CompTIA A+ 1101 Flashcards
An HTTPS application is using SSL/TLS protocol but should use a different port for unencrypted HTTP. Which port should unencrypted HTTP use?
A. TCP/80
B. TCP/587
C. TCP/143
D. TCP/993
A. TCP/80, by default, HTTPS uses TCP port 443. Insecure default HTTP port is TCP port 80.
The IT Department is setting up for outsource management of their client firms. The IT department has asked a server admin to configure a Linux server and accept remote terminal connections from clients without using passwords, along with encrypted terminal emulations. How does the admin set up this access? (Select all that apply)
A. Start a File Transfer Protocol (FTP)
B. Establish a Secure File Transfer Protocol (SFTP)
C. Use an open Secure Shell (OpenSSH) connection
D. Use a Secure Shell (SSH) connection
C & D. A SSH connection is the principal means of obtaining secure remote access to UNIX and Linux servers and to most types of network appliances (switches, routers, and firewalls). The most widely used Ssh is OpenSSH. Therefore a common SSH connection is considered OpenSSH
During a company meeting, a technician scribbled some notes about a firewall configuration on a white board. The technician has listed only the port numbers 25 & 587. What is the purpose of these protocols?
A. They are POP3, an early example pf a mailbox access protocol
B. The ports are for message relay between SMTP servers to submit secure and unsecured messages for delivery
C. Use TLS with the HTTP application to send these ports over rather than via an open and unencrypted port
D. They are the Lightweight Directory Access Protocol (LDAP), a TCP/IP protocol used to query and update an X 500 directory
B. The ports are for message delivery relay between SMTP server to submit secure and unsecured messages for delivery. Port TCP/25 is for insecure message relays (MTAs) between Simple Mail Protocol (SMTP) servers. Port TCP/587 submits encrypted authenticated and secured messages for delivery by an SMTP server.
A client connects to an IMAP server over port TCP/143, but this port is insecure. Instead, the client wants a secure connection established using TLS. What is the default port for the secure POP3/IMAP?
A. TCP port 993 or 995
B. TCP port 25 or 587
C. TCP port 143 or 110
D. TCP port 80 or 443
A. The default ports for a secure connection are either TCP port 993 IMAPS or 995 POP3S, depending on the mail access protocol in use (IMAP or POP)
When advising a company on configuring systems, the admin wants to provide better information network device status and how to monitor them in a client manual. Which of the following is the correct protocol that maintains a database containing statistics related to the activity of devices for review?
A. IMAP
B. DHCP
C. POP3
D. SNMP
D. SNMP is a framework for the management and monitoring of network devices. SNMP requires a Syslog agent that maintains a management information base (MIB) database. MIB holds statistics relating to the activity of the device.
A client wishes to download some files from home to upload onto the company’s website. Which ports would establish a connection for the client to achieve this? (Select all that apply)
A. TCP/20
B. TCP/80
C. TCP/443
D. TCP/21
A & D. FTP is associated with TCP/20 & 21 to transfer data in active mode or a server assigned port in passive mode or a server assigned port in passive mode & establish a connection.
As an alternative to static configuration, wired and wireless host can receive their IP address, subnet mask, default gateway, and DNS server addresses from which protocol? (Select all that apply)
A. APIPA
B. DHCP
C. DSL
D. PXE
A & B. Host servers have a failover mechanism when an IP configuration specifies the use of a DHCP server, but the host cannot contact one
The network administrator is configuring a network attached storage (NAS) appliance. What file sharing protocol should the admin use to allow access to Windows, Linux and Apple macOS clients.
A. Lightweight Directory Access Protocol (LDAP)
B. File Transfer Protocol (FTP)
C. Simple Network Management Protocol (SNMP)
D. Server Message Block (SMB)
D. SMB protocol that implements Windows File/Printer sharing is specifically for use on local networks only. Therefore allowing access from the internet would be a security risk.
What network protocol is obsolete and should be disabled on most networks as it poses a significant security risk?
A. NetBIOS
B. TCP/UDP
C. FTP
D. SMB
A. NetBIOS is obsolete and only required if the network must support file sharing for Windows versions earlier than Windows 2000
Authentication, authorization, and accounting (AAA) allows switches and access points to hold directory information to authenticate clients as they connect to the network. Which protocol would the AAA server use if it wanted to communicate with the directory service?
A. SMB/CIFS
B. LDAP
C. SNMP
D. DHCP
B. The AAA server uses LDAP to communicate with the directory service (AD) from an access point with no configured user account credentials, and it cannot decrypt any authentication traffic
In addition to Remote Desktop, which of the following protocols can an administrator use for remote access administration (Select all that apply)
A. SNMP
B. SSH
C. DHCP
D. Telnet
B & D. Telnet opens a plain text, unsecured remote console connection. Telnet uses TCP port 23. SSH provides the same capabilities as Telnet but encrypts the data while transferring to the port. SSH uses TCP port 22.
A top-level domain (i.e., .com) falsely represents the top of the DNS hierarchy. Why is this considered false?
A. The name server hosting the domain is a static configuration as the primary DNS server entry in the IP configuration of local clients
B. The top-level domain cannot be a duplicate, but also, it does not have to be a fully FQDN
C. The name server hosting the domain resource records on the internet is configured as the only DNS server entry and recognized by a specific IP address, not the domain name.
D. The DNS uses root servers at the hierarchy top, represented by a trailing dot at the end of a FQDN, ensuring a unique host name.
C. DNS is a global hierarchy of distributed server databases that contain information about each domain and the hosts within those domains
Which hardware networking device implements Ethernet cabling and ports to repeat transmission from one device to another as a concentrator function instead of the outdated hub? (Select all that apply)
A. Switch
B. Firewall
C. SDN controller
D. Router or modem
A B & D. A switch is a hardware networking appliance acting as a concentrator or connector for cable segments to a patch panel or router port. A firewall is a network security system of shielding layer/barrier to protect a computer system from unwanted data/viruses. DSL modems or SOHO router is a separate hardware device that can be embedded into a system to connect to the ethernet.
A network admin disconnected the company network router during a recent construction project. The system had a full fiber connection terminated to an optical network terminal, but now the patch cable is missing. The department manager insists the cable fiber optic since the service is full fiber. What type of cable does the system need for this connection?
A. An RJ45 unshielded twisted pair (UTP) patch cable
B. A copper wire VGA, HDMI, or USB
C. An RS-232 serial port cable
D. An RJ11 terminated patch cord asymmetrical digital subscriber line
A. The RJ45 unshielded twisted pair (UTP) patch cable will allow the ONT to convert the optical signal over the external fiber optic cable to an electrical one to connect to the local router
A network administrator sets up a high-speed, long range Asymmetrical DSL (ADSL) router/modem for a client. Unfortunately, the vendor did not include a list of the box contents and the instructions. What type of cable does the administrator need to connect the router’s interface?
A. A rewired RJ45 unshielded twisted pair (UTP) patch cable
B. A type A USB 3.2 high speed long range cable over 5m
C. A high speed 5 m asymmetrical VDSL cable
D. An RJ11 terminated patch cord over 300m long
D. A 300 m ADSL RJ11 terminated patch cord can connect to the phone line to support 52 Mbps downstream/6 Mbps upstream. A symmetric link only supports 26 Mbps in both direction.
A network administrator can configure a SOHO router to provide an IPv4 address configuration to hosts without further admin attention. A tech wrote some notes about IPv4 addresses used in various networks associated with the company support tickets. The tech assigned one of the addresses to the WAN interface of a SOHO router that requires troubleshooting. Which of these addresses must it be?
A. 169.254.1.21
B. 192.168.100.52
C. 224.100.100.1
D. 52.165.16.254
D. The WAN interface of the router must use an IPv4 address from a valid public range, so 52.165.16.254 is the only one to use on a SOHO router
What devices uses a embedded adapter to forward traffic through hardware ports between public and private network segments? (Select all that apply)
A. SOHO router
B. Patch panel
C. Firewall
D. Switch
A & D. A small office or home office (SOHO) will generally use a single wireless router, which combines the functions of a router, DSL/cable modem, Ethernet switch, and Wi-Fi access point to provide connectivity. The role of filtering allowed and denied hosts and protocols is performed by a network firewall. A basic firewall is configured with rules, referred to as a network access control list (ACL). An Ethernet switch provisions one port for each device that needs to connect to the network.
Another group has cabled wall ports to a patch panel during a previous construction. Now the company network administrator is completing the remaining network installation as part of a team effort, and will require additional infrastructure to complete this installation. What does the network admin need to do the finish the network?
A. Switch
B. Hub
C. NIC
D. Modem or router
A. The admin needs to install a networking app to act as a concentrator, connecting the cable segments like a switch, then cabling it to the patch panel ports using RK45 patch cords
A network admin is expanding the company network with new settings and requirements for switches, VLANs and IP subsets. What is the purpose of what the admin is doing?
A. To use unmanned switches to connect more clients without requiring configuration or intervention
B. To assign an FQDN managed by using a DNS within the org VLAN
C. To divide the VLAN into multiple secure broadcast domains through managed switches, allowing additional remote access via VPNs
D. To match the cable type and switches with sufficient ports to meet demand on the enterprise network
C. A VLAN ports can divide into groups using a feature of managed switches to allow additional remote access via VPNs
The TIA/EIA-568 standard defines two methods for terminating twisted pairs: T568A or T568B. In T568A, pin 1 is wired to green/white, pin 2 is wired to green, pin 3 is wired to orange/white and pin 6 is wired to orange. In T568B, the position of the green and orange pairs swap over so that orange terminates to 1 & 2 while green terminates to 3 & 6. What is the reason for this?
A. To terminate Cat 5 cable into a two-pair cable used in telephone systems and broadband digital subscriber line modems
B. To use PoE 802.3bt installation and run distribution system cables to wireless access points
C. To rewire a network with Cat 5 cables to support twisted pair for Gigabit Ethernet switches
D. To use the same termination method consistently to support a Gigabit Ethernet or an upgrade to an optical network terminal
D. A network admin wires a straight through ethernet cable with the dame type of termination at both ends. Using T568A at one end and T568B at the other creates a crossover cable, but Gigabit Ethernet interfaces can. crossover automatically using a standard cable.
Cloud services require the rapid provisioning and de-provisioning of server instances and networks. These components must be fully accessible to scripting, which brought about software defined networking (SDN). According to the definition by the IETF, the principal innovation of SDN is to do what?
A. To keep the layers and component interactions separated in the SDN architecture
B. To insert a control layer between the application and infrasture layers
C. To expose an API automated by scripts that call functions in the layer above or below and shut them down
D. To implement a physical device referred to as the “SDN controller”
B. The principal innovation of SDN is to insert a control layer between the application and infrastructure layers. It is a model for how these processes can provision and de-provision networks.
All PC motherboard have a built-in 1000BASE-T compatible adapter to establish connectivity with the ethernet. What other devices connect to different types of ethernet, such as fiber optics. (Select all that apply)
A. Modem
B. Patch Panel
C. NIC
D. SOHO router
A B & D. Modem, Patch panel & SOHO router
Which hardware networking device implements ethernet cabling and ports to repeat transmission from one device to another as a concentrator function instead of the outdated hub? (Select all that apply)
A. router or modem
B. switch
C. An SDN controller
D. Firewall
Router or modem, switch and firewall
A network admin plans to install a network of wireless access points with power supplied over data cabling. Each access point requires a 20W power supply. What version of Power over (PoE) must the switch support to fulfill this requirement (Select all that apply)
A. An 802.3af switch
B. PoE+ (802.3at)
C. POE++/4PPoE (802.3bt)
D. PoE-power injector
B & C. PoE 802.3at (PoE+) allows powered devices to draw up to about 25W with a maximum current of 600 mA. (PoE) 802.3bt (PoE++ or 4PPoE) supplies up to about 51W (Type 3) or 73W (Type 4) usable power
A network admin disconnected the company network router during a recent construction project. The system had a full fiber connection terminated to an optical network terminal (ONT), but now the patch cable is missing. The department manager insists the cable is fiber optic since the service is full fiber. What type of cable does the system need for this connection?
A. An RJ11-terminated patch cord asymmetrical DSL
B. An RS-232 serial port cable
C. A copper wire VGA, HDMI, or USB adapter cable
D. An RJ45 UTP patch cable
D. The RJ45 UTP patch cable will allow the ONT to convert the optical signal over the external fiber optic cable to an electrical one to connect to the local router.
A network admin is completing an installation as part of a team. Another group cabled the wall ports but left the ends of the cables bundled in the network closet. What additional infrastructure will the network admin require to complete this installation (Select all that apply)
A. A patch panel
B. A hub
C. A switch
D. A modem or router
A patch panel & switch
A Server admin for a major transportation company is facing a crisis where ransomware has taken over and destroyed the primary and backup locations. Luckily there was an unaffected domain controller in a remote country where the admin needed to fly immediately and back up the contents via a USB hard drive. The administrator uses a hard drive running USB 3.2 that supports 10 Gbps speeds but must ensure the legacy server can support connectors. Which of the following are supported connectors? (Select all that apply)
A. USB-A
B. USB Micro
C. USB-B
D. USB-C
A, B, & D. The admin uses a USB 3.2 Gen 2x1 Supersede USB, which runs up to 10 Gbps and supports the USB Micro connector. USB-A runs up to 10 Gbps. YSB Gen 2x1 Superspeed USB supports USB-C which runs up to 10 Gbps.
An audiovisual support professional is setting up a conference room that contains an F-type connector. What type of cable till support professional need to set up the equipment?
A. STP
B. Coax
C. Plenum
D. Fiber
B. Coax for CATV installations is typically terminated using a screw-down F-type connector. Coax is now mostly used for CCTV installations and patch cable for Cable Access TV (CATV) and broadband cable modems.
A marketing analyst is trying to connect an Apple device to a corporate PC, but the cable will not fit into the PC connections. What type of adapter should the analyst use?
A. SATA
B. HDMI
C. USB
D. Thunderbolt
C. The Lightning port is only found on Apple mobile drives. A suitable adapter cable needs to connect a device to a PC, such as Lightning-to-USB A or Lightning to USB C
A new support technician is troubleshooting connectivity issues. The technician decides to troubleshoot the physical layer and traces the wire back to networking closet. There, the support technician sees a large patch panel? (Select all that apply)
A. Fiber
B. Punchdown block
C. RJ11
D. RJ45
B, C, D. The cables running through the walls terminate the insulation displacement connector (IDC) punchdown blocks at the back of the panel. The tech can terminate the twisted pair cabling for Ethernet using modular RJ45 connectors. RJ11 is typically used to terminate two-pair cables and is widely used in telephone systems
A brand new network associate sets up phone lines at a new location. What type of connector will the associate need?
A. UTP
B. RJ11
C. RJ45
D. LC
B. RJ11 typically terminates two-pair cable and is widely used in telephone systems
A cable runner needs to run cable in a plenum space. What consideration does a runner need to account for with plenum spaces?
A. Dust
B. Easy damage
C. Weather resistance
D. Fire retardant
D. Building regulations require the use of fire-retardant plenum cables in such places. Plenum space is effective conduit for fire as there is plenty of airflow and no fire breaks
A helpdesk analyst is replacing an internal hard drive on a desktop. A tech had previously removed the hard drive, so the analyst did not have a chance to map which cable should go where. Which cable will provide power in a modern SATA setup?
A. 15-pin
B. Molex
C. 7-pin
D. eSATA
A. A separate 15-pin SATA power connector connects the device to the PC’s power supply
A server tech sets up a new server in their data center and opens the case to view the insides. The tech notices several hard drives inside. What type of setup does the server most likely have?
A. EIDE
B. SCSI
C. IDE
D. DVI
B. A SCSI or SAS is a dominate interface for enterprise-class storage devices in the PC workstation and server market
A service desk operator is looking at an older computer. The service desk operator attempts to plug a keyboard and mouse, but there are no USB ports. What type of cable do the keyboard and mouse need?
A. IDE
B. Molex
C. DVI
D. D89
D. D89 is the old proprietary standard for keyboards and mice, but USB cables replaced them
A manufacturer sells home repair goods through its online portal. Sales often skyrocket when demand is high due to storms and other phenomena. Due to the unpredictable nature of sales, what service does the manufacturer have in place to handle changing service levels?
A. Rapid elasticity
B. High availability
C. Shared resources
D. Metered utilization
A. Rapid elasticity refers to the system’s ability to handle changes to demand in real-time. A system with high elasticity will not experience loss of service or performance if demand suddenly doubles
A company deploys a new cloud service for its customers and its salespeople. Depending on the login access, users of the service will either shift to a resource center internal to the organization or to a forum where customers can freely collaborate. What model does the company deploy?
A. Private cloud
B. Public cloud
C. Community cloud
D. Hybrid cloud
D. A hybrid cloud type is a cloud computing solution that implements some sort of hybrid public/private/community
Rapid elasticity refers to the cloud computing system’s ability to do what?
A. Achieve pooling of shared resources
B. Handle changes to demand in real time
C. The service experiences very little downtime
D. Provide per-use billing for resources consumed by the cloud
B. Rapid elasticity refers to the system’s ability to handle changes to demand in real time.
An organization uses a private cloud service most of the year but only needs a higher utilization service several times a year when they have a symposium and many people worldwide attend. What is the best service model for this use?
A. A community cloud service deployed across multiple locations
B. A hybrid cloud
C. A public cloud
C. A private cloud with legacy hardware on premises
B. A hybrid deployment is a blend of public and private cloud services to provide some functions via a public cloud and keep sensitive or regulated infrasture, apps, and data on-premises
An engineer decommissions an on-premises email server as all email functionality is now a cloud subscription service. What type of cloud service does the email utilize?
A. XaaS
B. SaaS
C. PaaS
D. IaaS
B. SaaS is a model of provisioning software apps. Rather than purchasing software licenses, a business would access software hosted on a supplier’s servers on a pay-as-you-go arrangement
Which type of cloud model provides a scaffold for a business to develop, deploy, and run apps without having to run and maintain the underlying foundation?
A. DaaS
B. SaaS
C. PaaS
D. IaaS
C. PaaS provides resources somewhere between SaaS and IaaS and deploys un-configured servers, storage network infrastructure, and a multi-tier web/database platforms on top
A web hosting company is home to many company websites. The model is such that a single server can host roughly five small low-traffic websites without changing the configuration. What service type does the web hosting company offer with these sites?
A. High availability
B. Metered utilization
C. Shared resources
D. Rapid elasticity
C. Pooling shared resources means that the hardware making up the cloud provider’s data center is not dedicated or reserved to a single customer account
Multiple host servers exist of premise and in the cloud for a manufacturing company. Users receive a warning that files are not saved during logoff when using a computer session hosted by these servers. What type of service does the manufacturing company use?
A. DaaS
B. SaaS
C. PaaS
D. IaaS
A. Provisioning a virtual desktop infra sure (VDI) as a cloud service is often referred to as desktop as a service (DaaS). A tech can lock down virtual images in this environment to always use a fresh image
In a virtual desktop infrasture, what client functionality does a server handle? (Select all that apply)
A. App processing
B. Data storage
C. Screen display
D. Remote connection
A & B. In typical desktop virtualization solution, low-spec thin client computers replace desktop computers. The server handles even the data storage. VDI refers to using machines to provision corporate desktops. The server performs all app processing in the virtual desktop environment (VDE)
An engineer at the organization quickly deploys a small network in a cloud space. The network includes a subnet and router hidden behind a firewall for software testing. What type of service includes the ability to roll out such a cloud-based network?
A. PaaS
B. SaaS
C. IaaS
D. DaaS
C. IaaS is a means of provisioning IT resources such as servers, load balancers, and storage area network (SAN) components, quickly
Fmputing, organization can expand resources as needed. Services expand rapidly with virtualization through metered utilization using a paid cloud service provider. allowing access to increased resources. What are some of the other benefits the cloud provides (Select all that apply)
A. Data control
B. Elasticity
C. High availability
D. Scalability
B & C. HA is a requirement for short periods of downtime, typically due to planned maintenance and unscheduled outages. Scalability is the cost of supplying the cloud services based on the number of users receiving the service. The benefit for an organization is it can scale up or down services based on the need.
Multiple companies working together on a contract for an extended times decide that resources in a single cloud platform would work best during the project’s duration. What cloud type do the companies utilize?
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community cloud
D. A community cloud is where several organizations share the costs of either a hosted private of fully private cloud
Which cloud service allows for deploying a network of virtual machines running configured web servers, scripting environments, database software, and storage networks?
A. DaaS
B. IaaS
C. PaaS
D. SaaS
C. It provides resources somewhere between SaaS and IaaS and deployed un-configured servers, storage network infrastructure and multi-tier web/database platforms on top.
One type of cloud service allows the members of an organization to interact with the organization’s resources. What type of cloud service model is this?
A. PaaS
B. IaaS
C. SaaS
D. DaaS
B. Its a means of provisioning IT resources, such as servers, load balancers, and storage area network (SAN) components, quickly
Users at an organization would like to have access to their data when not connected to the internet. What type of service should IT configure for the users?
A. File sync
B. Metered utilization
C. Shared resources
D. High availability
A. File sync allows users to have a mirrored copy of their data on any number of devices. Data sync can occur across the cloud for files, emails, contacts and more
The company admin wants to provision IT resources such as servers, load balancers, and storage area network (SAN) components, to deploy when they need them rather than purchase these components separately. Which service model would be best?
A. PaaS
B. SaaS
C. DaaS
D. IaaS
D. Its a means of provisioning IT resources, such as servers, load balancers, and storage area network (SAN) components, quickly
After establishing a free account online, users can use a cloud-based mapping software for free. What type of cloud service is the mapping software an example of?
A. Public cloud
B. Community cloud
C. Hybrid cloud
D. Private cloud
A. A public cloud is a service offered over the internet by cloud service providers (CSPs) to cloud consumers, often referred to as tenants
What cloud service type does a company subscribe to when there is a need for a backend database server for an online app?
A. DaaS
B. IaaS
C. SaaS
D. PaaS
D. PaaS
A travel organization runs a website for most of the year using a private cloud but needs a “break out” solution when a higher utilization is forecast for sales. Which of the following would be the best solution?
A. Hybrid cloud
B. Public cloud
C. Community cloud
D. Private cloud with legacy hardware on premises
A. Hybrid
When users connect to the network, they use a basic hardware terminal to access a desktop hosted on a server. What structure is the user deploying?
A. IaaS
B. PaaS
C. DaaS
D. VDI
D. VDI refers to the use of virtual machines to provision corporate desktops. Low-spec thin client computers replace desktop computers in a typical desktop virtualization solution.
Cloud service providers should ensure that they meet the criteria for reliable and responsive cloud delivery characteristics, such as metered utilization, rapid elasticity, and high availability. What other criteria should cloud service providers meet?
A. Data storage
B. Resource sharing
C. File sync
D. File sharing
C. One of the advantages of cloud storage is automated file sync between different devices, such as a PC and smartphone
The network supervisor plans to predominantly use the 5 GHz band for an open plan office network. However, the business owner heard that this has a shorter range and thinks the network supervisor should use the 2.4 GHz band. Why should the 5 GHz band be preferred over the 2.4 GHz band in this case? (Select all that apply)
A. Regulations on power and dynamic frequency selection (DFS) prevent signals from entering with other nearby installations in a 5 GHz band
B. The chances of overlap are high on a 2.4 GHz band, increasing the risk of interference from other products
C. Despite the open floor plan, 2.4 GHz has a shorter range than 5 GHz and would not work well
D. On a 2.4 GHz network, there is not enough space for separate networks
A, B, & D. In a 2.4 GHz network, each channel is only 5 MHz wide. WiFi requires 20 MHz. The 5 GHz band is subdivided into 23 non-overlapping channels, each 20 MHz wide, reducing the risk of interference. In a 2.4 GHz band, there is no room for separate networks. Therefore the chances of overlap/interference are high using the 2.4 GHz band products. There a regulatory limits on power output constraining ranges of WiFi devices. The 5 GHz band must use DFS to prevent WiFi signals from interfering with radar/satellite signals
The standards compatibility for a WiFi network that will also be supporting most employees with mobile devices plan to use 802.11b/g/n to support its clients. Which GHz band is the best to support clients? (Select all that apply)
A. WiFi 6 working with a dual band adapter using both the 2.4 GHz and 5 GHz bands
B. WiFi working with the 5 GHz band
C. WiFi 6 to work the 2.4 GHz band
D. WiFi 5 working with the 5 GHz band
A & C. Most mobile devices use the 2.4 GHz frequency. WiFi 6 with access points will support 802.11b/g/n clients and is the best choice even an 11 Mbps data rate. Although WiFi 6 uses both bands, a client can only use one radio at a time, not both. This is not a feasible possibility, even with a dual band adapter.
Suppose a network specialist establishes a fixed long-range wireless device to configure a bridge between two networks and wants to use a specific frequency. What would be the best way for the operator to ensure signal quality?
A. Obtain a license to purchase exclusive rights to the frequency within a geological area from the FCC
B. Use a public unlicensed frequency but understand that these frequencies mean interferences are a risk
C. Install antennas to transmit signals via satellite unobstructed from a single directions not needing a license
D. Use a frequency not needing a license and minimize conflicts by ensuring the power output is strong
A. Regulations state that to cover long distances, the must carefully configure devices with precisely aligned point-to-point line of sight, fixed wireless ground-based high-gain microwaves, and license for exclusive rights to a frequency given by the FCC
The network specialist sets up a long range fixed wireless installation and operates on a public frequency without a license. Is this legal?
A. No, The point-to-point fixed wireless uses ground based high gain microwave antennas precisely aligned with one another, requiring a license
B. Yes, installations my use an unlicensed spectrum but cannot exceed the EIRP defined from regulations
C. No, the public spectrum requires the operator using the frequency band to have a license to operate
D. Yes, however the radio spectrum requires the operator to carefully shield the transmitters covering long distances to avoid obtaining a license.
D. Installations may use any unlicensed public spectrum but must no exceed the bands EIRP defined by regulations
WiFi is designed to work in which bands?
A. 5 GHz
B. 2.4 GHz
C. Neither 2.4 nor 5 GHz
D. Both 2.4 and 5 GHz
A. WiFi works only in the 5 GHz band. So while it can support 2.4 GHz, it needs a dual-band adapter to work with 2.4 GHz
The earliest versions of this technology supported a max range of 10m (30 feet). In contrast, newer versions can reach up to 100 feet, although at a significantly lower signal strength. Which of the following devices is usually portable, wearable, and must pair with other devices to work properly?
A. A low-energy RFC
B. An NFC tag
C. Bluetooth
D. An RFID tag
C. Bluetooth technology works best at the 2.4 GHz band, is portable, although some desktop systems are beginning to use it, and is usually wearable
Unlicensed spectrum refers to the operator using a public frequency band, such as 900 MHz or which bands?
A. 5 GHz only
B. 2.4 GHz only
C. Both 2.4 and 5 GHz
D. 20 MHz channels on 2.4 GHz
C. An unlicensed spectrum means the operator can use a public frequency band like 900 MHz, both 2.4 GHz and 5 GHz, as long as long range fixed wireless
An organization has asked a security analyst to review the contents of an external drive to see if the drive is reusable or if the organization needs to destroy it. However, the drive does not have a cable that connects to a USB. After finding an older computer that supports the cable the cable type, it still does not seem to connect. The analyst notice that there appears to be a cable for what looks like the power to the device. The analyst notices that there appears to be a cable for what looks like power to the device. What type of cable should the analyst try using?
A. eSATAp
B. Molex
C. IDE
D. SATA power connector
A. There is an external serial advanced technology attachment (eSATA) standard for the attachment of peripheral drives. eSATAp is a nonstandard powered port used by some vendors
A parent has purchased an older laptop for their young child to do some school work but finds the laptop has USB 1.1 connections. Which of the following should the parent use to be compatible?
A. USB 3 Type B Micro
B. Lightning
C. USB 3 Type B
D. USB 3 Type A
D. USB 3 Type-A connections are physically compatible with USB 1.1 and 2.0 connections
A helpdesk engineer runs cabling at a construction site. The site needs to achieve 100 Mbps, but the manager wants them to use the oldest cabling first to get rid of it. Which cabling should the engineer use?
A. Cat 6
B. Cat 5
C. Cat 5e
D. Cat 6A
B. Cat 5 cable supports the older 100 Mbps Fast Ethernet standard. It is no longer commercially available. A tech will probably need to rewire the network cabled with Cat 5 to support Gigabit Ethernet
A network associate is selecting cable that will need protection from the weather as much as possible. Which type should the associated use?
A. OSP
B. Aerial
C. Conduit
D. Direct burial
D. Direct burial cable is laid and then covered in earth or cement/concrete
An organization has asked a helpdesk attendant to swap out a defective monitor since part of the monitor with not display colors correctly. They are curious about how the LCD monitor varies the color, so they look at the inner workings. What is each pixel addressed by to vary the intensity of RGB values?
A. HDCP
B. VESA
C. Light-emitting diode
D. Transistor
D. Each pixel is addressed by a transistor to vary the intensity of each cell, therefore creating the gamut (range of colors) that the display can generate
A server tech has received a non-standard external drive. It appears older since it does not connect to USB, but it is not recognized when connected. The tech suspects it needs to be powered. Which of the following should the tech try?
A. eSATAp
B. SATA power connector
C. Molex
D. IDE
A. There is an eSATA standard for the attachment of peripheral drives. eSATAp is a non standard powered port used by some vendors
A cyber technician is reviewing CompTIA’s A+ troubleshooting model where it discusses making inquiries regarding environmental or infrastructure changes. Which step in the troubleshooting model covers this topic?
A. Sixth step
B. Fourth step
C. Fifth step
D. First step
D. The first step in the CompTIA’s troubleshooting model is identifying the problem first and then including any inquiries regarding environmental or infrastructure changes
A cyber technician is working on a computer issue that has established probable cause. Based on establishing the probable cause, the tech developed a plan of action. What step has the technician reached in the CompTIA A+ troubleshooting model?
A. Verify full system functionality and, if applicable, implement preventative measures
B. Identify the problem
C. Document the findings, actions, and outcomes
D. Test the theory to determine the cause
D. Testing a theory to determine the cause allows the technician to review various theories surrounding the issue (or issues) and what action the technician has performed to remedy the issue
A technician is troubleshooting a computer and wants to eliminate any factors that could cause the problem to reoccur. What can the technician use to mitigate re-occurrence?
A. Perform preventative measures
B. Establish a new theory
C. Establish a plan of action
D. Identify the problem
A. To fully solve a problem, the technician should implement preventative measures. This means eliminating any factors that could cause the problem to reoccur
A software technician is following the CompTIA A+ troubleshooting model and is gathering infromation from the employee of the contracted vendor. What questions could the technician ask the employee to gain the desired information? (Select all that apply)
A. What are the exact error messages appearing on the screen or coming from the speaker
B. Is anyone else experiencing the same problem
C. Has management been notified of this issue?
D. How long has the problem been occuring
A, B, & D. Before examining the computer, the technician should gather the date from the user by asking what error messages they got, how long the problem has occurring and if its affecting anyone else.
A cyber technician is reviewing CompTIA’s A+ troubleshooting model where it discusses first confirming the theory and then determining the next steps to resolve the problem. Whicj part of CompTIA’s A+ troubleshooting model covers this topic?
A. Fifth step
B. Sixth step
C. Second step
D. Third step
D. The third step in the CompTIA’s troubleshooting model begins with testing the theory to determine the cause, confirming the theory, and then determining the next steps tp resolve the problem
A tehcnician is reviewing the cyber ticket system and is reading through the documented findings and actions from the past 30 days. What benefit does this review provide the technician?
A. It provides the technician with an opportunity to review a complete description of the problem and its solution
B. It allows the technciian to review theories surrounding the issue and what actions to use to remedy the issue
C. It verifies that full system functionality has occured and preventative measures implemented if required
D. It allows the technician to gain information directly from the user who has reported the issue
A. Documenting the findings, actions and solutions allows a user to review a complete description of the problem and its solution
A cyber tehcnician is reviewing CompTIA’s A+ troubleshooting model where it discusses documenting the findings, actions, and outcomes. Which step in the troubleshooting model covers this topic?
A. Second step
B. Third step
C. Fourth step
D. Sixth step
D. The sixth step in the CompTIA A+ troubleshooting model is to document the findings, actions and outcomes
A software technician is reviewing the CompTIA A+ troubleshooting model and is examining the topic that discusses when a techcician cannot confirm a theory and the steps to either re-establish a new theory or escalate it to a supervisor. What step in the model is the tech reviewing.
A. Establish a plan of action to resolve the problem and implement the solution
B. Verify full system functionality, and if applicable implement preventative measures
C. Document the findings actions and outcomes
D. Test the theory to determine the cause
D. The third step in the CompTIA’s A+ troubleshooting model begins with testing the theory to determine the cause. If the technician cannot confirm the theory, then it requires re-establishing a new theory or escalating to a supervisor
A cyber technician is creating a best practices guide for torubleshooting by using CompTIA’s A+ troubleshooting model. The fourth step of this model is to establish a plan of action to resolve the problem and implement the solution. What should the techncian consider when implementing this step in the model
A. Refer to the vendor’s instruction for guidance
B. If the theory is not confirmed, re-establish a new theory or escalate
C. If necessary, conduct external or internal research based on symptoms
D. Once the theory is confirmed, determine the next steps to resolve the problem
A. The fourth step in the CompTIA A+ troubleshooting model is to establish a plan of action to resolve the problem, the implement the solution, including referring to the vendor’s instructions for guidance
A cyber technician is creating a best practices guide for troubleshooting by using CompTIA’s A+ troubleshooting model. What is NOT an aspect associated with the troubleshooting model?
A. Once the theory is confirmed, determine the next steps to resolve the problem
B. If necessary, conduct external or internal research based on symptoms
C. Consider corporate policies, procedures and impacts before implementing changes
D. Gather information from the user, identify user changes, and if applicable, perform backups before making changes
C. The technician must seek the proper authorization for a plan and conduct all remedial activities within the constraints of corporate policies and procedures, which is not part of the troubleshooting model
A cyber technician is creating a best practices guide for troubleshooting by using CompTIA’s A+ troubleshooting model. The third step pf this model is to test the theory to determine the cause. What should the technician consider when implementing this step in the model? (Select all that apply)
A. Gather information from the user identify user changes, and if applicable, perform backups before making changes
B. If the theory is not confirmed, re-establish a new theory or escalate
C. Once the theory is confirmed, determine the next steps to resolve the problem
D. If necessary, conduct external or internal research
B & C.
A software technician is about to begin troubleshooting a computer for a company employee. What are the benefits of identifying the problem?
A. It allows the technician to archive data findings and actions taken for future reference
B. It provides assurance to the technician that the issue has been resolved
C. It allows the technician to gain information from the user, identify any user changes and perform backups to the system if required
D. It allows the technician to contact vendor support for assistance in troubleshooting specific issues
C. Identifying the problem is usually initiated by the technician gaining details of the issue for the user of the system/device
A cyber technician is reviewing CompTIA’s A+ troubleshooting model where it discusses referring to the vendor’s instructions for guidance. Which step in CompTIA’s A+ troubleshooting model discusses this topic
A. Fourth step
B. Sixth step
C. Third step
D. Second step
A. The fourth step in the CompTIA A+ troubleshooting model is to establish a plan of action to resolve the problem, then implement the solution, including referring to the vendor’s instructions for guidance
A help desk analyst is looking at a computer that has PC-1600 RAM in it. What is the max data transfer?
A. 1.6 GBps
B. 2.1 GBps
C. 2.4 GBps
D. 3.2 GBps
A. The peak transfer rate is 1600 MBps (200 MT/s multiplied by 8 bytes (64 bits) per transfer), giving the “PC-1600” designation. 1600 MBps is equivalent to 1.6 GBps
A network admin is setting up a server to manage their routers and switches throughout the environment and push standardized configurations. The admin wants to use memory which performs a hash calculation on the data value. What should the network admin use?
A. UDIMM
B. RDIMM
C. Swap space
D. Virtual Memory
B. Error correction code (ECC) RAM performs a has calculation on the data value for each transfer and stores it as an 8-bit checksum. Most types of ECC supply as registeredDIMMs. A registered DIMM uses an extra component to reduce electrical load on the memory controller.
A server admin considers installing ECC RAM into the critical server to help with integrity but is concerned about multiple bit errors. What can happen when the admin installas ECC RAM?
A. System halt
B. Correction
C. An extra processor would be able to handle these
D. It cannot detect multiple bit errors
A. ECC can detect errors of 2, 3, or 4 bits but cannot correct them. Instead, it will generate an error message and halt the system
A server tech sets up a critical server that requires memory with a high reliability level. Which type of memory should the tech use?
A. ECC
B. Pagefile
C. DIMM
D. SODIMM
A. ECC RAM is for workstations and servers that require high reliability. ECC RAM performs a hash calculation on the data value for each transfer and stores it as an 8-bit checksum
A PC operator is building out a new system to replace an engineering tech’s order system. The system is rated 2400 MT/s. The engineer wants to maximize the amount of RAM. Which amount should they put in?
A. 8 GB
B. 32 GB
C. 16 GB
D. 128 GB
B. DD4 is rated at a data rate of 1600 to 3200 MT/s and can achieve a transfer rate of 12.8 to 25.6 GB /s. The max size supported is 32 GB
A systems admin sets up dual-channel in a system to increase performance. Which of the following does not require support?
A. Memory controller
B. RAM devices
C. CPU
D. Motherboard
B. With a dual-channel memory controller, there are effectively two 64 bit pathways through the bus to the CPU, meaning that the system can send 128 bits of data per transfer rather than 64 bits. This does not require support RAM devices, but it does from all others mentioned