Checkpoint Q's Flashcards
Which of the following types of display connectors uses a thunderbolt cable and was designed as a competitor to HDMI?
a) VGA
b) DisplayPort
c) eSATA
d) DVI
b) DisplayPort
DisplayPort uses a thunderbolt cable to connect a monitor to the computer. DisplayPort supports both copper and fiber-optic cabling. DisplayPort was created as a royalty-free standard to compete with HDMI. The digital video interface (DVI) was designed to replace the VGA port used by CRT monitors.
Which version of USB can operate at speeds of up to 5 Gbps?
a) USB 1.0
b) USB 1.1
c) USB 2
d) USB 3
d) USB 3
*USB 3 can support speeds of up to 5 Gbps. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops.
USB 1.1 supports 12 Mbps
USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at the slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port.
USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power.*
You want to build a new gaming computer but intend to reuse as many of the parts as possible from your old computer. You have determined that the motherboard and the case will be reused, and you will purchase a new graphics card, sound card, network interface card, and a USB 3.0 expansion card to increase your system’s overall speed and performance. You are a bit worried that your old computer’s power supply may not be able to support all of these new expansion cards.
Which of the following cards is MOST likely to consume the most power during operations and require you to purchase a new power supply to support it?
a) USB 3.0
b) Sound card
c) Graphics card
d) NIC
c) Graphics card
The power consumption of today’s graphics cards has increased a lot. The top models demand between 110 and 270 watts from the power supply; in fact, a powerful graphics card under full load requires as much power as the rest of the components of a PC system combined. If your old computer didn’t have a dedicated graphics card, it is unlikely that the power supply will be powerful enough to support one without replacing the power supply. Most business computers have a 300-watt power supply. If you are building a high-end gaming workstation, you may require a power supply with 750 watts or more.
You are trying to install Hyper-V on a new laptop, but you keep receiving an error during installation that the software cannot be installed. Which of the following characteristics of the laptop’s processor should you investigate as the MOST likely issue?
a) Virtualization (VT) support
b) Number of cores available
c) Cache size
d) Hyper-threading (HT) technology
a) Virtualization (VT) support
CPU Virtualization is a hardware feature found in all current AMD & Intel CPUs that allows a single processor to act as if it was multiple individual CPUs. This allows an operating system to more effectively & efficiently utilize the computer’s CPU power to run faster. This is enabled or disabled on supported processors within your system’s BIOS. HyperThreading (HT) is an Intel CPU architecture implemented to expose two or more logical processors to the OS to deliver performance benefits.
Dion Training’s video editor wants to install a new dedicated GPU using an expansion card. Which of the following should they verify before installing the new card?
a) The power supply’s wattage rating
b) The power supply supports 12 VDC input
c) The power supply’s efficiency rating
d) The number of SATA connectors available
a) The power supply’s wattage rating
Dedicated graphics cards use the most power of any component in a computer. If someone is installing or replacing a graphics card, it is important to compare the current system’s power usage to the wattage rating of the power supply to ensure it can support the new graphics card.
SATA connectors are not used with graphics cards but are instead used for storage devices and optical drives.
The power supply should support 115 VAC or 230 VAC as its input and provide 12 VDC, 5 VDC, and 3.3 VDC as its output.
A technician is building a new computer for Dion Training. The technician installs the motherboard, processor, memory, hard drives, and case fans, then they attempt to connect the cables to the appropriate connections. When the technician powers on the system, the fans spin, the motherboard’s LEDs light up, and the computer completes its POST. Unfortunately, the monitor displays a “bootable device not found” error.
Which of the following cables did the technician likely forget to connect?
a) Case fan 4-pin power cable
b) SATA 15-pin power cable
c) CPU 8-pin power cable
d) Motherboard 24-pin power cable
b) SATA 15-pin power cable
Based on the scenario, it is most likely that the technician forgot to connect the SATA 15-pin power cable causing the hard drive to remain off. The computer will still pass the POST, but it will be unable to load an operating system since there is no boot device found.
If the CPU power cable was unplugged, the CPU would not receive power and the POST would not complete.
If the motherboard power cable was not connected, then the motherboard’s LED would not be lit.
If the case fan’s power cables were not connected, the fans would not be spinning.
An eSports participant wants to build a custom computer system that is extremely fast but also operates quietly. Which of the following options should they install as their cooling mechanism?
a) Heat sink
b) Liquid cooling
c) Multiple case fans
d) Passive cooling
b) Liquid cooling
Any serious gamer or eSports participant should use liquid cooling. Liquid cooling is very efficient at removing heat while remaining relatively quiet. Unfortunately, liquid cooling can be messy due to potential leakage and spills, though. Therefore, it is always good to test the piping for leakage first, secure the endpoints, and then secure it to the housing unit on the liquid-cooled system.
While multiple cooling fans can dissipate heat sufficiently, they produce a loud humming sound while operating.
You are building a new server and want to ensure that its memory can allow the server to continue working even if there is an issue that corrupts data held within the memory modules. Which of the following types of memory should you select for the server?
a) Non-parity
b) Single-channel
c) ECC
d) Dual-channel
c) ECC
Error checking and correcting or error correcting code (ECC) is a type of system memory that has built-in error correction security. ECC is more expensive than normal memory and requires support from the motherboard. ECC is commonly used in production servers and not in standard desktops or laptops.
You are troubleshooting a workstation with four identical memory sticks installed, one in each of the slots labeled 1, 2, 3, and 4. The motherboard has a marking near the memory slots that says, “quad-channel support.” Based on what you observe, how many channels are being used by the motherboard’s memory?
a) One channel
b) Two channels
c) Three channels
d) Four channels
**Since the motherboard says it supports quad-channel, and four sticks of memory are installed, it would be using four channels. By using a motherboard that supports a quad-channel memory controller, the motherboard is able to transfer up to 256-bits of memory per transactions (4 x 64-bits) to increase the bandwidth available for data transfer.*
Which of the following types of memory relies on temporary storage space on the hard drive that is used when there is insufficient physical memory available to perform a given task?
a) VRAM
b) SODIMM
c) Virtual memory
d) ECC
**Virtual memory is an area on the hard disk allocated to contain pages of memory. When the operating system doesn’t have sufficient physical memory (RAM) to perform a task, pages of memory are swapped to the paging file. This frees physical RAM to enable the task to be completed. When the paged RAM is needed again, it is re-read into memory.
VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.*
A customer wants to enable TPM to add password protection as the system boots up for an added security layer. Which of the following should you check to determine if TPM is enabled on the system?
a) Device Manager
b) BIOS Settings
c) Computer Management
d) System Management
b) BIOS Settings
You should check the BIOS settings to ensure that TPM (Trusted Platform Module) is enabled. TPM enables a system to encrypt the contents of the HDD/SDD and will require a password to be entered during the boot process for the HDD/SDD to be decrypted. A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.
What is the purpose of utilizing secure boot?
a) Increase boot speed
b) Increase storage speed
c) Provide security for the OS
d) Provide RAM protection
c) Provide security for the OS
The purpose of Secure Boot is to prevent malicious and unauthorized apps from loading into the operating system (OS) during the startup process.
Secure Boot is enabled by default in Windows 10. When the PC starts, the firmware checks the signature of each piece of boot software, including UEFI firmware drivers (also known as Option ROMs), EFI applications, and the operating system. If the signatures are valid, the PC boots and the firmware gives control to the operating system. The OEM can use the firmware manufacturer’s instructions to create Secure boot keys and store them in the firmware.
Which option would you MOST likely use to configure PXE to set up remote imaging on a computer during a deployment?
a) BIOS boot option
b) Windows boot menu
c) Power management configuration
d) Secure boot configuration
a) BIOS boot option
To configure a computer to utilize the PXE boot option, you need to configure it under the BIOS boot option.
The Preboot Execution Environment (PXE) is an industry-standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator.
Secure boot is a security system offered by UEFI that is designed to prevent a computer from being hijacked by malware.
Power management allows Windows to reduce or turn off the power supplied to hardware components to save energy.
You just installed an SSD into a laptop to increase the storage speed of the device. Which of the following should you configure to increase the lifespan of the newly installed SSD?
a) Enable the power-saving mode of SSD
b) Disable regularly scheduled defragmentation of the SSD
c) Enable the paging file within the operating system
d) Disable memory caching on the SSD
b) Disable regularly scheduled defragmentation of the SSD
An SSD (Solid-State Drive) is limited in the total number of write functions that can occur over its lifespan. Due to the immediate ability of an SSD to locate data on the drive (since there is no spinning platter that must be moved to reach the right area to retrieve the data like a regular magnetic hard drive), there is no need to defragment an SSD. When you defrag a hard drive, especially an SSD, it will cause tons of small write accesses, reducing the hard drive’s lifespan. And since data is not being read sequentially, it doesn’t matter if the file is stored in a hundred different places.
You have been asked to recommend a RAID for use in a video editing workstation. The workstation must be configured to allow the highest speed operation and use 100% of the available drive free space. The workstation has no requirement for redundancy within this configuration. Which configuration do you recommend?
a) RAID 0
b) RAID 1
c) RAID 5
d) RAID 10
a) RAID 0
RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple storage devices, such as hard disks or solid-state drives (SSDs), in a redundant array of independent disks (RAID) group. Unlike other RAID levels, RAID 0 does not have parity or redundancy. It will provide faster performance and speed, as well as use 100% of the available drive space. A RAID 0 provides disk striping (speed/performance) but not mirroring with a minimum of two disks.
A computer technician is configuring a NAS for a company to store their corporate data. The technician has installed four 10 TB hard drives operating at 5400 RPM in a RAID 10 configuration. How much usable storage space is contained in this NAS?
a) 10 TB
b) 20 TB
c) 30 TB
d) 40 TB
b) 20 TB
A RAID 10 combines disk mirroring and disk striping to protect data stored in the array and required a minimum of four disks. Since the NAS uses a RAID 10 configuration, it is a stripped and mirrored array. When all four 10 TB HDDs are installed, half of the capacity is used by the mirroring functionality of the RAID 10. Therefore, only 20 TB is available as the usable storage capacity. This configuration will give the array higher speed/performance (due to the stripping) and increase redundancy (due to the mirroring).
You are installing Windows 2019 on a rack-mounted server and hosting multiple virtual machines within the physical server. You just finished the installation and now want to begin creating and provisioning the virtual machines. Which of the following should you utilize to allow you to create and provision virtual machines?
a) Disk management
b) Hypervisor
c) Device Manager
d) Terminal services
b) Hypervisor
A hypervisor, also known as a virtual machine monitor, is a process that creates and runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, like memory and processing. To create and provision virtual machines within the Windows 2019 operating system, you can use a Type II hypervisor like VM Ware or VirtualBox.
When using a Type 1 hypervisor virtualized environment, which of the following items is necessary to connect the VMs to the corporate network?
a) VNC
b) Virtual NIC
c) VDI
d) VPN
b) Virtual NIC
A virtual machine includes a virtual NIC. A virtual NIC is a type of virtual adapter that can be configured on logical partitions to provide a network interface. This virtual NIC can be paired and mapped to a physical NIC to get the VM onto the network.
Your company has decided to move all of its data into the cloud. Your company is concerned about the privacy of its data due to some recent data breaches that have been in the news. Therefore, they have decided to purchase cloud storage resources that will be dedicated solely for their use. Which of the following types of clouds is your company using?
a) Hybrid
b) Private
c) Public
d) Community
b) Private
A private cloud contains services offered either over the Internet or a private internal network and only to select users instead of the general public. A private cloud is usually managed via internal resources. The terms private cloud and virtual private cloud (VPC) are often used interchangeably.
You want to create a new mobile application and develop it in the cloud. You just signed up for a cloud-based service provider’s offering to allow you to develop it using their programming environment. Which of the following best describes which type of service you have just purchased?
a) DaaS
b) PaaS
c) IaaS
d) SaaS
b) PaaS
Platform as a Service (PaaS) provides the end-user with a development environment without all the hassle of configuring and installing it themselves. If you want to develop a customized or specialized program, PaaS helps reduce the development time and overall costs by providing a ready to use platform.
S –> P –> I
What type of services can allow you to get more storage and more resources added to the cloud as fast as possible?
a) Metered services
b) Rapid elasticity
c) Measured services
d) Resource pooling
b) Rapid elasticity
Rapid elasticity allows users to automatically request additional space in the cloud or other types of services. Because of the setup of cloud computing services, provisioning can be seamless for the client or user. Providers still need to allocate and de-allocate resources that are often irrelevant on the client or user’s side. This feature allows a service to be scaled up without purchasing, installing, and configuring new hardware, unlike if you had to install more physical storage into a server or datacenter.
Which of the following devices would you configure an access control list (ACL) to implement a security policy within your network?
a) Switch
b) Firewall
c) Repeater
d) Hub
b) Firewall
A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules called an access control list (ACL). A firewall typically establishes a barrier between a trusted internal network and an untrusted external network, such as the internet.
You connect a VOIP device on a user’s desk and need to connect it to a PoE-enabled switch located in a communications closet about 150 feet (approximately 50 meters) away. Which of the following cables should you select to connect the VOIP device to the switch?
a) CAT 3
b) Coax
c) CAT 6
d) Fiber
c) CAT 6
VOIP (Voice over IP) devices that rely on PoE (Power over Ethernet) should use a CAT 5e, CAT 6, or higher cable to make the connection. This allows a single cable (CAT 5e or CAT 6) to carry both the data and the device’s power. Fiber, coaxial, and CAT 3 cables cannot carry power to the VOIP device and cannot be used to meet this requirement. Using a CAT 5e or CAT 6 cable, you can connect two devices of approximately 300 feet (100 meters) without any need to repeat the signal.
CAT 6 (Category 6) cables are designed for high-speed networking and can support PoE (Power over Ethernet), which is essential for delivering power to the VOIP device over the same cable. They can handle gigabit speeds and distances up to 100 meters (about 328 feet), making them suitable for the 150-foot distance between the device and the switch.
CAT 3: This cable type is outdated and typically used for older telephone systems. It doesn’t support the high data speeds required for modern networking and also does not support PoE effectively.
Coax: This type of cable is used for cable TV or broadband internet connections, not for Ethernet networking, and does not support PoE.
Fiber: While fiber can handle long distances and high-speed data, it’s not typically used for small installations like this unless specifically required for very high throughput or long-distance connections. Fiber also requires specialized equipment (like media converters) to connect to a VoIP device and PoE switch.
Dion Training is upgrading its wired network from an older CAT5e network to a CAT 7 network. The network technician has run out of patch cables and asks you to create a straight-through patch cable. Which of the following tools is used to connect an RJ-45 connector to a patch cable?
a) Cable tester
b) Cable stripper
c) Crimper
d) Punchdown tool
c) Crimper
A crimper is a tool used to attach an RJ-45 plastic connector to an unshielded twisted pair (UTP) or shielded twisted pair (STP) cable. It pushes a portion of the plastic into the jacket of the cable to hold it in place. The RJ-45 connection is the standard one used for wired ethernet networks.
Punchdown tools are used to connect an ethernet cable to the back of a patch panel, a punchdown block, or the back of a network wall jack.
A cable stripper removes the plastic jacket from an ethernet cable to access its twisted pairs.
A cable tester is used to ensure a cable is working properly.
Explanation:
A crimper is a tool used to attach RJ-45 connectors (used for Ethernet cables) to the ends of a patch cable. The crimper helps securely fasten the connector to the cable by pushing metal pins into the cable’s wires, ensuring a proper connection.
Why the others are not correct:
a) Cable tester: This is used to check the integrity of a cable and make sure the connections are correct, but it is not used to attach connectors to cables.
b) Cable stripper: This tool is used to strip the outer insulation from a cable to expose the internal wires, but it is not used to attach connectors.
d) Punchdown tool: This tool is typically used for terminating wires into a patch panel or keystone jack, not for attaching RJ-45 connectors to patch cables.
Crimper: Used to attach RJ-45 connectors to the ends of Ethernet cables.
Punchdown Tool: Used to insert wires into patch panels or keystone jacks, not for attaching RJ-45 connectors.
In summary:
Crimper = To create cables by attaching connectors (e.g., RJ-45).
Punchdown Tool = To terminate wires in patch panels or jacks.*