Exam 3 Flashcards
What RAID level requires at least three hard disks to operate?
OBJ-5.3: RAID 5 requires at least three hard disks to operate. There is no maximum number of disks required. The parity data is spread across all drives to provide redundancy, which allows the array to operate even with one of the drives fails. RAID 5 is considered one of the most popular and widely used RAID configurations. A RAID 5 provides block-level striping with distributed parity to provide redundancy using a minimum of three disks. A RAID 0 provides disk striping (speed/performance) but not mirroring with a minimum of two disks. A RAID 1 provides mirroring (redundancy) but not disk striping with a minimum of two disks. A RAID 10 combines disk mirroring and disk striping to protect data stored in the array and required a minimum of four disks.
Which of the following cables is NOT used by Android smartphones and tablets?
OBJ-1.5: Android devices do NOT use the lightning cable because it is a proprietary 8-pin port and connector used solely by Apple devices. The Lightning connector is reversible and can be inserted in either direction. Lightning is a proprietary computer bus and power connector created by Apple. The lightning cable is used by every iPhone from the 5 to 13 series. Newer iPads have shifted to the use of USB-C for charging instead of the lightning cable, though. USB-C is the default standard used in USB 3.1 with a 24-pin connector. The connector is reversible and can be inserted in either direction. Micro USB is a miniaturized version of the Universal Serial Bus (USB) interface developed for connecting compact and mobile devices such as smartphones, Mp3 players, GPS devices, photo printers, and digital cameras. Micro USB connectors exist or have existed in three forms: micro A, micro B, and micro USB 3. Mini USB was introduced with USB 2.0 and was used with digital cameras and early tablets. Mini USB is not commonly used in modern devices.
You have connected your laptop to the network using a CAT 5e cable but received an IP address of 169.254.13.52 and cannot connect to www.DionTraining.com. What is most likely the cause of this issue?
OBJ-5.7: A DHCP Server is a network server that automatically provides and assigns IP addresses, default gateways, and other network parameters to client devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to clients’ broadcast queries. Since you have received an APIPA address (169.254.13.52), this signifies a DHCP failure. If a user is unable to access a website by using its domain name but can by its IP address, then this indicates a DNS resolution issue instead. ARP caches rely on layer 2 addresses known as MAC addresses, not IP addresses. Duplicate IP addresses will create an error on the screen instead of issuing an APIPA address as shown in this example.
You want to buy a new computer that will allow you to run at least 3 virtual machines (VMs) at the same time to practice for your CompTIA exams. You also know in the future that you would like to set up a virtual ethical hacking lab with numerous VMs to study for the CompTIA PenTest+ exam. Which TWO of the following components is the MOST important to upgrade if you want to simultaneously run numerous VMs?
OBJ-3.8: If you want good performance for a computer used for extensive virtualization (such as multiple virtual machines running at once), you should maximize the CPU and the RAM. The CPU should support virtualization and be a multicore processor. The memory should be fast and contain at least 16 GB of RAM to host numerous VMs effectively. These are the most important components when building a virtualization machine to support numerous VMs.
Which of the following ports is used by LDAP by default?
OBJ-2.1: The lightweight directory access protocol (LDAP) is a protocol used to access and update information in an X.500-style network resource directory. LDAP uses port 389. The service location protocol (SLP) is a protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network. This is an alternative protocol to LDAP in newer networks. SLP uses port 427. The remote desktop protocol (RDP) is a protocol used for the remote administration of a host using a graphical user interface. RDP operates over TCP port 3389. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53.
A workstation is having intermittent issues and continues to receive system errors or freeze. You believe that the problem is being caused by the workstation’s motherboard, not getting the proper amount of power to it, and you want to perform a test to confirm your theory. Which of the following tools should you use to determine if the proper amount of power is being supplied to the motherboard?
OBJ-2.8: A multimeter can measure the voltage, amperage, and resistance of a circuit. A multimeter can be a hand-held device useful for basic fault finding and field service work or a bench instrument that can measure electricity with a high degree of accuracy. Using a multimeter, you can determine the exact voltage being supplied to the motherboard from the workstation’s power supply. A POST card is a plug-in diagnostic interface card that displays progress and error codes generated during the power-on self-test of a computer. A loopback plug is used to test a port. When you connect a loopback plug to a port, you should see a solid connection LED. You can also use the loopback plug in conjunction with diagnostic software. A cable tester is used to ensure a cable is properly created as a patch cable (straight through) or a crossover cable. Cable testers provide detailed information on the physical and electrical properties of the cable. For example, they test and report cable conditions, crosstalk, attenuation, noise, resistance, and other cable run characteristics.
A penetration tester wants to build a workstation that will be used to brute force hash digests. Which of the following is the BEST option to ensure sufficient power and speed to crack them?
OBJ-3.5: Dedicated GPUs are designed to conduct complex mathematical functions extremely quickly. If you want to build a system to perform the cracking of a password, hash, or encryption algorithm, it is important to have a high-speed, dedicated GPU. The reason to use a GPU instead of a CPU for password cracking is that it is much faster for this mathematically intensive type of work. Cracking passwords, hashes, and encryption is a lot like mining cryptocurrency in that using dedicated GPUs will give you the best performance.
A user wants to run Windows 10 on their new Macbook without dual booting with Boot Camp. What software would allow the user to run Windows inside of OS X by using a Type 2 hypervisor?
OBJ-4.2: Virtual Box is a Type 2 hypervisor that allows you to install the software inside your existing operating system. You can then install a virtual machine containing another guest operating system. For example, a macOS system can have Virtual Box installed and then utilize Windows as a guest operating system inside a virtual machine hosted by Virtual Box. Vmware ESXi, Hyper-V, and RHEV are all Type 1, bare-metal hypervisors.
Which of the following types of data should you transmit over UDP?
OBJ-2.1: UDP (User Datagram Protocol) is a connectionless, non-guaranteed method of data communication. It does not provide any sequencing or flow control. Data sent over UDP could be lost and never resent. For this reason, UDP is not used for general web browsing or activity over HTTP/HTTPS (Ports 80 and 443). UDP is very good at delivering streaming media, though, since UDP is faster than TCP. Streaming videos or making Voice over IP (VoIP) calls are examples of use cases that rely upon UDP for their transmission.
Which of the following hard drive form factors would be connected to your laptop internally using a Micro SATA connection?
OBJ-1.1: A laptop hard drive usually comes in either the 2.5” form factor or the 1.8” form factor. When a 1.8” form factor is used, the drive is connected to the laptop using a Micro SATA connector since a regular SATA connector will not fit due to the connector’s larger size. An M.2 is a new set of form factors for an SSD that uses a mini card interface that is faster than a SATA connection. A 3.5” drive is only used in desktops and some networked file servers.
Which option would you MOST likely use to configure PXE to set up remote imaging on a computer during a deployment?
OBJ-3.5: To configure a computer to utilize the PXE boot option, you need to configure it under the BIOS boot option. The Preboot Execution Environment (PXE) is an industry-standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator. Secure boot is a security system offered by UEFI that is designed to prevent a computer from being hijacked by malware. Power management allows Windows to reduce or turn off the power supplied to hardware components to save energy.
You have just finished installing a virtual machine on a workstation. Your boss asks you to install a second virtual machine with the same settings. To save time, which of the following functions should you use?
OBJ-4.2: Cloning is a function that allows you to fully copy an existing virtual machine and its current configuration. This allows you to quickly deploy an exact copy without having to reconfigure everything again manually. Virtual machine migration is the task of moving a virtual machine from one physical hardware environment to another. Secure copy protocol is a means of securely transferring computer files between a local host and a remote host or between two remote hosts over port 22. Shadow Copy is a technology included in Microsoft Windows that can create backup copies or snapshots of computer files or volumes, even when they are in use.
You had just bought a top-of-the-line smartphone 2 months ago. In the last week, though, the smartphone seems to be running slowly. About 3 weeks ago, a new version of the phone’s operating system was installed. At first, everything was still working fine, but this week the smartphone is very sluggish. You brought the smartphone back to the store to diagnose the problem. They have run a full set of diagnostics on the smartphone’s hardware, but no issues were found to exist with the hardware. What do you think is MOST likely causing the poor performance with this smartphone?
OBJ-5.5: The most likely cause for the slowdown of this top-of-the-line smartphone is that too many apps are simultaneously trying to perform an update, and it is overwhelming the processor and memory. This commonly occurs within a week or two of a newly installed OS version. For example, if we upgrade from iOS 14 to iOS 15, all of the apps are updated and recoded to support the newer OS version. They are usually released within 1-2 weeks of the newly released version. Since the hardware passed all the diagnostics, the problem cannot be the internal storage. The OS update isn’t too resource-intensive since it is only a two-month-old top-of-the-line device.
You are troubleshooting a workstation for a customer. The workstation will not boot. When it is powered on, an error message of “OS not found” is displayed on the screen. What is the MOST likely solution to fix this error?
OBJ-5.3: The “OS not found” error at boot time is an indication that the MBR (Master Boot Record) or GPT (Globally Unique ID Partition Table) is corrupted or faulty. If this occurs, you should reboot into the Windows recovery mode and use the ‘bootrec /fixmbr’ command to fix the MBR.
Your son accidentally knocked his laptop off his desk while it was charging. Your son picks up the laptop and notices that the laptop’s battery will no longer charge. You begin to troubleshoot the problem to identify the cause. You ensure the laptop is connected to the power adapter and that the power adapter is plugged into a power outlet, but the laptop’s battery will still not charge. Which of the following components was MOST likely damaged when the laptop was knocked off of the desk?
OBJ-5.5: One of the most important parts of any good laptop is the DC power jack. This item allows you to charge your battery and provides you with a steady source of electricity. If it fails, your laptop will lose power and eventually be unable to turn it on. If your battery won’t charge or will only charge if the connection is made at a certain angle, this is usually an indication that the DC power jack has failed. To rule out the battery or power adapter as the source of the problem, you can use a multimeter to ensure they are providing the right amount of power.
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the port cluster.) Using the image above, which of the following correctly indicates the port labeled as I?
OBJ-3.2: This port is the RJ-45 connection or network interface card (NIC) port that is used to connect a computer to a wired network. An RJ-45 connector is used to terminate a copper twisted-pair Ethernet cable. For the exam, it is important that you can identify the different parts of a motherboard’s rear port cluster by sight.
Sally just purchased a new iPhone and AirPods to listen to her music. After setting up the new iPhone, she can get online and watch YouTube, but her wireless headphones aren’t working. Which of the following is MOST likely the problem?
OBJ-5.5: Since Sally can connect to the internet, either her cellular or WiFi is enabled, and the phone would not be in airplane mode. Since AirPods work over Bluetooth, it is most likely that the Bluetooth is not enabled on the new phone and should be turned on. Once Bluetooth is enabled, the Airpods will need to be paired to the device to begin using them.
Your company has recently migrated much of your data center to the cloud. Now, your boss needs a method to monitor all services used in supporting your customers to be properly billed based on their usage. Which of the following cloud computing concepts is your boss describing?
OBJ-4.1: Measured service is a term that IT professionals apply to cloud computing that references services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning. Rapid elasticity is used to describe scalable provisioning or the capability to provide scalable cloud computing services. Rapid elasticity is very critical to meet the fluctuating demands of cloud users. The downside of rapid elasticity implementations is that they can cause significant loading of the system due to the high resource number of allocation and deallocation requests. On-demand refers to the fact that a consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use.
What type of connector is used to terminate a coaxial cable?
OBJ-3.2: The F type connector is used with coaxial cables. Both RG-6 and RG-59 are cable types used for coaxial cable connections. RG-6 cabling is recommended for your Cable TV, satellite, TV antennas, or broadband internet. RG-59 cabling is generally better for most CCTV systems and other analog video signals. An RJ-45 connector is used to terminate a copper twisted-pair Ethernet cable. A DB-9 connector is used to terminate an RS-232 serial cable. An RJ-11 connector is used to terminate cables used for phone lines.
Rick, a computer technician, was contacted by a customer who wants to reduce his office computer’s footprint to save space. Which of the following cases is the smallest form factor?
OBJ-3.5: Since the customer wants to save space and reduce the computer’s overall size, Rick should use an mITX (Mini-ITX). The mITX contains a smaller footprint than the other options presented and measures only 6.7” x 6.7” in size. The mATX (microATX) motherboard’s form factor is 9.6” x 9.6” in size (24 cm x 24 cm). The mATX form factor is commonly used in smaller computer systems with a small form factor (SFF) case. An mATX motherboard is backward-compatible with the larger ATX motherboard since it contains the same mounting point locations as the full-size board. An ATX motherboard’s form factor is 12” x 9.6” in size (305mm x 244mm). ITX is a series of form factors which began with the mini-ITX, but there is no specific size called ITX.
You are building a new server and want to ensure that its memory can allow the server to continue working even if there is an issue that corrupts data held within the memory modules. Which of the following types of memory should you select for the server?
OBJ-3.3: Error checking and correcting or error correcting code (ECC) is a type of system memory that has built-in error correction security. ECC is more expensive than normal memory and requires support from the motherboard. ECC is commonly used in production servers and not in standard desktops or laptops. Single-channel memory is any memory using one 64-bit bus between the CPU and the RAM. Dual-channel memory is a memory controller with two primary pathways through the bus to the CPU to transfer 128-bits of data in each transaction. Non-parity memory is a type of system memory that does not perform error checking except when conducting the initial startup memory count.
You are working on a customer’s laptop. The image on the display suddenly becomes very dark and hard to see. You attempt to adjust the brightness and contrast of the laptop’s display using the special function keys, but this doesn’t brighten the display much. You pull out a bright flashlight and can see the image displayed a little better when using it. Which of the following components is MOST likely faulty and needs to be replaced?
OBJ-1.2: The inverter (also known as inverter board, screen inverter, or LCD inverter) is a part of the laptop’s display assembly. The inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight. The digitizer is a touch-sensitive glass panel covering the LCD in a touchscreen assembly. The digitizer is used to convert touch events to digital signals that can be interpreted as different types of input. A liquid crystal display (LCD) panel is a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. LCD panels are used on laptops and have replaced CRT monitors as the main type of computer display screen for desktops, as well. A graphics processing unit (GPU) is a microprocessor used on dedicated video adapter cards or within a CPU with integrated graphics capability to handle the mathematical calculations required to create immersive and 3D graphics.
Which port is used to connect to a POP3 server?
OBJ-1.6: The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.
Which of the following types of connectors are used to terminate a CAT 5e network cable?
OBJ-3.2: RJ-45 refers to a cable termination specification that specifies physical male and female connectors and the pin assignments of data jacks that can be used for networks and VOIP telephone cables. RJ-45 is an 8-pin/8-position plug or jack commonly used to connect computers onto Ethernet-based local area networks (LAN) and consists of two wiring schemes: T568A and T568B. An RJ-11 connector is used to terminate cables used for phone lines. A Molex connector is used to provide power to internal components of a computer from the power supply.
Which of the following ports is used by the Server Message Block (SMB) protocol to share files and printers on a Windows network?
OBJ-2.1: The server message block (SMB)/common internet file system (CIFS) is a protocol used for requesting files from Windows servers and delivering them to clients. SMB allows machines to share files and printers, thereby making them available for other machines to use. Samba software allows UNIX and Linux servers or NAS appliances to run SMB services for Windows clients. SMB operates on port 445. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443. The file transfer protocol (FTP) is the protocol used to transfer files across the internet over ports 20 and 21. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time.
While troubleshooting a switch at the Dion Training offices, you believe that one of the ports on a switch is defective. To prove your hypothesis, which of the following tools should you use?
OBJ-2.8: A loopback plug is used to test a port. It involves connecting pin 1 to pin 3 and pin 2 to pin 6. You can do this either by rewiring the jack or twisting the relevant pairs together on a cable stub. Alternatively, you can purchase a prefabricated loopback plug. When you connect a loopback plug to a port, you should see a solid connection LED. You can also use the loopback plug in conjunction with diagnostic software. A crimper is a tool used to attach an RJ-45 plastic connector to an unshielded twisted pair (UTP) or shielded twisted pair (STP) cable. It pushes a portion of the plastic into the jacket of the cable to hold it in place. A cable tester is used to ensure a cable is properly created as a patch cable (straight through) or a crossover cable. Cable testers provide detailed information on the physical and electrical properties of the cable. For example, they test and report cable conditions, crosstalk, attenuation, noise, resistance, and other cable run characteristics. Punchdown tools are used to connect an ethernet cable to the back of a patch panel, a punchdown block, or the back of a network wall jack.
You are building a Desktop PC for a newly hired employee at Dion Training. The computer’s motherboard doesn’t have a wireless network adapter integrated into it, so you need to purchase an expansion card to provide this functionality. Which of the following motherboard connections will most likely be used to connect the wireless network adapter card?
OBJ-3.5: PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has several PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. Network adapters and Wi-Fi network cards almost exclusively rely on PCIe x1 expansion slots or a USB connection for their connectivity. Graphics cards usually rely on a PCIe x16 expansion slot. eSATA is an external SATA port used to connect an external storage device such as a hard drive. The accelerated graphics port (AGP) is a parallel expansion card standard that was originally designed for attaching a video card to a computer system to assist in the acceleration of 3D computer graphics. AGP has been replaced with PCIe due to its faster speeds.
Which of the following is an APIPA or link-local address?
OBJ-2.6: IP addresses are either public, private, localhost, or APIPA addresses. Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function. When a host uses an APIPA address, it can communicate with other hosts on the same network using APIPA. Still, it cannot reach other networks or communicate with hosts who have managed to obtain a valid DHCP lease. Any address from 169.254.1.0 to 169.254.254.255 is considered an APIPA address. An APIPA address is also referred to as a link-local address. A private IP address is in the range of 10.x.x.x, 172.16-31.x.x, or 192.168.x.x. A localhost IP is 127.0.0.1. All others are considered public IP addresses.
Both Apple and Samsung have released their own version of contactless mobile payment solutions. For example, Apple Pay allows users to place their iPhone or Apple Watch within an inch of a credit card machine at a store to make a payment. Which of the following wireless technologies do these types of payment systems rely upon?
OBJ-1.5: NFC, or near-field communication, is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Infrared (IR) was a wireless networking standard supporting speeds up to about 4 Mbps with a direct line of sight for communications. Infrared sensors are used in mobile devices and with IR blasters to control appliances. While infrared (IR) used to be commonly used to connect wireless mice and keyboards to a laptop in the 1990s, it has fallen out of favor in the last 10-15 years since Bluetooth is more reliable and does not require a direct line of sight between the device and the laptop. Wi-Fi is the IEEE 802.11 standard for wireless networking based on spread spectrum radio transmission in the 2.4 GHz and 5 GHz bands. The standard has six main iterations (a, b, g, n, ac, and ax), describing different modulation techniques, supported distances, and data rates.
Which RAID solution will provide the BEST speed and redundancy for a backup and disaster recovery server?
OBJ-3.4: RAID 10 provides the system with both speed and efficiency. With RAID 10, the system has a mirror of striped disks for full redundancy and double fault tolerance. RAID 10 configuration (also known as RAID 1+0) requires a minimum of four disks and mirrors data across a striped disk pair. This is not only the best option presented in this question but also the most expensive option. A RAID 0 provides disk striping (speed/performance) but not mirroring with a minimum of two disks. A RAID 1 provides mirroring (redundancy) but not disk striping with a minimum of two disks. A RAID 5 provides block-level striping with distributed parity to provide redundancy using a minimum of three disks.
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.) Using the image of the motherboard above, which of the following correctly indicates the circled area?
OBJ-3.5: The area circled indicates the AGP slot on this motherboard. The accelerated graphics port (AGP) is a parallel expansion card standard that was originally designed for attaching a video card to a computer system to assist in the acceleration of 3D computer graphics. AGP has been replaced with PCIe due to its faster speeds. For the exam, it is important that you can identify the different parts of the motherboard by sight.
What material is first applied to a CPU during installation to help draw excess heat away from the processor?
OBJ-3.5: Thermal paste is a paste used to connect a heat sink to a CPU that provides a liquid thermally conductive compound gel to fill any gaps between the CPU and the heat sink to transfer heat more efficiently to the heat sink from the CPU. A heat sink is a block of copper or aluminum with fins. A cooling effect occurs when convection is achieved using passive cooling as the fins expose a larger surface area to the air around the component. Fans are used to dissipate the heat generated by the processors by increasing the airflow across the components. Liquid cooling uses a system of pumping water throughout the chassis to dissipate the heat generated by the processors. Liquid cooling is more effective at removing the heat than a fan-based system and quieter, too.
You just bought a new Virtual Reality headset to use with your computer. To ensure your computer is ready to support the new VR games, which of the following should you install?
OBJ-1.4: Virtual Reality (VR) requires a fast processor, lots of memory, and, most importantly, a dedicated graphics card. To support lag-free virtual reality and reduce headaches/eye pain, you need to ensure you have a high-end dedicated graphics card or GPU in your system. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. A hard disk drive (HDD) is a device providing persistent mass storage for a workstation or laptop by saving data even when the computer is turned off. Data is stored using platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter known as sectors.
A student wants to use their workstation to run several virtual machines. The workstation currently has an i7 quad-core processor, 4 GB of DDR3 memory, a 512 GB SSD, and a gigabit network interface card. Which of the following components should the student upgrade to support multiple virtual machines running simultaneously on the Windows workstation?
OBJ-5.2: This workstation is sufficient to run multiple virtual machines as long as the RAM is upgraded. Windows 10 requires at least 2 GB of memory, so only having 4 GB of memory for the entire system is too little to run multiple VMs. It is recommended to upgrade to at least 16 GB of RAM to allow this workstation to support multiple VMs. A virtualization machine needs a lot of memory, multiple processor cores (this already has 4 cores), adequate storage (512 GB of SSD is adequate), and a high-speed network card (1 Gbps is sufficient).