settings If you're sending an email message from an email client, you're commonly using SMTP (Simple Mail Transfer Protocol). There are three SMTP configuration settings that are important; the SMTP server name or IP address, the SMTP username, and the SMTP password. The incorrect answers: B. Check the IP address configuration If there were problems with the IP configuration, the manager would not be able to receive any email messages. In this question, the issue does not appear to be related to the IP address configuration. C. Send a test message using web-based email Sending an email message over web-based email would effectively bypass the local email client and would not help troubleshoot the local issues. D. Check the IMAP settings IMAP (Internet Message Access Protocol) is used for receiving email and not for sending email. In this example, the manager was able to receive messages, so the IMAP settings would most likely be working properly
31
``` A network administrator is installing a wireless access point in a new conference room. Which of these settings would provide the BEST security for this installation? ❍ A. WPA2 encryption ❍ B. SSID suppression ❍ C. Static IP addressing ❍ D. UPnP ❍ E. MAC filtering ```
The Answer: A. WPA2 encryption Configuring WPA2 (Wi-Fi Protected Access II) encryption would prevent unauthorized users from accessing the wireless network and would encrypt the data sent over the wireless network. The incorrect answers: B. SSID suppression Preventing the SSID (Service Set Identifier) from appearing in lists of available wireless networks would not provide any significant security feature. If someone knows the name of the network, they would still be able to connect. C. Static IP addressing Static IP (Internet Protocol) addressing is useful for unique environments that require specific IP address assignments, but assigning IP addresses statically doesn't add any significant security to the network. D. UPnP UPnP (Universal Plug and Play) allows network devices to automatically locate and configure other network devices. Generally speaking, the automatic configuration feature of UPnP makes the network LESS secure. E. MAC filtering Filtering traffic by MAC (Media Access Control) address can be easily circumvented with a packet capture application, so MAC filtering would not be considered a security feature.
32
A user would like to connect a tablet to their laptop computer using 802.11, but they are in a location without a wireless access point. Which of the following would be the BEST way to make this connection? ❍ A. Enable Bluetooth discovery on the tablet ❍ B. Configure infrastructure mode on both devices ❍ C. Create shared folders on the laptop computer ❍ D. Use ad hoc mode
The Answer: D. Use ad hoc mode Ad hoc mode allows two devices to directly communicate over an 802.11 wireless link without using an access point. The incorrect answers: A. Enable Bluetooth discovery on the tablet Enabling Bluetooth discovery would allow the tablet to use Bluetooth peripherals, but it would not enable 802.11 networking between the tablet and the laptop. B. Configure infrastructure mode on both devices Infrastructure mode is the 802.11 configuration used with an access point. In this question, the two devices need to communicate without using an access point. C. Create shared folders on the laptop computer Creating shared folders would potentially allow access from another device, but the network would need to be available to provide the connectivity.
33
``` Which of the following is used to forward traffic based on a destination MAC address? ❍ A. Unmanaged switch ❍ B. Repeater ❍ C. Router ❍ D. Firewall ```
The Answer: A. Unmanaged switch Switches determine how traffic is forwarded based on the destination MAC (Media Access Control) address in the frame. The qualification of managed or unmanaged is not important in this case, since both types of switches make forwarding decisions the same way. The difference between a managed and unmanaged switch are based on other features not associated with the forwarding process. The incorrect answers: B. Repeater A repeater receives a signal, regenerates the signal, and then passes the signal on to the next network link. There are no forwarding decisions occurring inside of a repeater. C. Router A router makes forwarding decisions based on the destination IP (Internet Protocol) address of a packet. D. Firewall A firewall controls the flow of traffic based on a set of predefined security policies. If the traffic flow matches one of the policies, the firewall can be configured to allow or block that traffic flow.
34
A system administrator made some BIOS changes to a desktop computer running Windows 10, and now this message appears when starting the computer: “This drive can only boot in UEFI mode.” Which of the following would be the BEST next troubleshooting step? ❍ A. Modify the boot drive sequence ❍ B. Enable Secure Boot ❍ C. Remove the BIOS password ❍ D. Boot the system with the Windows setup media
The Answer: B. Enable Secure Boot Secure Boot is part of the UEFI (Unified Extensible Firmware Interface) standard for a computer BIOS (Basic Input Output System). Secure Boot ensures that the underlying operating system has not been modified by malware or any other process. The incorrect answers: A. Modify the boot drive sequence Changing the boot drive sequence in the BIOS would not resolve the UEFI or Security Boot process. C. Remove the BIOS password UEFI mode and Secure Boot do not require a boot or management password, and removing any of those passwords will not resolve the error message. D. Boot the system with the Windows setup media Booting with separate media would not resolve this issue when booting to the primary storage drive. UEFI mode with Secure Boot is required for this system.