Dion Training CompTIA A+ Core 1 (220-1101) Practice Exam - Results Flashcards
Sarah is connecting a new wireless mouse to a client’s laptop. Which of the following technologies is MOST likely being used to connect the mouse to the laptop?
Explanation
OBJ 1.3 - Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices.
Infrared (IR)
was a wireless networking standard supporting speeds up to about 4 Mbps with a direct line of sight for communications. Infrared sensors are used in mobile devices and with IR blasters to control appliances. While infrared (IR) used to be commonly used to connect wireless mice and keyboards to a laptop in the 1990s, it has fallen out of favor in the last 10-15 years since Bluetooth is more reliable and does not require a direct line of sight between the device and the laptop.
Near field communication (NFC)
is a standard for peer-to-peer (2-way) radio communications over very short (around 4”) distances that facilitates contactless payment and similar technologies.
Universal serial bus (USB)
is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at a slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power.
Jason is teaching a CompTIA course at a large company, but they do not allow non-employees to connect to their network. Since Jason needs the Internet for an in-class demonstration, he connects his laptop to his iPhone using a USB cable. He essentially connects to the Internet using the smartphone as a modem. Which of the following terms best describes this configuration?
Explanation
OBJ 1.4 - Tethering is the use of a mobile device’s cellular data plan to provide Internet access to a laptop or PC. The PC can be tethered to the mobile by USB, Bluetooth, or Wi-Fi. One method of doing this is to connect the laptop to the device using a USB cable, and then it can be used as a wired network connection.
A portable hotspot
is a dedicated mobile device that connects to a cellular network and provides a wireless (Wi-Fi) network for a small number of users.
A tunneling (or encapsulation) protocol
wraps up data from one protocol for transfer over a different type of network. For example, PPP can carry TCP/IP data over a dial-up line, enabling a remote computer to communicate with the LAN. A baseband update is the modification of the firmware of a cellular modem.
Which of the following types of data should you transmit over UDP?
Explanation
OBJ 2.1 - UDP (User Datagram Protocol) is a connectionless, non-guaranteed method of data communication. It does not provide any sequencing or flow control. Data sent over UDP could be lost and never resent. For this reason, UDP is not used for general web browsing or activity over HTTP/HTTPS (Ports 80 and 443). UDP is very good at delivering streaming media, though, since UDP is faster than TCP. Streaming videos or making Voice over IP (VoIP) calls are examples of use cases that rely upon UDP for their transmission.
Which of the following ports should you block at the firewall if you want to prevent a remote login to a server from occurring?
Explanation
OBJ 2.1 - Secure shell (SSH) is the protocol used for remote administration and file copying using TCP port 22. SSH is considered secure since it uses authenticated and encrypted sessions for communication.
The file transfer protocol (FTP)
is the protocol used to transfer files across the internet over ports 20 and 21.
The hypertext transfer protocol (HTTP)
is a protocol used to provide web content to browsers using port 80.
The internet message access protocol (IMAP)
is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time.
You are trying to select the best device to install to proactively stop outside attackers from reaching your internal network. Which of the following devices would be the BEST for you to select?
Explanation
OBJ 2.4 - An intrusion prevention system (IPS) is a form of network security that detects and prevents identified threats. Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents, and capturing information about them. An IPS can block malicious network traffic, unlike an IDS, which can only log them.
A proxy server
is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.
System Logging Protocol (Syslog)
uses port 514 and is a way network devices can use a standard message format to communicate with a logging server. It was designed specifically to make it easy to monitor network devices. Devices can use a Syslog agent to send out notification messages under a wide range of specific conditions.
Which of the following statements about the 5.0 GHz wireless frequency used by Wi-Fi is correct?
Explanation
OBJ 2.3 - The 5.0 GHz frequency has more individual channels giving it less congestion and interference than the 2.4 GHz frequency. The 5.0 GHz frequency supports higher data rates than the 2.4 GHz frequency due to lower levels of congestion and interference.
The longer wavelength of 2.4 GHz
- makes it better at propagating through solid surfaces than the 5.0 GHz frequency.
- The 2.4 GHz frequency has a longer wavelength than the 5.0 GHz frequency. This longer wavelength gives the 2.4 GHz frequency the ability to cover a longer range using the same power output levels.
A cybersecurity analyst wants to install a network appliance to conduct packet capturing of the network traffic between the router and the firewall on the network. The device should not be installed in line with the network, so it must receive a copy of all traffic flowing to or from the firewall. Which of the following tools is required to meet these requirements?
Explanation
OBJ 2.8 - A network tap is used to create a physical connection to the network that sends a copy of every packet received to a monitoring device for capture and analysis.
A WiFi analyzer
can determine the wireless network’s signal strength, the frequencies in use, and any possible radio frequency interference.
A tone generator
is connected to a wall jack and sends a repeating signal over the cable. The probe can then be used to detect which cable is attached to the wall jack by detecting the signal being sent by the tone generator. The probe needs to be near or touch the cable with the tone generator attached to identify it positively.
A cable tester
is used to ensure a cable is properly created as a patch cable (straight through) or a crossover cable. Cable testers provide detailed information on the physical and electrical properties of the cable. For example, they test and report cable conditions, crosstalk, attenuation, noise, resistance, and other cable run characteristics.
You are troubleshooting an older wireless network that is running Wireless G (802.11g). This network appears to have a lot of collisions and interference. You look up the configuration on two of the three access points in the areas and see they are using Channel 1 and Channel 6. To prevent interference and ensure non-overlapping of the channels, what channel should the third access point utilize?
Explanation
OBJ 2.3 - With wireless access points that run 2.4 GHz frequencies, you can only select channels between 1 and 11 in the United States. This includes 802.11b, 802.11g, 802.11n, and 802.11ax networks. To prevent overlapping of the channels, you should select channels 1, 6, and 11. By doing so, you can increase the reliability and throughput of your wireless network.
You have just finished building a Windows server, installing its operating system, updating its security patches, formatting a dedicated data partition, and creating accounts for all of the company’s employees. What is the next thing that must be configured to provide users with the ability to access the data contained on the server’s data partition?
OBJ 2.4 - Most of the options provided are reasonable next steps, but the question specifically states that you want to allow the users to access the server’s data. Therefore, **file sharing **is the next step to providing access to the data and folders for employees on the network. After configuring file sharing, it would be good to configure audit logging and possibly a print server. RAID storage should have been configured before installing the operating system or creating the data partition. A file server is used to host and control access to shared files and folders for the organization.
Which port is used to connect to a POP3 server?
Explanation
OBJ 2.1 - The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them.
he internet message access protocol (IMAP)
is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time.
The simple mail transfer protocol (SMTP)
is the protocol used to send mail between hosts on the Internet using TCP port 25.
The hypertext transfer protocol secure (HTTPS)
is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.
Dion Training has just installed a brand new email server. Which of the following DNS records would need to be created to allow the new server to receive email on behalf of diontraining.com?
Explanation
OBJ 2.6 - An MX record is used for outgoing (SMTP) and incoming (POP3/IMAP) traffic.
An A record
ssociates your domain name with an IPv4 address.
An AAAA record
associates your domain name with an IPv6 address.
A CNAME record is
a canonical name or alias name, which associates one domain name as an alias of another (like beta.diontraining.com and www.diontraining.com could refer to the same website using a CNAME).
Which type of wireless network utilizes the 5 GHz frequency band and reaches speeds of up to 6.9 Gbps?
Explanation
1. OBJ 2.3 - The 802.11ac (Wireless AC or Wi-Fi 5) standard utilizes a 5 GHz frequency to provide wireless networking at theoretical speeds up to 6.9 Gbps. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds.
2. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless AC also has a version called Wi-Fi 6E that supports the 6 GHz frequency instead of the 2.4 GHz and 5.0 GHz frequencies used in Wi-Fi 6.
The 802.11ax (Wireless AX or Wi-Fi 6) standard
utilizes 2.4 GHz and 5.0 GHz frequencies to provide wireless networking at theoretical speeds up to 9.6 Gbps. Wireless AX uses orthogonal frequency-division multiple access (OFDMA) to conduct multiplexing of the frequencies transmitted and received to each client to provide additional bandwidth.
The 802.11a (Wireless A) standard
utilizes a 5 GHz frequency to provide wireless networking at speeds up to 54 Mbps.
The 802.11b (Wireless B) standard
utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 11 Mbps.
The 802.11g (Wireless G) standard
utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 54 Mbps.
The 802.11n (Wireless N) standard utilizes
a 2.4 GHz frequency to provide wireless networking at speeds up to 108 Mbps or a 5.0 GHz frequency to provide wireless networking at speeds up to 600 Mbps. Wireless N supports the use of multiple-input-multiple-output (MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless N supports channel bonding by combining two 20 MHz channels into a single 40 MHz channel to provide additional bandwidth.
Dion Training has a single switch that services every room within its offices. The switch contains 48 ports, but Jason wants to divide the ports based on functional areas, such as web development, instruction support, and administration. Which technology should Jason utilize to divide the physical switch into three logically divided areas?
Explanation
OBJ 2.6 - A VLAN (virtual LAN) allows a single physical switch to be divided into logical networks. VLANs are only supported on managed switches, but they allow for a different logical subnetwork address to be assigned to various ports on the switch. This requires that communications between different VLANs must go through a router, just as if you had multiple switches. A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
A digital subscriber line (DSL) modem
is a device used to connect a computer or router to a telephone line which provides the digital subscriber line service for connection to the Internet.
Dynamic NAT
is a many-to-one mapping of a private IP address or subnets inside a local area network to a public IP address or subnet outside the local area network. The traffic from different zones and subnets over trusted (inside) IP addresses in the LAN segment is sent over a single public (outside) IP address.
You are configuring a print server on the network. Which type of IP address should you configure it with?
Explanation
OBJ 2.5 - A static IP address should be used for servers to ensure they are easy to find, access, and manage on the network. When configuring a static IP address, you need to include the IP address, subnet mask, gateway, and DNS server’s IP address. A static IP address is used when the DHCP server is disabled and clients are configured manually to join the network properly.
A dynamic IP address is
configured automatically by a DHCP server when a new host joins the network.
Automatic Private IP Addressing (APIPA)
- is a feature of Windows-based operating systems that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.
- When a host uses an APIPA address, it can communicate with other hosts on the same network using APIPA. Still, it cannot reach other networks or communicate with hosts who have managed to obtain a valid DHCP lease. An APIPA address is also known as a link-local address.
Which of the following devices is installed in a communication closet to connect network wall jacks to a network switch using pre-wired RJ-45 ports?
Explanation
OBJ 2.2 - A patch panel is used in a structured cabling system. A computer is connected to a wall jack in this cable system and then connected to a patch panel by cabling running through the walls. A pre-wired RJ-45 port on the patch panel is then connected to a port on the switch using a straight-through or patch cable.
A router
is a network device that links dissimilar networks and can support multiple alternate paths between locations based upon the parameters of speed, traffic loads, and cost. Routers are used to logically divide networks into subnets.
A wireless access point (WAP), or access point,
connects directly to a wired local area network and the AP then provides wireless connections using Wi-Fi for other devices to use that wired connection. An AP supports the connection of multiple wireless devices through their one wired connection.
A hub
provides no intelligence in its interconnection functions so that whatever is received on one port is repeated out every other port. This leads to many collisions occurring on the hub and increases the number of rebroadcasts which can slow down the entire network.
Which of the following is NOT categorized as wearable technology?
Explanation
OBJ 1.3 - Phablets are essentially large smartphones. Their size is smaller than a tablet but larger than a smartphone. Generally, smartphones that have screen sizes between 5.5” and 7” are considered phablets by manufacturers. Many phablets also come with a stylus for note-taking on the larger screen size instead of using your finger.
Smartwatches, fitness monitors, and VR headsets
are all considered wearable technology or wearables. Fitness monitors are wearable mobile devices that focus on tracking the health and exercise habits of their users. A high-end smartwatch (for example, an Apple Watch) will allow the user to see their notifications, chat activity, and even make phone calls. A mid-range or low-end smartwatch can still have the ability to read your chat and notifications, but you may be unable to make phone calls from it. A virtual reality headset (VR) is a headset worn like goggles to interact with images displayed in the headset. Virtual reality is a computer-generated, simulated environment experienced via a headset connected to a PC or powered by a smartphone.
Which of the following types of authentication devices is being used in this picture? Fingerprint?
In this picture, the user is being authenticated using their fingerprint, which is considered something you are or a biometric factor of authentication. Something you are refers to biometric authentication and includes fingerprints, retina scans, and facial scans.
Something you know
is a knowledge factor that includes usernames, passwords, and other non-tangible facts.
Something you have
is a possession factor that includes a physical token, key fob, or smart card. Somewhere you are is a location factor that includes your GPS coordinates or the location of your IP address.
Something you do
is an action factor that includes the way you sign your name, the way you say a passphrase, and other actionable items.
Jason’s cellphone company advertises that they offer unlimited data. The internet at Jason’s studio was not working today, so he turned on his mobile hotspot to upload the videos recorded today. Initially, the data transfer was occurring without any issues and Jason observed that his data was uploading at 25 Mbps. After 20-30 minutes, though, the speed of the connection dropped to only 0.125 Mbps. Which of the following is the MOST likely cause for this drop in speed during the upload process?
Explanation
OBJ 1.4 - A data cap or bandwidth cap is a service-provider imposed limitation on the amount of data transferred by a user’s account or device over the cellular network. Many smartphone plans that advertise unlimited data still have a transfer limit. Once the limit is reached, these plans will either prevent all data transfer from occurring or slow down the speeds of data transfer. For example, T-Mobile offers unlimited data in the United States, but if a user transfers over 50GB of data then their data is deprioritized and transmitted at slower speeds. Other carriers will use a data throttling method, instead, which slows down all data sent for the remainder of the customer’s billing cycle.
A distributed denial of service (DDoS) attack
is a denial of service attack that uses multiple compromised computers, called zombies, to launch the attack against a target. Based on the scenario, there is no evidence that the smartphone’s battery is depleted since the phone is still online and transmitting data. The smartphone is not using Wifi to transmit the data and there is no evidence that the 802.11 (Wi-Fi) radio is broken.
Dion Training wants to replace any remaining old CRT displays used in the company with a type of screen that produces less voltage and is more energy-efficient. Additionally, the new screen type selected should not contain a backlight. What type of display technology should they select?
Explanation
OBJ 1.2 - An organic light-emitting diode (OLED) display is a type of LED flat panel display device that uses organic compounds that emit light when subjected to an electric current. An OLED display works without a backlight because it emits visible light. Thus, it can display deep black levels and be thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions (such as a darker room), an OLED screen can achieve a higher contrast ratio than an LCD, regardless of whether the LCD uses cold cathode fluorescent lamps or an LED backlight. An OLED will consume around 40% of an LCD’s power, displaying a primarily black image. For most images, it will consume 60–80% of the power of an LCD.
A liquid crystal display (LCD) panel
s a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. The LCD panel is backlight by a cold cathode fluorescent (CCFL) bulb. LCD panels are used on laptops and have replaced CRT monitors as the main type of computer display screen for desktops, as well.
A light-emitting diode (LED) display
is an LCD panel that uses a LED backlight instead of a CCFL backlight to provide its light source.
A plasma display
is a type of flat panel display that uses small cells containing plasma with ionized gas that responds to electric fields. Plasma displays create excessive heat and are not as energy efficient as an LCD, LED, or OLED display.
Which of the following settings must be enabled on a mobile device to embed the GPS position into a photograph when using your device’s camera?
Explanation
OBJ 1.4 - Location services enable the device to know its position using its internal GPS receiver or its approximate location using its cellular radio. To embed the GPS position into a photograph, location services must be enabled.
Mobile device management (MDM) software suites
are designed to manage the use of smartphones and tablets within an enterprise.
Full device encryption (FDE)
is used to encrypt the user and system data stored in the device’s internal storage. The encryption key is stored in a protected portion of the device and can be used to remotely wipe the device if it is lost or stolen.
A security profile
is used to apply different permissions and functionality to an employee’s mobile device and is usually configured by an MDM.
ou have been asked to set up the corporate email on several mobile devices for Dion Training’s employees. The employees will use their mobile devices to check their email when out of the office, but they will also need to check their email from their desktop computers. Which of the following email protocols should you configure to allow the employees to receive their mail and maintain the read/unread status across all of their devices?
Explanation
OBJ 1.4 - You should configure IMAP because it will leave the email on the server and allow for synchronizing the mail to all devices, including each email’s read state.
2. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time.
If you configure POP3,
- the mail is downloaded to the device and removed the mail from the server’s mailbox by default.
- The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them.
SMTP
is used to send emails, not receive them.
2. is the protocol used to send mail between hosts on the Internet using TCP port 25.
HTTPS
is used for web browsing, not for receiving emails.
2. is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.
Dion Training wants to order some new laptops for their video editors. The video editors want to ensure the display has the best color accuracy when using a 60 Hz refresh rate. Which of the following types of displays should the company purchase to meet this requirement?
Explanation
OBJ 1.2 - An in-plane switching (IPS) LCD panel uses technology designed to resolve the quality issues inherent in TN panel technology, including strong viewing angle dependence and low-quality color reproduction. IPS displays have great color accuracy, but they do not support higher refresh rates sought after by gamers.
A twisted nematic (TN) LCD panel
uses technology where the panel is black when no electric current is running through the liquid crystal cells because the cells align themselves in a twisted state. When an electric current is applied, the liquid crystal cells untwist, allowing light to pass through, resulting in a white display screen. TN displays can be made with high refresh rates of 120 Hz or 144 Hz which makes them popular with gamers.
A vertical alignment (VA) LCD panel
uses technology designed to have liquid crystals lay perpendicular to the glass substrate when power is removed and in a vertical position when voltage is applied. This allows light to move through the liquid pixels when voltage is applied and the image is then produced. VA displays are a good middle-ground between IPS and TN panel displays.
A plasma display
s a type of flat panel display that uses small cells containing plasma with ionized gas that responds to electric fields. Plasma displays create excessive heat and are not as energy efficient as an LCD, LED, or OLED display.
Which of the following form factors provides a mini card interface used to connect a laptop’s SSD at higher bus speeds than SATA?
Explanation
OBJ 1.1 - M.2 s a new set of form factors for mini card interfaces. An M.2 SSD provides a direct interface with the PCI Express bus to provide higher bus speeds than a SATA connection. M.2 adapters come in four different sizes based on their length. The one chosen depends on your model of laptop and the space available within the case. The 80mm variety is the most common one used in modern laptops.
A traditional laptop hard drive usually comes in
either the 2.5” form factor or the 1.8” form factor. When a 1.8” form factor is used, the drive is connected to the laptop using a Micro SATA connector since a regular SATA connector will not fit due to the connector’s larger size. A 3.5” drive is only used in desktops and some networked file servers.
You are working on a customer’s laptop. The image on the display suddenly becomes very dark and hard to see. You attempt to adjust the brightness and contrast of the laptop’s display using the special function keys, but this doesn’t brighten the display much. You pull out a bright flashlight and can see the image displayed a little better when using it. Which of the following components is MOST likely faulty and needs to be replaced?
Explanation
OBJ 1.2 - The inverter (also known as inverter board, screen inverter, or LCD inverter) is a part of the laptop’s display assembly. The inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight.
The digitizer
is a touch-sensitive glass panel covering the LCD in a touch screen assembly. The digitizer is used to convert touch events to digital signals that can be interpreted as different types of input.
A liquid crystal display (LCD) panel
is a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. LCD panels are used on laptops and have replaced CRT monitors as the main type of computer display screen for desktops, as well.
A graphics processing unit (GPU)
is a microprocessor used on dedicated video adapter cards or within a CPU with integrated graphics capability to handle the mathematical calculations required to create immersive and 3D graphics.
You are at the grocery store. At the checkout, you slide your credit card through the payment terminal and then sign your name to authorize the charge. Which of the following did you MOST likely use to make this purchase?
Explanation
OBJ 1.3 - Many stores use a signature pad to digitally capture your handwritten signature when using a credit card to pay for your purchase. A signature capture pad is a device that electronically captures a person’s handwritten signature on an LCD touchpad using a pen-type stylus. Once captured, digital signatures can be imported into and used with most ID software and security programs. Signatures can also be digitally stored for future use.
Near-field communication (NFC)
is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another.
Bluetooth
is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices.
A touchpad
is an input device used on most laptops to replace a mouse. The touchpad allows the user to control the cursor by moving a finger over the pad’s surface.
Which of the following accounts should you set up to use Apple’s online cloud storage and file synchronization service for macOS and iOS devices?
Explanation
OBJ 1.4 - Apple’s online cloud storage and file synchronization service for macOS and iOS devices is called iCloud. The service provides a centralized location for mail, contacts, calendar, photos, notes, reminders, and files online.
Apple’s iTunes
is a media player, media library, Internet radio broadcaster, mobile device management utility, and the client app for the iTunes Store. It is not a cloud-based solution for synchronization.
Google Workspace
is a collection of cloud computing, productivity and collaboration tools, software, and products developed and marketed by Google.
Microsoft 365, formerly Office 365,
is a line of subscription services offered by Microsoft which adds to and includes the Microsoft Office product line.
Which of the following laptop displays requires an inverter?
Explanation
OBJ 1.2 - An inverter supplies the correct AC voltage to the LCD’s fluorescent backlight from the laptop’s DC power circuits. An LCD (TFT) with fluorescent backlight has been the standard display technology for the last few years. The backlight is a fluorescent bulb that illuminates the image, making it bright and clear.
A light-emitting diode (LED) display
is an LCD panel that uses a LED backlight instead of a CCFL backlight to provide its light source.
An organic light-emitting diode (OLED) display
is a type of LED flat panel display device that uses organic compounds that emit light when subjected to an electric current. An OLED display works without a backlight because it emits visible light. Thus, it can display deep black levels and be thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions (such as in a dark room), an OLED screen can achieve a higher contrast ratio than an LCD, regardless of whether the LCD uses cold cathode fluorescent lamps or an LED backlight.
A plasma display
is a type of flat panel display that uses small cells containing plasma with ionized gas that responds to electric fields. Plasma displays create excessive heat and are not as energy efficient as an LCD, LED, or OLED display.
Your office is located in a small office park, and you are installing a new wireless network access point for your employees. The companies in the adjacent offices are using Wireless B/G/N routers in the 2.4 GHz spectrum. Your security system uses the 5 GHz spectrum, so you have purchased a 2.4 GHz wireless access point to ensure you don’t cause interference with the security system. To maximize the distance between channels, which set of channels should you configure for use on your access points?
Explanation
OBJ 2.5 - Wireless access points should always be configured with channels 1, 6, or 11 to maximize the distance between channels and prevent overlaps. Each channel on the 2.4 GHz spectrum is 20 MHz wide. The channel centers are separated by 5 MHz, and the entire spectrum is only 100 MHz wide. This means the 11 channels have to squeeze into the 100 MHz available, and in the end, overlap. Channels 1, 6, and 11, however, are far enough from each other on the 2.4GHz band that they have sufficient space between their channel centers and do not overlap.
You just configured your iPhone to connect to your car’s stereo over Bluetooth to play your favorite podcasts while driving to work. What type of network did you create between your iPhone and your car?
Explanation
OBJ 2.7 - A personal area network (PAN) is a close-range network that is usually based on Bluetooth or NFC for communications between personal devices, such as smartphones, laptops, printers, and other peripheral devices.
A local area network (LAN)
is a network where all the nodes or hosts participating in the network are directly connected with cables or short-range wireless media.
A wide area network (WAN)
is a network that spans multiple geographic locations such as the internet. Wide area networks are often established with leased telecommunication circuits.
A storage area network (SAN)
is a dedicated, independent high-speed network that interconnects and delivers shared pools of storage devices to multiple servers. A storage area network often uses Fibre Channel over Ethernet (FCoE), Fibre Channel, or Internet Small Computer Systems Interface (iSCSI) connections to achieve the speeds necessary to support SAN operations.