CPT 209 Final Review Flashcards
SAS is optimal for use in ___________________ and workstations because it has a more versatile array of connectors and is faster at reading and writing data in a continuous computer session
Standard Homes
Magnetic hard drive read/write heads are controlled by an _____________, which moves the read/write heads across the disk surfaces in unison.
actuator
ATAPI is a legacy standard interface system designed to connect hard drive, CD-ROM drive, ZIP, and large Tape drives.
True
With ______________________, you can connect and disconnect a drive while the system is running.
hot-swapping
What command can be used to make sure that the hard drive does not have bad sectors?
chkdsk
The slower the spindle rotates on a traditional magnetic drive, the better performance it will have.
False
Most current magnetic hard drives use ________ byte sectors.
4096
RAID 5 requires three or more drives and uses _________ checking.
parity
Why might you want to use a RAID 0 disk configuration?
to improve overall disk performance
Besides capacity, SD cards come in three physical sizes and are rated for ____________ in classes.
memory
Which type of RAID volume is used for fault tolerance and only requires two drives?
RAID 1
What two optical disc drive standards allow for rewritable discs?
BD-RE
DVD-RAM
The hard drive firmware, UEFI/BIOS, and the OS address the sectors on a hard drive utilizing what technology?
logical block addressing
If you are adding a hard drive to a system that already has a drive with Windows installed on it, what should you do?
boot Windows and use Disk Management to prepare the new drive
The boot sector that holds an MBR partition table can be repaired.
True
What two optical disc drive standards support writing discs with a total capacity of 8.5GB?
DVD-R DL
DVD+R DL
A _____________________ has no moving parts and is built using nonvolatile memory, which is similar to that used for USB flash drives.
Solid State Drive
Scenario:
This morning when Paul turned on his computer at work, it would not boot.
Instead, Paul reported that he heard a loud clicking noise coming from inside his computer.
What might be the problem with Paul’s computer?
Magnetic hard drive failed
What are current (non-legacy) file systems used with macOS?
APFS
Ext3
Mac OS Extended
Legacy IDE uses what pin counts on it’s ribbon cables?
40
Which type of removable storage media can provide up to 2 TB of storage?
SDXC
The read/write head on a magnetic hard drive is at both the top and bottom of each disk.
True
NVMe interface standard is used only by SSDs.
True
This form factor used to be called SFF-8639 and was targeted almost entirely at server and enterprise markets.
SSD Form Factor
Scenerio:
Keion works as a freelancer creating websites and designing logos for clients.
He recently had a hard drive failure and lost work for a client, and he would like to prevent the same type problem from happening again.
Keion does not want to rely on a backup but would like a way to ensure that his data is safe on his computer.
You recommend that he create a RAID array that will duplicate his work onto two disks.
What RAID configuration should you recommend to Keion?
RAID 1
Scenario:
Devon would like to install a new hard drive on his computer. Because he does not have a SATA port available on his motherboard, he has decided to purchase a NVME SSD hard drive.
How can Devon attach a NVME device to his computer?
PCIe expansion card
U.2 port on the motherboard
M.2 slot on the motherboard
Which rotation speed is not a typical spindle rotation speed for magnetic hard drives?
3200 RPM
A hybrid hard drive uses the flash component as a ____________ to improve drive performance.
buffer
What are four of the factors you should consider when purchasing a hard drive that affect performance, use, and price?
Speed of the spindle, size of cache, drive capacity, and interface standard
Scenario:
Sharon is troubleshooting a computer and wants to test the hard drive in another computer.
Sharon removes the hard drive and notices that it does not have a SATA power connection.
The connector for power is white and has four pins instead.
What type of connector will Sharon need to test the hard drive in the computer she is using?
Molex connector
What two SD standards utilize the FAT file system?
SDHC
SD
What process writes sector markings to a magnetic hard drive?
low-level formatting
RAID is the acronym for redundant array of _______________________ disks
independent
What two different file systems can be used on a Compact Disc (CD)?
UDF
CDFS
The NTFS file system is primarily used by hard drives that run Windows Operating systems.
The acronym NTFS stands for _____________________________________.
New Technology File System
Scenario:
You recently installed a new RAID controller card in a PCIe expansion slot on your computer.
After setting up the controller, you transfer data from the backup you created over to the computer.
When you finish the setup, you turn the computer off and return it to its normal location.
When you turn the computer on, you immediately receive the error message, “RAID not found.”
What might be the problem?
Expansion card failed or became unseated.
If a computer is performing slowly due to file fragmentation, what Windows tool can be utilized to rearrange fragments?
Expansion card failed or became unseated.
Which file system is used by small-capacity USB flash drives and memory cards?
FAT
Scenario:
Terry came into work and turned on his computer.
During the boot process, the computer shut down.
When he tried again, the computer showed the error message, OS not found.
Terry called the help desk and explained the computer issue.
The help desk technician asked Terry to open the computer.
As a help desk technician, what would you have Terry check on his computer with the case cover removed?
SATA cable connection
Data is organized on a magnetic hard drive in _____[a]_____ circles, called tracks. Each track is divided into segments called _____[b]_____.
concentric
sectors
The SATA 3.2 revision allows for PCIe and SATA to work together in a technology called SATA ________________, which uses a new SATA connector.
Express
How many layers of data can exist on a single side of a Blu-ray disc?
4 Layers
The _________________ file system is used by large-capacity removable storage devices such as large-capacity USB flash drives, memory cards, and some external hard drives.
exFat
What are current (non-legacy) file systems used with Linux OS?
Ext2
Ext3
Ext4
A SATA power cable has how many pins?
15 pins
A SATA data cable has how many pins?
7 pins
The SATA drive technology utilizes a serial data path.
True
What technology is used to assure that the logical block addressing on a SSD does not always address the same physical blocks, in order to distribute write operations?
wear leveling
The 2.5” size hard drive is typically used in devices such as laptops.
True
The __________________________ is a small database that holds parameters Windows 7/8/10 needs for a successful boot
Boot Configuration Data
What hard drive technology is used to predict when a drive is likely to fail?
S.M.A.R.T.
In an SSD drive, flash memory is stored on ___________________________________ (EEPROM) chips inside the drive housing.
Electronically erasable programmable read-only memory
You are installing a new hard drive in a system in which the hard drive will run at 6.0Gbps.
What can you use to determine whether the SATA port no which you are connecting the drive will also run at 6.0Gbps?
Motherboard manual.
SSDs are less expensive than magnetic hard drives
False
When installing a SATA hard drive, is it true or false that you need to move the jumpers on the back of the drive to instruct the computer on which hard drive is the bootable drive?
False
What SATA standard provides a transfer rate of 3 Gb/sec?
SATA2
Scenerio:
During routine maintenance on your server, you discover that one of the hard drives on your RAID array is starting to go bad.
After you replace the drive and rebuild the data, you run diagnostics on the RAID controller card with no problems, so you believe you fixed the problem.
The next morning you arrive at work and discover that the RAID has completely failed. None of the disks are working.
Your server is still running because you installed the OS on a non-RAID disk, but all the data is missing, and the server shows that none of your RAID disks are found.
What might be the problem with your server?
RAID controller
Motherboard
What type of RAID is a combination of mirroring and striping?
RAID 10
What command line utility can be used to repair the BCD on a Windows installation?
bootrec
Scenario:
While working on your computer, you receive the POST error, “Drive Not Recognized.”
You check your SATA cable to see if it is the problem, and it tests fine.
You remove the hard drive and test it in a computer system known to be in good working condition and find that the hard drive is working. You can move data and check to make sure the OS files are not corrupt.
You use a power supply tester to see if the voltage for the SATA power connection is correct, and the test shows the power is correct.
You check BIOS to make sure the hard drive can be recognized and find that all settings in BIOS are at default, so the system should recognize the hard drive.
What might be the problem with your hard drive system?
Motherboard SATA port has gone bad.
magnetic drives have larger capacity for the money than solid state drives.
True
The SATA 6 Gb/s standard is also known by what other name?
SATA III
SCSI subsystems need a _________________ resister plugged into the last device on the daisy chain
terminating
Scenario:
Sherri has recently been injured.
She is having a problem using her left hand and would like to use a stylus to move her mouse around the screen on her laptop computer.
What device can Sherri add to her system to allow a non-touch screen laptop to use a stylus to manipulate the screen?
Digitizer
LED stands for: ____________________________________
Light-emitting diode
Scenario:
Bayley wants to connect a new external hard drive to his Windows PC.
He wants the fastest connection type available because he plans to edit video directly to and from the external hard drive.
Which connection type should Bayley use to get the fastest connection possible?
Thunderbolt 3
The ____________ board on a laptop converts DC to AC used to power LCD backlighting
inverter
Scenario:
Henry’s laptop computer was stepped on yesterday, and the touchpad no longer works.
The keyboard works fine.
What can Henry do to use a mouse with his laptop?
He can attach a USB mouse.
Scenario:
David has a laptop that is having a problem with the video system.
You believe the problem might be the backlight.
During your research, you discover that the laptop does not have a backlight.
What type of screen is on David’s new laptop?
OLED
Scenario:
Sarah needs to connect to an interface port on an enterprise switch.
Her laptop does not have the correct port.
When she mentions this to her boss, he tells her that they have several older laptops in a closet and one of them should have a RS-232 connector for the enterprise switch.
What does the connector that Sarah needs look like?
A 9 pin two row D-shaped male connector
OLED does not emit as much light as an LCD monitor does, and, therefore, can produce deeper blacks, provide better contrast, work in darker rooms, and use less power than can an LCD monitor.
True
A barcode reader might use what kind of port?
wireless
USB
serial
keyboard
an outdated wireless technology used to connect personal devices, has been replaced by Bluetooth
infrared (IR)
another term for graphics tablet, which is used to hand draw
digitizer
transmits both digital video and audio, most common type is the Type A 19-pin
HDMI connector
uses a thin LED layer or film between two grids of electrodes
OLED
used to cast a transparent image onto a large screen
projector
the number of times a monitor screen is built or refreshed in one second
refresh rate
used with a graphics tablet and works like a pencil
stylus
the relative difference between light and dark areas on a video screen
contrast ratio
A black screen occurs right after you install a new video card. What might the problem be?
the onboard video is not disabled in BIOS
What DVI port types will work with an HDMI to DVI adapter ?
DVI-I
DVI-D
Scenario:
You are using a new LCD monitor and notice that the icons and images look distorted or elongated.
What video setting can you use to fix this problem?
Resolution
Scenario:
Stephen has an older LCD monitor that he uses for presentations.
Recently, Stephen has noticed that a spot on the monitor that does not change when he shows his presentations.
The spot does not display the colors and stays dark when the screen is white.
What might be the problem with Stephen’s video issue?
Dead pixel.
An eSATA-600 port is capable of attaining what maximum data transfer speed?
6 Gbps
Every installed device requires a device driver to control the device.
True
Scenario:
Nick is working on a new graphic for one of his company’s clients and is having an issue with the color on his screen.
The client wants the graphic to include a very bright red color, but Nick can’t seem to find the right color on his screen.
He seems to have the color perfect on the screen, but when he tries to print the graphic, the color seems to fade.
He has checked the printer, and it works fine.
What will help Nick see on the screen the color that he is printing?
Calibrate the display color.
What should you install in a server room that will save space by allowing you to control multiple servers with a single mouse, keyboard, and monitor?
a KVM switch
which statement is accurate when installing a new device?
a mouse may not require an additional device driver installation
A touchscreen on a laptop can be used as both a mouse and keyboard?
True
Scenario:
Reggie has hired you to design a home network.
The home network will share a printer but will mainly be used to stream movies to two different rooms.
What kind of storage should you recommend to Reggie for this type of network?
Network-attached storage
Scenario:
Jose calls you at the help desk because he is having a problem logging on to his laptop computer.
After several unsuccessful attempts to enter his password, he asks you to reset the password because he must have forgotten it.
You reset his password, and he types it, but again the computer rejects it.
Jose assures you that he typed the correct user name and password.
You ask him what type of computer he is using, and he tells you a laptop.
What might be the problem with Jose’s computer?
Num Lock key is on.
Scenario:
Sandy is replacing her broken laptop LCD screen with a new screen.
During disassembly, she notices two cables that wrap around the screen and connect to the mini-PCIe card inside the laptop.
What will happen if Sandy breaks one of these cables?
She will not be able to connect to Wi-Fi with the laptop.
__________________ uses data packet transmissions similar to those of Ethernet, USB, and PCI Express.
DisplayPort
Scenario:
Heather’s computer display is having a problem in which the desktop seems to be shifting.
What could be causing this problem on Heather’s monitor?
GPU on video card overheating.
Scenario:
You are installing a webcam in the screen bezel of your laptop.
Prior to disassembling the laptop, what other devices in the screen bezel should you be aware of?
WI-FI antenna
Microphone
OLED monitors give less glare than LED monitors.
False
Which of the following describes USB 3.2?
20 Gbps , cable length up to 1 meter
Scenario:
The video on your laptop needs to be updated.
You have researched online, and according to the manufacturer, you can install a new video card in your laptop.
What is the most likely slot connection you will use to install a new video card in your laptop?
Mini PCIe
Scenario:
When Ron turns on his computer, he hears one beep.
However, there is no image on the screen.
The monitor indicator is not on.
What should Ron consider first when he troubleshoots this video issue?
Is the monitor plugged in properly?
What is the distance between adjacent dots on a screen known as?
pixel pitch
Scenario:
Jordan has been asked to help his company find a way to allow all the workers to log on to computers securely but without using a user name and password.
The CIO wants everyone use face recognition software.
What peripheral will be needed on each computer to allow the workers to log on using face recognition software?
Camera or webcam
Which statement regarding the USB standard and USB devices is accurate?
a USB cable has four wires, two for power and two for communication
Scenario:
Henry uses a laptop and has noticed that sometimes when he is typing, the cursor will move, causing him to mistype words or even delete sentences or entire paragraphs.
Henry has tried not to touch the touchpad on his laptop, but the problem still occurs.
What can Henry do to remedy this problem?
He can turn off the touchpad in Windows.
A ________________ device inputs data about a person which might include fingerprints and voice.
biometric
Bad drivers can affect the mouse cursor. A __________ cursor is a trail left behind when you move a cursor.
ghost
What term refers to horizontally torn images on a screen, which occur when the video feed from the video controller gets out of sync with the refresh rate of the monitor?
artifacts
Scenario:
You have been asked to assist a retail company.
It sells clothing and would like to have a Point of Sale computer installed to help with inventory control and to allow customers to check out faster.
What peripheral will you recommend to them to help them keep track of inventory and check customers out faster?
Barcode reader
A _______________ is an input device that uses a monitor or LCD panel as the backdrop for input options.
touch screen
When a static image stays on a monitor for many hours leaving a permanent impression of that image on the monitor, what term is used to describe the condition?
burn-in
What two wireless technologies share a similar radio frequency range?
Bluetooth
802.11b
This type of monitor technology produces an image using large, easily polarized molecules.
LCD Monitor
If a driver update creates a problem, you can __________________ the driver update if the previous drivers were working.
undo
Which type of video port provides a digital-only signal?
DVI-D
Scenario:
Eric has asked you to help him build a new gaming computer so that he can play the newest games available.
He also wants the computer to be VR-compatible.
He has already purchased a high definition sound card, a new multi-core processor, an SSD hard drive, and 16GB of RAM.
What is missing from Eric’s game design build?
Video card
VGA mode includes what two resolutions for troubleshooting monitors?
640 x 480
800 x 600
What icon might you see in Device Manager that indicates a problem with a device?
yellow triangle
Senario:
Damion recently did an update to his computer and added a new video card.
After the update, Damion decided that he would like to play his favorite game.
While he was playing the game, the system locked up.
He restarted the computer and did not have any issues until he tried to play the same game, at which point, the computer locked up again.
What might be the problem with Damion’s computer?
Version of DirectX is out of date.
Game is not compatible with video card.
Video card device drives need to be updated.
When using static IP addressing, software automatically configures the network connection on each device.
False
Scenario:
You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site.
Instead, you receive an error message saying that the address cannot be resolved.
What network setting should you check to see the address of the server being used to resolve this address?
DNS
Cellular devices that use GSM or LTE require a __________________________________________ be installed in the device, which contains the information that identifies your device to the carrier.
subscriber identification module
SIM
Scenario:
A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business.
Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients?
DHCP server
What device handles access to another network for a client computer if it does not have a better option?
default gateway
Scenario:
You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN.
Which of the following features will you configure on the SOHO router to accomplish this task?
Demilitarized zone
If the computer you are using is a laptop that moves from one network to another, what tab from TCP/IPv4 Properties box can be used to configure a secondary configuration, such as a static IP if a DHCP server cannot be reached?
Alternate Configuration
Scenario:
A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices.
However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent.
One of the travelers has an unlimited cellular data plan and a strong consistent signal.
Which of the following methods would most likely be implemented to provide Internet service to the group?
Mobile hotspot
Use ping to test for connectivity or to verify name _______________ is working.
resolution
Internet Protocol version 6 (IPv6) uses a _________ bit address to identify a network connection.
128
An IPV4 address octet can have numbers 0 (zero) to _____.
255
If you are experiencing issues reaching a target destination network, and you need to to display each hop to the destination, what command should you use?
tracert
The acronym Wi-Fi is short for ___________________. It’s technical name is IEEE 802.11
Wireless Fidelity
What command manages user accounts on the local system in Windows?
net user
Which of the following are functions that a SOHO router might perform besides the normal duty of routing packets between networks?
Firewall
Wireless access point
You are tasked with configuring a wireless SOHO router for a customer.
WPA2-PSK, AES
A WLAN covers a large geographical area and is made up of many smaller networks.
False
A ____________________ covers a small area, such as a home, office, or small group of buildings.
local area network
A ____________________ covers a large geographical area and is made up of many smaller networks.
wide area network (WAN)
Using port ______________, when a firewall receives a request for communication from the Internet to a specific computer and port, the request will be allowed and forwarded to that computer on the network.
forwarding
Scenario:
A manager in a small office is asking if it is possible to limit network access to a particular website during business hours.
Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks.
Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?
Implement a blacklist on the firewall and add the site the users are visiting.
Each client and server application installed on a computer listens at a predetermined address that uniquely identifies the application on the computer. This address is a number and is called a __________ number.
port
If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address?
APIPA
T/F: RJ-45 connectors use twisted pair cabling and have eight pins. Copper Ethernet patch cables utilize the RJ-45 connector.
True
Which of the following is true about cable Internet?
you share the cable infrastructure with your neighbors
Scenario:
Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network.
Which Microsoft command-line command should Henry use to check whether he can connect to the server?
ping
What two commands are used to display TCP/IP configuration on Windows and Unix / Linux / Mac OS X operating systems, respectively?
ifconfig
ipconfig
What functions as the name of a wireless network?
SSID
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.
False
The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term?
full duplex
What statement regarding satellite connections is accurate?
It requires line of sight connectivity
Which of the following will use an RJ-11 connector for connectivity?
DSL
A ____________________ covers a large campus or city?
metropolitan area network
Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps?
Fourth-generation cellular
What type of IP address is configured by a server when a device first initiates a connection to the network?
dynamic
What command connects or disconnects a computer from a shared resource or can display information about connections?
net use
What DSL technology provides equal bandwidth in both directions?
SDSL
What command can be used to flush the local DNS cache on a Windows computer?
ipconfig /flushdns
802.11ac Wi-Fi standard supports up to eight antennas and supports ___________________, which detects the locations of connected devices and increases signal strength in those directions.
beamforming
Internet Protocol version 4 (IPv4) uses a _________ bit address to identify a network connection
32
A group of wireless devices are using each other as relays to share a network connection across a large area.
Which of the following network categories is being used?
WMN
Scenario:
A technician is configuring a new SOHO multifunction wireless router at a customer’s location to provide network access to several wireless devices.
The technician is required to protect the customer’s private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed.
Which of the following is the best step for the technician to take in securing the router to meet this requirement?
Change the router’s default administrative password.
Scenario:
Jacob wants to set up extra security on his wireless network; he currently uses WPA2.
He wants to allow only his devices to connect to the network and reject devices that he does not own.
What extra wireless security should Jacob employ in on his wireless router?
MAC filtering
What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest?
WAN, MAN, LAN, PAN
Scenario:
A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on.
Which of the following will meet these requirements?
Cable
Scenario:
Bob is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle.
He wants a way to limit their ability to view content on the Internet.
What will you recommend to Bob?
Use Parental Controls.
A student wants to connect to her wireless LAN at home but is not sure where to change the setting so that they can connect.
Where in the Windows Control Panel will the student find thier computer’s network connection settings?
Network and Sharing Center
A ________________________________ is often used by employees when they work away from the corporate network to connect to that network by way of the Internet.
virtual private network
Three current security standards for 802.11 wireless networks are:
WPA
WPA2
WPA3
_______________ is the theoretical number of bits that can be transmitted over a network at one time.
bandwidth
The ______________________ command (known simply as ping) tests connectivity by sending an echo request to a remote computer.
Packet Internet Groper
Scenario:
Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data.
You have assured the company that WPA2 is secure.
What makes WPA2 more secure than WPA?
AES (Advanced Encryption Standard)
Scenario:
A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address.
Which of the following should the technician configure?
Address reservation
A domain _____[a]_____ identifies a network. Examples of this are the names that appear before the period in Microsoft.com, course.com, and mycompany.com.
The letters after the period are called the _____[b]_____ domain and tell you something about the domain. Examples are .com (commercial), .org (nonprofit), .gov (government), and .info (general use).
name
top-level
If you’re looking to install Gigabit Ethernet, what cabling system would you use?
Cat-6
Scenario:
You are installing network cabling and require a cable solution that provides the best resistance to electromagnetic interference.
Which of the following will you choose for this installation?
STP
An IPV4 address octet can have numbers 0 (zero) to _____.
255
What two standards have been established for wiring twisted-pair cabling and RJ-45 connectors?
T568B
T568A
A server or service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the location bar. If this service is malfunctioning, your browser will display a page not found error.
What server provides this service?
Web server
What does a 1000BaseT NIC use to connect to a network cable?
RJ-45 port
Lightweight Directory Access Protocol utilizes what port for remote access?
389
A __________________________________________ appliance, also called a security appliance, network appliance, or Internet appliance, stands between the Internet and a private network, as does a router, and protects a network. (three word answer)
This appliance is considered a next-generation firewall that can protect a private network.
Unified threat management
Switches are slowly being replaced by hubs, which are newer technology.
False
What protocols are used to deliver mail messages?
IMAP4
SMTP
POP3
What protocol makes a connection, checks whether the data is received, and resends it if it is not?
TCP
________________ is a feature that might be available on high-end wired network adapters that allows power to be transmitted over Ethernet cable.
power over ethernet
Scenario: A technician is installing UTP cable and needs to terminate the connections on the patch panel.
What tool should be used to terminate and complete this installation?
Punchdown tool
Scenario:
While assisting a Windows user over the phone, you need to determine the IP address for the DHCP server along with the MAC address of the Ethernet NIC.
The user has successfully opened a command prompt.
What command will you have the user type at the command line to determine these two addresses?
ipconfig /all
Scenario:
A technician has been dispatched to a client’s office to diagnose wireless network issues and suspects that channel overlap may be the problem.
Which of the following tools will the technician use to help in determining whether her suspicions are correct?
Wi-Fi analyzer
A server provides the necessary IP configuration to your network host so the host can communicate on the network. If this service malfunctions, your device will not be able to utilize the network.
What server provides this service?
DHCP server
If your wireless access point does not reach the entire area you need to cover, you can add a __________ (or an extender), which amplifies and retransmits the signal to a wider coverage area.
repeater
A _________________ is just a pass-through and distribution point for every device connected to it, without regard for what kind of data is passing through and where the data might be going.
hub
CIDR notation is a shorthand notation for expressing an IPv4 address and subnet mask.
True
What type of device do you need if you want to connect two network segments together such as a wireless network and a wired network?
bridge
A punchdown tool is used to wire twisted-pair cabling to a keystone jack.
True
Twisted-pair cabling uses pairs of wires twisted together to reduce ______________, which is interference that degrades a signal on the wire.
crosstalk
A ____________________ cable (also called a patch cable) is used to connect a computer to a switch or other network device.
straight-through
In order to terminate multiple network cables that converge in one location such as an electrical closet or server room, what should you use?
patch panel
An intrusion prevention system will monitor, detect, log, issue alerts, and prevent malicious activity.
True
Which of the following describes an IPv6 link-local address assigned to a node on a network?
A private unicast address used for limited communication with neighboring nodes in the same link.
A _______________ Fiber-optic cable uses multiple paths for light.
multimode
Unicast addresses include what types of addresses?
global address
link-local address
unique local address
A(n) _____[a]_____ switch requires no setup or configuration other than connecting network cables to its ports. It does not require an IP address.
A(n) _____[b]_____ switch has firmware that can be configured to monitor and manage network traffic.
unmanaged
managed
What cable system utilizes a fiber-optic cable?
1000BaseFX
What two terms are used to describe the User Datagram Protocol (UDP)?
connectionless protocol
best effort protocol
Under what circumstance might you use an Ethernet loopback plug?
to test a network cable
___________________ Domain Name identifies a computer and the network to which it belongs.
Fully qualified
How are IP addresses available to the Internet classified?
public
What two-part kit is used to locate copper cable runs in walls and at their termination points?
Toner probe
A few IP addresses are reserved for special use by TCP/IP and should not be assigned to a device.
- 255.255.255
- 0.0.1
- 0.0.0
The User Datagram Protocol (UDP) guarantees delivery of data to its destination.
False
Fiber-optic cables transmit signals as pulses of light over _________ or plastic strands inside protected tubing.
glass
A ______________ cable is used to connect two like devices such as a hub to a hub or a PC to a PC
crossover
Which is used to identify the network portion and the host portion of an IP address?
subnet mask
A ____________________ (also called a computer name) is the name of a computer and can be used in place of its IP address.
host name
Messages are delivered to a single node on a network when using what type of IPv6 address?
unicast address
In the T568B wiring scheme, what two color pairs are used for transmit and receive on a 100BaseT network?
White/green, green
White/orange, orange
What TCP port is utilized by an SSH server listening for connections?
22
Which statement regarding 10-Gigabit Ethernet is accurate?
it is a good choice for backbone networks
__________________ cable is used in areas between the floors of buildings because it does not give off toxic fumes when burned.
plenum
You can turn your smartphone into a Wi-Fi analyzer by installing a free or inexpensive app through your phone’s app store.
True
The current release of SMB is CIFS, also called SMB2.
False
A ______________ Fiber-optic cable uses a single path for light to travel in the cable
single-mode
Scenario:
You are tasked with securing a small network for a client in which the following requirements must be met:
If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered.
The private trusted network should not be accessible from the public untrusted network.
If attacks are coming from the external network, the system should detect and prevent malicious activity.
All incoming and outgoing email should be scanned for malware.
Which of the following would best meet the requirements of the client?
Implement a UTM appliance.
Internet Protocol version 4 (IPv4) uses a _________ bit address to identify a network connection.
32-bit
____________________________ is a technique designed to conserve the number of public IP addresses needed by a network. A router stands between a private network and the Internet.
network address translation
What is the unit of information called when a network adapter adds the source and destination MAC address to the segment of data before it is transmitted on the network?
frame
___________________ is used to allow IPv6 messages to traverse IPv4 networks.
tunneling
When a TCP message reaches its destination, an ________________ is sent back to the source.
acknowledgment
EoP (Ethernet over Power) or _________________________________ provides a method of using existing power lines to transmit data through adapters plugged into the electrical outlets
powerline networking
A cable ____[a]____ is used to build your own network cable or repair a cable. It cuts away the plastic ____[b]____ or coating around the wires inside a twisted-pair cable so that you can install a connector on the end of the cable.
A ____[c]____ is used to attach a terminator or connector to the end of a cable. It applies force to ____[d]____ the connector to the wires in the cable to securely make a solid connection.
stripper
jacket
crimper
pinch
Scenario:
You replaced the LCD panel in a laptop computer and verified full system functionality, including wireless connectivity.
The customer picked up the laptop and now reports he can no longer access his wireless network regardless of how close the computer is positioned to the WAP.
Other users can connect to the WAP without any problem.
Which of the following is the most likely reason for this problem?
The laptop’s wireless radio is toggled to the off position.
Scenario:
The network icon in the notification area of a Windows 7 machine is displaying a yellow triangle with a black exclamation point indicating limited connectivity.
Checking the computer’s network connection properties will most likely indicate which of the following single-assigned host IP addresses?
169.254.1.1
FE80::feba:123:8:9343
Internet Protocol version 6 (IPv6) uses a _________ bit address to identify a network connection.
128-bit
What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively?
SSH
Telnet
Scenario:
Your company is experiencing an increase in malware incidents.
Your manager is asking for advice on how best to verify that company-owned workstations are up-to-date with security patches, anti-malware requirements, and software application updates.
The manager is also concerned that employee-owned devices connecting to the corporate LAN have the same level of security as the company devices.
Which of the following protections and services should you recommend?
Implement an endpoint management server appliance.
What command can be used to clear the local DNS cache on a Windows computer?
ipconfig /flushdns
Before replacing an image drum, what should you do first?
unplug it and allow the printer to cool down
What statement regarding the cleaning of a laser printer is accurate?
wipe the rollers on a laser printer with a dry cloth
Scenario:
Kendra, a user, would like to share her serial printer that has no networking connectivity with the other users in her small office.
Which of the following would be the best choice for providing this functionality with the least effort and cost to the user?
Enable print sharing on the computer.
For a 1200 dots per inch (dpi) printer, the laser beam makes 1200 passes for every one inch of the drum __________________.
circumference
A ____ printer connects directly to a computer by way of a USB port, parallel port, serial port, or wireless connection.
local
The Windows Printer User Interface command, ________________________, is used by administrators to manage printers and printer drivers on remote computers.
printui
What part of a laser printer puts a positive charge on the paper in order to pull the toner from the drum onto the paper?
transfer roller
All dual core or higher processors and all motherboards sold today support ____________________________ virtualization (HAV) technology capable of enhancing the processor support for virtual machines.
Hardware-assisted
What best describes the following service?
the customer leases the underlying hardware, including servers, networking, and storage.
These underlying services are then used virtually.
The customer is responsible for providing and managing applications, data, and backups.
The customer may also be responsible for its own operating systems.
IaaS
What wireless methods exist for connecting to a printer?
Wi-Fi infrastructure mode
Wi-Fi ad hoc mode
Bluetooth
Which of the following is a cloud computing element that gives a service provider the ability to dynamically allocate shared physical resources to multiple customers based on each customer’s usage demand?
Resource pooling
Which of the following terms describes the software layer that is responsible for creating and running a VM on a host?
Hypervisor
A ______________ printer has an Ethernet port to connect directly to the network or uses Wi-Fi to connect to a wireless access point.
network
Scenario:
You were hired by a design firm that uses Mac equipment exclusively.
You prefer to use your Windows laptop and would like to print to the printers that are already in use.
When you open the list of shared printers, nothing is shown.
Which of the following will allow you to discover and print to the network printers from your Windows device?
Download and install Bonjour Print Services.
Some laser printers use erase ____[a]____ to neutralize any charge left on a imaging drum. These devises use a ____[b]____ colored light to not damage the drum.
lamps
red
A Type 2 hypervisor installs in a host operating system as a(n) _________________________ and is sometimes called a hosted hypervisor.
application
Examples of Type _______ hypervisors are XenServer by Citrix, KVM by Red Hat, ESXi by VMware, and Hyper-V by Microsoft.
1
For a Windows VM, be sure to configure Windows ___[a]___ in the VM, keep Windows updates current, install and run antivirus software, require ___[b]___ for all user accounts in the VM, and ___[c]___ data folders.
firewall
passwords
encrypt
What kind of printer works by placing toner on an electrically charged rotating drum and then depositing the toner on paper as the paper moves through the system at the same speed the drum is turning.
Laser
In laser printing, what is the process of placing a high electrical charge on the imaging drum to condition it before an image is exposed to the drum?
Charging
What type of printer burns dots onto special coated paper?
Thermal Transfer
For heavy business use, the best practice is to purchase one machine for one ___________, instead of bundling many functions into a single machine.
purpose
Scenario:
You are on a committee tasked with researching and recommending a service that will allow employees the opportunity to save files from their mobile phones, laptop computers, and workstation computers to cloud file storage services.
Which of the following will need to be researched and considered in order to make a comprehensive recommendation?
Synchronization apps
The best-known impact printer is a dot matrix printer, which prints only text that it receives as ________ data.
raw
Scenario:
A technician is troubleshooting a Windows 10 x64 desktop system with a Type 2 hypervisor that is hosting four VMs that must be run simultaneously.
The technician suspects the sluggish performance is due to insufficient physical RAM in the host computer and has disabled dynamic RAM allocation in the hypervisor.
Assuming each operating system installed requires 2GB of RAM, what is the minimum amount of physical RAM that will need to be installed in the host system to meet the requirements of this scenario?
10240 MB
Scenario:
A company needs a way to convert 10 years of shipping records currently on paper into files that can be saved to its private cloud storage.
Which of the following will be the best choice to accomplish this goal with the least amount of employee effort?
Use a dedicated ADF scanner connected to either a workstation or the LAN.
______________________ cloud computing means the service is always available.
Cloud computing vendors often advertise uptime of this service, which is the percentage of time in any given year when their services are available online without disruption.
On-demand
Scenario:
A help desk technician needs to run virtual machines on her laptop computer for several upcoming training sessions.
Which of the following must be completed before she can use virtualization on her laptop?
Enable virtualization support in the laptop’s UEFI.
Scenario:
A small bank with several regional branches is searching for a solution to consolidate its business services into a single site with centralized management.
The service should provide secure resources for use by the bank, and these resources must be isolated from any other organization using the same service provider.
Which of the following will best meet the needs of the bank?
Private cloud
What type of virtualization should you deploy to provide a Virtual Desktop Infrastructure?
server-side
Which of the following is considered a security benefit when utilizing virtualization?
Isolating operating system when running multiple concurrent VMs.
What two types of thermal printer exist?
thermal transfer printer
direct thermal printer
What tool can you use to stop and restart the Windows print spooler?
Services console
Automatically printing on both sides of the page is called ____ printing.
duplex
Which of the following technologies can provide an application to remote users without the need to install the application on the users’ systems?
Application virtualization
An ___________ printer uses a type of ink-dispersion printing and doesn’t normally provide the high-quality resolution of laser printers.
inkjet
Impact printer ribbon provides both the ink for printing and the _____________ for the pinheads.
lubrication
Scenario:
A company is utilizing servers, data storage, data backup, and software development platforms over an Internet connection.
Which of the following describes the company’s approach to computing resources?
Cloud computing
Which of the following is a cloud computing service model that relies most heavily on the cloud vendor to manage and maintain its services?
SaaS
Scenario:
The laser printer in your accounting department is printing faded prints that are getting lighter over time.
What is the most likely reason for the faded prints?
The printer is low on toner.
Scenario:
A client is asking for a printing solution that will print three sheets of paper with identical information on each page with a single pass of the printer (in others words, in triplicate).
Furthermore, the client requests that the solution take the least amount of time and effort to maintain.
Which of the following printer types should be recommended?
Impact
Laser printer parts that might need replacing include the ___[a]___ roller that pushes a sheet of paper forward from the paper tray and the ___[b]___ pad that keeps more than one sheet of paper from moving forward.
pickup
separation
Scenario:
A technician has connected a USB printer to a workstation and shared the printer on the local workstation for other users on the network to utilize.
The technician successfully printed a test print from the printer’s console and the workstation that the printer is physically connected to.
After leaving the customer’s site, the technician received a call from the customer stating no one other than the local user can print to the printer.
Each time they attempt to print, they receive an “Access Denied” message.
Which of the following is the most likely reason the other users cannot print?
The other users lack sufficient permissions for the shared printer.
______________________ provides customers with scalable services that can be automatically scaled up or down depending on need.
Rapid elasticity
What type of printer is slower than a laser printer, and also tends to smudge on inexpensive paper?
Inkjet
Extreme ____________________ can cause laser printer toner to clump in the cartridge and give a Toner Low message.
humidity
Some advanced printers have print server programs included in the printer firmware itself.
True
Scenario:
You are installing several VMs on your desktop computer and need to determine whether your system can support running all the VMs at the same time.
Your host operating system is Windows 10 Pro, and your system has 16GB of physical RAM installed.
Which of the following is the best approach in making this determination, assuming dynamic allocation of RAM is disabled?
Add up the required RAM for each of the guest VM operating systems you want to run at the same time and add the RAM required by your host OS.
What is the main advantage of using a thick client?
A Thick client can be a low-end to high-end desktop or laptop.
After stopping the Print Spooler services, to delete any unwanted, lingering print jobs left in the printer queue, open File Explorer or Windows Explorer and delete all files in the _______________________________________________ folder.
C:\Windows\System32\spool\PRINTERS
What step in the laser printing process is responsible for conditioning the imaging drum in preparation for receiving an electrical charge?
Cleaning
If you have Windows printing problems, consider that Windows might be using the wrong or __________________ printer drivers.
corrupted
Scenario:
Henry wants to build a computer that will allow him to run a hypervisor program.
What does Henry not need on his computer?
High-end video card
For color laser printers, the fuser bonds all toner to the paper and aids in __________ the tones to form specific colors.
blending
Which of the following creates an environment that behaves in a hardware-like manner to run software meant for other hardware?
Emulator
For color laser printers, the writing process repeats __________ times.
4
How do you know if a printer needs routine maintenance?
the number of pages the printer has printed since the last maintenance
Laser printers automatically calibrate themselves periodically.
true
What type of computer is recommended when you want to allow the server to do most of the computing but would like to connect to the server via a browser?
Thin client
Scenario:
A customer states that when she removes the printed pages from her laser printer output tray, the black ink smears all over her fingers.
Which of the following is the most likely problem?
The fuser is malfunctioning and needs to be serviced.
With ________________________________, a personal computer provides multiple virtual environments for applications.
Client-side virtualization
Scenario:
You are troubleshooting an inkjet printer that prints areas on the page with random voids and missing colors.
Which of the following will best help resolve the problem?
Printer calibration
Head cleaning utility
The laser printer fuser assembly uses heat and ________________ to fuse the toner to the paper.
pressure
Scenario:
A company purchased a high-quality color laser printer to print color brochures and sales proposals.
The printer is connected to a marketing PC via USB and is configured as a shared local printer for use by the sales and marketing teams.
The manager is concerned about the cost of consumables for the printer and does not want users to unintentionally print to the printer.
What can be done to ensure that only authorized users can send print jobs to the printer?
Enable user authentication on the printer share.
Properly order the Seven steps in laser printing: (first to last)
- Processing
- Cleaning
- Conditioning
- Writing
- Developing
- Transferring
- Fusing
in a __________________________, services are shared between multiple organizations with a common interest, but the services are not available publicly.
Community cloud
Which of the following aspects of cloud computing allows a service provider to limit a customer’s use of a particular resource based on a service agreement between the provider and the customer?
Measured service
What statement regarding Type 1 hypervisors is accurate?
They are called bare-metal hypervisors
A printer that utilizes a ribbon that contains wax-based ink is known as what type of printer?
Thermal Transfer