CompTIA A+ Core 1 Practice Test Flashcards

1
Q

What causes a mobile device battery to swell?

A

A swollen battery indicates a problem with the battery’s charging circuit, which is supposed to prevent overcharging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Improper charging routine

A

An improper charging routine will reduce the usable life of a battery. A Li-ion battery should not be allowed to fully discharge regularly or be kept persistently at 100% charge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Old battery

A

As batteries age, they will not hold a proper charge. Symptoms can be that the device will not switch on or only remains on for a few seconds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Underpowered adapter

A

Charging ports can be damaged by improper insertion and removal of the connectors. Signs of this are no charging or intermittent charging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A technician notices that the printer’s output was not expected and needs to check the printer’s control panel to investigate the problem. What does the technician need to check?

A

Calibration is how the printer determines the appropriate print density or color balance. Most printers calibrate themselves automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Maintenance kit

A

A maintenance kit is a replacement feed roller, transfer roller, and fuser unit. The printer’s internal copy count of the number of printed pages guides the replacement kit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Toner

A

Toner is composed of a fine compound of dyestuff and wax or plastic particles. The toner carries the same negative charge polarity as the drum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Developer roller

A

The developer roller is very close to the photosensitive drum. The toner is fed evenly onto a magnetized developed roller from a hopper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This protocol transfers email messages across a network and uses TCP port 25.

A

Simple Mail Transfer Protocol (SMTP) transfers email messages across a network and uses TCP port 25.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FTP

A

File Transfer Protocol (FTP) makes files available for download across a network. It utilizes two ports. TCP Port 21 establishes the connection between two computers (control connection), and TCP port 20 is the port the file(s) are transferred across (data connection).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Telnet

A

Telnet makes an unsecured connection to the command-line interface of a remote server and uses TCP port 23.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSH

A

Secure Shell (SSH) makes a secure connection to the command-line interface of a remote server and uses TCP port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What problem does a screensaver help prevent?

A

When the same static image displays for an extended period, it can damage the monitor’s picture elements, causing a ghost image to “burn” permanently onto the display. An animated screensaver can help prevent this problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fuzzy image

A

If the output resolution does not match the display device’s native resolution, then the image will appear fuzzy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dim image

A

Incorrect settings or a failed backlight can cause a dim image. Adjusting the brightness and contrast of a display can help fix a dim image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stuck pixels

A

A flat-panel monitor defect may cause individual pixels to be “stuck” or “dead.” If a digital display panel has stuck pixels, and the panel is not replaceable under warranty, then software utilities are available to reactivate pixels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An automobile allows for connecting a smartphone or tablet for entertainment and audio purposes. Pairing the two occurs with which technology?

A

A Bluetooth wireless radio creates a short-range personal area network (PAN) to share data with a PC, connect to a printer, and even connect to automobiles. The connection occurs through what is known as pairing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NFC

A

Many mobile devices have near-field communication (NFC) chips built in. NFC allows for very short-range data transmission (up to about 20 cm/8 in.) to activate a receiver chip in a contactless reader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hotspot

A

A smartphone or tablet can be configured as a personal hotspot to share its cellular data connection with other computer devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Wi-Fi

A

Every laptop, smartphone, and tablet supports a Wi-Fi radio. While some automobiles also offer built-in Wi-Fi, this technology is not used to pair two devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What hardware on a client’s computer allows a device and printer to connect over a network?

A

A print server is a hardware and firmware that allows client computers to connect directly over the network without going via a server computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Printer share

A

The print share model describes how multiple client devices access the printer. Ordinary users can connect to a network printer if the print server administrator grants permission to use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Secured prints

A

Secured print is held on the print device until it authenticates directly with the print devices. This mitigates the risk of intercepting confidential information from the output tray before the user has had time to collect it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Audit log

A

An audit log can identify printed documents that have gone missing or identify the unauthorized release of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A user is trying to connect a gaming console to a television. What type of connector should the user utilize?

A

A high-definition multimedia interface (HDMI) is the most widely used video interface. HDMI supports both video and audio. The user would utilize this because it is ubiquitous in consumer electronics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

USB 3.0

A

USB 3.0 has new versions of Type A, Type B, and Type B Micro connectors with additional signaling and wires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Adapter

A

An adapter cable has connectors for two different cable types at the end. An active adapter uses circuitry to convert the signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Lightning port

A

A Lightning port is found only on Apple’s mobile devices. The Lightning connector is reversible. The user needs a suitable adapter cable to connect such a device as a Lightning-to-USB A or Lightning-to-USB C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

An IT support specialist updated all the information systems in the office last week and the users are complaining that the routinely used applications no longer work. What is most likely the issue breaking the applications?

A

Legacy software applications and operating systems may not perform well if a user’s system has been upgraded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Resource requirements

A

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Security requirements

A

Security requirements are incorrect because the question does not mention anything security-related.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Test development

A

Test development often uses virtual desktop platforms based on some sort of guest OS hypervisor. This environment protects a live environment from any potential coding issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A support desk technician must make a custom-length Ethernet patch cable for a user’s desk setup. What tool do they need to create this cable? (Select all that apply.)

A
  1. A crimper is a tool used to fix a male jack to a patch cord. The support technician would do this to both ends of the custom cable.
  2. A cable stripper is a tool that would score the outer jacket just enough to remove it.
  3. Snips are needed to cut the custom length cable to size and trim the ripcord and the start filler inside the cable. Sometimes snips are integrated on cable stripper tools and can be singular in function.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Punchdown tool

A

A punchdown tool fixes each conductor into an insulation displacement connector (IDC). This would not be used in this scenario, as there is no punching down of wires into a block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which internal component does a mobile device use to acquire single or multi-touch input?

A

A touch screen is also referred to as a digitizer because of the way it converts analog touch input to digital software instructions. A digitizer sits above a display panel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Inverter

A

An inverter component is used to convert from the DC power supplied by the motherboard to the AC power for certain mobile flat panel displays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Display

A

The display panel is only a single layer within the screen assembly for a mobile device. Several other display components make up the whole screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Trackpad

A

A trackpad (also referred to as a touchpad) acts as a mouse and is a larger-format device attached as a peripheral rather than built into a laptop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A user complains the cursor on their laptop jumps around on its own. This is especially bad while they are typing. What could solve this problem? (Select all that apply.)

A
  1. On a laptop, if the touchpad sensitivity is too high, typing can cause vibrations that move the cursor. If the touchpad is not needed, it can be disabled. There is generally a function key that will disable the touchpad.
  2. The touchpad sensitivity can be turned down by installing up-to-date drivers and configuring input options.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Replace the backlight.

A

The symptoms of a faulty backlight are a display that is very dim and cannot be adjusted with software settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Replace the battery.

A

A faulty battery can cause overheating or the inability to hold a charge. It does not cause problems with the touchpad unless a swollen battery is warping the touchpad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A user finished setting up their new laptop on the latest Windows operating system and is currently setting up print capabilities. They go to pick up the paper from the printer but everything comes out garbled. What should they troubleshoot first?

A

Garbled print typically occurs because of a fault in rendering the print job somewhere in the path between the application, printer (driver), page description language, and print device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Clean the rollers

A

Vertical or horizontal lines marks that appear in the same place are often due to dirty feed rollers or a damaged or dirty photosensitive drum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Toner fuser

A

Toner not fused to paper has symptoms of output that smudges easily. This indicates that the fuser needs replacing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Creased paper

A

Most paper jams arise because the media (paper or labels) are not suitable for the printer or because a sheet is creased, folded, or not loaded properly in the tray.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A manager needs to electronically sign many documents while using a laptop. Precision is not required and there is very little money in the budget to spend. What does the manager choose to use as a solution?

A

A touchpad is a navigation device that is built into laptops and acts as a mouse. Using a finger with the touchpad can cost-efficiently accomplish the manager’s needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Touch pen

A

Most drawing pads and some touch screens can be used with a touch pen or stylus rather than fingers. A stylus allows for more precise control and can be used for handwriting and drawing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Trackpad

A

A trackpad acts as a mouse and is a larger-format device attached as a peripheral rather than built into a laptop. It may also be used on desktops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Drawing pad

A

A drawing pad refers to a large-format touch device attached as a peripheral. These are also called graphics tablets as they are used in digital art applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A laptop user at a company asks the IT department for computer equipment. In addition to an external monitor, the user would like to take advantage of an expansion card. What does IT purchase for the user?

A

A docking station is a sophisticated port replicator. When docked, a portable computer can function like a desktop machine or use additional features, such as a full-size expansion card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Port replicator

A

A port replicator either attaches to a special connector on the back or underside of a laptop or is connected via USB. It provides a full complement of ports for devices such as keyboards, monitors, mice, and network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Serial interface

A

Serial is one of the oldest and simplest computer interfaces. While not many mobile devices have hardware serial ports, the software serial port is often used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Laptop ports

A

Laptops ship with standard wired ports for connectivity. The ports are usually arranged on the left and right edges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A company offers a bring your own device (BYOD) program at work. Several users approach the company in an effort to receive reimbursement for changing personal phones to the company’s carrier. This will be done by swapping out a subscriber identity module (SIM) card in devices with which network type?

A

Global System for Mobile Communication (GSM) allows subscribers to use a removable subscriber identity module (SIM) card to use an unlocked handset with their chosen network provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

LTE

A

Long-term evolution (LTE) provides an upgrade from CDMA. All 4G and 5G cellular data connections require a SIM card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

CDMA

A

Code division multiple access (CDMA) means that the handset is directly managed by the provider and there is no removable SIM card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

NFC

A

Near-field communications (NFC) allow a mobile device to use a close-range service such as contactless payments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

The software-defined networking (SDN) model consists of multiple layers for networking functions that can be accessed and managed via scripting and automation. Which of the following are layers within the SDN model? (Select all that apply.)

A
  1. The application layer applies business logic to decide how to prioritize and secure traffic and where to switch the traffic.
  2. The control layer is the principal innovation of SDN as it interfaces between the application and infrastructure layers and acts as a controller for the automation of networking functions via APIs.
  3. The infrastructure layer contains the devices (physical or virtual) that handle the actual forwarding (switching and routing) of traffic.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Internet layer

A

The Internet Protocol (IP) layer is a function of the Open Systems Interconnection (OSI) model that provides packet addressing and routing within a network of networks. Though this functions within the SDN, it is not a main software-defined networking layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A user receives a loaner Android mobile phone for use while traveling on business. To charge the device, which traditional cable type will the user need?

A

Modern Android-based smartphones and tablets use the USB-C connector for wired peripherals and charging. The Micro-B USB and Mini-B connector form factors are only found on old devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Lightning

A

Most iPhone and iPad Apple devices use the proprietary Lightning connector. Some of the latest iPad models, such as the iPad Pro, use USB-C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Serial

A

Serial is one of the oldest and simplest computer interfaces. While not many mobile devices have hardware serial ports, the software serial port is often used for programming and connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

HDMI

A

A high-definition media interface (HDMI) port is a multimedia port used for connecting computers and other devices to a display for audio/video purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which of the following causes the ink in an inkjet printer to break up into small pumps, which give an electrical charge when they leave the print head and can either stick to the paper or fall off?

A

Epson design, the nozzle contains a piezoelectric element, which changes shape when a voltage is applied. The steady stream is the ink sent through the print head, and the ink that falls off is recycled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Thermal method

A

The thermal method is when the ink at each nozzle in the print head is heated, creating a bubble. When the bubble bursts, it sprays ink through the nozzle and draws more ink from the reservoir.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Imaging drum

A

The imaging drum is a round rotating cylinder conditioned by the primary charge roller (PCR) in a laser printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Transfer roller

A

Transfer roller applies a positive charge to the underside of the paper in a laser printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

A support technician replaces a Wi-Fi card in a laptop. The following day, the laptop user states that the company’s Wi-Fi network signal is weaker than it was before. What does the technician find to be the likely problem?

A

When replacing a Wi-Fi card, it is important to remember to connect the antenna. The connection is usually a wire with a terminating end that snaps onto the card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

The Wi-Fi card is not seated properly.

A

A Wi-Fi card is seated into a laptop and is usually a peripheral component interconnect express (PCIe) type connector. Having the card seated incorrectly would render the Wi-Fi card unrecognizable and not function at all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

The incorrect software drivers are installed.

A

Devices within a computer require software drivers to function. Since the system identified the card properly, then the support technician installed the correct drivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

The Wi-Fi is not compatible with the new card.

A

There are varying specifications for Wi-Fi. Since the Wi-Fi is receiving a signal, the Wi-Fi card is compatible with the company’s Wi-Fi system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Remote wipe, locator apps, device encryption, remote backup, and antivirus software fall under which category of requirements?

A

Security requirements are correct because all the things listed in the question refer to profile security requirements established for any system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Resource requirements

A

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Test development

A

Test development often uses virtual desktop platforms that are based on some guest OS hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Legacy software/OS

A

Legacy software applications and operating systems may not perform well if a user’s system has been upgraded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

A technician is using a printer that has text-to-raster conversion. Which of the following is this?

A

(PostScript) is Adobe’s device-independent PDL and is often for professional desktop publishing and graphical design output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

PDL

A

A page description language (PDL) creates a raster file from the print commands sent by the software application. A raster file is a dot-by-dot description of where the printer should place ink.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

PCL

A

A printer control language (PCL) is more closely tied to individual features of printer models and can introduce some variation in output depending on the print device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Infrastructure mode

A

Infrastructure mode connects the printer to an access point to make it available to clients on the network via an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What can a cloud developer use to analyze viruses, worms, and Trojans without infecting their computer and network?

A

A sandbox is an isolated environment to analyze viruses, worms, and Trojans in a space that prevents the researcher’s computer and network from becoming infected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Test development

A

Test development often uses virtual desktop platforms based on some guest OS hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Cross-platform virtualization

A

Cross-platform utilization tests software applications under different OSs and resource constraints and is important to ensure the application is compatible across several different environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Resource requirements

A

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What might be diagnosed by no LED status indicators on a drive?

A

No LED status indicator lights could indicate that the whole system might not be receiving power or that the individual disk could be faulty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Bad sectors

A

A read/write error can indicate faulty sectors in a hard disk drive (HDD). Likewise, a power failure or a mechanical fault can damage a sector. If the technician runs a test utility, such as the chkdsk command, and chkdsk locates more bad sectors each time the technician runs the test, it is a sign that the disk is about to fail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Keyboard issue

A

During power-on self-test (POST), three long beeps will indicate a keyboard issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Corrupted boot sector

A

The error message, “Boot device not found,” would indicate a corrupted boot sector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What is a possible source of data corruption?

A

Data corruption can occur when particular sectors or blocks fail, meaning that the system cannot open the files stored in these locations or they simply disappear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Loss of internet access

A

Although frustrating, loss of internet access will not cause data to become corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Failing RTC battery

A

A failing real-time clock (RTC) battery will not corrupt the data. Instead, the main symptom will be incorrect data and time. The RTC battery is known as the complementary metal-oxide-semiconductor (CMOS) battery in older systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

SMART

A

Self-Monitoring, Analysis, and Reporting Technology (SMART) is a system utility that can help diagnose drive problems, not cause data corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

A technician has tested a computer with extended read/write times and found it to have IOPS reduced from vendor baselines. What should the technician do next?

A

A computer experiencing extended read/write times and a technician diagnosing it with reduced input/output operations per second (IOPS), has a failing drive. However, the drive has not yet failed, so the first thing to do is perform data backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Replace the drive.

A

Replacing the drive immediately will result in full data loss. However, the drive has not failed yet, so the technician should back up the data before replacing the drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Change the PSU.

A

The technician should replace the power supply unit (PSU) when it is overheating or not delivering consistent power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Change the power cord.

A

The technician should replace a frayed power cord when the cord is no longer working.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

A user wants to mitigate the risk of data loss by using a disk that underpins the mass storage system and provides fault tolerance. What can the user use?

A

A redundant array of independent disks (RAID) is an array that appears as a single storage resource or volume and can be partitioned and formatted like any other drive. RAID has a basic level numbered from 0 to 6. There are also nested RAID solutions, like RAID 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

NVMe

A

NVMe (NVM express) can be packaged for installation to a PCIe slot as an expansion card or an M.2 slot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

SSD

A

A solid-state drive (SSD) uses flash memory technology to implement persistent mass storage. Flash memory performs much better than the mechanical components used in hard drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

mSATA

A

A mini-serial ATA (mSATA) allows a technician to plug an SSD packaged as an adapter card into the motherboard’s combined data and power port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

A technician suspects a mobile device to have liquid damage. What should the technician do first?

A

The technician should power off the device to avoid further damage and remove any excess liquid. Next, the technician must disassemble the device to dry the internal components when exposed to liquid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Replace the battery.

A

The technician will need to replace the battery when a device has liquid damage; however, this is not the first step.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Replace the screen.

A

Sometimes liquid damage can result in seeing liquid under the screen. This does not necessarily mean that the screen needs replacing; sometimes, it just needs to dry out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Request a warranty replacement.

A

Depending on the warranty policy, a warranty replacement for water damage to a mobile device may be appropriate. However, the first step will be to power down the device before moving forward.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

A technician did not install the full complement of modules, which would allow the system to revert to as many channels as are populated. What types of channels would allow this to happen? (Select all that apply.)

A
  1. Technicians can use triple-channel memory controllers in some CPUs and supporting chipsets.
  2. Quad-channel memory controllers are similar to triple-channel as a technician can use them in certain CPUs and supporting chipsets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Dual-channel

A

Dual-channel memory controllers effectively have two 64-bit pathways through the bus to the CPU, meaning that they can send 128 bits of data per transfer rather than 64 bits. This feature requires support from the CPU, memory controller, and motherboard but not RAM devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Single-channel

A

Single-channel memory means that there is one 64-bit data bus between the CPU, memory controller, and RAM devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

An employee uses a device that gives them authentication to release the print job. What is this device?

A

Badging means the print device has a smart card reader. An employee must present an ID badge to the reader to start the print job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Print server

A

A print server is a hardware and firmware that allows client computers to connect directly over the network without going via a server computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Audit log

A

An audit log can identify printed documents that have gone missing or identify the unauthorized release of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

User authentication

A

A company can configure user authentication on a print share. User authentication means that the printer sharing server or print device will only accept print jobs from authorized user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Regarding a personal computer, what houses internal components or provides input/output functions, or external storage? (Select all that apply.)

A
  1. Peripheral devices typically perform the input function (keyboard, mouse, microphone, and camera), output (monitor and speakers), or external storage.
  2. System case houses the internal components, including the motherboards, central processing unit (CPU), system memory modules, adapter cards, fixed disks, and power supply unit.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

USB

A

Universal Serial Bus (USB) is the standard meaning of connecting most peripheral device types to a computer. A host controller manages USB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

HDMI

A

A high-definition multimedia interface (HDMI) is the most widely used video interface. HDMI supports both video and audio. HDMI rates as either standard or high speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

This can be used individually or in conjunction with other configurations to effectively verify email services and block the transmission of spoofed and unwanted messages. (Select all that apply.)

A
  1. The Sender Policy Framework (SPF) record—there must be only one per domain—identifies the hosts authorized to send email from that domain.
  2. DomainKeys Identified Mail (DKIM) uses cryptography to validate the source server for a given email message. This can replace or supplement SPF.
  3. The Domain-based Message Authentication, Reporting, and Conformance (DMARC) framework ensures that the developer effectively utilizes SPF and DKIM. A DMARC policy publishes as a domain name system (DNS) TXT record.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Virtual private network

A

A virtual private network (VPN) enables hosts to connect to the LAN without being physically installed at the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Which application protocol underpins file and printer sharing on Windows networks and usually runs directly over the TCP/445 port?

A

Server Message Block (SMB) is the application protocol underpinning file and printer sharing on Windows networks. SMB usually runs directly over TCP port 445.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Network Basic Input/Output System

A

Network Basic Input/Output System (NetBIOS) allows computers to address one another by name and establish sessions for other protocols, such as SMB. This uses UDP port 137 for name services and TCP port 139 for session services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

File Transfer Protocol

A

The File Transfer Protocol (FTP) allows clients to upload and download files from a network server. It uploads files to websites and utilizes TCP ports 20 and 21.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

HyperText Transfer Protocol

A

HyperText Transfer Protocol (HTTP) is usually used to serve HTML web pages or applications hosted on a web server and typically operates over TCP port 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

A large store chain is eager to reduce the cost of maintaining their servers but is unsure what the best method would be for their use case. The major requirements for the chosen solution are that the store chain needs to own its cloud infrastructure (without sharing with another organization) to maintain maximum privacy and security of the data. Which cloud computing option best meets the store chain’s major requirements?

A

The private cloud meets the store chain’s two major requirements because it gives organizations greater control over the privacy and security of their data stored in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Public cloud

A

The public cloud is incorrect because there are risks regarding performance and security. The public cloud is a shared resource with other organizations, and a cloud service provider (CSP) runs it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Hybrid cloud

A

A hybrid cloud is incorrect because some cloud functions can be done via a public cloud, creating potential vulnerabilities to privacy and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Community cloud

A

Community cloud is incorrect because it requires the store chain to share a hosted private or a fully private cloud with other organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

What is a sign that the RTC battery is failing?

A

The real time clock (RTC) is part of the chipset that keeps track of the calendar date and time and runs on battery power. If the system date or time is wrong, it can indicate that the battery is failing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Computer crash

A

Intermittent computer crashes can be difficult to diagnose, but a failing RTC battery is not a cause of computer crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Grinding noise

A

Grinding noises can indicate mechanical failure on a hard drive disk (HDD), but this does not relate to the RTC battery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Application crash

A

Application crashes can be challenging to diagnose, but the RTC battery is not a cause of application crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

A display manufacturing company is evolving their current model line to offer a new model of display that does not require backlight. What technology does not require a backlight as each individual pixel is self-illuminating?

A

In an organic LED (OLED) display, or technically an advanced matrix OLED (AMOLED), each pixel is generated by a separate LED. This means that the panel does not require a separate backlight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Light-emitting diodes

A

An LCD must be illuminated to produce a clear image. In a TFT, the illumination is provided by an array of light-emitting diodes (LEDs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Liquid crystal display

A

Most mobile devices use a flat-panel screen technology based on a type of liquid crystal display (LCD). A liquid crystal is a compound whose properties change with the application of voltage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Thin film transistor

A

In the types of flat panels used for computer and mobile device displays, the liquid crystal elements and transistors are placed on a thin film transistor (TFT).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

A user is trying to print visual graphics for an upcoming meeting, but the paper is coming out faded. What should they check first?

A

For faded or faint prints, if a simple cause such as the user choosing an option for low density (draft output) can be discounted, then this is most likely to indicate that the toner cartridge needs replacing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Creased paper

A

If paper is not feeding into the printer check that the paper is not creased, damp, or dirty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Paper weight

A

If the printer is feeding multiple sheets also check the paper size and weight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Orientation

A

For incorrect page orientation, the paper size and orientation must be set correctly for the print job or the finishing/binding will be aligned to the wrong edge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

A technician researches flat-screen displays to find the perfect model for a conference room. The screen should feature a high viewing angle as the conference room is wide. Which technology does the technician look for when purchasing a flat-screen display?

A

In-plane switching (IPS) uses crystals that rotate rather than twist. The main benefit is to deliver better color reproduction at a wider range of viewing angles. Most IPS panels support 178/178 degree horizontal and vertical viewing angles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

VA

A

Vertical alignment (VA) uses crystals that tilt rather than twist or rotate. This technology supports a wide color gamut and the best contrast-ratio performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

LED

A

An array of light-emitting diodes (LEDs) can provide illumination in a flat panel. Most smartphone and tablet screens use edge lighting where the LEDs are at the top or bottom of the screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

LED

A

A separate LED generates each pixel in an organic LED (OLED) display, or technically, an advanced matrix OLED (AMOLED) display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

A user reports that their reporting resource is not working. They mentioned an error message that they did not write down but are certain that a “HTTP request failed” was a part of the error. What specialized support team will the user contact to resolve this issue?

A

A web server provides client access using HTTP or its secure version (HTTPS). Given the limited information, this would be the first team to reach out to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Mail server team

A

Mail servers primarily use Simple Mail Transfer Protocol (SMTP), which specifies how the user delivers an email from one mail domain to another domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Print server team

A

Print servers rely heavily on Server Message Block (SMB) protocol for file and printer sharing on a Windows network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

File server team

A

File servers also rely heavily on Server Message Block (SMB) protocol for file and printer sharing on a Windows network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

A logistics company wants to streamline its workflow and track shipments as they move in and around its facilities without barcode scanners. What type of personal area networking solution would best suit this requirement?

A

Radio-frequency ID (RFID) encodes information into passive tags, which can be energized and read by radio waves from a reader device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

NFC

A

Near-field communication (NFC) is a peer-to-peer version of RFID. NFC works typically at up to two inches, which would not be a large enough range for this scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Bluetooth

A

Bluetooth is used to connect peripheral devices to PCs and mobiles and to share data between two systems. No information needs to be transferred to the physical shipments, so this technology would not be the best solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Wi-Fi 5

A

Wi-Fi 5 is a connection that requires physical hardware on both sides of communication, so this would carry an extremely high cost for implementation in this scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

A company has a structured cable system installed by a technician. The technician uses a permanent cable that terminates to wall ports and patch panels. What is this mechanism called?

A

A punchdown block is a mechanism used to terminate wires. A technician can use RJ45 to terminate twisted pair cabling for Ethernet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

RJ45

A

RJ45 connectors are also known as “8P8C.” Each conductor is a four-pair Ethernet cable that is color-coded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

RJ11

A

RJ11 typically terminates a two-pair cable used in the telephone systems and with DSL modems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

T568A

A

T568A is a twisted pair that a technician can use in the TIA/EIA-568. In T568A, the technician wires pin 1 to green/white, wires pin 2 to green, wires pine 3 to orange/white, and wires pin 6 to orange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

What features of the cloud allow multiple users to simultaneously access content and work collaboratively while tracking edits by each user?

A

File synchronization is an advantage of cloud storage that replicates files between data centers and different devices such as PCs and smartphones. Cloud storage also allows multiple users to access content to work collaboratively simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Shared resources

A

To meet availability, scalability, and elasticity requirements, cloud providers must be able to provision and de-provision resources automatically through the pooling of shared resources and virtualization.

154
Q

Community cloud

A

A community cloud is a cloud environment deployed for shared use by cooperating tenants. These tenants usually have similar security and operating concerns.

155
Q

High availability

A

High availability means that the service experiences very little downtime. Downtime can occur because of scheduled maintenance and unexpected outages.

156
Q

The TIA/EIA-568-C Commercial Building Telecommunications Cabling Standards have specific recommendations for health care facilities with Power over Ethernet (PoE) 802.3bt installations, and for running distribution system cable to wireless access points. Which Cat does this refer to?

A

Cat 6A is recommended for health care facilities since it supports 10 Gbps over 100m, but the cable is bulkier and heavier than Cat 5e and Cat 6. The installation requirements are more stringent.

157
Q

Cat 5

A

Cat 5 cable supports the older 100 Mbps fast Ethernet standard. It is no longer commercially available, so a technician will need to rewire the network cable with Cat 5 to support Gigabit Ethernet.

158
Q

Cat 5e

A

Cat 5e cable supports Gigabit Ethernet links for client computers but can now opt to install Cat 6 cable.

159
Q

Cat 6

A

Cat 6 cable is more reliable than Cat 5e and supports 10 Gbps but over reduced range.

160
Q

A technician decides to update a server’s redundant array of independent disks (RAID) array with solid-state hard drives. The plan is to clone the current array and restore it to the newly built array. Which step does the technician use in a migration approach?

A

Migration means using backup software to perform (disk imaging) on the old drive and storing it on a USB or directly to the new drive(s).

161
Q

Data backup

A

A replacement drive approach only has the data backed up from the old drive. The technician then fits the new drive to the laptop and reinstalls all software.

162
Q

Data restore

A

When using a replacement approach, the technician restores user data from a backup. This approach means that the technician removes the old drives and replaces them with the new drives.

163
Q

OS installation

A

When a replacement approach occurs, the new drives need the operating system (OS) installed and any other required applications.

164
Q

A technician reimaged an infected computer. What will the technician do to avoid this problem from happening again?

A

To fully solve a problem, implement preventative measures. For example, after clearing a virus from a computer, make sure that antivirus software is running and updating before returning the computer to the user.

165
Q

Disable user’s internet access.

A

Disabling the user’s internet access would guarantee protection from viruses but prevent the user from working. This solution does not address or consider business interests.

166
Q

Document the changes.

A

Documenting the changes is an important step but does not stop the virus infection from happening again.

167
Q

Escalate to a supervisor.

A

Escalating to a supervisor is effective when the technician cannot identify or solve the problem. In this case, the technician has already solved the problem.

168
Q

An IT administrator noticed that the company needs a more secure way to create and store data. What should the IT administrator implement?

A

A trusted platform module (TPM) is a specification for hardware-based storage of digital certificates, cryptographic keys, and hashed passwords.

169
Q

HSM

A

A hardware security module (HSM) is a secure USB key or thumb drive used to store cryptographic material.

170
Q

Secure boot

A

Secure boot is a unified extensible firmware interface (UEFI) feature designed to prevent a computer from being hijacked by malware. Under secure boot, the computer firmware configuration has cryptographic keys that can identify trusted code.

171
Q

Boot options

A

Boot options define how the system firmware searches devices for a boot manager. It is one of the most important parameters in a system setup.

172
Q

A network technician installs wireless access points (APs) in an office and would like to use power over Ethernet (PoE) to power the APs. The current network infrastructure is not capable of doing this. What would the network technician need to install to augment the power requirements for PoE APs?

A

If a switch does not support PoE, a network technician can use a (power injector). One port on the injector connects to the switch port. The other port connects to the device.

173
Q

Firewall

A

Firewalls have rules that list source and destination network addresses, protocol types, and whether to allow or block traffic matching the rule. This would not provide power to connected devices.

174
Q

Managed switch

A

Managed switches have internal software for more advanced functionality. Though managed switches can provide power, this scenario points out that it is not available.

175
Q

Patch panel

A

In most types of office cabling, the computer connects to a wall port and via cabling running through the walls to a patch panel. Patch panels do not provide inline power to connected devices.

176
Q

Users reported an incident where they could not connect to network shares on a specific file server but could utilize all other resources and the internet. After logging into the server locally to check, it seems to be up and connected to the network. There is no response after going to a user’s station and using the ping command to contact the server by the documented IP address. What should be the issue to investigate next?

A

If the server locally appears online and connected, it has an address, but likely one provisioned from DHCP if workstations cannot ping the server by the documented IP address.(Check the server’s IP address. It may have a DHCP-provisioned address instead of a static address.)

177
Q

Check to see if the user workstation has been given an APIPA address.

A

The user workstation would not likely reach all other resources if it had an APIPA address.

178
Q

Check the user’s default gateway to ensure it can communicate to remote networks.

A

If the user station can connect to other resources, especially the internet, there is likely no issue with the gateway.

179
Q

Ensure the server has a Class A IPv4 address.

A

It may not be a Class A address, depending on the type of network structure. A technician can also use class B and C addresses for private addressing.

180
Q

The IP address range 172.16.0.0 to 172.31.255.255 is not routable on the Internet. Which class of private addresses is this considered?

A

172.16.0.0 to 172.31.255.255 is a Class B private address range with a default subnet mask of 255.255.0.0 and is for networks with 256 to 65,534 hosts.

181
Q

Class A

A

10.0.0.0 to 10.255.255.255 is a Class A private address range with a default subnet mask of 255.0.0.0 and networks with more than 65,536 hosts.

182
Q

Class C

A

192.168.0.0 to 192.168.255.255 is considered a Class C private address range with a default subnet mask of 255.255.255.0 and is for smaller networks with fewer than 254 hosts.

183
Q

Class D

A

The address classes (A, B, and C) derive from the earliest form of Internet Protocol (IP). Class D networks are for multicasting.

184
Q

A technician needs to add a more secure and reliable additional memory space that assigns memory locations to process in 4 kilobytes chunks called pages. What can the technician use?

A

Virtual RAM, also known as virtual memory, is not just used to supplement RAM with swap space.

185
Q

Rootkit

A

A rootkit is a malware that can use an exploit to escalate privileges.

186
Q

Single-channel

A

Single-channel memory means that there is one 64-bit data bus between the CPU, memory controller, and RAM devices.

187
Q

Dual-channel

A

Dual-channel memory controllers effectively have two 64-bit pathways through the bus to the CPU, meaning that they can send 128 bits of data per transfer rather than 64 bits. This feature requires support from the CPU, memory controller, and motherboard but not RAM devices.

188
Q

A user had lost several mobile devices in the past. Each device had a basic password which put company data at risk. The user has a new phone and uses which method of increased security to log in?

A

Two-factor or multifactor authentication means that the user must submit at least two different kinds of credentials. This would be used to authenticate access to a system with a higher level of security than a single method.

189
Q

Corporate application

A

Corporate applications refer to applications running on the device. This does not pertain to gaining access to the device.

190
Q

Device pairing

A

To connect a peripheral device via Bluetooth, the Bluetooth radio on each device must be put into discoverable mode, which is also known as pairing mode. This would not increase security.

191
Q

Location services

A

Using location services is not related to being connected to a cellular network. Location services use Wi-Fi and GPS to determine a device’s location.

192
Q

Microsoft Word crashes every time it opens, but otherwise, the computer runs fine. What is a reasonable proposed solution?

A

Application crashes are difficult to diagnose, but if only a single program continues to crash, it is likely a corrupted program problem. The simplest fix would be to uninstall and then reinstall the program.

193
Q

Replace the PSU.

A

A faulty power supply unit (PSU) would result in the entire computer having problems, not just a single program.

194
Q

Dust the fan.

A

Dust buildup can cause overheating in a fan system, but overheating would affect the whole computer, not just one program.

195
Q

Replace the RAM.

A

Replacing the random access memory (RAM) would solve a memory problem, but since only one program has issues, it is likely a corrupted program.

196
Q

This protocol facilitates requests for an IP address and other network settings and uses ports 67 & 68.

A

Dynamic Host Configuration Protocol (DHCP) utilizes two ports. DHCP clients use UDP port 68 to request an IP address configuration from a server. The server responds using UDP port 67 to provide clients with an IP address configuration.

197
Q

Domain Name System

A

Domain Name System (DNS) facilitates identification of hosts by name alongside IP addressing and utilized over UDP traditionally or TCP port 53 in specific circumstances.

198
Q

Network Basic Input/Output System

A

Network Basic Input/Output System (NetBIOS) supports legacy Windows versions’ networking features that include name service for name registration and resolution, similar to DNS today. It utilizes UDP and TCP ports 137-139.

199
Q

Lightweight Directory Access Protocol

A

Lightweight Directory Access Protocol (LDAP) queries information about network users and resources. Third-party applications can use this to query Active Directory. LDAP uses TCP port 389.

200
Q

After running a Self-Monitoring, Analysis, and Reporting Technology (SMART) diagnosis on a computer, with extended read/write times, the input/output per second (IOPS) matches the vendor’s baseline. What could be the problem?

A

The Self-Monitoring, Analysis, and Reporting Technology (SMART) diagnosis measures the input/output per second (IOPS) on the drive. If this matches the vendor baselines, the technician must address other problems. One possible problem is a hard drive nearly at capacity.

201
Q

Disk failure

A

The technician will rule out disk failure since the IOPS matches the vendor baseline. Deviation from this points toward a failing drive.

202
Q

No power

A

The drive is currently having a problem with extended read/write, which indicates that it is getting power.

203
Q

Hard drive unavailable

A

The error message, “Hard drive unavailable,” can occur due to physical or software problems, but the drive is writing slowly, indicating that it is available.

204
Q

How can a technician eliminate overheating as the cause of a sluggish computer?

A

If the temperature is too high, the central processing unit (CPU) and other components are likely to throttle performance to avoid overheating. The technician can verify this by checking temperature sensors and fan speeds.

205
Q

By touching the computer

A

Even if the computer is not hot to the touch, it can still slow the computer down. Just touching the case to check the temperature of the CPU would not rule out temperature problems.

206
Q

By running a speed test

A

A slow computer can sometimes mean a network connection problem, which the technician can verify by running a speed test. This test would be appropriate after checking for temperature problems.

207
Q

By checking for misconfigurations

A

Misconfigurations can cause sluggish performance, but this would not help rule out overheating.

208
Q

Cloud service providers (CSPs) help organizations save time and money by hosting virtual resources on their hardware. What do CSPs use to ensure efficiency while providing services to customers?

A

Shared resources are correct. To meet availability, scalability, and elasticity requirements, cloud providers must be able to provision and de-provision resources automatically through the pooling of shared resources and virtualization.

209
Q

Community cloud

A

Community cloud is incorrect. CSPs provide community clouds to customers using shared resources. A community cloud is a way for organizations to share a private cloud and save money.

210
Q

Public cloud

A

The public cloud is incorrect. CSPs provide public clouds to customers using shared resources. CSP offers public cloud on a subscription or pay-as-you-go basis but comes with security and performance risks.

211
Q

Hybrid cloud

A

Hybrid cloud is incorrect. CSPs provide hybrid clouds to customers using shared resources. Customers using hybrid clouds can use public cloud resources when their private infrastructure is insufficient.

212
Q

A technician builds a computer using the most common form factor measuring 12 x 9.6 inches and has up to seven expansion slots. What form factor is the technician using?

A

An advanced technology extended (ATX) specifies the standard form factor for most desktop PC motherboards.

213
Q

ITX

A

Information technology extended (ITX) has two designs: the mini-ITX and the mobile-ITX. The mini-ITX is 6.7 inches square with one expansion slot. Technicians can mount most mini-ITX boards in ATX cases.

214
Q

SAN

A

A storage area network (SAN) is more flexible and reliable than using local disks on each server machine. It provides access to a configurable group of storage devices that application servers can use.

215
Q

BTX

A

A balanced technology extended (BTX) improves ATX since it has better airflow.

216
Q

A user has a newly issued smartphone that has corporate communication software installed. What can the user expect to sync while using Microsoft Exchange?

A

Most email systems store messages on the server, and the client device is used to manage them. A client device that uses technology such as ActiveSync can store a local copy.

217
Q

Contacts

A

A contact is a record with fields for name, address, email address(es), phone numbers, notes, and more. Contacts are synced with Exchange ActiveSync.

218
Q

Calendar

A

A calendar item is a record with fields for appointment or task information, such as subject, date, location, and participants. Calendars are synced with Exchange ActiveSync.

219
Q

Texts

A

Texts are messages that are sent via cellular service. While there are sync methods available, they are not synced with Exchange.

220
Q

A user complains that a laptop is slow. A technician concludes that the best solution is to remove the current mechanical disk drive with a faster solid-state drive. The technician opts to back up the user data and install a fresh operating system on a new drive. Which approach defines the technician’s steps?

A

A replacement drive approach only has the data backed up from the old drive. The technician then fits the new drive to the laptop and reinstalls all software. Then the technician can restore user data from the backup.

221
Q

Upgrade

A

An upgrade is a general term, and with software, an upgrade occurs between software versions. With hardware, newer hardware replaces older hardware. While a hardware upgrade occurs in the scenario, it does not define the technician’s steps.

222
Q

Migration

A

Migration means using backup software to create an image of the old drive and storing it on a USB or other type of media.

222
Q

Clone

A

Cloning a disk is similar to migration in that it makes a copy of an entire drive to another storage device.

223
Q

A user needs to change the direction of the viewing of a page. What tab would the user need to click on to change the page view from portrait to landscape?

A

Orientation is one of the default jobs options set in the preferences dialog.

224
Q

Quality

A

The quality tab allows users to choose the type of paper stock (size and type) and whether to use an economy or draft mode to preserve ink/toner.

225
Q

Finishing

A

The finishing tab allows users to select the output options such as whether to print on both sides of the paper (duplex), print multiple images per sheet, and print in portrait or landscape orientation.

226
Q

PDL

A

Page description language (PDL) creates a raster file from the print commands sent by the software application.

227
Q

A technician is working on a blank computer monitor problem. The monitor power cord is plugged in and receiving power. What is the next step to check?

A

A systematic approach to troubleshooting helps save time and effort. After verifying that the monitor is getting power, checking that the monitor connects to the computer is the next logical step.

228
Q

Check the PSU.

A

The power supply unit (PSU) is a component on the computer that can cause intermittent issues if it is failing. There is no indication that the PSU is the problem here.

229
Q

Check monitor input settings.

A

Incorrect monitor input settings can cause a blank screen but the technician should follow the step verifying that the monitor connects to the computer first.

230
Q

Check for physical damage.

A

Physical damage to a computer can cause problems, but there is no indication that this could be the problem and is not a logical next step.

231
Q

A printer allows connection to a network through the infrastructure mode. Which of the following connections is the printer most likely using when referring to an infrastructure mode connection?

A

Wireless has two interfaces, Bluetooth and Wi-Fi. Bluetooth allows access by using the print device control panel to make it discoverable Then, the Bluetooth page adds the device.

232
Q

USB

A

USB connects the device plug to the printer’s USB port and the host plug to a free port on the computer.

233
Q

Ethernet

A

An engineer can configure Ethernet to obtain an Internet Protocol (IP) configuration from a Dynamic Host Configuration Protocol (DHCP) server or they can manually configure this.

234
Q

Duplex Unit

A

Engineers use duplex units for double-sided printing and a finisher unit for folding, stapling, and hole punching.

235
Q

A user decides to take a coffee break so the cleaning crew can do their job. After returning, the computer has power but no internet. What is a possible cause?

A

When gathering the initial information, asking about recent changes can narrow down the problem. For example, the internet was working, but after the cleaners left, it was not working, which narrowed the problem down significantly. Vacuums or brooms can easily unplug Ethernet cords.

236
Q

The latest OS update corrupted their Ethernet adapter.

A

Although operating system updates can cause problems, there was no indication that an operating system update occurred during a coffee break.

237
Q

The whole building has lost internet.

A

If the whole building had lost internet services, there would be more complaints from users. An issue with the internet is unlikely to be the problem.

238
Q

Unclear, escalate to a supervisor.

A

Although escalating to a supervisor is a valid resolution method, the technician must first perform basic troubleshooting steps.

239
Q

What universal serial bus (USB) does a technician use that allows a device to send and receive simultaneously?

A

USB 3.0 is a new type of connector form factor and has upgraded transfer rates which are full-duplex.

240
Q

USB 2.0

A

USB 2.0 is a high-speed standard that specifies a data rate of 480 Mbps shared between all devices attached to the same host controller. The USB 2.0 is half-duplex, which means that each device can send or receive, but not simultaneously.

241
Q

USB Type B

A

USB 2 Type B connects to large devices. The connector and port are square, with a beveled top.

242
Q

USB Type A

A

USB 2 Type A connects to the host and some types of peripheral devices. The connector and port are flat rectangle-shaped. A technician should insert the connector with the USB symbol facing up.

243
Q

A computer has intermittent problems and is making grinding and clicking noises. What is the likely problem?

A

A hard disk drive (HDD) has moving platters and arms that can start to fail due to mechanical problems. The mechanical problems can result in grinding or clicking noises.

244
Q

Overheating

A

System diagnostics would diagnose an overheating computer, or more commonly by the computer becoming hot to the touch.

245
Q

No power

A

The power must be on for the computer to make grinding and clicking noises. If there is no power, the disk cannot move.

246
Q

Corrupted boot sector

A

A corrupted boot sector would keep the computer from booting at all. After using power-on self-test (POST), an error message stating, “Boot device not found,” would appear.

247
Q

A technician receives a ticket on a proprietary internal system. What would be the best place to start researching possible solutions?

A

Colleagues, or an internal ticketing system, will give the most relevant information to specific systems and sets of problems that users have. Well-documented internal tickets will generally contain solutions to the most common problems.

248
Q

Search through textbooks.

A

A textbook is generally outdated for specific technology solutions and would not contain information about a proprietary system.

249
Q

Ask a supervisor.

A

A supervisor is a useful resource but should not be the first person to ask. The technician should complete documentation of all attempts at solutions and searches before escalating tickets.

250
Q

Search the internet.

A

Searching the web is a great research step, but the technician should perform it after first checking if any internal documentation is available.

251
Q

A government organization wants to develop their own application to process information, but they do not want to be responsible for maintaining the hardware or the database platform that the application runs on. Additionally, the organization does not want to be burdened with maintaining the integrity and availability of the database platform because they will be very busy with other responsibilities. Which service would be best for the government organization to pursue?

A

Platform as a service (PaaS) is correct. PaaS would provide IT hardware and the database platform on top of the hardware, but the customer must develop their app to run on top of the platform. The service provider will maintain the integrity and the availability of the platform for the customer.

252
Q

Infrastructure as a service (IaaS)

A

Infrastructure as a service (IaaS) is incorrect because it will only provide IT hardware management for the customer.

253
Q

Community cloud

A

Software as a service (SaaS) is incorrect because the organization will be developing its application.

254
Q

Shared resources

A

Shared resources are not a service that can be purchased. Service providers can provide services using shared resources to lower the cost to the customer.

255
Q

A user’s phone is not charging. After testing with several known good charging cables, the technician realizes that holding the connection forcefully will start charging the phone. What is the likely problem?

A

A physically damaged charging port can result in a connector being too loose. The technician was able to force the phone to start charging by pushing the cable into the port and holding it. The damaged port should be replaced by the manufacturer.

256
Q

Digitizer issue

A

A digitizer issue on a mobile phone presents itself by the touch screen not working or not working properly.

257
Q

Liquid damage

A

Liquid damage can result in visible signs of water under the screen, graphics artifacts, or no image at all.

258
Q

Faulty charging circuit

A

A faulty charging circuit can result in a swollen battery. The swollen battery is identified by a bulging of the phone so it no longer lays flat.

259
Q

A technician uses a storage device containing non-volatile flash memory to replace the hard drive since the speed is much greater. What is this called?

A

A solid-state drive (SSD) uses flash memory technology to implement persistent mass storage. Flash memory performs much better than the mechanical components used in hard drives. Devices are produced in a standard width of 2.5 inches.

260
Q

mSATA

A

A mini-serial ATA (mSATA) allows a technician to plug an SSD packaged as an adapter card into the motherboard’s combined data and power port.

261
Q

NVMe

A

NVMe (NVM express) can be packaged for installation to a PCIe slot as an expansion card or an M.2 slot.

262
Q

M.2

A

The M.2 adapter card form factor is considerably smaller than a PCIe adapter and is oriented horizontally rather than vertically, so the interface is often used on laptops and PC motherboards.

263
Q

A company is building a new office space and data center. They would like network segmentation to ensure that only certain servers and workstations can access sensitive data. What type of devices will be the foundation of that type of network?

A

Managed switches have internal software that configures security settings and chooses options for the switch’s more advanced functionality, such as VLANs, to enable the segment of network devices and traffic.

264
Q

Unmanaged switches

A

Unmanaged switches perform their functions without requiring configuration. It would power on, connect to some hosts, and establish Ethernet connectivity between the network interfaces without intervention.

265
Q

Ethernet hubs

A

Ethernet hubs are legacy network hardware devices that provide multiple connections to computers in a small area and are inefficient at network management.

266
Q

Firewalls

A

Firewalls have rules that list source and destination network addresses, protocol types, and whether to allow or block traffic matching the rule. Although this scenario’s potential to eventually implement this exists, it would not be the foundation for the desired segmentation.

267
Q

A tier one helpdesk technician receives a corporate cellphone with a broken screen. What is the first step?

A

Mobile devices are easy to drop, and screens can crack or shatter. This is likely to require warranty or professional services to repair it.

268
Q

Replace the screen.

A

If there are no visible cracks, the screen or digitizer may have been damaged by liquid. But the screen is visibly cracked in this question.

269
Q

Open the phone to check for liquid damage.

A

Mobile devices are likely to require warranty or professional services to replace parts, such as a broken screen. Replacing parts outside the warranty can void the contract.

270
Q

Replace the charging cable.

A

If a cellphone is having trouble charging, then replacing the charging cable can help isolate the problem. There is no indication of a charging problem in the scenario.

271
Q

What characteristics of Wi-Fi 6 (802.11ax) allow for increased bandwidth and support for modern networks? (Select all that apply.)

A
  1. Wi-Fi 6 works in both the 2.4 GHz and 5 GHz bands. There is emerging development for operation over the 6 GHz band as well (Wi-Fi 6e).
  2. Wi-Fi 6 also adds support for uplink multi-user, multiple input, multiple output (MU-MIMO) along with downlink MU-MIMO. This allows MU-MIMO-capable clients to send data to the access point simultaneously.
  3. Orthogonal frequency division multiple access (OFDMA) can work alongside MU-MIMO to improve client density—sustaining high data rates when more stations connect to the same access point.
272
Q

Typically supports up to four simultaneous clients

A

Wi-Fi 5 supports up to four simultaneous clients over 5 GHz only, and Wi-Fi 6 can support up to eight clients, giving it better performance in congested areas.

273
Q

A customer builds a new facility that they will mainly use to provide services for physically disabled residents. They would like to accommodate as much as possible so that residents can be more independent. What type of technology, if appropriately secured, would be a great solution to accomplish this goal?

A

The Internet of Things (IoT) endpoints implement the function of a smart lightbulb, refrigerator, thermostat/heating control, or doorbell/video entry phone that a user can operate and monitor remotely. Configured with the appropriate hub/control solution, this would be a proper solution.

274
Q

SCADA

A

A supervisory control and data acquisition (SCADA) system typically runs as software gathering data from and managing plant devices and equipment with embedded PLCs, referred to as field devices.

275
Q

Exchange servers

A

Exchange servers are mail servers that facilitate sending and receiving mail messages and also manage user mailboxes.

276
Q

Syslog server

A

Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de-facto standard for logging events from distributed systems.

277
Q

Which mechanism has performance ratings of 5,400 rpm, 7,200 rpm, 10,000 rpm, and 15,000 rpm?

A

A hard disk drive (HDD) stores data on metal or glass platters coated with a magnetic substance. The top and bottom of each platter are accessed by its own read/write head, moved by an actuator mechanism.

278
Q

RAID

A

A redundant array of independent disks (RAID) is an array that appears as a single storage resource or volume and can be partitioned and formatted like any other drive.

279
Q

mSATA

A

A mini-serial ATA (mSATA) allows a technician to plug an SSD packaged as an adapter card into the motherboard’s combined data and power port.

280
Q

SSD

A

A solid-state drive (SSD) uses flash memory technology to implement persistent mass storage. Flash memory performs much better than the mechanical components used in hard drives.

281
Q

An online retailer uses the cloud to host its infrastructure because the cloud provider guarantees 99.999% service uptime. What benefit of using the cloud has the online retailer been guaranteed?

A

High availability means that the service experiences very little downtime. Downtime can occur because of scheduled maintenance and unexpected outages.

282
Q

Rapid elasticity

A

Rapid elasticity refers to the system’s ability to handle changes to demand in real-time without loss of service or performance. Rapid elasticity allows a system to reduce costs when demand is low.

283
Q

Metered utilization

A

Metered utilization is the per-use billing for resources consumed by the cloud, making cloud offerings cheaper or more expensive for an organization, depending on their resource consumption.

284
Q

Shared resources

A

Shared resources are incorrect. To meet availability, scalability, and elasticity requirements, cloud providers must be able to provision and de-provision resources automatically through the pooling of shared resources and virtualization.

285
Q

A basic firewall configuration has rules, referred to as network access control lists (ACLs). What are the basic properties needed for a firewall ACL to implement the desired security features configured? (Select all that apply.)

A
  1. The ACL requires source and destination network or device for the firewall to know what networks and devices are allowed to communicate with each other.
  2. A protocol needs to be defined in an ACL to narrow the scope of network traffic managed by the ACL.
  3. The network technician can set the ACL to either allow or block specific protocols and traffic between various sources and destination networks and devices.
286
Q

MAC address

A

Firewalls typically manage network traffic at a different layer in the Open Systems Interconnection (OSI) model, and MAC addresses are usually not found in traditional firewall ACLs.

287
Q

One of two monitors remains a blank screen after a user logs onto the system. The technician suspected an unplugged monitor, but it was connected. What is the next step in troubleshooting?

A

After the first theory does not work, establish a new probable cause of the problem. Start with basic information, including verifying that the monitor is receiving power.

288
Q

Escalate the problem.

A

Escalating the problem to a supervisor is a valid route, but not in this case. The technician has not exhausted all reasonable troubleshooting options.

289
Q

Identify the problem.

A

The problem is that the second monitor has a blank screen, which the technician has already identified. Identifying the problem is the first troubleshooting step.

290
Q

Document the changes.

A

Documenting the changes is the last step in the troubleshooting methodology, including a verified working solution.

291
Q

What channel system requires support from the CPU, memory controller, and motherboard but not from the RAM devices?

A

Dual-channel memory controllers effectively have two 64-bit pathways through the bus to the CPU, meaning that they can send 128 bits of data per transfer rather than 64 bi

292
Q

Single-channel

A

Single-channel memory means that there is one 64-bit data bus between the CPU, memory controller, and RAM devices.

293
Q

Triple-channel

A

Technicians can use triple-channel or quad-channel memory controllers in some CPUs and supporting chipsets. If the technician does not install the full complement of modules, the system will revert to as many channels as are populated.

294
Q

ECC RAM

A

Technicians use error correction code (ECC) RAM for workstations and servers that require high reliability.

295
Q

A video gamer is using a product designed to record footage from computer games. What is this called?

A

Capture cards record video input and save it as a movie or streaming media file. Some work with PC games, while others record from a game console or live camera high-definition multimedia interface (HDMI) sources, such as a camcorder or security camera.

296
Q

Video card

A

Video cards generate the signal to drive a monitor or projector. Low-end graphics adapters are likely to be included with the motherboard chipset or as part of the CPU itself.

297
Q

Sound card

A

A sound card records input from a microphone. Audio playback occurs via speakers or headphones connected to sound cards.

298
Q

NIC

A

The network interface card (NIC) hardware component on a computer provides a network connection.

299
Q

A systems engineer is building a virtual machine to run a service with 8 dual-core CPUs and 500 GB of random access memory to function properly. Where would these two hardware requirements be listed?

A

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

300
Q

Security requirements

A

Security requirements are incorrect because the amount of central processing units (CPUs) and random access memory (RAM) a system needs will not impact the security of a system.

301
Q

Legacy software/OS

A

Legacy software/OS is incorrect because a list of legacy software and OSs would not encompass hardware like CPU and RAM.

302
Q

Test development

A

Test development often uses virtual desktop platforms based on some guest OS hypervisor.

303
Q

This protocol makes a secure connection to the graphical interface of another computer and uses TCP port 3389.

A

Remote Desktop Protocol (RDP) makes a secure connection to the graphical desktop of a remote computer and uses TCP port 3389.

304
Q

Simple Network Management Protocol

A

Simple Network Management Protocol (SNMP) queries status information from network devices and uses UDP port 161. SNMP traps information sent to a management server utilizing UDP port 162.

305
Q

Server Message Block

A

Server Message Block (SMB) is the application protocol underpinning file and printer sharing on Windows networks. SMB usually runs directly over TCP port 445.

306
Q

Trivial File Transfer Protocol

A

Trivial File Transfer Protocol (TFTP) is a simplified form of FTP supporting only file copying and uses UDP port 69.

307
Q

A computer monitor’s display is so dim it is almost invisible. What is the likely problem?

A

If a display’s image is so dim that it is almost invisible, the backlight has probably failed. The technician will need to replace the backlight or get it repaired under warranty.

308
Q

Incorrect resolution

A

The image will appear fuzzy if the output resolution does not match the display device’s native resolution. This fuzzy resolution typically happens if the video card’s driver is faulty or incorrectly configured.

309
Q

Dead pixels

A

Dead pixels occur when individual pixels stay black. A technician generally cannot fix dead pixels.

310
Q

Incorrect cables

A

Incorrect cables can cause many problems, from flickering screens to audio problems. However, in this case, it is unlikely to be the problem.

311
Q

The technician can hear the computer’s fan spinning, but no output displays on the laptop. What would be the first troubleshooting technique?

A

The fan spinning indicates that the device is getting power. The blank screen could indicate a faulty screen, or the computer could not initiate a power-on self-test (POST). Connecting an external monitor will indicate which direction to go.

312
Q

Replace the CPU chip with a known good one.

A

Replacing the central processing unit (CPU) chip is premature if the technician has not ruled out a faulty screen.

313
Q

Open the laptop and check all cabling.

A

If a user has not recently performed on the laptop, then internal cable problems are unlikely to be a problem.

314
Q

Replace the battery.

A

The spinning fan indicates the computer is getting power, so the battery is not the most likely problem.

315
Q

A technician needs a connector that offers high-speed standards that specify a data rate of 480 Mbps shared between the devices attached to the same host controller. What connector should the technician use?

A

USB 2.0 is half-duplex, which means that each device can send or receive, but not simultaneously.

316
Q

USB 3.0

A

USB 3.0 has new versions of Type A, Type B, and Type B Micro connectors with additional signaling and wires. This allows a device to send and receive simultaneously.

317
Q

Lightning port

A

The Lightning port is found only on Apple’s mobile devices. The Lightning connector is reversible. The user needs a suitable adapter cable to connect such a device as a Lightning-to-USB A or Lightning-to-USB C.

318
Q

HDMI

A

A high-definition multimedia interface (HDMI) can rate as either standard or high speed. It provides high resolutions, such as 4K and 8K, and gaming features, such as the ability to vary the monitor refresh rate to match the frame rate of the video source.

319
Q

A company has found that specific departments are more productive when working from home as remote workers. The company would like to implement this ability and has reached out to a network security firm. What foundational infrastructure solution should the company implement to allow remote workers to access all the needed resources from their laptops at home?

A

A virtual private network (VPN) enables hosts to connect to the LAN without being physically installed at the site. This would be the first foundational step to implement in the given scenario.

320
Q

Virtual LAN

A

A virtual LAN (VLAN) is a logical network segment using a feature of managed switches to segregate network traffic. Though the company may use this as a layer of security, it would not be foundational.

321
Q

Mail exchange records

A

A mail exchange (MX) record identifies an email server for the domain so that other servers can send messages to it.

322
Q

DNS (AAAA) records

A

In the Domain Name System (DNS), an AAAA record resolves a host name to an IPv6 address. This would not help with granting remote workers access to resources.

323
Q

This part of an IP address configuration allows a host to communicate with a remote network, most notably the internet. Otherwise, the host will only communicate with the local network without this.

A

The default gateway is the IPv4 router address, such as 192.168.0.1. This setting is not compulsory, but failure to enter a gateway would limit the host to only communicate on the local network.

324
Q

DNS address

A

DNS addresses provide resolution of host and domain names to their IP addresses and are essential for locating resources on the internet.

325
Q

Static address

A

Using static addressing requires an administrator to visit each computer to enter the configuration information for that host manually.

326
Q

APIPA address

A

When a host uses an APIPA address, it can communicate with other hosts on the same network using APIPA. Still, it cannot reach other networks or communicate with hosts who have obtained a valid DHCP lease.

327
Q

While diagnosing a computer that is not powering on, the technician has established that the wall socket is working correctly since there is a fully plugged power cord. What would be a reasonable next step?

A

After the troubleshooting steps listed, the next reasonable step would be to replace the power cord with a known good cord. If there is a problem with the cord, and the computer boots with a known good cord, then that was the issue.

328
Q

Disconnect the plug-in graphics card.

A

After checking the power cord, disconnect any extra devices. For example, the power supply unit (PSU) might be underpowered for the external device.

329
Q

Plug in a known working monitor.

A

For diagnosing blank screen problems, plug in a known good external monitor. However, it is not appropriate when the computer is not getting power.

330
Q

Check the system configurations.

A

Checking system configurations can help diagnose application crashes or intermittent restarts, but it is not possible if the computer is not getting power.

331
Q

How can a technician diagnose capacitor swelling?

A

Capacitors are barrel-like components that regulate the flow of electricity to system chips. Swollen, bulging, or emitting any residue indicates damaged or failed capacitors. The only sure way to diagnose this is visual.

332
Q

Computer that is hot to the touch

A

A computer that is hot to the touch can indicate overheating, not capacitor swelling.

333
Q

Slow computer

A

A sluggish computer can result from many different problems and is not a diagnostic indicator of capacitor swelling.

334
Q

System diagnostics

A

System diagnostics can help diagnose software and some hardware problems, and it can also point towards capacitor swelling. However, a physical inspection will still be necessary.

335
Q

A remote connection for users to access a company’s private network requires access from an external IP. How might a laptop user test this connection if they are currently connected to the company’s internal network?

A

A smartphone or tablet can be configured as a personal (hotspot) to share its cellular data connection with other computer devices. This approach can be used to simulate being on an external network.

336
Q

Enable pairing.

A

To connect a peripheral device via Bluetooth, the Bluetooth radio on each device must be put into discoverable mode, which is also known as pairing mode.

337
Q

Use the correct PIN.

A

When using Bluetooth, the pairing system should automatically generate a passkey or PIN code when a connection request is received by a peripheral device.

338
Q

Update the PRL.

A

Information that a cellular radio needs to connect to a network is provided as a preferred roaming list (PRL). Updating the PRL will update the list.

339
Q

While trying to diagnose an intermittent shutdown problem, a technician watches while the user reproduces the error. Before the computer shuts down, it gives the BSOD. How is this helpful in diagnosing the problem?

A

The blue screen of death (BSOD) is Windows proprietary crash screen. BSOD contains an (error code) and a QR code to the memory dump. A technician can search error codes online for more information.

340
Q

BSOD indicates power supply unit (PSU) needs replacing.

A

A faulty power supply unit (PSU) can cause intermittent restarts, but the BSOD does not necessarily indicate that the power supply is the problem.

341
Q

BSOD means that memory needs replacing.

A

Memory problems can cause intermittent restarts, but the BSOD does not necessarily mean a memory problem.

342
Q

BSOD shows software corruption.

A

Software corruption can cause intermittent restarts, but a BSOD does not necessarily mean it is software corruption. The error code on the BSOD will give further information.

343
Q

A network administrator is looking at a user’s box which seems to have intermittent connectivity issues. Which of the following should they do first?

A

The first step in resolving a no or intermittent connectivity issue is to check that the patch cords are properly terminated and connected to the network ports.

344
Q

Check nominal link speed.

A

If a user reports slow speed, establish that there is a link speed problem by checking the nominal link speed and using a utility to measure transfer rate independent of specific apps or network services.

345
Q

Analyze network congestion.

A

Jitter is typically caused by network congestion affecting packet processing on routers and switches.

346
Q

See if it received a DHCP lease.

A

In Windows, a limited connectivity message specifically means that the host can establish a physical connection to the network but has not received a lease for an IP configuration from a Dynamic Host Configuration Protocol (DHCP) server.

347
Q

The 802.11n standard was introduced as an improvement over 802.11a/b/g standards. What characteristics of the 802.11n standard show improved connectivity and performance? (Select all that apply.)

A
  1. 802.11n can work over both 2.4 GHz and 5 GHz. A technician can implement each band by a separate radio.
  2. Introduced with 802.11n is increased reliability and bandwidth by multiplexing signal streams from 2–3 separate antennas. This technology is known as multiple input multiple outputs (MIMO).
  3. The nominal data rate for 802.11n is 72 Mbps per stream or 150 Mbps per stream for a 40 MHz bonded channel, and 802.11n access points market using Nxxx designations, where xxx is the nominal bandwidth.
348
Q

It can work only over the 5 GHz band. (TorF)

A

802.11n works over both the 2.4 GHz and 5 GHz bands. 802.11n is also known as Wi-Fi 4.

349
Q

What issue does constant indicator LED activity imply?

A

Constantly on light-emitting diode (LED) indicator lights imply disk thrashing. Disk thrashing occurs when there is not enough system random access memory (RAM), so the system continually uses the disk for paging (virtual memory). It could also signify a faulty software process or that malware has infected the system.

350
Q

Faulty boot sector

A

A faulty boot sector would display the error message, “Bootable device not found,” instead of constantly on LED indicator lights.

351
Q

Connector fault

A

If the device does not boot at all, a physical connection in the computer could be faulty.

352
Q

Mechanical problem

A

Loud clicking or grinding noises as the drive is operating indicate mechanical problems with the drive. Therefore, the technician should replace the hard disk drive (HDD) as soon as possible.

353
Q

A penetration tester must infiltrate a company’s facility to capture all the network traffic from a particular set of PCs over a physical network cable. The tester can only access the intermediate distribution frame (IDF) closets into which all devices are patched. What tool can the tester utilize to accomplish their goal?

A

A network tap intercepts the signals passing over a cable and sends them to a packet or protocol analyzer. Taps are either powered or unpowered. There are passive and active capture types.

354
Q

Wi-Fi analyzer

A

A Wi-Fi analyzer records statistics for the access point (AP) that the client is currently associated with and detects any other access points in the vicinity.

355
Q

Toner probe

A

A toner probe detects the signal and follows the cable over ceilings and through ducts, or identifies it from the rest of the bundle.

356
Q

Cable tester

A

A basic cable tester is a pair of devices attached to each cable end. It tests a patch cord or wall ports and panel patch ports connected via patch cords to test the permanent link.

357
Q

A user calls to report that they cannot connect to the internet and various other internal resources from their laptop. After a technician asks them what IP address their Windows laptop has, they report it has an address of 169.254.0.115. What problem is the user’s laptop having?

A

Automatic private IP addressing (APIPA) is a mechanism for Windows hosts to obtain an address automatically that (cannot contact a DHCP server) to revert to using an address from the range 169.254.x.y. This is also called a link-local address.

358
Q

The laptop has a misconfigured static IP address.

A

Using static addressing requires an administrator to visit each computer to enter the configuration information for that host manually. This IP would likely not be statically assigned.

359
Q

The laptop has a Class A private address.

A

10.0.0.0 to 10.255.255.255 is a Class A private address range.

360
Q

The laptop has a misconfigured default gateway address.

A

The default gateway parameter is the IPv4 address of a router. If the laptop cannot contact a DHCP server, it will not get a default gateway at all.

361
Q

What symptom only points to a mechanical fault?

A

A hard disk drive (HDD) has moving pieces that generally make a low-level sound when accessed. A loud or grinding noise, or any clicking sound, is a sign of a mechanical problem.

362
Q

Bootable device not found

A

The error message, “Bootable device not found” could indicate a physical problem, but it is just as likely to be a corrupted boot disk sector (software problem).

363
Q

Read/write failure

A

Bad sectors in an HDD typically cause read/write failures when trying to open or save a file. Power failures or mechanical faults can cause read/write failures.

364
Q

No LED status lights

A

No light-emitting diode (LED) status indicators can mean the whole system is not receiving power or an individual disk unit is faulty.

365
Q

When a user downloads a Microsoft Store application, where does the application run to prevent the app from making system-wide changes and prevent a faulty store app from “crashing” the entire OS?

A

A sandbox is an isolated environment where Microsoft Store apps run to prevent the app from making system-wide changes and prevent a faulty store app from “crashing” the entire OS.

366
Q

Test development

A

Test development often uses virtual desktop platforms based on some sort of guest OS hypervisor.

367
Q

Cross-platform virtualization

A

Cross-platform utilization tests software applications under different OSs and resource constraints and is important to ensure the application is compatible across several different environments.

368
Q

Resource requirements

A

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

369
Q

A technician works on a faulty unit and needs to remove and replace a power supply unit (PSU) without opening the case and without the server losing power. What is this configuration?

A

A redundant power supply requires a compatible motherboard. This configuration is more common in server systems than on desktop PCs. Typically, each PSU plugs into a backplane on a server and is hot-swappable.

370
Q

Modular power supply

A

A modular power supply has power connector cables that are detachable from the unit.

371
Q

Liquid-base cooling system

A

A liquid-based cooling system refers to a system of pumping water around the chassis. Water is a more effective coolant than air convection, and a good pump can run more quietly than numerous fans.

372
Q

Open-loop system

A

An open-loop system will usually need draining, cleaning, and refilling periodically. The fans and radiators need to be kept dust-free. The technician should drain the system prior to moving the PC to a different location.

373
Q

A user wants to mitigate the risk of data loss by using a disk that underpins the mass storage system and provides fault tolerance. What can the user use?

A

A redundant array of independent disks (RAID) is an array that appears as a single storage resource or volume and can be partitioned and formatted like any other drive. RAID has a basic level numbered from 0 to 6. There are also nested RAID solutions, like RAID 10.

374
Q

NVMe

A

NVMe (NVM express) can be packaged for installation to a PCIe slot as an expansion card or an M.2 slot.

375
Q

SSD

A

A solid-state drive (SSD) uses flash memory technology to implement persistent mass storage. Flash memory performs much better than the mechanical components used in hard drives.

376
Q

mSATA

A

A mini-serial ATA (mSATA) allows a technician to plug an SSD packaged as an adapter card into the motherboard’s combined data and power port.

377
Q

What would cause a central processing unit (CPU) to make only minor changes to the CPU internals that significantly improve performance and increase speed?

A

Multicore is a design that allows each core to communicate with the others, allowing the processing tasks to be divided and assigned properly. The multicore acts as a single unit. This allows for it to be more efficient.

378
Q

Multisocket

A

Multisocket offers multiple sockets and supports two processors for the CPU.

379
Q

Single core

A

Single core CPU has a single execution unit and set of registers implemented on a single package.

380
Q

Multithreading

A

Multithreading is also known as HyperThreading by Intel. A thread is a stream of instructions generated by a software application. This provides multiple threads of execution at once, supported by the operating system.

381
Q
A