Exam 5 Flashcards

1
Q

Dion Training’s file server is using a RAID 5 with four disk drives as its data store. One of the drives in the array has just failed. The RAID 5 is still operating and no data loss has been experienced, but the array is no longer providing any resiliency or redundancy. Which of the following actions should you take to restore this drive to normal operations?

A

OBJ-5.3: In a RAID 5 storage array, you should replace the failed disk and then rebuild the array. If you remove the failed drive, the array can continue functioning at sub-optimal performance until a new drive is installed. The options to perform a system restore would result in downtime and possible data loss. Therefore they should not be selected. While you could run a RAID 5 with only 3 drives, this RAID 5 was already using 4 drives, and the loss of one of those drives by rebuilding it as a 3 drive RAID 5 would result in a 33% reduction in the amount of storage space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Molly enjoys playing an online MMORPG each day after work. To access the game, she simply enters the website address and logins in to begin playing. Today, she tried to access the game from her laptop at work, but she couldn’t launch the game. What is most likely causing the issue?

A

OBJ-4.1: The company firewall may be blocking any gaming-related websites and applications to improve security. Adding the website or a category of websites to the firewall’s blocklist would prevent all corporate users from accessing the content. When using cloud-based resources, it is important that all of the right ports and protocols are allowed through the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A client has a new 2-in-1 laptop/tablet. Whenever they use the touchscreen, the cursor appears to jump to the wrong location and select the wrong icons. If the client connects a USB mouse, there are no issues with using the device. Which of the following should you attempt to perform FIRST to fix this issue?

A

OBJ-5.4: Tablet/laptops with touchscreen capability can be recalibrated from within the Windows Control Panel. This will ensure that the right parts of the screen are responding when touched. If this is not effective, then you should attempt to update the touchscreen’s drivers. Cursor drift can occur over time, but it is easily fixed by conducting a new touch calibration sequence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Jason’s new iPhone has locked up, and the touchscreen is unresponsive. He tries to tap the screen, press the buttons, and still, nothing happens. What should he do next?

A

OBJ-5.5: Smartphones can become frozen, hung up, or locked up to the point they are unresponsive to touch or some button presses. The best solution is to hold down the power and volume down buttons simultaneously on an iPhone and then slide to power off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Jason would like the fastest internet available at his house, and he called his local fiber-optic provider. Which of the following offers would provide the fastest service to Jason’s home network?

A

OBJ-2.7: “Fiber to the X” (FTTx) is commonly used to describe where the fiber connection ends between the service and the subscriber. The closer the fiber is to the user’s network, the faster the service. FTTH (fiber to the house) provides fiber directly to the user’s home network making it the fastest option. Traditionally, you will find a 1 Gbps connection or higher with FTTH. FTTN (fiber to the node) or FTTC (fiber to the curb/cabinet) provides fiber only to the local area or neighborhood but then uses copper cabling from the node/cabinet/curb to the home network, which slows down the network (generally, 100-200 Mbps). HFC (Hybrid Fiber Coax) is similar to FTTN/FTTC, except that coaxial cable is used from the cabinet to the home to increase the speed (generally 300-500 Mbps).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have signed up for a web-based appointment scheduling application to help you manage your new IT technical support business. What type of solution would this be categorized as?

A

OBJ-4.1: Software as a Service (SaaS) is ca loud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions. Platform as a Service (PaaS) is a cloud computing service that enables consumers to rent fully configured systems that are set up for specific purposes. Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center. Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have been asked to configure your neighbor’s SOHO network. Your neighbor wants to build a Minecraft server so that all their friends can play together over the internet. When configuring their firewall, where should you place the server?

A

OBJ-2.3: A perimeter network (formerly called a Demilitarized Zone or DMZ) is a portion of a private network connected to the Internet and protected against intrusion. Certain services may need to be made publicly accessible from the Internet (such as a web, email, or Minecraft server) and they should be installed in the perimeter network instead of in your intranet. If communication is required between hosts on either side of a perimeter network, then a host within the perimeter network will act as a proxy to take the request. If the request is valid, it re-transmits it to the destination. External hosts have no idea about what is behind the perimeter network so that the intranet remains secure. A perimeter network can be implemented using either two firewalls (screened subnet) or a single three-legged firewall (one with three network ports). In this SOHO network, it would use a single three-legged firewall approach to separate the perimeter network from the LAN and WAN. A local area network (LAN) is a network where all the nodes or hosts participating in the network are directly connected with cables or short-range wireless media. A wide area network (WAN) is a network that spans multiple geographic locations such as the internet. A metropolitan area network (MAN) is a network that covers a geographical area equivalent to a city or municipality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which version of USB can operate at speeds of up to 5 Gbps?

A

OBJ-3.1: USB 3 can support speeds of up to 5 Gbps. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at the slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You just bought a new car and want to use the built-in stereo to make and receive calls on your smartphone. Which of the following should you perform to connect your smartphone to the car stereo?

A

OBJ-1.6: By pairing the device, you will establish the Bluetooth connection between your smartphone and the car stereo. Bluetooth is commonly used to create a wireless connection between a smartphone and a car stereo for making/receiving phone calls, streaming music from the smartphone to the stereo, and other functions supported by the stereo. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another. Wi-Fi is the IEEE 802.11 standard for wireless networking based on spread spectrum radio transmission in the 2.4 GHz and 5 GHz bands. The standard has six main iterations (a, b, g, n, ac, and ax), describing different modulation techniques, supported distances, and data rates. A device driver is a small piece of code that is loaded during the boot sequence of an operating system. This code, usually provided by the hardware vendor, provides access to a device, or hardware, from the OS kernel. Under Windows, a signing system is in place for drivers to ensure that they do not make the OS unstable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A client has a workstation with a RAID 5 configuration and reports that slower than normal performance occurs when reading/writing files to the RAID. You run a diagnostic program against the RAID, and the system passes all of the diagnostic tests without any issues. While you are running the tests, though, you heard clicking noises coming from the RAID. Which of the following is the MOST likely cause of the slow performance being experienced by the client?

A

OBJ-5.3: Based on the symptoms described, the RAID itself is fully functional, so the RAID controller is not causing any problems. This could be caused by a failing hard drive or the system overheating due to the slow performance. Since there is a clicking noise, this is most likely a hard drive failure since a cooling fan makes a whirring or grinding noise instead. Therefore, we can assume the RAID is made up of magnetic hard drives, and one of those hard disks is starting to fail. To replace the hard drive, you need to find a comparable drive that will work in the array, reboot the computer, and enter the RAID setup program to rebuild the array after replacing that hard drive. If you use a RAID 1, RAID 5, or RAID 10, the system will continue to operate normally, but with slower performance, until you replace the hard drive and rebuild the RAID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have been asked to set up the corporate email on several mobile devices for Dion Training’s employees. The employees will use their mobile devices to check their email when out of the office, but they will also need to check their email from their desktop computers. Which of the following mail protocols should you configure to allow the employees to receive their mail and maintain the read/unread status across all of their devices?

A

OBJ-1.6: You should configure IMAP because it will leave the email on the server and allow for synchronizing the mail to all devices, including each email’s read state. If you configure POP3, the mail is downloaded to the device and removed the mail from the server’s mailbox by default. SMTP is used to send emails, not receive them. HTTPS is used for web browsing, not for receiving emails. The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following storage types utilize a NAND chipset mounted directly onto the motherboard instead of a mechanical spinning drive to store data?

A

OBJ-3.4: NVMe (Non-Volatile Memory Express) is a storage controller mounted on the motherboard. It utilizes a NAND chipset and connects via the motherboard’s PCIe bus for increased speed. NVMe allows much higher transfer rates than SATA/AHCI. A solid-state drive (SSD) is a personal computer storage device that stores data in non-volatile special memory instead of on disks or tape. While SSDs also avoid spinning drives, they cannot be mounted directly onto the motherboard. A hard disk drive (HDD) is a device providing persistent mass storage for a workstation or laptop by saving data even when the computer is turned off. Data is stored using platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter known as sectors. Serial ATA (SATA) is the most widely used interface for hard disks on modern desktop and laptop computers. SATA uses a 7-pin L-shaped data connector with one device per port. SATA operates at bandwidths of 1.5 Gbps, 3 Gbps, or 6 Gbps. SATA drives can also use a 15-pin power connector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your company has decided to move all of its data into the cloud. Your company is small and has decided to purchase some on-demand cloud storage resources from a commercial provider (such as Google Drive) as its primary cloud storage solution. Which of the following types of clouds is your company using?

A

OBJ-4.1: The public cloud is defined as computing services offered by third-party providers over the public internet, making them available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume. Amazon Web Services, Microsoft Azure, and Google Cloud are three popular public cloud platforms. A private cloud contains services offered either over the Internet or a private internal network and only to select users instead of the general public. A community cloud is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third party and hosted internally or externally. A hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud, and third-party public cloud services with orchestration between these platforms. This typically involves a connection from an on-premises data center to a public cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dion Consulting Group is working with a new laptop manufacturer. The manufacturer wants to create the thinnest and lightest laptops in the world. To do this, they need to choose the right technology for their displays. Which technology should Dion Consulting recommend to allow for the thinnest laptop displays?

A

OBJ-1.2: An OLED display works without a backlight because it emits visible light. Thus, it can display deep black levels and be thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions (such as a darker room), an OLED screen can achieve a higher contrast ratio than an LCD, regardless of whether the LCD uses cold cathode fluorescent lamps or an LED backlight. An in-plane switching (IPS) LCD panel uses technology designed to resolve the quality issues inherent in TN panel technology, including strong viewing angle dependence and low-quality color reproduction. A liquid crystal display (LCD) panel is a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. The LCD panel is backlight by a cold cathode fluorescent (CCFL) bulb. LCD panels are used on laptops and have replaced CRT monitors as the main type of computer display screen for desktops, as well. A light-emitting diode (LED) display is an LCD panel that uses a LED backlight instead of a CCFL backlight to provide its light source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A client is attempting to power on their computer, but it keeps booting to the incorrect hard drive. Which of the following actions should you perform to attempt to fix this problem?

A

OBJ-5.2: If the system still fails to boot up from the correct drive, then go into the BIOS/UEFI setup program and check the existing boot order settings. If they are in the wrong order, reconfigure them to ensure the usual boot device is listed first in the list and then restart the computer. There is no need to unplug the exteranl hard disks since you can simply change the boot order in the BIOS. The F8 key will allow the user to choose to boot into Windows in regular or safe mode. This worked by default in Windows 7, 8, and 8.1, but need to be enabled before it will work in Windows 10. The technician cannot configure the boot order in Windows without first booting into Windows from the hard drive, so the technician would still need to reconfigure the boot order in the BIOS/UEFI first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Jason created an email with sensitive information. To secure the contents, he encrypted the email before sending it to the recipient. The recipient received the email in their email client but cannot decrypt and read the email’s contents. Which of the following is MOST likely the issue?

A

OBJ-5.5: The email would rely on S/MIME (Secure/Multipurpose Internet Mail Extensions), a standard for the public key encryption and signing of MIME data within emails. The client may be unable to read the S/MIME contents due to a missing or corrupted digital certificate. SMTP is used for sending an email, not receiving and reading emails. The receiver would not be attempting to encrypt the content. They would be attempting to decrypt it. The receiver’s POP3 server appears to be functional since they received the email. They simply cannot open/read it (which relies on S/MIME).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The Chief Financial Officer has asked Maria for a recommendation on how the company could reduce its software licensing costs while still maintaining the ability to access its application server remotely. Which of the following should Maria recommend?

A

OBJ-3.9: A thin client is a small device that can operate with or without an operating system installed on the client device. Instead, it can boot directly from a network-based operating system on a common server and access applications on the company’s application server. This type of architecture can drastically reduce the need for operating system licenses and reduce deployment costs. A thin client runs from resources stored on a central server instead of a localized hard drive. Thin clients work by connecting remotely to a server-based computing environment where most applications, sensitive data, and memory are stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A technician is troubleshooting an issue with a workstation. The workstation can ping 8.8.8.8 successfully, but it is unable to access Facebook.com. Which internal network server is MOST likely causing these issues?

A

OBJ-2.5: A DNS server is used to perform name lookups and convert them to valid IP addresses. If a workstation can ping an IP, that indicates the network connection is working. If the workstation cannot access a website using its domain name (like diontraining.com or facebook.com), it indicates a problem might exist with the DNS server. A domain name system (DNS) server is a server that hosts the database of domain names and the IP addresses mapped to those names. Each DNS server is authoritative for certain domain names that their organization owns. A mail server is a server that sends or received emails on behalf of its users. POP3 and IMAP servers are used to receive email and SMTP is used to send an email. A dynamic host configuration protocol (DHCP) server is a server configured with a range of addresses to lease. Hosts can be allocated an IP address dynamically or be assigned a reserved IP address based on the host’s MAC address. The server can also provide other configuration information, such as the location of DNS servers. A file server is used to host and control access to shared files and folders for the organization. A file transfer protocol (FTP) server is a type of file server that is used to host files for users outside your organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.) Using the image of the motherboard above, which of the following correctly indicates the circled area?

A

OBJ-3.5: The area circled indicates the USB connectors on this motherboard. These connectors are used to connect the front panel USB ports to the motherboard. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at the slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power. For the exam, it is important that you can identify the different parts of the motherboard by sight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Your boss wants to be able to remotely print from her laptop and smartphone while away from the office. She asks you to set up a method to ensure that she doesn’t have to go back to her office to print a document. Which of the following should be configured to meet this requirement?

A

OBJ-3.10: In this case, your boss asked for a simple way to print from her mobile devices when she is out of the office. Therefore, you should configure cloud printing. For example, Google’s Cloud Print allows a user to print from any device in the world, regardless of their current location. After printing, the printed papers would be ready in her office when she returns. Bluetooth allows a connection from up to 10 feet away, making it unusable when she is out of the office. An integrated print server would require her to be connected to the local area network to send the documents to the printer. WiFi printing would also require her to be in the office to connect to the wireless network and print the documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Your boss is looking for a recommendation for a backup solution that can backup non-sensitive data in the most cost-efficient way. The company already has an Office 365 subscription for each employee. The employees should be able to backup and access their data from anywhere using their laptops, smartphones, or tablets. Which of the following solutions should you recommend?

A

OBJ-4.1: OneDrive is a Microsoft product that comes as part of the Office 365 subscription package. The other options can also provide the capabilities requested, but there would be a separate cost to utilize them. Therefore, you should recommend OneDrive in this scenario. OneDrive can utilize the storage that is easy to access from a laptop, smartphone, or tablet while the employees are away from their offices. Software as a Service (SaaS) is a cloud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Your company is currently using a 5 GHz wireless security system, so your boss has asked you to install a 2.4 GHz wireless network to use for the company’s computer network to prevent interference. Which of the following can NOT be installed to provide a 2.4 GHz wireless network?

A

OBJ-2.4: Wireless networks are configured to use either 2.4 GHz or 5.0 GHz frequencies, depending on the network type. 802.11a and 802.11ac both utilize a 5.0 GHz frequency for their communications. 802.11b and 802.11g both utilize a 2.4 GHz frequency for their communications. 802.11n and 802.11ax utilize either 2.4 GHz, 5.0 GHz, or both, depending on the Wi-Fi device’s manufacturer. The 802.11b (Wireless B) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 11 Mbps. The 802.11g (Wireless G) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 54 Mbps. The 802.11n (Wireless N) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 108 Mbps or a 5.0 GHz frequency to provide wireless networking at speeds up to 600 Mbps. Wireless N supports the use of multiple-input-multiple-output (MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless N supports channel bonding by combining two 20 MHz channels into a single 40 MHz channel to provide additional bandwidth. The 802.11ac (Wireless AC or Wi-Fi 5) standard utilizes a 5 GHz frequency to provide wireless networking at theoretical speeds up to 5.5 Gbps. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When using an impact printer, what is used to transfer the ink to a piece of paper?

A

OBJ-3.11: An impact printer operates the same way as an old-fashioned typewriter. It uses a film-like ribbon that sits inside between the paper and print head. The ribbon is impacted by a series of mechanical dots in the print head, and this transfers the ink from the ribbon to the paper to form the desired image or text. An inkjet cartridge is used with an inkjet printer. Toner is used with a laser printer. Filament is used with a 3-D printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following wiring standards should be used when installing ethernet cabling in an office or data center?

A

OBJ-3.1: The T568A and T568B standards are used when installing ethernet cabling. If both ends of the cable use T568A, the cable being created is called a straight-through or patch cable. If one end of the cable is T568A and the other is T568B, then the cable is called a crossover cable. By default, the Department of Defense uses T568A writing on both ends of a cable, and most other organizations use the ANSI/TIA/EIA standards that use T568B on both ends of the cable. An RJ-11 connector is used to terminate cables used for phone lines. A DB-9 connector is used to terminate an RS-232 serial cable. RG-6 cabling is recommended for your Cable TV, satellite, TV antennas, or broadband internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following devices combine an accurate geolocation system that communicates with a constellation of 24 satellites continuously during its operation?

A

OBJ-1.4: A GPS (global positioning system) device is used to determine a receiver’s position on the Earth based on information received from 24 GPS satellites, which operate in a constellation in Medium Earth Orbit (MEO). The receiver must have a line-of-sight to four of the GPS satellites continuously to accurately determine its position on the earth (latitude, longitude, and altitude). A virtual reality headset (VR) is a headset worn like goggles to interact with images displayed in the headset. Virtual reality is a computer-generated, simulated environment experienced via a headset connected to a PC or powered by a smartphone. An e-Reader is a tablet-sized device designed for reading rather than general-purpose computing. For example, the Amazon Paperwhite is an example of a traditional e-Reader. Fitness monitors are wearable mobile devices that focus on tracking the health and exercise habits of their users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following ports should you unblock at the firewall if your workstation cannot access http://www.diontraining.com but can access https://www.diontraining.com?

A

OBJ-2.1: HyperText Transfer Protocol (HTTP) is the basis for the World Wide Web. HTTP enables clients (typically web browsers) to request resources from an HTTP server. A client connects to the HTTP server using its TCP port (the default is port 80) and submits a resource request using a Uniform Resource Locator (URL). HTTPS (HTTP Secure) uses port 443. In this question, it states that the user can access HTTPS but not HTTP, indicating that port 80 is blocked. The server message block (SMB)/common internet file system (CIFS) is a protocol used for requesting files from Windows servers and delivering them to clients. SMB allows machines to share files and printers, thereby making them available for other machines to use. Samba software allows UNIX and Linux servers or NAS appliances to run SMB services for Windows clients. SMB operates on port 445. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Jason’s cellphone company allows him to use his smartphone as a wireless hotspot with his laptop when traveling. Jason notices that if he runs a speed test from his smartphone, the cellular connection is 8761 kbps. If he runs the same speed test connection from his laptop connected to his cellphone over its wireless hotspot, the speed drops to 243 kbps. Which of the following is the MOST likely cause for the drop in the speed test results?

A

OBJ-5.7: Some cellular companies provide free mobile hotspots as part of their plans, but they will throttle the speeds provided by the hotspot. For example, T-Mobile in the United States can provide extremely fast cellular data connections from your smartphone, but they will throttle your hotspot connectivity to 256 kbps unless you purchase an additional high-speed option for your hotspot. The other options are all incorrect since any of those issues would cause the laptop to have no connectivity instead of the slow connectivity provided in the question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You have just set up an FTP server to allow users to download the new open-source application your company is releasing. Which port should be opened to allow users to connect to this server?

A

OBJ-2.1: The file transfer protocol (FTP) is the protocol used to transfer files across the internet over ports 20 and 21. Secure shell (SSH) is the protocol used for remote administration and file copying using TCP port 22. SSH is considered secure since it uses authenticated and encrypted sessions for communication. Telnet is the protocol used for remote command-line administration of a host using TCP port 23. Telnet is considered insecure since it is unauthenticated and unencrypted. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You are traveling to Thailand on a business trip. Your laptop’s touchscreen display is visibly flickering between being too bright and too dim when plugged into the power outlet at a local coffee shop. You take your laptop to your hotel room, and you notice it doesn’t flicker when plugged in there. Which of the following is the MOST likely cause of this issue?

A

OBJ-5.4: Since the only change between the flickering and non-flickering was the change in location and the power source, it is likely the cause of the issue. In some areas of the world, power is less stable and reliable than in more industrialized countries like the United States, Canada, England, and Japan. Some locations around the world have less reliable power that is subject to more power fluctuations. Flicker is a visible change in a lamp’s brightness due to rapid fluctuations in the power supply voltage. The voltage drop is generated over the grid’s source impedance by the changing load current of equipment or facility. These fluctuations can generate the visible flicker noticed by the user of the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following virtualization concepts refers to a VM’s ability to have memory allocated for its use?

A

OBJ-4.1: Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. Measured service is a term that IT professionals apply to cloud computing that references services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning. Using a synchronization app can allow the files to be stored on both the laptop and the cloud service while maintaining the latest versions in both places. This allows a user to synchronize content between all of their own devices and share their cloud storage content with other users. Multiple users can simultaneously access the content to work collaboratively, or they can access it at different times. Each user’s changes are typically marked with a flag or color highlighting to indicate who made changes to what content. Virtual application streaming allows an application to be delivered to a workstation from the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Ted, a file server administrator at Dion Training, has noticed that many sensitive files have been transferred from a corporate workstation to an IP address outside of the local area network. Ted looks up the IP address and determines that it is located in a foreign country. Ted contacts his company’s security analyst, verifying that the workstation’s anti-malware solution is up-to-date and the network’s firewall is properly configured. What type of attack most likely occurred to allow the exfiltration of the files from the workstation?

A

OBJ-2.4: Since the firewall is properly configured and the anti-malware solution is up-to-date, this signifies that a zero-day vulnerability may have been exploited. A zero-day vulnerability is an unknown vulnerability, so a patch or virus definition has not been released yet. A zero-day vulnerability refers to a hole in software that is unknown to the vendor. Hackers then exploit this security hole before the vendor becomes aware and hurries to fix it. This exploit is therefore called a zero-day attack. Zero-day attacks include infiltrating malware, spyware, or allowing unwanted access to user information. Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Impersonation is the act of pretending to be someone or something else. A session hijacking attack compromises the session token by stealing or predicting a valid session token to gain unauthorized access to the webserver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Jason presents a “how to pass your certification exams on the first attempt” lesson for his students using an overhead projector. After 24 minutes, the project goes blank. Jason allows the students to take a 15-minute coffee break while he attempts to turn the project back on. The project runs for another 4 minutes and then turns off again. What is MOST likely wrong with the projector and the laptop setup?

A

OBJ-5.4: The most likely cause is that the projector is overheating. A faulty or clogged cooling fan could cause this. If the projector overheats, it will turn off the projector’s bulb to reduce the machine’s heat load. The laptop’s sleep setting is not the cause since it is randomly turning off at different amounts of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Samantha, a consultant, is working onsite at a large corporation’s headquarters this week. She takes out her iPad and attempts to launch an application. She notices that the application will not launch, even though she is connected to the wireless network and has properly established internet connectivity. Which of the following should she do to fix this issue and allow the application to launch properly?

A

OBJ-5.5: Applications often run in the background and do not get properly closed when you finish using them. This can cause them to hang and lock up when a user tries to reopen them. By closing all open applications, shutting down the iPad, then rebooting it and launching the app again will ensure that the application is freshly loaded and overcome many issues. This will ensure that the cache is cleared before attempting to reload the application. While a factory reset and iOS reload would also work, it would take much longer and cause extensive data loss on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

An employee at Dion Training complains that every time airplane mode is enabled on their laptop, their external mouse and headphones stop working. Which of the following technologies is being disabled by airplane mode and likely causing the issues experienced by this user?

A

OBJ-1.6: Bluetooth is a wireless connectivity method that is usually used by external mice and wireless headphones. When airplane mode is enabled, the GPS, cellular, wireless, and Bluetooth radios are usually disabled in smartphones, tablets, or laptops. If the Bluetooth radio is turned off/disabled, it will cause issues with Bluetooth-connected devices like mice and headphones. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. A GPS (global positioning system) device is used to determine a receiver’s position on the Earth based on information received from 24 GPS satellites, which operate in a constellation in Medium Earth Orbit (MEO). The receiver must have a line-of-sight to four of the GPS satellites continuously to accurately determine its position on the earth (latitude, longitude, and altitude). A cellular radio is a component in a mobile device capable of switching frequencies automatically when moving between network cells without losing the connection. Wi-Fi is the IEEE 802.11 standard for wireless networking based on spread spectrum radio transmission in the 2.4 GHz and 5 GHz bands. The standard has six main iterations (a, b, g, n, ac, and ax), describing different modulation techniques, supported distances, and data rates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Dion Training wants to install a network cable to run a television signal between two buildings. Which of the following cable types should it utilize?

A

OBJ-3.1: A coaxial cable is a cable used to transmit video, communications, and audio. A coaxial or coax cable is most commonly used as a cable to connect a TV to a cable TV service. Coaxial cables are a specialized type of copper cabling that uses a copper core to carry the electrical signal while being enclosed by plastic insulation and shielding to protect the data transmission from the effects of electromagnetic interference (EMI). Plenum-rated cable has a special insulation that has low smoke and low flame characteristics. Plenum cable is mandated to be installed in any air handling space. Shielded cables contain a braided foil shield around the inner cabling to protect the data from the effects of electromagnetic interference (EMI). An optical fiber consists of an ultra-fine core of glass to carry the light signals surrounded by glass or plastic cladding, which guides the light pulses along the core, and a protective coating. The fiber optic cable is contained in a protective jacket and terminated by a connector. Fiber optic cables use light signals to carry data across a cable at extremely high bandwidths.

36
Q

What type of connector is most commonly used to terminate a copper twisted-pair Ethernet cable?

A

OBJ-3.2: A copper twisted-pair Ethernet cable is usually terminated with an RJ-45 connector. Coaxial cables are normally terminated using an F type connector. An RS-232 serial cable is normally terminated with a DB-9 connector. A fiber optic cable normally uses an ST, SC, LC, or MTRJ connector.

37
Q

You are troubleshooting a Dell laptop for a customer, and you see a blank screen during boot up. You decide to plug in an external monitor to the laptop and reboot it again, but the blank screen persists. What should you attempt next?

A

OBJ-5.2: Many laptops have a series of keystrokes such as FN + F8 to switch from the internal display to an externally connected screen. Since the internal display is not working, rebooting again or trying to navigate the BIOS without seeing the screen would be ineffective. Instead, trying the function key toggle that switches to an external monitor may resolve the issue temporarily while you begin to look for a long-term solution. Different manufacturers use different keystrokes, but FN + F8 is an example of the keystroke used in Dell laptops.

38
Q

You are troubleshooting a laptop’s display for a customer. The customer states that parts of the picture remain on the screen even after a full shutdown or reboot. You update the device drivers and recalibrate the display, but the problem remains with the laptop’s display. Which of the following is MOST likely the problem with the display?

A

OBJ-5.4: Burn-in or image persistence is a discoloration of areas on an electronic display that causes a non-uniform use of the pixels that appears as an image remains after the screen is turned off or rebooted. While LCD and LED displays are not as likely as plasma and CRT monitors to suffer from burn-in, burn-in can still occur.

39
Q

You are troubleshooting a workstation with four identical memory sticks installed, one in each of the slots labeled 1, 2, 3, and 4. The motherboard has a marking near the memory slots that says, “quad-channel support.” Based on what you observe, how many channels are being used by the motherboard’s memory?

A

OBJ-3.3: Since the motherboard says it supports quad-channel, and four sticks of memory are installed, it would be using four channels. By using a motherboard that supports a quad-channel memory controller, the motherboard is able to transfer up to 256-bits of memory per transactions (4 x 64-bits) to increase the bandwidth available for data transfer.

40
Q

You are building a virtualization environment to host several secured Linux distributions as VMs. The VMs need to have access to the local corporate network and communicate with the host operating system, the other VMs, and the internal network clients. Still, they should not have access to the internet. Which of the following types of network connections should you configure for each VM?

A

OBJ-4.2: If you select internal, each VM can communicate between the host and the other VMs. If you select external, the VMs would have internet access. The private network connection type will create a switch that is usable only by the VMs. The VMs cannot use the switch to communicate with the host. If you select localhost, each VM could only communicate with itself.

41
Q

You are troubleshooting a computer that will not boot. You do not hear anything when you attempt to boot the computer, but you smell something that reminds you of burning plastic. Which of the following tools should you use to diagnose the problem with this computer?

A

OBJ-5.2: The smell of burning plastic and the computer not turning on are symptoms of a power supply issue. Therefore, you should use a power supply (PSU) tester. A burning smell emitting from your laptop indicates that your machine’s cooling system is not functioning properly. If your laptop smells like something is burning, this usually means that your computer is overheating. This can be caused by a fan not working properly. For example, if the power supply unit’s fan isn’t working properly, the unit can overheat, and the wiring in the power supply’s transformer can start to burn or melt. This can then cause the power supply unit to fail, too.

42
Q

(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the port cluster.) Using the image above, which of the following correctly indicates the port labeled as D?

A

OBJ-3.1: This port is an HDMI connection. A high-definition multimedia interface (HDMI) connection is used to provide high-specification digital content to audio-video equipment from a computer. For the exam, it is important that you can identify the different parts of a motherboard’s rear port cluster by sight.

43
Q

Jason’s iPad only had 12% battery remaining at the end of the day, so he connected his iPad to the lightning cable and wall adapter last night before going to bed. In the morning, Jason tried to turn on the iPad, but it appeared to be completely powered down, and the battery was drained. Jason connected the lightning cable to his iPhone, and the iPhone began charging. Which of the following is MOST likely the reason that the iPad didn’t charge overnight?

A

OBJ-5.5: Since the iPad didn’t charge overnight, but the iPhone could charge with the same wall adapter and lightning cable, so we must suspect that the charging port or the battery on the iPad is defective. Since the iPad’s battery was working yesterday during the day (as noted by the 12% battery remaining at the end of the day), it is MOST likely that the charging port is defective.

44
Q

You are about to embark on a long trip, which will require over 24 hours of flying. You want to read several books during your trip, but do not want to carry all the paperbacks with you. You have decided to purchase a device for the trip for the sole purpose of reading books, but it must have extremely long battery life and not get distorted or hard to read in the sunlight. Which should you purchase?

A

OBJ-1.4: An e-Reader is a tablet-sized device designed for reading rather than general-purpose computing. For example, the Amazon Paperwhite is an example of a traditional e-Reader. Unlike a tablet, an e-reader is designed for the sole purpose of reading digital books and magazines (with perhaps the option to add annotations). E-readers use electrophoretic ink (e-ink) technology to create an Electronic Paper Display (EPD). Compared to the LED or OLED display used on a tablet, an EPD has low power consumption but facilitates high contrast reading in various ambient light conditions. These screens do not need to use a backlight in typical conditions, saving power and extending battery life.

45
Q

Which of the following ports should you block at the firewall if you want to prevent a remote login to a server from occurring?

A

OBJ-2.1: Telnet is the protocol used for remote command-line administration of a host using TCP port 23. Telnet is considered insecure since it is unauthenticated and unencrypted. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.

46
Q

Which cellular technology utilizes new frequency bands to reach proposed speeds of up to 70 Gbps?

A

OBJ-2.4: 5G cellular technology is made up of three different types: low-band, mid-band, and high-band mmWave technology. Low-band 5G reaches an average speed of 55 Mbps with a theoretical speed of 150 Mbps. Mid-band 5G reaches an average speed of 150 Mbps with a theoretical speed of 1.5 Gbps. High-band 5G reaches an average speed of 3 Gbps with a theoretical speed of up to 70 Gbps. 5G cellular technology is made up of three different types: low-band, mid-band, and high-band mmWave technology. Low-band 5G reaches an average speed of 55 Mbps with a theoretical speed of 150 Mbps. Mid-band 5G reaches an average speed of 150 Mbps with a theoretical speed of 1.5 Gbps. High-band 5G reaches an average speed of 3 Gbps with a theoretical speed of up to 70 Gbps. 4G cellular technology is made up of LTE and LTA-A. Long Term Evolution (LTE) is a packet data communications specification providing an upgrade path for both GSM and CDMA2000 cellular networks. LTE has a theoretical speed of 150 Mbps and a real-world speed of around 20 Mbps. LTE Advanced (LTE-A) has a theoretical speed of 300 Mbps and a real-world speed of around 40 Mbps.

47
Q

Which of the following network configurations on a virtual machine are used to prevent the VM from accessing the internet, but still allow it to communicate with other VMs on the host and the host itself?

A

OBJ-4.1: Virtual machines can have their network configured as internal to prevent them from communicating with the internet. When configured to internal, the VMs can communicate with each other and the host machine. The private network connection type will create a switch that is usable only by the VMs. The VMs cannot use the switch to communicate with the host. If you select external, the VMs would have internet access. If you select localhost, each VM could only communicate with itself.

48
Q

Which of the following would installing a multicore CPU achieve?

A

OBJ-3.5: A multicore CPU offers essential performance, and overall processing increases to the system. When attempting to access shared folders on a server, a high-performance network interface card (NIC) would be a better choice. When trying to increase the video playback or video editing speed, installing a dedicated GPU would be a more appropriate choice.

49
Q

A computer technician is configuring a NAS for a company to store their corporate data. The technician has installed two 1 TB hard drives operating at 7200 RPM in a RAID 1 configuration. How much usable storage space is contained in the NAS?

A

OBJ-3.4: A RAID 1 provides mirroring (redundancy) but not disk striping with a minimum of two disks. Since the NAS is using a RAID 1 configuration, it is a mirrored array. Both 1 TB HDDs are installed, but a full copy of the data must be contained on each drive. Therefore, there is still only 1 TB of usable storage capacity in the NAS.

50
Q

You are troubleshooting an older wireless network that is running Wireless G (802.11g). This network appears to have a lot of collisions and interference. You look up the configuration on two of the three access points in the areas and see they are using Channel 1 and Channel 11. To prevent interference and ensure non-overlapping of the channels, what channel should the third access point utilize?

A

OBJ-2.4: With wireless access points that run 2.4 GHz frequencies, you can only select channels between 1 and 11 in the United States. This includes 802.11b, 802.11g, 802.11n, and 802.11ax networks. To prevent overlapping of the channels, you should select channels 1, 6, and 11. By doing so, you can increase the reliability and throughput of your wireless network.

51
Q

An employee at Dion Training complains that their smartphone is broken. They state that it cannot connect to the internet, nor can it make or receive phone calls and text messages. You ask them to start up the music player on his phone, and it opens without any issues. It appears the common issue has to do with the device’s network connectivity. Which of the following is MOST likely the problem with this smartphone?

A

OBJ-1.6: If the smartphone is functioning properly except for applications that require network connectivity, then the issue is either a misconfiguration (like enabling airplane mode by mistake), a defective cellular radio chip, or a similar issue. The most likely cause is that the employee accidentally enabled the airplane mode on the device that turns off the cellular radio for the smartphone and can cause the network connectivity to be lost. A technician should first verify that airplane mode is disabled and that the cellular radio is enabled. If that doesn’t solve the problem, then the technician should investigate whether it is a hardware issue (such as a broken cellular radio chip). The Bluetooth connection being disabled would affect paired devices like a headset or wireless speaker, not the ability of the device to connect to the internet. According to the scenario presented, there is no mention of a VPN, so the VPN password being incorrectly answered is not correct.

52
Q

The touch screen on your Windows 10 laptop is not working properly. You have been asked to troubleshoot the laptop. What should you check FIRST?

A

OBJ-5.5: Most laptops have a digitizer and an LCD screen if they are touchscreen devices. The digitizer is a piece of glass glued to the LCD’s surface and is used to capture your touches and translate them into input for your system. If the touch screen is not working, but the display doesn’t look cracked or broken, this is often a sign that the digitizer settings are incorrect or the digitizer is defective.

53
Q

Linda wants to reduce the number of monitors, keyboards, and mice required to control the multiple servers she manages in the data center. Which of the following devices should she install to allow a single keyboard or mouse to control multiple systems?

A

OBJ-3.6: A KVM (or Keyboard, Video, and Mouse) is a simple and easy to use hardware switching device that allows for multitasking on a single device. A KVM gives you the ability to connect 2 to 64 physical computers to a single set of hardware devices, such as a keyboard, monitor, and mouse. KVMs can be directly connected to the systems being controlled over USB, known as local remote. Modern KVMs can also operate over the network using KVM over IP, common in large datacenter implementations. A PS/2 connector is an older serial communication connector used for mice and keyboards. A PS/2 splitter allows both a mouse and keyboard to be connected to a single PS/2 port on a single system. A video mirroring device is used to send a duplicate copy of the video display signal to two or more monitors simultaneously. A USB splitter or USB hub is a device that connects to a USB port to allow additional USB devices to be connected to the PC, essentially increasing the number of USB ports available.

54
Q

Your company has decided to begin moving some of its data into the cloud. Currently, your company’s network consists of both on-premise storage and some cloud-based storage. Which of the following types of clouds is your company currently using?

A

OBJ-4.1: A hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud, and third-party public cloud services with orchestration between these platforms. This typically involves a connection from an on-premises data center to a public cloud. A community cloud is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. A public cloud contains services offered by third-party providers over the public Internet and is available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume. A private cloud contains services offered either over the Internet or a private internal network and only to select users instead of the general public.

55
Q

Your boss has requested that you replace all of the hubs in the network with switches. What is the MOST likely reason for doing this?

A

OBJ-2.2: The MOST likely reason for changing all the hubs to switches is to increase the network’s performance. Hubs treat every port on the hub as part of the same collision domain, and these lead to a high amount of collisions on the network that degrades performance. By replacing all of the hubs with switches, the network can run much faster and more efficiently. The other reasons are possible, but simply not the BEST reason for purchasing all new switches to replace the current hubs.

56
Q

John connected his MacBook to the corporate network and is trying to print to the office’s large network printer. John notices that the print job is failing to print. The other employees in the office are having no issues printing from their Windows workstations. Which of the following should be done to resolve John’s issue?

A

OBJ-3.10: You should install the print drivers for OS X (macOS) on the print server to ensure compatibility with MacBooks and iMac devices. Since the Windows users can print to the network printer without any issues, the printer and the network are working properly. Instead, the most likely explanation is that the print server does not have the print drivers for OS X (macOS) installed on it.

57
Q

You are troubleshooting a customer’s PC. You realize there is a problem with the RAM and decided to replace the faulty module. You turn on the PC, and after a few seconds, you hear a single beep. What does hearing a single beep indicate?

A

OBJ-5.2: During the bootup process, a power-on self-test (POST) is performed. A single beep is commonly used to indicate the successful completion of the POST. Based on the POST results, different series of beeps may be played to indicate the status of the system. For example, if a single beep was heard, this could indicate a successful POST after a new hardware installation has been completed. Each manufacturer uses different POST codes, so it is important to consult the manual for the motherboard or BIOS in use by the system.

58
Q

Your son has a gaming laptop in his bedroom. He loves his laptop since it allows him to take it over to his friend’s houses when desired, but his laptop only has 1 USB port. When he gets home, though, he prefers to use a USB mouse, keyboard, and webcam when playing games on his laptop. He only has $20 saved up but wants to buy a device that would allow him to connect all 3 of these peripherals with one USB connector. Which of the following do you recommend he purchase?

A

OBJ-1.3: Since your son has a limited budget of just $20, the best option to meet his needs would be a USB 4-port hub. This would allow him to connect his USB mouse, keyboard, and a webcam to the USB 4-port hub and then connect the USB 4-port hub using a single USB connector to the laptop. A USB hub is a device that connects to a USB port to allow additional USB devices to be connected to the PC, essentially increasing the number of USB ports available. Thunderbolt is a connector type that can be used either as a display interface (like DisplayPort) or as a general peripheral interface (like USB 3). Thunderbolt 3 uses USB-C connectors. A docking station is a sophisticated type of port replicator designed to provide additional ports (such as network or USB) and functionality (such as expansion slots and drives) to a portable computer when used at a desk. A port replicator is a simple device to extend the range of ports (for example, USB, DVI, HDMI, Thunderbolt, network, and so on) available for a laptop computer when it is used at a desk. The difference between a docking station and a port replicator is that a docking station can add additional capabilities beyond what is already integrated into the laptop whereas a port replicator can only reproduce the same ports that already exist on the laptop.

59
Q

Natalie’s computer is having difficulty accessing websites. She reports that she started receiving pop-ups on her screen before this connectivity problem began. You search the computer and find a piece of malware installed, so you remove it. You also do a full virus scan of the computer, ensure her computer has the most up-to-date virus definitions and is set the anti-virus software to automatically scan the computer every night at 2 am. As you return the computer to Natalie, you verify that she can now successfully access the websites again. What is the NEXT step you should perform according to the CompTIA troubleshooting methodology?

A

OBJ-5.1: There are 6 steps in the CompTIA troubleshooting methodology: (1) Identify the problem, (2) Establish a theory of probable cause, (3) Test the theory to determine the cause, (4) Establish a plan of action to resolve the problem and implement the solution, (5) Verify full system functionality and, if applicable, implement preventive measures, (6) Document findings, actions, and outcomes. Based on the question, you just finished performing step 5, so the NEXT step to perform is step 6.

60
Q

You have been asked to replace a cracked screen on a laptop. The replacement screen was delivered today, but it did not include any instructions for removal and replacement. You have been unable to find the repair information on the manufacturer’s website. Which of the following is the BEST course of action for you to take when replacing the cracked screen?

A

OBJ-5.5: Replacing a cracked laptop screen is a common task for a computer technician. If you are not provided with the instructions for how to do it for a particular model, you can carefully disassemble the laptop and document/label all of the screw locations and cables/connectors. This will then allow you to replace the cracked screen and reconnect all the cables properly. You do not need to update the device drivers on the laptop unless there was some software display issue before the screen was cracked. When possible, you should use OEM parts when repairing or replacing components to ensure you don’t void the laptop’s warranty or cause other issues.

61
Q

Your company uses a virtual desktop infrastructure (VDI) environment for employees to access their desktop applications. To allow employees access to the VDI environment, the company is installing thin clients in each employee’s office. Which THREE of the following tasks must you first complete to install a thin client for a new employee?

A

OBJ-4.2: A thin client is a stateless, fanless desktop terminal that has no hard drive. All features typically found on the desktop PC, including applications, sensitive data, memory, etc., are stored back in the data center when using a thin client, most typically in a VDI or other environment. To set up a thin client, you will first connect it to the network, update its security software, and then install/configure any applications needed to access the VDI environment.

62
Q

(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.) Using the image of the motherboard above, which of the following correctly indicates the circled area?

A

OBJ-3.5: The area circled indicates the PCIe x8 slot on this motherboard.PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has some PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. For the exam, it is important that you can identify the different parts of the motherboard by sight.

63
Q

What is the MOST common connector type used when connecting a USB cable to the back of a printer?

A

OBJ-3.1: The most common USB connector used to connect to a printer is USB Type B. This connector has a large square-shaped male connector that is connected to the rear of the printer. A USB Type A connector is often used to connect to the workstation or computer itself. This question specifically asked which connector is being attached to the printer. Micro USB is a miniaturized version of the Universal Serial Bus (USB) interface developed for connecting compact and mobile devices such as smartphones, MP3 players, GPS devices, and digital cameras. Mini USB was introduced with USB 2.0 and was used with digital cameras and early tablets.

64
Q

(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.) Using the image of the motherboard above, which of the following correctly indicates the circled area?

A

OBJ-3.5: The area circled indicates the Mini PCIe slot. Mini PCIe (mPCIe) are smaller form factor versions of standard PCI Express expansions cards used with laptops and other small form factor computing devices. Mini PCIe expansion cards provide the ability to add wireless networking or cellular data cards to a laptop. These slots can also be used to connect motherboard mounted solid-state storage devices. For the exam, it is important that you can identify the different parts of the motherboard by sight.

65
Q

Which of the following devices have most of the same functionality as a personal computer but can be operated with a single hand?

A

OBJ-1.4: A smartphone is a device with roughly the same functionality as a personal computer operated with a single hand. Most smartphones have a screen size between 4.5” and 5.7”. Leading smartphones provide high-resolution screens. Smartphones have fast multicore CPUs, anywhere between 2 and 6 GB system memory, and 16 GB+ flash memory storage. They come with premium front and back digital cameras, input sensors like accelerometers, and Global Positioning System (GPS) chips. They can establish network links using Wi-Fi and a cellular data plan. A high-end smartwatch (for example, an Apple Watch) will allow the user to see their notifications, chat activity, and even make phone calls. A mid-range or low-end smartwatch can still have the ability to read your chat and notifications, but you may be unable to make phone calls from it. A smartwatch is not a replacement for a laptop or desktop, but a high-end smartphone can be.

66
Q

Which button on a desktop computer begins a reboot of the computer without power being removed from the computer’s components?

A

OBJ-3.5: The reset button is usually located on the front panel of a desktop computer next to the power button. When the reset button is pressed, it allows the user to reboot the computer without releasing power from the system’s components. This is often used when software has malfunctioned and caused the computer to halt or lock up. The power button is used to shut down or put the computer to sleep. There is usually not a dedicated suspend or hibernate button, but these are instead provided as software buttons in the operating system.

67
Q

Dion Training’s service desk has received calls from numerous users stating they are receiving an error message concerning duplicate IP addresses being detected on their systems. These users also cannot access the network’s file server or browse any websites. Which of the following servers should the technician check first in troubleshooting this issue?

A

OBJ-2.5: If duplicate IP addresses are being detected on workstations across the network, it is either an issue with the DHCP server or someone has been statically assigning IP addresses to workstations improperly. A dynamic host configuration protocol (DHCP) server is a server configured with a range of addresses to lease. Hosts can be allocated an IP address dynamically or be assigned a reserved IP address based on the host’s MAC address. The server can also provide other configuration information, such as the location of DNS servers. A domain name system (DNS) server is a server that hosts the database of domain names and the IP addresses mapped to those names. Each DNS server is authoritative for certain domain names that their organization owns. A proxy server is a server that acts as an intermediary between a client requesting a resource and the server that provides that resource. A proxy server can be used to filter content and websites from reaching a user. An authentication, authorization, and accounting (AAA) server is a server used to identify (authenticate), approve (authorize), and keep track of (account for) users and their actions. AAA servers can also be classified based on the protocol they use, such as a RADIUS server or TACACS+ server.

68
Q

The printer in the Dion Training offices routinely has issues anytime there is a power outage. The printer is a multi-function, network-enabled printer that connects directly to the network switch using a CAT 5e cable. Which of the following should you do to resolve this continuing issue?

A

OBJ-5.7: Since the problem always occurs after a power outage, the printer is likely turning on faster than the DHCP server. This could lead to the printer not getting a new IP address properly or the clients not locating the printer on the network. Therefore, you should configure a static IP for the printer (and any servers) on the network. Servers and shared printers should use a static IP instead of a dynamic assignment to prevent issues.

69
Q

Which type of wireless network utilizes the 2.4 GHz frequency band and reaches up to 11 Mbps speeds?

A

OBJ-2.4: The 802.11b (Wireless B) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 11 Mbps. The 802.11a (Wireless A) standard utilizes a 5 GHz frequency to provide wireless networking at speeds up to 54 Mbps. Even though 802.11a was a faster standard, the 802.11b standard gained more widespread adoption due to the low cost of manufacturing the radios for use in the 2.4 GHz frequency band. The 802.11g (Wireless G) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 54 Mbps. The 802.11n (Wireless N) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 108 Mbps or a 5.0 GHz frequency to provide wireless networking at speeds up to 600 Mbps. Wireless N supports the use of multiple-input-multiple-output (MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless N supports channel bonding by combining two 20 MHz channels into a single 40 MHz channel to provide additional bandwidth. The 802.11ac (Wireless AC or Wi-Fi 5) standard utilizes a 5 GHz frequency to provide wireless networking at theoretical speeds up to 3.5 Gbps. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. The 802.11ax (Wireless AX or Wi-Fi 6) standard utilizes 2.4 GHz and 5.0 GHz frequencies to provide wireless networking at theoretical speeds up to 9.6 Gbps. Wireless AC uses orthogonal frequency-division multiple access (OFDMA) to conduct multiplexing of the frequencies transmitted and received to each client to provide additional bandwidth. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless AC also has a version called Wi-Fi 6E that supports the 6GHz frequency instead of the 2.4 GHz and 5.0 GHz frequencies used in Wi-Fi 6.

70
Q

You are connecting a laptop to a brand new digital high definition TV. Unfortunately, the laptop is a little outdated and only has an analog display output. Which of the following adapters could you use to convert the signal from analog to digital for use with the new television?

A

OBJ-3.1: Since this question asks you to select the converter that can convert a signal from analog to digital, you need to consider which of the connectors are analog and digital. S-Video, RCA, and VGA are all analog. HDMI and DVI-D are both digital. Therefore, the correct answer is VGA (analog) to DVI-D (Digital). HDMI to VGS would be digital to analog. S-Video to RCA would be analog to analog. DVI-D to HDMI would be digital to digital.

71
Q

Which cloud computing concept is BEST described as focusing on the replacement of physical hardware at a customer’s location with cloud-based resources?

A

OBJ-4.1: Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center. If you purchase a server in the cloud and then install and manage the operating system and software, this is Iaas. Platform as a Service (PaaS) is a cloud computing service that enables consumers to rent fully configured systems that are set up for specific purposes. Software as a Service (SaaS) is a cloud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions. Security as a service is a business model in which a service provider integrates their security services into a corporate infrastructure on a subscription basis more cost-effectively than most individuals or corporations can provide on their own when the total cost of ownership is considered.

72
Q

What are the dimensions of a MicroATX motherboard?

A

OBJ-3.5: The mATX (microATX) motherboard’s form factor is 9.6” x 9.6” in size (24 cm x 24 cm). The mATX form factor is commonly used in smaller computer systems with a small form factor (SFF) case. An mATX motherboard is backward-compatible with the larger ATX motherboard since it contains the same mounting point locations as the full-size board. An ATX motherboard’s form factor is 12” x 9.6” in size (305mm x 244mm). ITX is a series of form factors that began with the mini-ITX, but there is no specific size called ITX. The mITX (Mini-ITX) form factor is 6.7” x 6.7” in size (17 cm x 17cm). The mITX is commonly used in smaller computer systems with a small form factor (SFF) case. These motherboards are usually used in computers designed for passive cooling and a low power consumption architecture, such as a home theater PC system.

73
Q

What is the sixth step of the CompTIA troubleshooting methodology?

A

OBJ-5.1: For the exam, it is important that you can list and identify the 6 steps of the CompTIA troubleshooting methodology in order. (1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and then implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.

74
Q

You are building a Gaming PC to support a high-end virtual reality headset. The computer needs a high-end processor, lots of RAM, and a dedicated high-end graphics card. This graphics card will be installed in one of your expansion slots on your motherboard. Which of the following motherboard connections will most likely be used to connect the graphics card?

A

OBJ-3.5: PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has some PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. Graphics cards almost exclusively rely on PCIe x16 expansion slots for their connectivity. The peripheral component interconnect (PCI) bus is used to provide low-speed connectivity to expansion cards but has been mostly replaced by the faster PCIe bus. The accelerated graphics port (AGP) is a parallel expansion card standard that was originally designed for attaching a video card to a computer system to assist in the acceleration of 3D computer graphics. AGP has been replaced with PCIe due to its faster speeds. USB is an external connection and not used to connect high-end graphics cards using an expansion slot.

75
Q

Which of the following laptop displays requires an inverter?

A

OBJ-1.2: An inverter supplies the correct AC voltage to the LCD’s fluorescent backlight from the laptop’s DC power circuits. An LCD (TFT) with fluorescent backlight has been the standard display technology for the last few years. The backlight is a fluorescent bulb that illuminates the image, making it bright and clear. A light-emitting diode (LED) display is an LCD panel that uses a LED backlight instead of a CCFL backlight to provide its light source. An organic light-emitting diode (OLED) display is a type of LED flat panel display device that uses organic compounds that emit light when subjected to an electric current. An OLED display works without a backlight because it emits visible light. Thus, it can display deep black levels and be thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions (such as in a dark room), an OLED screen can achieve a higher contrast ratio than an LCD, regardless of whether the LCD uses cold cathode fluorescent lamps or an LED backlight. A plasma display is a type of flat panel display that uses small cells containing plasma with ionized gas that responds to electric fields. Plasma displays create excessive heat and are not as energy efficient as an LCD, LED, or OLED display.

76
Q

You are working as a laptop repair technician. You just received a laptop that was reported to have a glass of water spilled on it. You want to examine the components in the laptop to begin troubleshooting it. What are the first steps you should take as part of your troubleshooting process?

A

OBJ-5.5: When you are taking apart a laptop, it is important to keep track of each of the screws and the location that they were removed from. Many of the screws may appear to be the same height or width, but they may be different. One easy way to keep track of these parts is to create a grid on a sheet of printer paper and place the screws on this makeshift diagram. While the other options may be useful, the question asks you what you should do first to examine the laptop components. To perform that examination, you must remove the external casing and its screws.

77
Q

Which cellular technology is comprised of LTE and LTE-A to provide higher data speeds than previous cellular data protocols?

A

OBJ-2.4: 4G cellular technology is made up of LTE and LTA-A. Long Term Evolution (LTE) is a packet data communications specification providing an upgrade path for both GSM and CDMA2000 cellular networks. LTE has a theoretical speed of 150 Mbps and a real-world speed of around 20 Mbps. LTE Advanced (LTE-A) has a theoretical speed of 300 Mbps and a real-world speed of around 40 Mbps. 5G cellular technology is made up of three different types: low-band, mid-band, and high-band mmWave technology. Low-band 5G reaches an average speed of 55 Mbps with a theoretical speed of 150 Mbps. Mid-band 5G reaches an average speed of 150 Mbps with a theoretical speed of 1.5 Gbps. High-band 5G reaches an average speed of 3 Gbps with a theoretical speed of up to 70 Gbps. 3G cellular technology is made up of two different technologies: HSPA+ and EV-DO. HSPA+ (Evolved High-Speed Packet Access) is a 3G standard used for GSM cellular networks and can support up to a theoretical download speed of 168 Mbps and a theoretical upload speed of 34 Mbps. In the real world, though, HSPA+ normally reaches speeds around 20 Mbps. EV-DO (Evolution-Data Optimized) is a 3G standard used for CDMA cellular networks and can support up to 3.1 Mbps downloads. A wireless mesh network (WMN) is a wireless network topology where all nodes, including client stations, can provide forwarding and path discovery to improve coverage and throughput compared to using just fixed access points and extenders.

78
Q

Which of the following ports should you unblock at the firewall if your workstation cannot access https://www.diontraining.com but can access http://www.diontraining.com?

A

OBJ-2.1: HyperText Transfer Protocol Secure (HTTPS) is the basis for secure communication and eCommerce on the World Wide Web. HTTPS uses an SSL or TLS encryption tunnel over the standard HTTP protocol. This operates over port 443. In this question, it states that the user can access HTTP but not HTTPS, indicating that port 443 is blocked. The server message block (SMB)/common internet file system (CIFS) is a protocol used for requesting files from Windows servers and delivering them to clients. SMB allows machines to share files and printers, thereby making them available for other machines to use. Samba software allows UNIX and Linux servers or NAS appliances to run SMB services for Windows clients. SMB operates on port 445. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53.

79
Q

Jason is teaching a CompTIA course at a large company, but they do not allow non-employees to connect to their network. Since Jason needs the Internet for an in-class demonstration, he connects his laptop to his iPhone using a USB cable. He essentially connects to the Internet using the smartphone as a modem. Which of the following terms best describes this configuration?

A

OBJ-1.5: Tethering is the use of a mobile device’s cellular data plan to provide Internet access to a laptop or PC. The PC can be tethered to the mobile by USB, Bluetooth, or Wi-Fi. One method of doing this is to connect the laptop to the device using a USB cable, and then it can be used as a wired network connection. A portable hotspot is a dedicated mobile device that connects to a cellular network and provides a wireless (Wi-Fi) network for a small number of users. A tunneling (or encapsulation) protocol wraps up data from one protocol for transfer over a different type of network. For example, PPP can carry TCP/IP data over a dial-up line, enabling a remote computer to communicate with the LAN. A baseband update is the modification of the firmware of a cellular modem.

80
Q

(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.) Using the image of the motherboard above, which of the following correctly indicates the circled area?

A

OBJ-3.5: The area circled indicates the PCIe x4 slot on this motherboard. PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has some PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. For the exam, it is important that you can identify the different parts of the motherboard by sight.

81
Q

A user has reported that their workstation is running slowly. You perform a reboot of their workstation and receive a S.M.A.R.T. error during the boot-up process. Which of the following actions should you perform FIRST?

A

OBJ-5.3: S.M.A.R.T. is an acronym for Self-Monitoring and Repair Tool. It is a feature in all modern magnetic hard drives (non-SSD drives) that monitors the hard drive to ensure it performs properly. S.M.A.R.T. can detect when the failure of a drive is imminent and can alert the user so that they can back up the drive before a complete failure occurs. If your hard drive produces a S.M.A.R.T. failure, you should immediately back up the drive. Once a backup has been completed, you can instead focus on repairing the drive using chkdsk.

82
Q

You are troubleshooting a memory issue on a customer’s laptop and have determined that the memory module needs to be replaced. You walk into the storage room to select a memory module to use as a replacement. Which of the following choices would be the MOST LIKELY choice for you to select for use on the laptop?

A

OBJ-3.3: A small outline dual inline memory module (SODIMM) can be purchased in various types and sizes to fit any laptop, router, or other small form factor computing device. For the exam, if you are ever asked about installing memory in a small form factor device or a laptop, the answer will usually be SODIMM. Single-channel memory is any memory using one 64-bit bus between the CPU and the RAM. Error checking and correcting or error correcting code (ECC) is a type of system memory that has built-in error correction security. ECC is more expensive than normal memory and requires support from the motherboard. ECC is commonly used in production servers and not in standard desktops or laptops. Double data rate synchronous dynamic (DDR) random access memory is a standard for SDRAM where data is transferred twice per clock cycle to achieve a maximum data rate that is 64 times the bus speed in bps. There are various versions of DDR including DDR2, DDR3, DDR4, and DDR5.

83
Q

Your company has an office in Boston and is worried that its employees may not reach the office during periods of heavy snowfall. You have been asked to select a technology that would allow employees to work remotely from their homes during poor weather conditions. Which of the following should you select?

A

OBJ-2.6: A remote-access VPN connection allows an individual user to connect to a private network from a remote location using a laptop or desktop computer connected to the internet. A remote-access VPN allows individual users to establish secure connections with a remote computer network. Once established, the remote user can access the corporate network and its capabilities as if they were accessing the network from their own office spaces. Network address translation (NAT) is a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses. NAT can use static mappings but is commonly implemented as network port address translation (PAT) or NAT overloading, where a few public IP addresses are mapped to multiple LAN hosts using port allocations. A Virtual LAN (VLAN) is a logically separate network that is created using switching technology. Even though hosts on two VLANs may be physically connected to the same cabling, local traffic is isolated to each VLAN so they must use a router to communicate. An intrusion detection system (IDS) is a device or software application that monitors a network or system for malicious activity or policy violations. Any malicious activity or violation is typically reported to an administrator or collected centrally using a security information and event management system. Unlike an IPS, which can stop malicious activity or policy violations, an IDS can only log these issues and not stop them.

84
Q

Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function?

A

OBJ-2.3: Universal plug-and-play (UPnP) is a protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall. UPnP is associated with several security vulnerabilities and is best disabled if not required. You should ensure that the router does not accept UPnP configuration requests from the external (internet) interface. If using UPnP, keep up-to-date with any security advisories or firmware updates from the router manufacturer. A mobile device management (MDM) software suite is used to manage smartphones and tablets within an enterprise. The dynamic host control protocol (DHCP) is a protocol used to allocate IP addresses to a host when it joins a network. DHCP utilizes UDP ports 67 and 68. Network address translation (NAT) is a network service provided by the router or proxy server to map private local addresses to one or more publicly accessible IP addresses. NAT can use static mappings but is commonly implemented as network port address translation (PAT) or NAT overloading, where a few public IP addresses are mapped to multiple LAN hosts using port allocations.

85
Q

What is the name of a computer system that is designed to perform a specific and dedicated function?

A

OBJ-2.5: An embedded system is a computer system designed to perform a specific, dedicated function. These systems can be as small and simple as a microcontroller in an intravenous drip-rate meter or as large and complex as an industrial control system managing a water treatment plant. Embedded systems might typically have been designed to operate within a closed network. The network elements are all known to the system vendor, and there is no connectivity to wider computer data networks. A legacy system is no longer directly supported by its vendor. Networks often need to retain hosts running DOS or legacy versions of Windows (8.1 and earlier) or old-style mainframe computers to run services that are too complex or expensive to migrate to a more modern platform. Legacy systems usually work well for what they do (which is why they don’t get prioritized for replacement), but they represent very severe risks in terms of security vulnerabilities. Unified threat management (UTM) devices are network appliances that provide all the security functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, data loss prevention, content filtering, and other security devices into a single device or appliance. Patch systems are used to conduct patch management across your organization’s network