Exam 220-901 Practice – Set G Flashcards
Which of the following connector types is MOST likely to be used with fiber connections?
A. RJ-45
B. SC
C. USB
D. RG-9
B. SC
Which of the following connectors is commonly used on a shielded twisted pair cable?
A. BNC
B. RJ-45
C. F
D. HDMI
B. RJ-45
Which of the following describes the use of the DNS protocol as it relates to a TCP/IP network?
A. Provides remote connectivity to resources on the network
B. Provides separate control and data connections between network resources
C. Provides mapping of user friendly names to network resources
D. Provides automated addressing to resources on the network
C. Provides mapping of user friendly names to network resources
Explanation:
http://www.howstuffworks.com/dns.htm
Peter’s company just moved into a new building, and the company’s management is very concerned about proper equipment grounding. Which of the following risks are they attempting to mitigate by grounding equipment?
A. Security breaches
B. Electrical shock
C. Chemical burns
D. Equipment theft
B. Electrical shock
Which of the following connectors are typically used to terminate an RG-6 cable? (Select TWO).
A. RJ-45 B. BNC C. ST D. DIN-9 E. F
B. BNC
E. F
A user with a USB printer would like to print from more than one computer. Which of the following features should be used?
A. File and printer sharing
B. Internet connection sharing
C. Enable printer duplexing
D. USB hub
A. File and printer sharing
A user is trying to setup a small office home office (SOHO) wireless network and does not want any neighbors to be able to discover the network. Which of the following parameters would MOST likely be configured?
A. Configure a proxy server address
B. Enable WEP encryption
C. Disable SSID broadcast
D. Configure DMZ settings
C. Disable SSID broadcast
Explanation:
http://compnetworking.about.com/cs/wirelessproducts/qt/disablessidcast.htm
Which of the following would be the MOST important factor to consider when building a virtualization workstation?
A. High-end graphics card with onboard memory
B. A compact form factor
C. Dual monitor support
D. Maximum RAM and CPU cores
D. Maximum RAM and CPU cores
Explanation:
Virtualization requires a lot of memory and processing power. If you install 2 or 3 operating systems, you will be needing memory and processors to keep them running in optimal condition. Therefore, you need maximum RAM and CPU cores to make sure you have enough resources for your virtualization platform
A user is watching streaming video on a home network, but experiences buffering and delays when there are too many people on the network. Which of the following is MOST likely to resolve the issue?
A. Disable SSID broadcast
B. Setup UPnP
C. Enable QoS
D. Configure DMZ
C. Enable QoS
Which of the following cable types delivers a signal over a single pin connector?
A. Ethernet
B. Coaxial
C. S-video
D. DVI
B. Coaxial
Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices?
A. Mesh
B. Bus
C. Ring
D. Star
C. Ring
A printer is not pulling paper out of the paper tray. Which of the following is the MOST possible cause of the problem?
A. Pickup rollers
B. Print head
C. Drum
D. Fuser
A. Pickup rollers
A technician has been dispatched to install a maintenance kit in a laser printer. Which of the following components should the technician avoid touching when performing the installation?
A. Fuser housing
B. Transfer roller
C. Pickup roller
D. Toner cartridge
B. Transfer roller
Emily, a customer, calls and states she wants to buy a new desktop but she needs it to be as small as possible. Which of the following form factors should be recommended?
A. Micro-ATX
B. BTX
C. ATX
D. ITX
D. ITX
Which of the following versions of Windows 7 would a technician MOST likely install for a small business?
A. Windows 7 Professional 64-bit
B. Windows 7 Professional
C. Windows 7 Media Center
D. Windows 7 Home
B. Windows 7 Professional
When replacing a print head in an impact printer, special care MUST be given to adjustinG.
A. the ribbon drive assembly
B. the form thickness
C. the platen gap
D. the form length
C. the platen gap
A technician receives a request to investigate illegal copyrighted content that may exist on a company laptop. Which of the following is the FIRST step in dealing with the request?
A. Preserve the data
B. Identify content
C. Document changes
D. Report to the user’s supervisor
B. Identify content
Which of the following cable connection types is an example of a mini DIN?
A. BNC
B. PS/2
C. RCA
D. DB9
B. PS/2
Which of the following laptop features can normally be modified using function keys?
A. Enabling/disabling infrared
B. Enabling/disabling an external display
C. Enabling/disabling print spooling
D. Enabling/disabling drive encryption
B. Enabling/disabling an external display
Explanation:
http://www.computerhope.com/issues/ch000801.htm
A technician needs to replace a computer’s hard drive. Which of the following should the technician do FIRST?
A. Remove network connections
B. Remove the RAM
C. Self ground on the computer case
D. Disconnect power to PC
D. Disconnect power to PC
Which of the following should a technician configure on a small office home office (SOHO) wireless router so IP addresses are automatically assigned to devices on the wireless network?
A. MAC filtering
B. DHCP
C. NAT
D. DNS
B. DHCP
Explanation:
http://www.thegeekstuff.com/2013/03/dhcp-basics/
The network printer is locking up and printing garbled text. When the user cancels the job from their local print queue, nothing happens. Which of the following is the MOST likely cause?
A. The printer needs to be power cycled to clear the job.
B. The print server’s queue needs to be checked.
C. The printer needs to be set to factory defaults.
D. The user’s workstation needs to be rebooted.
B. The print server’s queue needs to be checked.
Which of the following is the correct configuration for a RAID 5 array?
A. A two disk set with one data strip
B. A three disk set with two data strips and a parity strip
C. A two disk set with two data strips
D. A four disk set with two sets of data strips
B. A three disk set with two data strips and a parity strip
Which of the following is the MAXIMUM data transfer rate of Bluetooth v3.0?
A. 1Mbps
B. 3Mbps
C. 24Mbps
D. 54Mbps
C. 24Mbps
A technician is helping set up a new networking closet and notices that the humidity level is low in the room. Which of the following should be installed FIRST before rack mounting equipment?
A. A dehumidifier
B. A fire suppression system
C. ESD strap
D. Grounding bars
D. Grounding bars
Explanation:
http://www.ecpowersystems.com/resources/electrical-power-systems/electrical-ground-bars-and- inefficient-data-centers/
A smartphone user experiences difficulty removing the back cover of the device. Once finally removed, the battery appears to have swollen. The battery is still functional, but requires more frequent charging than it used to. Which of the following should the user do NEXT?
A. Remove the battery and let it cool for 24 hours
B. Fully discharge and then fully recharge the battery
C. Short the battery terminals with a paper clip
D. Replace the battery with a new one
D. Replace the battery with a new one
Which of the following USB connector types can be commonly found on non-iOS mobile devices? (Select TWO).
A. Micro-SD B. A C. B D. mini E. micro
D. mini
E. micro
A user has forgotten their BIOS password on their computer. Which of the following would a technician use to allow the user access to their PC?
A. Remove the BIOS chip on the PC
B. Re-flash the BIOS
C. Run password cracking software on the user’s PC
D. Set the password clear jumper on the motherboard
D. Set the password clear jumper on the motherboard
A technician is repairing a printer in the payroll department that includes employees’ sensitive information. Which of the following should the technician do with the printed sensitive information documents that were used for testing?
A. Keep printed items for future reference.
B. Shred the printed documents.
C. Leave the documents on the printer.
D. Recycle all printed documents.
B. Shred the printed documents.
Explanation:
Sensitive information should be shredded to avoid any security breach. A shredder can easily shred books of documents in seconds. The ethical way is to shred the printed sensitive information documents immediately.
Network cards have a unique hex number assigned to every unit. This number is known as which of the following?
A. IP address
B. LUN
C. Network ID
D. MAC address
D. MAC address
A technician replaces a failed hard drive with a brand new one. The technician boots from a PE CD and attempts to install a custom OS build deployed from the network. The hard drive is visible in the system’s BIOS. However, once in the preinstallation environment, the drive is not recognized in the imaging process and the process fails. Which of the following is MOST likely the cause of failure?
A. The boot CD has failed and needs to be replaced.
B. The hard drive needs to have its configuration manually defined in the BIOS.
C. The PC’s power supply is not providing enough power to the new hard drive.
D. The hard drive has not been partitioned correctly.
D. The hard drive has not been partitioned correctly.
Which of the following modules of DDR SDRAM is designed to operate at 200 MHz using DDR- 400 chips?
A. PC-1600
B. PC-2100
C. PC-2700
D. PC-3200
A computer technician is installing a new wireless router for a small office. The office already has an internal device that assigns addresses to users. Which of the following functions needs to be disabled on the router to prevent conflicts?
A. DMZ capability
B. MAC filtering capability
C. Network Address Translation
D. DHCP server functionality
D. DHCP server functionality
Explanation:
DHCP automatically assigns IP address, subnet mask and default gateway to provide access to workstations. Disable DHCP server before installing a wireless router so that you can configure it without DHCP assigning IP addresses to other computers.
A user has powered off their computer after a suspected attack and breach. A technician has been assigned to pick up the PC and deliver it to the corporate office. Which of the following should the technician do after receiving the PC?
A. Record what the user experienced, the times they experienced it and the effects of the breach
B. Image the drive and create a drive hash to prove the contents were not changed in transit
C. Document the customer and technician’s names, what was received, and the time
D. Remove the hard drives as they will be installed into a PC on a “Safe LAN” in the corporate office
C. Document the customer and technician’s names, what was received, and the time
Which of the following Internet connection types is a digital form that runs over standard telephone wiring?
A. Fiber
B. Dial-up
C. Cable
D. DSL
D. DSL
Which of the following cable types should be used for analog telephony in a fire safety zone where EMI is known to be high? (Select TWO).
A. Plenum Single-mode Fiber B. Plenum Multimode Fiber C. Plenum CAT5e D. PVC CAT6 E. PVC Multimode Fiber F. Plenum STP CAT3
C. Plenum CAT5e
F. Plenum STP CAT3
In reference to express card types (e.g. Express Card 34 and Express Card 54), which of the following BEST describes what the numbers indicate?
A. Size of the memory allocation
B. Size of the expansion slot
C. The IEEE specification that it originated from
D. Number of available communication channels
B. Size of the expansion slot
Explanation:
http://www.enthusiastpc.net/articles/00003/
A memory type typically used in high end workstations and not generally found in consumer grade PCs is:
A. DDR3.
B. ECC.
C. PC2-6400.
D. DDR2-667.
B. ECC.
A technician has been asked to identify the unknown network addresses from a series of printers attached to the network via external hardware printer servers. Which of the following will provide the technician with the necessary information?
A. Performing a device self test print page from each printer
B. Performing a device print page from each print server
C. Performing a device factory reset on each print server
D. Performing a PING of each device address without the FQDN
B. Performing a device print page from each print server
Which of the following uses pair authentication to provide a wireless connection between two devices?
A. 802.11n
B. Bluetooth
C. Infrared
D. Cellular
B. Bluetooth