CompTIA A+ Core 1 Final Assessment Flashcards

1
Q

Which cloud characteristic handles changes in demand requirements in real time?

A

Rapid elasticity refers to the system’s ability to handle changes to demand in real time. This type of system would not experience loss of service or performance if demand doubles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scalability

A

Scalability means that the costs involved are linear. For example, if the number of users doubles, the costs to maintain the same level of service would also double

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

High Availability (HA)

A

High availability (HA) means that the service experiences very little downtime. For example, a service with 99.999% availability experiences only 5 minutes and 15 seconds annual downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Metered Utilization

A

The per-use billing for resources consumed by the cloud is referred to as metered utilization. The metering measurement is based on the type of resource such as storage, processing, bandwidth, or active users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many binary digits are found within a media access control (MAC) address?

A

A MAC address consists of 48 binary digits, making it 6 bytes in size. MAC addresses are represented in hexadecimal and each hex digit represents half a byte.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IP Address

A

An IP address is 32 binary digits. This address type is made up of four octets, each with 8 binary digits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MAC Hexadecimal

A

A MAC address is typically represented as 12 digits of hexadecimal. Hex is a numbering system often used to represent network addresses of different types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

16 Bits

A

The number 16 is representative in many areas of computing that usually relate to bits. There are not 16 MAC binary digits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A small call center office asks their IT service provider to implement a voice-over-IP (VoIP) system for them. After discussing the office’s needs, the technician learns that their ability to make and receive phone calls is critical. Considering this information, which of the following should the technician recommend?

A

The technician should suggest configuring quality of service (QoS) on the router to prioritize the port used by VoIP over any other type of protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dynamic frequency selection (DFS)

A

Dynamic frequency selection (DFS) is used to prevent Wi-Fi signals from interfering with radar and satellites. It is not related to VoIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Universal Plug-and-Play (UPnP)

A

Universal Plug-and-Play (UPnP) is a firewall setting that automatically opens the IP addresses and ports necessary for VoIP calls, but it has many security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Port flapping

A

Port flapping is when a port transitions continually between up and down states, often caused by bad cabling, external interference, or a faulty network interface card (NIC) at the host end. It is not something that is set up and is not related to VoIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A systems administrator looks to control HTTP requests from client computers based on the time of day. What type of service does the administrator deploy when configuring clients in a non-transparent manner?

A

A proxy can perform a security function by acting as a content filter to block access to sites deemed inappropriate. A non-transparent proxy requires client configuration for the proxy server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Load Balancer

A

A load balancer can be deployed to distribute client requests across server nodes in a farm or pool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A unified threat management (UTM)

A

A unified threat management (UTM) appliance is one that enforces a variety of security policies and controls, combining the work of multiple security functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An embedded system

A

An embedded system is an electronic device that is designed to perform a specific, dedicated function. An embedded system does not describe the deployed service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Non-volatile storage devices hold data when the system is powered off. These devices are also referred to as mass storage. What are the three types of technologies that mass storage devices use? (Select all that apply.)

A
  1. Magnetic drives, commonly called hard disk drives (HDDs), store data on metal or glass platters that are coated with a magnetic substance.
  2. Optical drives, such as Compact Discs (CDs), DVDs, and Blu-Ray drives, use a laser to read data that has been encoded on the surface of the disc.
  3. A solid-state drive (SSD) uses flash memory technology to implement persistent mass storage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RAM

A

System memory is implemented as random-access memory (RAM) devices. RAM is faster than the flash memory used for SSDs and much faster than an HDD, but it is volatile. RAM is not a mass storage technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An engineer configures 6 disks in a workstation to be part of a redundant array of independent disks (RAID) volume where one-sixth of the space on each disk will be used for parity. Which RAID type does the engineer implement?

A

RAID 5 requires a minimum of three drives but can be configured with more. When configuring RAID 5, an equal portion of each disk is used for parity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RAID 0

A

RAID 0 requires a minimum of two drives but can be configured with more. As this type of RAID provides no redundancy, there is no parity information available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RAID 1

A

RAID 1 is a mirrored drive configuration that uses two disks. A read operation may use either disk, however, a write operation is performed on both disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RAID 10

A

RAID 10 is a nested RAID configuration that combines the features of two basic RAID implementations. It pairs a logical striped volume (RAID 0) configured with two mirrored arrays (RAID 1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A technician needs to repair a laptop. Symptoms are that some keyboard characters are not typing properly and the fingerprint reader is not recognized. What type of component is the technician inspecting?

A

When replacing components such as a keyboard or touchpad, a connection is made to the motherboard via a data cable, typically with a flat ribbon cable type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Small Outline DIMM (SODIMM)

A

Laptop RAM is packaged in a smaller form factor called Small Outline DIMM (SODIMM). The memory is typically fitted into slots that pop up at a 45º angle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

M.2 Port

A

A solid-state disk (SSD) can be provisioned in an adapter card form factor. These often use an M.2 interface. An M.2 port is oriented horizontally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The peripheral component interconnect express (PCIe) bus

A

The peripheral component interconnect express (PCIe) bus is the mainstream interface for modern adapter cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a class of management software designed to apply security policies to the use of mobile devices and apps in the enterprise?

A

Enterprise Mobility Management (EMM) is a class of management software designed to apply security policies to the use of mobile devices and apps in the enterprise. The two main functions of the EMM suite are Mobile Device Management (MDM) and Mobile Application Management (MAM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Internet Mail Access Protocol (IMAP)

A

Internet Mail Access Protocol (IMAP) is a protocol used in the accessing of email from multiple devices. This protocol allows the user to view messages on a server but will not delete the email from the server until the user specifically deletes the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Two-factor authentication (2FA)

A

Two-factor authentication (2FA) is a two-part authentication protocol such as a PIN and fingerprint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Mobile device synchronization (sync)

A

Mobile device synchronization (sync) is the process of copying data back and forth between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Several users of a shared printer complain that the printer is printing on both sides of a sheet of paper when it should only print on one side. What setting does a technician change?

A

Duplex printing refers to the capability of a printer to print on both sides of a sheet of paper. The technician would adjust this setting to single-sided printing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Orientation (Printing)

A

The orientation setting on a printer refers to having a print job use portrait or landscape mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Badging (Printing)

A

Badging means the print device is fitted with a smart card reader. The employee must present their ID badge to the reader to start the print job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Quality (Printing)

A

The quality of a print job allows for the selection of the proper type of paper stock (size and type) to use and whether to use an economy or draft mode to preserve ink/toner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A shared printer handles a lot of print jobs for a medium-sized company. As of late, all users are complaining about the print jobs having a speckled output. What does a printer maintenance technician find to be the problem?

A

The speckling of toner on output is likely caused by loose toner that may be getting onto the paper. Cleaning the inside of the printer using an approved toner vacuum is helpful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The fuser needs replacing

A

When toner is not fused to the paper, a common symptom is an output that smudges easily. This indicates that the fuser needs replacing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The feed rollers are dirty

A

Vertical or horizontal lines on output, such as marks that appear in the same place, are often due to dirty feed rollers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The charge roller is dirty

A

Black stripes or a whole page black indicates that the primary charge roller is dirty or damaged or that the high voltage power supply to the developer unit is malfunctioning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A security team at a company discovers that malware is rapidly moving from one virtual machine to another in a live environment. What security issue is occurring?

A

Virtual machine escaping (VM escaping) refers to malware running on a guest OS jumping to another guest or to the host system itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Extension (Virtualization)

A

An extension may refer to a number of things. With virtualization, the central processing unit (CPU) uses extensions to enable virtualization features within the host and guest operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Intrusion

A

Intrusion refers to a malicious actor gaining unauthorized access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Sprawl (Virtualization)

A

The uncontrolled deployment of more and more VMs is referred to as virtual machine sprawl (VM sprawl). Such action may happen as a result of malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A laptop technician in a large corporation needs to upgrade the hard drives on employee laptops. Currently, the laptops have standard 5400 rpm 500 Gb magnetic drives. The technician needs to know what physical drive size to order. What is the normal size for a laptop magnetic drive?

A

A 2.5-inch drive is the standard size for a laptop magnetic HDD. On laptops, it is also important to consider the depth of the drive, since those vary by manufacturer and model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

3.5 inch drive

A

A 3.5-inch drive is the standard size for a desktop magnetic HDD. This drive configuration is too large for most laptops to utilize internally. Laptop drives are commonly 2.5 inches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

1.8 inch drive

A

A 1.8-inch drive is commonly an mSATA SSD drive, not an HDD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

M.2 SSD (80 mm)

A

The M.2 SSD adaptors interface directly with the PCI express bus. The most popular length is 80 mm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A critical system is set to use secure boot. What properties are characteristic of the secure boot process? (Select all that apply.)

A
  1. Secure boot is a unified extensible firmware interface (UEFI) feature designed to prevent a computer from being hijacked by malware. With secure boot, the computer firmware is configured with cryptographic keys.
  2. With secure boot, the firmware can identify trusted code and ensure that the bootloader has been digitally signed by the OS vendor.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A trusted platform module (TPM)

A

A trusted platform module (TPM) microprocessor is hard coded with a unique, unchangeable key, referred to as the endorsement key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

TPM over OS

A

TPM can be enabled or disabled and reset via the system setup program. TPM can be managed from the OS as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A technician builds a spare computer with an older motherboard and purchases a new modular power supply. What type of P1 motherboard connector will the power supply most likely provide?

A

Most modular power supply units (PSUs) have a 20+4-pin P1 adapter cable for compatibility with older motherboards with a 20-pin port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

9 pin motherboard

A

Internal USB 2 connections are made via 9-pin headers. The front panel audio interface also has a 9-pin connector for attaching to the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

20 pin motherboard

A

Motherboards with a 20-pin power port have been replaced with newer boards that have a 24-pin port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

4/6/8 pins motherboard

A

A PSU will usually have several Molex and/or SATA device power connectors and 4/6/8-pins used for motherboard peripherals such as the CPU and adapter cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A user complains about the quality of the display on a laptop. The user mentions that the laptop has been in use since the company started many years ago. IT determines that the display uses a very early thin film transistor (TFT) technology and will replace the laptop. Which TFT technology does the display use?

A

In an early TFT implementation, twisted nematic (TN) crystals twist or untwist in response to the voltage level. This is the earliest type of TFT technology that can be in budget displays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Vertical Alignment

A

Vertical alignment displays use crystals that tilt rather than twist or rotate. This technology supports wide color gamut and the best contrast ratio performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

LED (OLED) display

A

In an organic LED (OLED) display, or technically an advanced matrix OLED (AMOLED), each pixel is generated by a separate LED. This is not a TFT display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

IPS Display

A

In-plane switching (IPS) displays use crystals that rotate rather than twist. The main benefit is to deliver better color reproduction at a wider range of viewing angles. Most IPS panels support 178/178 degree horizontal and vertical viewing angles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Systems administrators deploy a virtualization solution that separates host resources for each instance at the operating system level. Which solution is running?

A

With a container, resource separation occurs at the OS level. The OS defines isolated containers for each user instance to run in. Each container is allocated CPU and memory resources, but the processes run through the native OS kernel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Type 1 Hypervisor

A

A bare metal virtual platform means that a type 1 hypervisor is installed directly onto the computer and manages access to the host hardware without going through a host OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Type 2 Hypervisor

A

A hypervisor application that is installed onto a host OS itself is known as a type 2 hypervisor. VMWare Workstation and Parallels are examples.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

VM

A

Client-side virtualization refers to any solution designed to run on desktops or workstations. A traditional virtual machine (VM) runs on what is known as a hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A user’s monitor displays a distortedly large image. To fix the resolution problem, the IT specialist performs which software troubleshooting steps? (Select all that apply.)

A
  1. If the output resolution of the video card does not match the resolution of the display device’s native resolution, the image on the screen may be distorted and the card needs to be configured correctly.
  2. Updating the video card driver will install the most recent version of the driver, which should fix the configuration compatibility problem.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Use the OSD to check configuration settings on the graphics card.

A

The OSD does not check configuration settings but does allow a user to adjust screen functions, such as contrast, aspect ratio, and brightness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Check that the monitor is powered on.

A

A monitor that is not powered on will remain dark and will NOT produce a fuzzy image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

An organization looks to harden email services. The systems administrator uses every possible option to help prevent SPAM and other anomalies. During the final stages of configuration, the systems administrator creates a policy within the Domain Name System (DNS) to handle authentication failures. Which record is being configured?

A

The Domain-based Message Authentication, Reporting, and Conformance (DMARC) framework ensures that SPF and DKIM are being utilized effectively. DMARC specifies a policy mechanism for senders to specify how authentication failures should be treated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Mail Exchange (MX)

A

A mail exchange (MX) record is used to identify an email server for the domain so that other servers can send messages to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

The Sender Policy Framework (SPF)

A

The Sender Policy Framework (SPF) uses a TXT resource record published via DNS to identify the hosts authorized to send email from that domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

DomainKeys Identified Mail (DKIM)

A

DomainKeys Identified Mail (DKIM) uses cryptography to validate the source server for a given email message. To configure DKIM, the organization uploads a public encryption key as a TXT record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A printer technician receives a complaint from multiple users sharing a laser printer that the pages they are printing are faded or faint. Upon troubleshooting, the technician ruled out user and server settings. What laser printer component needs replacing to fix this error?

A

If user settings can be ruled out, it is common that the toner cartridge has simply run out of toner and needs to be replaced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Fuser

A

The fuser on a laser printer would have to be replaced if printed material on a paper smudges easily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Print head

A

Both inkjet and dot matrix printers use a print head in the printing process. Laser printers do not rely on a print head.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Drum (Printer)

A

The print drum on a laser printer may need to be replaced if images reappear on a sheet of paper as it is printed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A computer technician replaces the power supply in a desktop system. To do this, the technician needs to know the output of the current power supply unit (PSU). What is the PSU output capability measured as?

A

The PSU’s output capability is measured as its wattage rating. Power is measured in watts (W), calculated for electrical components as voltage multiplied by current (V*I).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Voltage

A

The voltage coming into a PSU is the input voltage. Though it is important to assess the power distribution for its output voltages, it is not how the PSU output capability is measured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Power

A

Power is the rate at which things generate or use energy. Power is measured in watts (W), calculated for electrical components as voltage multiplied by current (V*I).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Efficiency

A

The efficiency is calculated as wattage drawn from the power grid divided by the wattage the PSU is rated at. This is not, however, how the PSU output capability is measured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

A user states that a smartphone does not hold a charge for as long as it did in the past and seems to charge slowly after replacing a lost adapter. The change was noticed over the last few months. What could be the cause? (Select all that apply.)

A
  1. An aging battery would be the cause of charging issues, including the likelihood of a battery no longer holding a full charge. As batteries age, so does the charging lifetime.
  2. An aftermarket or third party mobile power supply may impact how well a battery is being charged, as it may not have the manufacturer’s power specifications needed for proper charging of the device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Swelling

A

Swelling is a symptom and not a cause of a battery problem. Swelling is the result of a defective, overheating, or aging battery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Li-ion

A

Li-ion batteries are not related to a degrading charge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

A technician troubleshoots wired connectivity issues with a device. What should the technician check first to resolve a no connectivity issue?

A

When troubleshooting connectivity on a wired network, the first thing the technician should check is the Ethernet cable. Ensure that the RJ45 connectors are solidly connected to the cable, there are no obvious wear bends or breaks, and that it is properly connected to the device and the wall jack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

NIC

A

The NIC or driver software may be malfunctioning, however, this is not common, nor should it be the first step in troubleshooting connectivity issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Wall Port

A

The wall port is the port that connects the device to the local switch. It is uncommon for the wall port to have a physical issue that would cause no or intermittent connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Wifi Adapter

A

The Wi-Fi adapter is an adapter used to connect to wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

A PC tech plugs a x4 PCIe adapter card into a x8 socket. What speed would the card be capable of running? (Select all that apply.)

A
  1. Each PCIe adapter card supports a specific number of lanes. Ideally, the card should be plugged into a port that supports the same number. Often a card will only work at x1 if in a mismatched port.
  2. If insufficient slots are available, a card will fit in any port with an equal or greater number of lanes. The card may work at x4.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

x16

A

A card may be plugged into a port with a greater number of lanes. This is called up-plugging. The card, however, will not work at x16.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

x8

A

Additionally, a card may be plugged into a x8 port, which has a larger number of lanes, but will not work either.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

While troubleshooting a user’s computer that has no power, the technician eliminated these possible causes: power supply, cabling, wall socket, and connection issue. Therefore, which of the following could be the problem?

A

Given all of the potential causes that were discounted by the technician, a faulty motherboard is the only available option that would cause a computer to have no power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Faulty CPU

A

A faulty CPU can cause several problems, such as booting issues and frequent shutdowns. But, it will not cause the computer to have no power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Corrupted BIOS

A

A corrupted BIOS will thwart the booting process, but it will not result in the computer having no power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Corrupted boot sector

A

A corrupted boot sector will prevent Windows from loading and produce error messages such as “Boot device not found” or “OS not found” but it does not lead to no power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

A company implements a new wireless Infrastructure. During the installation, an engineer adjusts the signal of all antennas for optimal performance. Which setting does the engineer use to measure dBi?

A

Antenna gain is the amount that a signal is boosted by directionality. This focuses the signal in a single direction rather than spreading it over a wide area. Gain is measured in dBi (decibels isotropic).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Transmit Power

A

Transmit power is the basic strength of the radio, measured in dBm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Effective isotropic radiated power (EIRP)

A

Effective isotropic radiated power (EIRP) is the sum of transmit power and gain, expressed in dBm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Frequency Band

A

Every Wi-Fi device operates on a specific radio frequency range within an overall frequency band. Each frequency band is split into a series of smaller ranges referred to as channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

A technician needs to troubleshoot problems. When problem-solving, what are the three items that define a problem? (Select all that apply.)

A
  1. Troubleshooting is problem-solving. It is important to realize that problems have causes, symptoms, and consequences. Knowing what issue the user or system is having helps define the symptoms of the problem. Identifying the symptom(s) allows one to properly assess a problem.
  2. Once the symptoms are defined, narrow down the cause. Identifying the cause of the problem is an important problem-solving step. This could be a faulty network interface card.
  3. Often, the consequence of the problem is that affected user(s) are unable to complete their work. Understanding the consequences of problems, allows the technician to prioritize problems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Fault

A

Though a fault can be a cause of a problem, it is not part of the problem-solving process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

A user complains that a computer is too slow when opening numerous applications. A technician suggests purchasing a new computer that features CMP capabilities to handle the user’s workload. Which statement describes the technician’s suggestion?

A

A multi-core central processing unit (CPU) is multiple processors combined in one. This means that there are multiple execution units and registers. This is referred to as chip level multiprocessing (CMP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

A single execution unit and set of registers for processes

A

A single-core CPU has a single execution unit and set of registers implemented on a single package. This essentially means that the system has a single processor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

A multi-socket motherboard for multiple CPUs

A

The use of two or more physical CPUs is referred to as symmetric multiprocessing (SMP). An SMP-aware OS can then make efficient use of CPUs on a multi-socket motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Multiple parallel thread capability within a process

A

Simultaneous multithreading (SMT) is referred to as HyperThreading by Intel. A thread is a stream of instructions generated by a software application. SMT allows the threads to run through the CPU at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

The projector in the conference room is experiencing intermittent shutdowns. The technician begins troubleshooting by checking all the connector cables. What are the next troubleshooting steps for the technician? (Select the best two choices.)

A
  1. Overheating is the main cause of intermittent shutdowns for projectors. Dust in the vents of a projector is a likely cause of intermittent shutdowns because the blocked vents could lead to overheating.
  2. When a projector shuts down intermittently, the technician should check that the fan is working. A projector uses a very strong bulb that becomes very hot and a faulty fan can cause overheating, which leads to shutdowns.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Check that the bulb is not burned out.

A

Projector bulbs have a limited lifespan, so a burned-out bulb is not uncommon and does not result in intermittent shutdowns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Check that the LED array is situated properly.

A

An LED array is more commonly found in a PC monitor than a projector but does not lead to intermittent shutdowns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What is the modern Android-based smartphone and tablet connector for wired peripherals and charging?

A

USB-C is the modern and current type of connector for Android-based smartphones and tablets. Laptops may also use USB-C ports. These can serve as either standard USB-C ports or function as Thunderbolt ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Micro-B USB

A

Micro-B USB connector form factors are only found on older models of Android devices. Micro-USB devices are being phased out in favor of the USB-C connector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Mini-B

A

Mini-B USB connectors are less common and are still found on some game consoles and other hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Lightning

A

The Lightning connector is a proprietary connector for Apple phones and tablets. This type of port is still used currently. However, some of the latest iPad models, such as the iPad Pro, use USB-C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

A technician troubleshoots a motherboard issue. What the tech discovers is chip creep with a serial ATA (SATA) connector. What is the cause? (Select all that apply.)

A
  1. Chip creep is where an adapter works loose from its socket over time. This may happen perhaps because of temperature changes causing the plastic to flex over time.
  2. Dust and dirt can cause chip creep in a SATA connector by acting as an abrasive between the connector and socket, causing wear and damage to the pins over time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Electrostatic discharge

A

The motherboard’s soldered chips and components could be damaged by electrostatic discharge (ESD), electrical spikes, or overheating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Capacitor swelling

A

If a component has “blown,” it can leave scorch marks. This may be caused by capacitor swelling. The capacitors are barrel-like components that regulate the flow of electricity to the system chips.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

A technician plugs a USB device into a computer and notices that the speeds are slightly less than expected. The USB port and device are USB 3.x devices, and the achieved speed is roughly 9 Gbps. What USB standard is in use?

A

Variations of USB 3.x introduced new connector form factors and faster transfer rates than previous versions. USB 3.2 Gen 2x1 is capable of speeds up to 10 Gbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

USB 3.2 Gen 1

A

The USB 3.2 Gen 1 Superspeed USB standard is capable of up to 5 Gbps. The legacy designation of this standard is USB 3.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

USB 3.2 Gen 2x2

A

The USB 3.2 Gen 2x2 Superspeed USB is capable of 2 x 10 Gbps. While other standards can use a variety of connector types, this standard strictly uses USB-C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

USB 2.0

A

USB 2.0 is a high speed standard that specifies a data rate of 480 Mbps that is shared between all devices attached to the same controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

An engineer configures a workstation for development testing by using virtualization. The engineer chooses to use a type 1 hypervisor. Which statements describe the environment? (Select all that apply.)

A
  1. A bare metal virtual platform means that a type 1 hypervisor is installed directly onto the computer and manages access to the host hardware without going through a host OS.
  2. When a hypervisor is installed directly on the hardware of a host system, it is a type 1 hypervisor. This type has direct access to hardware on the host.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

The hypervisor is installed within an OS.

A

A hypervisor application that is installed onto a host OS itself is known as a type 2 hypervisor. VMWare Workstation and Parallels are examples.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

The hypervisor is host-based.

A

In a guest OS (or host-based) system, a hypervisor is installed within the operating system of the physical host machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

A systems administrator is wanting to use a process in which the TCP/IP protocol is used to query and update an X.500 directory. What can be used to accomplish this task?

A

The Lightweight Directory Access Protocol (LDAP) is a TCP/IP protocol used to query and update an X.500 directory. LDAP uses TCP and UDP port 389 by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

POP3

A

The Post Office Protocol version 3 (POP3) will download any mail to the device, removing it from the server mailbox. Configuring a device to use an Exchange server will not use POP3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

IMAP

A

The Internet Message Access Protocol (IMAP) is useful for accessing email on multiple devices as this protocol does not remove email from the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

SMTP

A

An outgoing mail server sends outbound emails. The Simple Mail Transfer Protocol (SMTP) server is used for sending an email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

A support firm installs and configures network access control systems for organizations. This includes implementing the security mechanisms for local and remote computers to authenticate with an internal server system. A switch is put in place on the edge of the network to protect the server and protect against unauthorized traffic. What role does the switch play in the implementation?

A

A network access server (NAS) or network access point (NAP) is an access appliance, such as a switch, access point, a firewall, or a VPN gateway. It is the device that a system makes a connection to in order to access a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Supplicant

A

A supplicant device is a device requesting access to a network. This includes a user’s PC or laptop, or even a smart device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

An authentication, authorization, and accounting (AAA) server

A

An authentication, authorization, and accounting (AAA) server is an authentication server that is located in the internal network. A supplicant device authenticates against an AAA server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

RADIUS

A

An authentication, authorization, and accounting (AAA) server is often implemented using a protocol called Remote Authentication Dial-In User Service (RADIUS).

126
Q

The office laser printer starts printing pages that smudge easily. The IT specialist is proficient in the common printing defects of laser printers and knows what is causing the problem. What will the IT specialist do to fix the problem?

A

The IT specialist will replace the fuser because smudging print indicates that the toner is not fusing to the paper.

127
Q

Clean the blocked ink nozzle.

A

Ink nozzles spray ink onto paper and are part of an inkjet printer. Blocked ink nozzles cause lines to run through printed pages.

128
Q

Realign the transfer belt.

A

A transfer belt applies a charge to the paper so that it attracts toner from the photoconductor. A misaligned transfer belt causes a cast or shadow-like effect on printouts.

129
Q

Adjust the platen gap.

A

The platen is part of a dot matrix printer. It adjusts the gap between paper and the print head to accommodate different paper types. The incorrect adjustment could cause smudging.

130
Q

A manufacturing firm uses an older Windows NT computer to operate a unique piece of machinery. To support such a legacy system on the network, what common port settings are enabled for communications?

A

Ports 137-139 (UDP/TCP) are used for NETBIOS over TCP/IP communications. NETBIOS is used on a modern network to support networking features for legacy versions of Windows.

131
Q

3389 RDP

A

Port 3389 is a common TCP port that is used on Windows computers as a Remote Desktop Protocol (RDP) to make a remote graphical connection to another system.

132
Q

161 SNMP

A

Port 161 is a common UDP port for the Simple Network Management Protocol (SNMP). SNMP is used to query status information from network devices.

133
Q

389 LDAP

A

Port 389 is a common TCP port that is used for the Lightweight Directory Access Protocol (LDAP). LDAP is used to query information about network users and other network resources.

134
Q

A company considers moving its infrastructure to the cloud. Management emphasizes the need to handle changes in resource usage in real-time. Which feature fulfills this need?

A

Rapid elasticity refers to the system’s ability to handle changes to demand in real-time. A system will not experience loss of service or performance if demand suddenly doubles.

135
Q

Shared resources

A

In a cloud environment, resources are often shared. Pooling of shared resources means that the hardware making up the cloud provider’s data center is not dedicated or reserved to a single customer account.

136
Q

High availability

A

High availability (HA) means that the service experiences very little downtime. For example, a service with 99.999% availability experiences only 5 minutes and 15 seconds annual downtime.

137
Q

Scalability

A

Scalability means that the costs involved are linear. For example, if the number of users doubles in a system, the costs to maintain the same level of service would also double.

138
Q

An engineer plans a fiber cable implementation between two campus buildings about 50 kilometers apart. Due to the distance between the locations, the engineer selects single-mode fiber. What specifications does the engineer need to consider with this decision?

A
  1. Single-mode fiber (SMF) has a small core (8-10 microns) and is designed to carry a long wavelength over long distances.
  2. Small core, long distances, long wavelength
139
Q

MMF

A

Multi-mode fiber (MMF) does not support such high signaling speeds or long distances as single-mode. MMF uses less expensive and less coherent LEDs or vertical cavity surface emitting lasers.

140
Q

MMF

A

Multi-mode fiber (MMF) has a larger core than single-mode fiber (62.5 or 50 microns) and is designed to carry a short wavelength infrared light.

141
Q

Single Mode Cables

A

Single-mode cables support data rates up to 10 Gbps or better and cable runs many kilometers, depending on the optics and cable quality.

142
Q

A college campus is spread throughout an entire city. There is a plan to upgrade the connectivity to all buildings for increased speed. What type do engineers upgrade to?

A

A metropolitan area network (MAN) refers to a specific network type covering an area equivalent to a city or other municipality. The campus network is this type of network.

143
Q

A wide area network (WAN)

A

A wide area network (WAN) spans multiple geographic locations. One example of a WAN is the internet.

144
Q

A local area network (LAN)

A

A local area network (LAN) is a group of computers connected by cabling and one or more network switches that are all installed at a single geographical location such as within a single building.

145
Q

A personal area network (PAN)

A

A personal area network (PAN) refers to using wireless connectivity to connect to devices at a range of a few meters.

146
Q

A user complains about a faulty network connection on a laptop. A technician traces the Ethernet cable in the office to a direct connection in a 16-port smart switch. While investigating the switch’s activity, it becomes apparent that port flapping is occurring. What does the tech troubleshoot as a possible cause? (Select all that apply.)

A
  1. Bad cabling can cause port flapping. If a cable has been pinched, twisted, or suffered any other type of physical damage, it may be faulty.
  2. A port on a network interface card or the switch itself may be faulty. This could be caused by a number of issues, including a manufacturer’s defect, damage from power, or it may simply be failing.
  3. External interference is possible. While the path of the cabling is not known in the scenario, fluorescent lighting and other electronic devices might be causing interference.
147
Q

Latency

A

Latency would not cause port flapping. Latency would be noted as a bandwidth and speed/performance issue.

148
Q

A universal asynchronous receiver transmitter (UART) port was traditionally a physical serial port in a legacy system. In a modern mobile device, how can a UART be utilized? (Select all that apply.)

A
  1. A Bluetooth wireless radio creates a short-range personal area network (PAN) to share data with a PC, connect to a printer, and even connect to automobiles. A Bluetooth connection does use a UART.
  2. A universal serial bus (USB) connection allows systems to easily use peripherals and more. A USB connection does use a UART.
149
Q

Wi-Fi

A

Every laptop, smartphone, and tablet supports a Wi-Fi radio. While some automobiles also offer built-in Wi-Fi, this technology is not used to pair two devices. Wi-Fi does not use a UART.

150
Q

Ethernet

A

Ethernet is a networking standard that covers a variety of wired and wireless technologies. An Ethernet connection does not use a UART.

151
Q

What issue does the help desk technician suspect is causing a problem of a mouse cursor moving on its own?

A

On a laptop, if touchpad sensitivity is too high, typing can cause vibrations that move the cursor. Examples include the pointer drifting across the screen without any input or a “ghost cursor” jumping about when typing. Calibrating the touchpad is a recommended solution.

152
Q

Digitizer

A

Symptoms such as a touch screen not responding to input could indicate a problem with the digitizer.

153
Q

Swelling

A

A swollen battery indicates some sort of problem with the battery’s charging circuit, which is supposed to prevent overcharging. If a device is exposed to liquid, this could also have damaged the battery.

154
Q

Overheating

A

The compact design of mobile devices makes them vulnerable to overheating. The bottom surface of a laptop becomes hot when improperly ventilated.

155
Q

A company plans on live streaming a company-wide meeting once a month. Engineers prepare network equipment to allow the traffic. Which protocol is normally used for such a task?

A

The User Datagram Protocol (UDP) provides unreliable, connectionless forwarding. UDP has less transmission overhead than TCP and is the protocol used with audio and video streams.

156
Q

TCP

A

The Transmission Control Protocol (TCP) guarantees connection-oriented forwarding of packets. TCP can identify and recover from lost or out-of-order packets which are not ideal for audio and video communications.

157
Q

IP

A

The Internet Protocol (IP) provides packet addressing and routing within a network of networks. A PC, laptop, mobile device, or server that can communicate on an IP network uses addressing and routing.

158
Q

DHCP

A

As an alternative to static configuration, a host can receive its IP address, subnet mask, default gateway, and DNS server addresses from a dynamic host configuration protocol (DHCP) server.

159
Q

A user contacts a printer technician to report that every print job sent to a laser printer has lines of toner in the same location on every page that is printed. What does the technician suggest may need cleaning or replacing?

A

Marks that appear in the same place (referred to as repetitive defects) are often due to dirty feed rollers or a damaged or dirty photosensitive drum.

160
Q

Toner

A

If there was speckling of toner on the printouts, loose toner may be getting onto the paper. The inside of the printer would need to be cleaned using an approved toner vacuum.

161
Q

Fuser

A

If the toner was not fused to the paper properly by having an output that smudges easily, then this would indicate that the fuser needs replacing.

162
Q

Pins

A

Pins are used with a dot matrix printer. Lines in dot matrix printer output indicate a stuck pin in the print head.

163
Q

A college would like to implement a secured print solution so that print jobs do not arrive at a printer until the printer is physically interacted with. This will help prevent students from potentially picking up faculty print jobs. Which two physical security solutions does the IT department consider to accomplish this? (Select all that apply.)

A
  1. A secured print job is held on the print device until the user authenticates directly with the print device. A PIN entry requires the user to input the correct password via the device control panel. (Pin Code)
  2. Secured print mitigates the risk of confidential information being intercepted from the output tray. Badging means the print device is fitted with a smart card reader that enables print output to be retrieved. (Badging)
164
Q

Driver

A

Drivers refer to the software required for a computer and computer application to communicate with a printer.

165
Q

Permissions

A

Permissions for a print job refer to the ability to send a job to the printer. Permissions are configured with software controls.

166
Q

A network administrator adds several network printers to a business network. Users can install the printers easily by browsing resources that are available for use. Which protocol enables the ability for the printer to have an automatically populated address book.

A

The Lightweight Directory Access Protocol (LDAP) is a TCP/IP protocol used to query and update resources in an X.500 directory. It is widely supported in current directory products such as Windows Active Directory.

167
Q

NAS

A

A network access server (NAS) is an access appliance, such as a switch, access point, and VPN (a gateway that allows client access to a network).

168
Q

AAA

A

An authentication, authorization, and accounting (AAA) server consolidates authentication services across multiple access devices.

169
Q

SSO

A

Some protocols allow a user to authenticate once to access a network and gain authorization for all the compatible application servers running on it. This is referred to as single sign-on (SSO).

170
Q

A technician looks to wire an office for a medium-sized local area network (LAN). When considering the available standards and speeds, the technician decides to implement Gigabit Ethernet. What specific standard does the technician use?

A

1000BASE-T refers to Gigabit Ethernet over copper twisted pair cabling. Gigabit Ethernet works at 1000 Mbps (or 1 Gbps). 1000BASE-T is the mainstream choice of standard for most LANs.

171
Q

100BASE-T

A

100BASE-T refers to Fast Ethernet over copper twisted pair cabling. Fast Ethernet works at 100 Mbps.

172
Q

10GBASE-T

A

10GBASE-T refers to a copper cabling standard working at 10 Gbps.

173
Q

IEEE 802.3

A

Most cabled LANs are based on the 802.3 Ethernet standards maintained by the Institute of Electrical and Electronics Engineers (IEEE). 802.3 covers more than just Gigabit Ethernet. The IEEE 802.3 standards are designated xBASE-Y, where x is the nominal data rate and Y is the cable type.

174
Q

A large technical firm deploys a cloud service. The service offers cloud storage along with web development capabilities. What deployment model does the firm utilize when a multi-tiered subscription option is available to the general consumers?

A

A public (or multitenant) model is a service offered over the internet by cloud service providers (CSPs) to cloud consumers, often referred to as tenants. With this model, a cloud service provider can offer subscriptions or pay-as-you-go.

175
Q

Private

A

A private model is a cloud infrastructure that is completely private and owned and used by an organization.

176
Q

Hybrid

A

A hybrid model is a cloud computing solution that implements some sort of hybrid public/private/community.

177
Q

Community

A

A community cloud is where several organizations share the costs of either a hosted private or fully private cloud.

178
Q

A printer technician works in a corporate office. Their office has multiple types of printers that require regular maintenance. Which type of printer maintenance includes replacing and properly disposing of a toner print cartridge?

A

Laser printers are printers that use toner for printing documents. Toner is kept in a cartridge that may need to be replaced during normal printer maintenance.

179
Q

3-D printer maintenance

A

A 3D print process builds a solid object from successive layers of material. Though there are multiple types of 3-D printers with varying functions, common printer maintenance includes cleaning the print bed and extruder and replacing used filament.

180
Q

Impact printer Maintenance

A

Impact printers are printers that strike an inked ribbon against various forms of paper to leave a mark. Common maintenance includes replacing the ribbon and feeding in new tractor paper if used.

181
Q

Inkjet printer maintenance

A

Inkjet printer maintenance commonly focuses on paper stocking and replacing or refilling ink cartridges.

182
Q

Which type of virtualization refers to any solution designed to run on ordinary desktops or workstations?

A

Client-side virtualization is any solution designed to run on “ordinary” desktops or workstations. Each user will be interacting from a PC with the virtualization host directly.

183
Q

Server-side virtualization

A

Server-side virtualization is the process of deploying a server as a virtual machine. The server virtual machine (VM) can then be accessed from multiple clients for a given purpose.

184
Q

Application virtualization

A

In application virtualization, the client computer will either stream an application from the server for local processing or access an application hosted on a server.

185
Q

Container virtualization

A

Container virtualization requires resource separation at the OS level.

186
Q

When upgrading the RAM on multiple standardized laptops, what is the most important factor to consider to ensure compatibility with the existing hardware?

A

The DDR version of a laptop is critical in the upgrade process. For example, a laptop designed to run DDR4 cannot run DDR3 RAM.

187
Q

Size of pins

A

It is the number of pins, and not size, on the RAM module that can affect compatibility with the laptop’s existing hardware; however, the DDR version is the most important factor to consider to ensure compatibility.

188
Q

HDD size

A

The HDD drive size on a laptop will vary. Though it is important to get a properly sized HDD, it does not affect the RAM.

189
Q

AC adapter power rating

A

A laptop AC adapter is an external power supply that converts power from AC to the DC voltages used by the laptop. This is not a consideration for RAM upgrades.

190
Q

A computer has three disk drives. Which of the following RAID configurations will most likely be used with such a setup? (Select all that apply.)

A
  1. RAID 0 requires two or more disk drives. It works with as many disks as the computer can accommodate. It is a striping configuration where data is spread across the disks.
  2. RAID 1 is commonly used with just two disks although additional disks are possible. It is a mirrored drive configuration where data from one disk is duplicated on the second disk.
191
Q

RAID 5

A

RAID 5 needs at least 3 disks but can be configured with more, depending on the system’s capacity. RAID 5 is a striping configuration with parity.

192
Q

RAID 10

A

RAID 10 needs at least four disks and the number of disks needs to be even. It is striping combined with mirroring.

193
Q

A hardware technician replaces the central processing unit (CPU) on an Advanced Micro Devices (AMD) motherboard. What must be applied when connecting the heat sink to the CPU?

A

During the installation of the heat sink on top of the CPU, a small amount of thermal grease must be applied in an X-pattern to allow for heat transference to be most successful.

194
Q

Locking lever

A

The CPU locking lever is on the motherboard and is used to lock the CPU in place. This is done before the heat sink is installed.

195
Q

CPU socket

A

The CPU socket is the socket on the motherboard where the CPU will be installed.

196
Q

PIN grid array (PGA)

A

PIN Grid Array (PGA) is a type of CPU socket form factor that is used by AMD processors.

197
Q

A remote facility cannot utilize a wired internet connection for a short period. When relying on a wireless solution, the company uses a technology that must be provisioned with a motor so it can periodically realign with the array. Which internet access technology is in use?

A

Satellites positioned in low Earth orbit (LEO) have a drawback such that the satellites move relative to the surface of the Earth. Premises antennas must be provisioned with a motor so that they can periodically realign with the array.

198
Q

Geostationary orbital satellite internet access

A

A satellite-based microwave radio system provides far bigger areas of coverage than can be achieved using other technologies. Satellites placed in a high geostationary orbit are impacted by increased latency.

199
Q

Wireless internet service provider

A

A wireless internet service provider (WISP) uses ground-based long-range fixed access wireless technology.

200
Q

Global System for Mobile Communication

A

The Global System for Mobile Communication (GSM) refers to cellular usage that allows subscribers to use a removable subscriber identity module (SIM) card to use an unlocked handset with their chosen network provider.

201
Q

A new computer experiences a malfunction with a touch input device. A support engineer disassembles the computer to diagnose the problem. While troubleshooting, which component would the technician find as a 9-pin header on the motherboard?

A

Internal USB 2 connections are made via 9-pin headers, which accept up to two 4-pin port connections while the 9th pin is to orient the cable correctly. (usb port)

202
Q

Power button

A

The power button is not a 9-pinned header and is used to send a signal that can be interpreted by the OS as a command to shut down rather than switching the PC off.

203
Q

Drive activity light

A

Drive (HDD/SSD) activity lights are active when an internal storage disk is being accessed.

204
Q

PSU main motherboard power

A

The main P1 motherboard power connector is a distinctive 24-pin connector or 20-pin for legacy motherboards that supplies the main power for the motherboard.

205
Q

A technician that is new to 3D printers needs to call service for a malfunctioning printer. The technician explains that the problem is with what looks to be a print-head. Which component does the tech report as a problem?

A

An extruder on a 3D printer is the equivalent of a print head in an inkjet printer. A motor in the extruder draws filament. It is melted and squirted onto the object.

206
Q

Motion control

A

A 3D printer has many moving parts. The gears, motors, and motion control enable the precise positioning of the extruder.

207
Q

Build plate

A

The print bed/build plate on a 3D printer is a flat glass plate onto which the material is extruded. The bed is usually heated to prevent the material from warping.

208
Q

Bed (printer)

A

The bed/build surface on a 3D printer is a sheet placed onto the base plate to hold the object in position while printing but also allows its removal on completion.

209
Q

If there is not enough system Random Access Memory (RAM), the memory space can be extended by using disk storage as a page file or swap space. What is this combination of addressable memory called?

A

The total amount of addressable memory (system RAM plus swap space) is referred to as virtual memory or virtual RAM. With virtual memory, the OS assigns memory locations to processes in 4-kilobyte chunks called pages. (virtual ram)

210
Q

ECC RAM

A

Error correcting code (ECC) RAM is used for workstations and servers that require a high level of reliability.

211
Q

Address space

A

Address space is the amount of memory locations the CPU can keep track of. A 32-bit CPU can access a 4GB address space, whereas a 64-bit CPU commonly uses a 48-bit address bus, allowing up to 256 Tb of memory.

212
Q

Dual-channel memory controller

A

With a dual-channel memory controller, there are two 64-bit pathways through the bus to the CPU.

213
Q

Which current USB standard supports 2 x 10 Gbps speeds and uses a USB-C connector type?

A

The universal serial bus (USB) 3.2 specification deprecated some of the older terms used to describe the supported transfer rates. (USB 3.2 Gen 2x2) SuperSpeed USB is capable of 2 x 10 Gbps.

214
Q

USB 3.2 Gen1

A

Iterations of the universal serial bus (USB) 3.x specification introduced new connector form factors and upgraded transfer rates. USB 3.2 Gen 1 SuperSpeed is capable of 5Gbps.

215
Q

USB 3.2 Gen 2x1

A

Each universal serial bus (USB) 3.x specification is full-duplex, so a device can send and receive simultaneously. USB 3.2 Gen 2x1 USB SuperSpeed is capable of 10 Gbps.

216
Q

USB 3.1

A

There have been several iterations of the universal serial bus (USB) standard. Each version introduces better data rates. USB 3.1 is now a past standard.

217
Q

An organization conducts a weekly video conference from its home office to its field locations. Recently, employees at the field locations have been complaining of poor audio and video quality. Which protocol does an engineer monitor for performance issues?

A

The User Datagram Protocol (UDP) is an unreliable, connectionless protocol. It is used in time-sensitive applications, such as audio or video. Lost data results in poor audio and video streaming.

218
Q

The Transmission Control Protocol (TCP)

A

The Transmission Control Protocol (TCP) guarantees connection-oriented forwarding of packets. TCP can identify and recover from lost or out-of-order packets and is not suitable for audio and video data communications.

219
Q

The Internet Protocol (IP)

A

The Internet Protocol (IP) provides packet addressing and routing within a network of networks.

220
Q

A media access control (MAC)

A

A media access control (MAC) address is a physical hardware address of a device and is not a protocol.

221
Q

A department within an organization would like to share a specific set of files with external users from a Windows 10 system. The users will also need to save files as well. Which solution does the systems administrator configure without needing to directly require Windows permissions?

A

File Transfer Protocol-Secure (FTPS) allows a client to upload and download files from a network server. An FTPS server can be easily configured without the need for local user accounts.

222
Q

Server Message Block (SMB)

A

Server Message Block (SMB) is the application protocol underpinning file and printer sharing on Windows networks.

223
Q

Network Basic Input/Output System (NetBIOS)

A

The earliest Windows networks used a protocol stack called the Network Basic Input/Output System (NetBIOS). It is only required if the network must support file sharing for Windows versions earlier than Windows 2000.

224
Q

HTTP

A

The HyperText Transfer Protocol (HTTP) enables clients (typically web browsers) to request resources from an HTTP server.

225
Q

A hard disk drive in a system experiences extended read and write times. What is likely the cause? (Select all that apply.)

A
  1. Bad sectors may be found on a traditional hard disk. While bad sectors can be marked as unusable, having them present is usually a sign of a failing disk.
  2. Bad blocks may be found on a hard disk. A block is a grouping of sectors. A single sector or multiple sectors in a block may have gone bad.
226
Q

Disk thrashing

A

Constant LED activity, often referred to as disk thrashing, can be a sign that there is not enough system RAM so that the disk is being used continually for paging (virtual memory).

227
Q

Data corruption

A

Data corruption is caused by a failing disk and will not cause extended read and write times.

228
Q

An engineer plans a new wired infrastructure rollout that will support wireless capabilities. The requirement includes the incorporation of access points that use 48V of power and 13 watts. Which specific IEEE standard does the engineer implement?

A

The 802.3af standard allows powered devices to draw up to about 13 W. Power is supplied as 350mA@48V and limited to 15.4 W. Usable wattage usually falls around 13 W.

229
Q

802.3at

A

The 802.3at (PoE+) standard allows powered devices to draw up to about 25 W, with a maximum current of 600 mA.

230
Q

802.3bt

A

The 802.3bt (PoE++ or 4PPoE) supplies up to about 51 W (Type 3) or 73 W (Type 4) usable power.

231
Q

802.3

A

The 802.3 standard is an overall arching standard that covers Ethernet usage. While the implementation falls under 802.3, it is not specific to the application.

232
Q

When troubleshooting internet connectivity issues on a wired network, the first step is to make sure the patch cables are working and physically connected to the network ports. If that is not the problem, what is the next troubleshooting step?

A

After eliminating patch cables as a probable cause, the next step in troubleshooting internet connectivity is to test for bad ports using a loopback tool. This will verify the integrity of the network interface port by checking that it can receive a signal generated by itself.

233
Q

Update the NIC driver.

A

Updating the network interface card (NIC) driver is a legitimate troubleshooting step, but should occur after testing for bad ports.

234
Q

Verify the Ethernet speed and duplex configuration are set to auto-negotiate.

A

Verifying that Ethernet speed and duplex configuration are set to auto-negotiate is a legitimate troubleshooting step, but should occur after testing for bad ports.

235
Q

Check that Wi-Fi is turned on.

A

Checking that Wi-Fi is turned on is not relevant since this is a wired network.

236
Q

A company realizes that it needs to implement a management solution for mobile phones. Which solution is specific to the restriction of apps installed from a device’s app store?

A

Mobile application management (MAM) is part of an enterprise mobility management (EMM) suite that sets policies for apps that can process corporate data and prevents data transfer to personal apps. This type of solution configures an enterprise-managed container or workspace.

237
Q

EMM

A

Enterprise mobility management (EMM) is a class of management software designed to apply security policies to the use of mobile devices and apps in the enterprise.

238
Q

MDM

A

Mobile device management (MDM) sets device policies for authentication, feature use (camera and microphone), and connectivity. MDM can also allow device resets and remote wipes.

239
Q

BYOD

A

With bring your own device (BYOD), employees are allowed to use a personally owned device to access corporate accounts, apps, and data. BYOD can raise security concerns.

240
Q

A developer asks the IT department if virtualization would be possible to test software in a sandboxed environment. The developer’s workstation runs Windows 10, the central processing unit (CPU) has virtualization technology enabled, and has plenty of resources for virtual machines. Which Type 2 hypervisor does the IT staff install?

A

VMWare Workstation would be the best choice of the available options. VMWare workstation is a type 2 hypervisor that would easily install in the Windows 10 operating system and provide the features the developer requires.

241
Q

Parallels Workstation

A

Parallels Workstation is a type 2 hypervisor, however, it is software that is installed on a Mac computer to allow the virtualization of a guest operating system such as Windows 10.

242
Q

VMWare ESXi

A

VMWare ESXi is a type 1 hypervisor that is designed for bare-metal install in a server environment.

243
Q

Microsoft Hyper-V

A

Hyper-V is a type 1 hypervisor. While Hyper-V is available in the Windows 10 operating system, the IT department installs a type 2.

244
Q

An engineer is evaluating a new unified threat management (UTM) appliance as a potential replacement for an outdated firewall. Which feature related to website browsing is the engineer most likely to find in the UTM?

A

UTM appliances commonly include content filtering capabilities, allowing administrators to block or allow access to specific websites, categories, or services based on security policies. This helps in preventing users from accessing potentially malicious or inappropriate content.

245
Q

Data loss prevention

A

While DLP systems scan outgoing traffic for sensitive or flagged information, ensuring unauthorized data transfers don’t occur, it’s typically not a primary website browsing feature in UTMs.

246
Q

Workflow automation

A

Workflow automation is more related to processes in industrial control systems or business applications, ensuring tasks are coordinated and executed automatically. It’s not a typical website browsing feature found in UTMs.

247
Q

Load balancing

A

While load balancing plays a critical role in network and application performance, they are not specifically a website browsing feature in the context of a UTM.

248
Q

A user’s computer powers on, but it does not pass the power on self-test (POST) and there is no display on the monitor. The IT specialist starts with the POST issue. Which of the following troubleshooting tests are appropriate in this situation? (Select all that apply.)

A
  1. A faulty device can halt the POST process. One way to test this is by removing devices one at a time to see if it resolves the problem.
  2. If a computer cannot pass POST, a faulty device could be to blame. Removing all non-essential devices, then adding them back one at a time will identify the problem device if it exists.
  3. A faulty central processing unit (CPU) could keep POST from executing, so replacing the CPU chip with a known good one will confirm or eliminate this as a cause.
249
Q

Check power management with ACPI.

A

The advanced configuration and power interface (ACPI) is a power management standard that defines power states such as “sleep” and “hibernate.”

250
Q

A user traveling on business reports that a company owned device suffered damage to the screen during a trip. A technician notices cracks on the screen and determines that touch input is no longer recognized. Visual elements on the screen look fine. What components need replacing? (Select all that apply.)

A
  1. A touch sensitive component in a mobile device is referred to as a digitizer because of the way it converts analog touch input to digital software instructions. In this case, the digitizer is damaged.
  2. The touch sensitive component itself is covered by a thin layer of scratch-resistant, shock-resistant tempered glass. In this case, the glass is cracked.
251
Q

Display panel

A

The display panel sits below the digitizer. As the visuals on the screen look fine, the display does not need to be replaced.

252
Q

Gyroscope

A

A gyroscope can detect when a device changes position and adjust the screen orientation appropriately. The gyroscope does not need replacing.

253
Q

An organization experiences an internet outage. As fiber is being used, an engineer checks to see if the optical signal is being properly converted to an electrical signal. The router is connected using an RJ45 copper wire patch cord. What does the engineer check?

A

The optical network terminal (ONT) installed at the customer’s premises converts the optical signal to an electrical one. The ONT is connected to the customer’s router using an RJ45 copper wire patch cord.

254
Q

OLT

A

An optical line terminal (OLT) is located in a street cabinet. From the OLT, splitters direct each subscriber’s traffic over a short length of fiber to an optical network terminal (ONT) installed at the customer’s premises.

255
Q

PoP

A

A connection to an internet service provider’s (ISP’s) network uses its nearest point of presence (PoP), such as a local telephone exchange.

256
Q

PON

A

A full fiber connection to a customer’s building is implemented as a passive optical network (PON). In a PON, a single fiber cable is run from the point of presence to a street cabinet.

257
Q

A company places restrictions on the specific components and ports of mobile devices. This includes USB ports and cameras. Which specific enterprise management solution does the company deploy for this purpose?

A

Mobile Device Management (MDM) systems primarily focus on managing mobile devices in enterprise settings. They allow organizations to set specific policies that control various features of the device, including restricting access to components such as USB ports and cameras.

258
Q

A mobile application management (MAM)

A

A mobile application management (MAM) system sets policies for apps that can process corporate data and prevents data transfer to personal apps.

259
Q

Enterprise mobility management (EMM)

A

Enterprise mobility management (EMM) is a class of management software designed to apply security policies to the use of mobile devices and apps in the enterprise. This is a broad term that encompasses MDM and MAM.

260
Q

SYNC

A

Sync is an application feature that allows for the synchronization of data. Email, for example, is a popular application that features synchronization. Microsoft Exchange server features ActiveSync.

261
Q

A data scientist needs to run complex algorithms and machine learning programs that require a significant amount of computing power. The scientist tells the company’s IT pro that their current computer is too slow and their data is backed up daily. What RAID configuration would be best for the data scientist where they don’t need redundancy?

A

Since the data scientist needs speed and computing power and is not concerned about data loss, RAID 0 is the best option. RAID 0 uses striping and spreads data across all disks in the array, sacrificing redundancy for speed.

262
Q

RAID 1

A

RAID 1 uses mirroring with two disks. If one disk fails, the other takes over.

263
Q

RAID 5

A

RAID 5 uses striping with distributed parity, meaning all information is spread across all disks in the array so that if one disk fails, data can be reconstructed from the remaining disks.

264
Q

RAID 10

A

RAID 10 uses logical striping with two mirrored arrays. This configuration offers solid fault tolerance since a disk in each mirror can fail and the volume will still be available.

265
Q

A support technician helps a user identify a problem with a newly installed application. The user states the application was working the day before. What does the technician do next?

A

Establishing a theory of probable cause can include questioning the obvious. This might include questioning if there have been any system changes since the last use. If necessary, conducting research may be required.

266
Q

Test a theory to determine a cause.

A

Testing a theory to determine the cause is done once a theory has been established. Comparing to a similar system that works without issue is an example.

267
Q

Establish a plan of action.

A

Establishing a plan of action to resolve a problem and implement a solution happens after. Removing any updates is an example.

268
Q

Document the findings.

A

Documenting the findings happens during the final stage of troubleshooting.

269
Q

What service provides on-demand resources like server instances, file storage, databases, or applications over a network?

A

Cloud computing is a service that provides on-demand resources such as server instances, file storage, databases, or applications over a network, typically the internet.

270
Q

Software-defined networking (SDN)

A

Software-defined networking (SDN) is a model for the rapid provisioning and de-provisioning of cloud-based servers and networks.

271
Q

Local area network (LAN)

A

A local area network (LAN) is a group of computers connected by cabling and one or more network switches that are all installed at a single geographical location.

272
Q

Software as a service (SaaS)

A

Software as a service (SaaS) is a model of provisioning software applications. Rather than purchasing software licenses for a given number of seats, a business would access software hosted on a supplier’s servers on a pay-as-you-go arrangement.

273
Q

Which of the following solutions can mitigate debris reaching components and address occasional overheating in a system that’s positioned safely away from other objects by facilitating airflow to cool down the internal components? (Select all that apply.)

A
  1. Installing a new system fan will help increase the system’s airflow and cooling. A new fan will be free of debris and contain healthy components to run at optimal speeds.
  2. Using blanking plates is also an effective solution. Always use blanking plates to cover up holes in the back or front of the PC. Holes can disrupt the airflow and decrease the effectiveness of the cooling systems.
274
Q

Add more RAM

A

Adding more RAM will not directly address the issue of overheating caused by insufficient airflow. RAM does not contribute to the cooling of the system’s internal components.

275
Q

Check the motherboard

A

Checking the motherboard is not a common technique for addressing an occasional system overheating issue.

276
Q

After identifying the problem with a user’s computer and collecting detailed information from the user about the problem, a technician believes they know the cause. However, when testing this theory, the technician discovers they were wrong and may not be capable of resolving the issue. What are some appropriate troubleshooting steps for the technician to try next? (Select all that apply.)

A
  1. If the technician believes the problem is now beyond their ability to solve, they should escalate it through the proper channel.
  2. After discovering the initial probable cause theory was wrong, the technician should develop a new theory based on what is known about the problem combined with what is now known not to work. If the technician believes their initial theory was the only solution within their skill set, they should escalate the problem.
277
Q

Back up the computer.

A

Backing up the computer should have occurred before the technician tested their probable cause theory.

278
Q

Ask colleagues if any changes have been made to the network infrastructure.

A

Asking colleagues about changes to network infrastructure should have occurred while gathering information. This is before developing an initial probable cause theory.

279
Q

A printer technician troubleshoots a laser printer and determines that the exposing stage of the print job is the issue with print jobs printing incorrectly. What does the technician suspect is happening?

A

In the exposing stage, as the laser receives the image information, it fires a short pulse of light for each dot in the raster to neutralize the charge that was applied by the PCR. In this stage, the imaging drum loses its charge when functioning properly. (The imaging drum is not properly losing its charge.)

280
Q

The OS driver is improperly encoding the page in a page description language.

A

During the processing stage, the OS driver encodes the page in a page description language and sends it to the print device for processing.

281
Q

The imaging drum is not being conditioned by the primary charge roller.

A

In the charging stage, the imaging drum is conditioned by the primary charge roller (PCR). The PCR is a metal roller with a rubber coating powered by a high voltage power supply assembly.

282
Q

The toner is not being fed evenly onto a magnetized developer roller.

A

In the developing stage, the toner is fed evenly onto a magnetized developer roller from a hopper.

283
Q

A technician installs memory into a computer that supports a multi-channel configuration. A 4GB module is placed in bank A1 and a 12GB module is placed in bank B1. A diagnostic tool reports that 16GB is useable, but not as multi-channel. What mode does the system use in making all of the memory available?

A

In flex mode, memory that is of equal value within each channel can work as dual-channel while the remainder of the memory will work in single-channel mode. (Flex)

284
Q

Single-channel

A

In a modern system, single-channel memory means that there is one 64-bit data bus between the central processing unit (CPU), memory controller, and RAM devices.

285
Q

Dual-channel

A

In a modern system with a dual-channel memory controller, there are two 64-bit pathways through the bus to the CPU. This means that 128 bits of data can be sent per transfer.

286
Q

ECC

A

Error correcting code (ECC) RAM is used for systems that require a high level of reliability. For each data transfer, ECC RAM performs a hash calculation.

287
Q

An engineer troubleshooting a network connection identifies a port flapping problem. What should the engineer investigate as a possible cause? (Select all that apply.)

A
  1. A bad Ethernet cable, such as a cable that has a pinch or a kink in it, may experience intermittent connects and disconnects. Replacing the cable is recommended.
  2. A network interface card (NIC) port may experience connection issues if the card has been physically damaged in any way.
  3. As with a NIC port, a switch port can experience a malfunction. Such a malfunction in connectivity can be caused by a power surge or other physical damage.
288
Q

Port Security

A

Port security would not cause intermittent connectivity issues. Security settings would allow or deny system access based on the security policies placed upon the port.

289
Q

Engineers need to share data between the team’s laptop devices that are located in the same office space. The speed needs to be at least 50 Mbps. Which technology do the engineers use?

A

Every laptop, smartphone, and tablet supports a Wi-Fi radio. While some automobiles also offer built-in Wi-Fi, this technology is not used to pair two devices.

290
Q

Bluetooth

A

A Bluetooth wireless radio creates a short-range personal area network (PAN) to share data with a PC, connect to a printer, and even connect to automobiles. A Bluetooth connection does not support the desired bandwidth.

291
Q

CDMA

A

Code division multiple access (CDMA) refers to a cellular device and means that the handset is directly managed by the provider and there is no removable SIM card.

292
Q

NFC

A

Many mobile devices have near-field communication (NFC) chips built-in. NFC allows for very short-range data transmission (up to about 20 cm/8 in.) to activate a receiver chip in a contactless reader.

293
Q

A technician is managing configuration settings in Windows for a LaserJet printer from the printer’s properties dialog box. Among the following options, which one is NOT commonly found in the properties dialog box?

A

In Windows, there are two main configuration dialogs for a local printer: printer properties and printing preferences. In contrast to the properties dialog box, the preferences dialog sets the default print job options, such as finishing options or whether to print in color or black and white.

294
Q

Printing to a different port

A

A printer’s properties dialog allows you to manage configuration settings for the printer object and the underlying hardware, such as updating the driver and printing to a different port.

295
Q

Sharing and permissions

A

A sharing and permissions option is commonly found on a Windows printer properties dialog box.

296
Q

Configuring different feed trays

A

Device settings to configure default paper types for different feed trays can be found in a printer properties dialog box.

297
Q

An employee at an organization requests a laptop upgrade. The request is for a laptop that is extremely lightweight. There is also a requirement for the fastest speeds possible in order to demo the company’s software to potential clients. With these requirements in mind, which drive type should the laptop have?

A

An M.2 SSD usually interfaces with the PCI Express bus, allowing much higher bus speeds than SATA. M.2 adapters can be different lengths.

298
Q

mSATA

A

An SSD might be housed on a card with a Mini-SATA (mSATA) interface. These cards resemble Mini PCIe cards but are not physically compatible with Mini PCIe slots. mSATA uses the SATA bus, so the maximum transfer speed is 6 Gbps.

299
Q

2.5” HDD

A

Traditional laptop HDDs are usually found with a 2.5” form factor. These drives are typically found in budget and heavier laptops.

300
Q

1.8” HDD

A

Some laptops use a 1.8” HDD. HDDs are much slower (usually 5400 rpm models) than SSD.

301
Q

A technician follows a best practice methodology when troubleshooting a problematic computer system. Which of the following represents a consequence of having a problematic computer when considering that problems have causes, symptoms, and consequences?

A

It is important to realize that problems have causes, symptoms, and consequences. A consequence is the result of the problem. Not being able to provide data is a consequence of having a problematic system. (Data required for a meeting is missing.)

302
Q

The printer is not working properly.

A

This is an issue related to the printer, which may be caused by a range of factors, such as connection issues, driver problems, or hardware malfunctions.

303
Q

The internet connection is slow.

A

This is an issue related to the network connection, which may be caused by bandwidth limitations, signal interference, or other factors affecting the quality of the connection.

304
Q

The computer is running low on memory.

A

This is an issue related to the amount of available memory on the computer, which may be caused by running too many applications or processes simultaneously, or by having too many large files open at once.

305
Q

A technician plans an upgrade for several company laptops with new internal storage devices. The requirement is that the new devices interface with a PCI Express bus. What type of device does the technician use?

A

An M.2 SSD usually interfaces with the PCI Express bus, allowing much higher bus speeds than SATA. M.2 adapters can be of different lengths (42 mm, 60 mm, 80 mm, or 110 mm).

306
Q

uSATA

A

Some drives fit into a drive bay with no cables. 1.8” drive bays might require the use of the micro SATA or uSATA connector.

307
Q

mSATA

A

An SSD might be housed on a card with a Mini-SATA (mSATA) interface. These cards resemble Mini PCIe cards but are not physically compatible with Mini PCIe slots.

308
Q

SATA

A

Traditional magnetic drives and SSD flash storage devices can use the SATA interface and connector form factors.

309
Q

A user tries to connect a second monitor to a computer. The computer has an available digital visual interface (DVI) connector and the monitor has a video graphics array (VGA) connector. After looking at the computer, a technician recommends a VGA to which type of cable?

A

DVI-I is a technology that is capable of connecting a digital source to an analog display or an analog source to a digital display. A VGA to DVI-I cable will connect your digital computer to an analog monitor.

310
Q

DVI-D

A

DVI-D is available in both single link and dual link. A DVI-D cable is intended to be used between two digital devices. As VGA is analog, a DVI-D cable will not be useful.

311
Q

DVI-A

A

DVI-A is a technology that carries an analog signal to an analog device. This cable along with an adapter for a VGA connector is required.

312
Q

USB-C

A

USB adapters to convert connector types, such as USB-C to USB-A but this is not applicable for this situation.