Exam 6 Flashcards

1
Q

Which cellular technology is compromised of HSPA+ and EV-DO to provide higher data speeds than previous cellular data protocols?

A

OBJ-2.4: 3G cellular technology is made up of two different technologies: HSPA+ and EV-DO. HSPA+ (Evolved High-Speed Packet Access) is a 3G standard used for GSM cellular networks and can support up to a theoretical download speed of 168 Mbps and a theoretical upload speed of 34 Mbps. In the real world, though, HSPA+ normally reaches speeds around 20 Mbps. EV-DO (Evolution-Data Optimized) is a 3G standard used for CDMA cellular networks and can support up to 3.1 Mbps downloads. 4G cellular technology is made up of LTE and LTA-A. Long Term Evolution (LTE) is a packet data communications specification providing an upgrade path for both GSM and CDMA2000 cellular networks. LTE has a theoretical speed of 150 Mbps and a real-world speed of around 20 Mbps. LTE Advanced (LTE-A) has a theoretical speed of 300 Mbps and a real-world speed of around 40 Mbps. 5G cellular technology is made up of three different types: low-band, mid-band, and high-band mmWave technology. Low-band 5G reaches an average speed of 55 Mbps with a theoretical speed of 150 Mbps. Mid-band 5G reaches an average speed of 150 Mbps with a theoretical speed of 1.5 Gbps. High-band 5G reaches an average speed of 3 Gbps with a theoretical speed of up to 70 Gbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many volts of electrical charge is applied to the drum of a laser printer?

A

OBJ-3.11: To ensure the positively charged toner is attracted to the laser printer’s negatively charged drum during printing, a uniform negative charge of approximately 600 volts is applied to print the image on the paper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dion Training utilizes a federation authentication model for all of its internal and external services. If an employee needs to access one of the company’s web applications from their smartphone, they use a username and password to log in to the main website. They then are transferred and authenticated to all of the other sites and services automatically. Which of the following type of authentication is this known as?

A

OBJ-1.7: Single Sign-on (SSO) is an authentication technology that allows users to authenticate once and receive authorizations for multiple services. The advantage of single sign-on is that each user does not have to manage multiple user accounts and passwords. The disadvantage is that compromising the account also compromises multiple services. Multifactor authentication is an authentication scheme that relies on at least two of the five factors: something you know, something you have, something you are, something you do, and somewhere you are. Since only a username and password are used in this scenario, it is not considered multi-factor authentication. Face ID is an Apple device feature that uses a face lock to grant access to the device. Face ID is considered a form of biometric authentication. Touch ID is an Apple device feature that uses fingerprint biometric information to grant access to the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are trying to select the best device to install to detect an outside attacker trying to reach into your internal network. The device should log the event, but it should not take any action to stop it. Which of the following devices would be the BEST for you to select?

A

OBJ-2.5: An intrusion detection system is a device or software application that monitors a network or system for malicious activity or policy violations. Any malicious activity or violation is typically reported to an administrator or collected centrally using a security information and event management system. Unlike an IPS, which can stop malicious activity or policy violations, an IDS can only log these issues and not stop them. An intrusion prevention system (IPS) conducts the same functions as an IDS but can also block or take actions against malicious events. An authentication, authorization, and accounting (AAA) server is a server used to identify (authenticate), approve (authorize), and keep track of (account for) users and their actions. AAA servers can also be classified based on the protocol they use, such as a RADIUS server or TACACS+ server. A proxy server is a server that acts as an intermediary between a client requesting a resource and the server that provides that resource. A proxy server can be used to filter content and websites from reaching a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your child’s school issues an Office 365 account to each student to use for their school projects. Your child needs to install the proper software on their Windows 10 laptop for their school work folder to remain synced between the laptop and the cloud service. Which software should you install?

A

OBJ-4.1: OneDrive is a part of the Office 365 suite of tools and services. OneDrive is an online data storage service that can be used through a web browser or a downloadable client. If you have the downloadable client installed, it will ensure the files always remain synced between the cloud service and the local laptop. Software as a Service (SaaS) is a cloud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user wants to print a large job on both the front and back sides of the paper. Which of the following settings should the technician advise the user to change in the printer settings?

A

OBJ-3.10: Duplex printing is a feature of some computer printers, multi-function printers (MFPs), and copy machines that allow the printing of a sheet of paper on both sides automatically. Without this capability, print devices can only print on a single side of the paper, sometimes called single-sided printing or simplex printing. With duplex printing, information is printed on the front side of a piece of paper, and then the paper is automatically fed back through the printer to print the information on the backside of the paper. Page orientation is how a rectangular page is oriented for normal viewing. The two most common types of orientation are portrait (taller rather than wider) and landscape (wider rather than taller). The collate setting allows the gathering and arranging of individual sheets or other printed components into a pre-determined sequence. Collating creates consistent, logical sets from multiple parts, such as printing a series of pages in a report like pages 1, 2, 3 before printing the second copy. This makes it easier to staple and distribute to people after coming out of the printer. The term transparency was made up as a distractor for this question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are setting up a cable television in a customer’s home. Which connector type should be used to connect the TV tuner to the wall jack when using a coaxial cable?

A

OBJ-3.1: The F type connector is used with coaxial cables. Both RG-6 and RG-59 are cable types used for coaxial cable connections. RG-6 cabling is recommended for your Cable TV, satellite, TV antennas, or broadband internet. RG-59 cabling is generally better for most CCTV systems and other analog video signals. An RJ-45 connector is used to terminate a copper twisted-pair Ethernet cable. A DB-9 connector is used to terminate an RS-232 serial cable. A ST, SC, LC, or MTRJ connector is used to terminate a fiber optic cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A repeat customer is back with their laptop again. This is the third time they have dropped their laptop and caused their hard disk’s internal platter to fail. Which of the following devices should you replace their internal hard drive with to prevent this issue from occurring again?

A

OBJ-5.3: Since this customer is accident-prone, you should recommend they install an NVMe or SSD device. These solid-state devices are more resistant to drops since they have no moving parts or platters in them. A hybrid or HDD solution would not be effective as they both have moving platters in them that can be destroyed by a drop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following security features would allow a user to track their laptop’s location if it was stolen?

A

OBJ-3.5: LoJack for Laptops is a proprietary laptop theft recovery software that grants remote access to lock, delete sensitive files, and locate the stolen laptop. The user will need to install a LoJack program on the laptop and create a security card with the laptop’s PIN/ID. This PIN/ID can be used to track down the laptop whenever it reconnects to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the port cluster.) Using the image above, which of the following correctly indicates the port labeled as K?

A

OBJ-3.1: This port is the audio cluster on the rear of this motherboard. This contains the audio inputs and outputs in mini-jack format. For the exam, it is important that you can identify the different parts of a motherboard’s rear port cluster by sight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dion Security Group has established a Security Operations Center (SOC) that operates 24/7. They have several 65” plasma TVs at the front of the room that are used as computer displays to show open tickets. You turned off the televisions to clean the screens and noticed that the company logo is still visible in each of the screens’ upper left corners. Which of the following should you do to correct this?

A

OBJ-5.4: The logo in the upper left corner has been burned into the display since it is a static image. This is common with plasma displays and TVs. To fix this, you need to replace the TVs. If you plan to have a lot of static content on a display, you should use an OLED or LED display instead. If burn-in was experienced on old CRT monitors, you could run a degaussing program to erase the burn-in. Unfortunately, this will not work for plasma, LED, or OLED displays, though.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rick has just received a new Google Pixel smartphone and installed all of his favorite apps, including a different style virtual keyboard. After about 6 months of use, he noticed that the smartphone has become slow, and the virtual keyboard is not responding properly when keys are pressed or becomes completely unresponsive. What is the FIRST solution to try to fix this issue?

A

OBJ-5.5: The simplest and most efficient way to fix unresponsive apps is to close the app running in the background and restart the app again. A custom virtual keyboard app can often cause performance decline and unresponsiveness, and the virtual keyboard will lock up. It is always a good practice to always close apps running in the background to reduce resource consumptions. If this doesn’t solve the issue, then a soft reset or factory reset may be needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a security concern with using a cloud service provider and could result in a data breach caused by data remnants?

A

OBJ-4.1: Rapid elasticity can be a security threat to your organization’s data due to data remanences. Data remanence is the residual representation of digital data that remains even after attempts have been made to remove or erase it. So, when a cloud resource is deprovisioned and returned to the cloud service provider, it can be issued to another organization for use. If the data was not properly erased from the underlying storage, it could be exposed to the other organization. For this reason, all cloud-based storage drives should be encrypted by default to prevent data remanence from being read by others. Metered services are pre-paid, a-la-carte, pay-per-use, or committed offerings. A metered service like a database may charge its users based on the actual usage of the service resources on an hourly or monthly basis. For example, Dion Training used the AWS Lambda serverless product in some of our automation. This service charges us $0.20 for every 1 million requests processed. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. On-demand refers to the fact that a consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which application would NOT allow you to sync your data between your Windows, macOS, Android, and iOS devices?

A

OBJ-4.1: Shadow Copy will not sync your data between Windows, macOS, Android, and iOS devices because it only works on Windows devices. OneDrive, Google Drive, and DropBox allow you to configure their synchronization applications on all four of these operating systems to keep them synced with the latest version in the cloud service. These applications are all a form of SaaS (software as a service). Using a synchronization app can allow the files to be stored on both the laptop and the cloud service while maintaining the latest versions in both places. This allows a user to synchronize content between all of their own devices as well as share their cloud storage content with other users. Multiple users can simultaneously access the content to work collaboratively, or they can access it at different times. Each user’s changes are typically marked with a flag or color highlighting to indicate who made changes to what content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An employee’s laptop has become warm to the touch and does not sit evenly on the table during use. You turn the laptop over and see the case bulging into a slightly rounded shape. What is the MOST likely cause of this issue?

A

OBJ-5.5: Based on the description, the battery is defective and swelling. Swollen batteries, while not common, are a significant risk. They result from too much current inside a cell of the battery, which causes a build-up of heat and gas. This can be caused by overcharging, manufacturer defects, deep discharge, or damage to the battery. The most common cause is an overcharge of the battery, which causes a chemical reaction between the electrodes and the electrolyte, resulting in the release of heat and gases that expand inside the battery, causing the casing to swell or split open. If a battery begins to bulge, swell, or split, it should immediately be replaced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A customer wants to build a home server that would allow their family to stream locally stored video files on a home network. The home server should also have fault tolerance to ensure the server’s data is not inadvertently lost in the event of a hard disk drive failure. Which of the following configurations would BEST meet these requirements? (Select TWO)

A

OBJ-3.8: In this scenario, a gigabit NIC will help handle the heavy network load created by sharing large files over the network. Data protection needs to use a RAID 1, RAID 5, or RAID 10 configuration to protect against any potential data loss caused by a single hard disk drive failure. RAID 5 is the most commonly used RAID for servers. A RAID 5 requires a minimum of 3 hard disk drives and can continue to operate as long as 2 of the 3 drives are functional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You just installed an SSD into a laptop to increase the storage speed of the device. Which of the following should you configure to increase the lifespan of the newly installed SSD?

A

OBJ-3.4: An SSD (Solid-State Drive) is limited in the total number of write functions that can occur over its lifespan. Due to the immediate ability of an SSD to locate data on the drive (since there is no spinning platter that must be moved to reach the right area to retrieve the data like a regular magnetic hard drive), there is no need to defragment an SSD. When you defrag a hard drive, especially an SSD, it will cause tons of small write accesses, reducing the hard drive’s lifespan. And since data is not being read sequentially, it doesn’t matter if the file is stored in a hundred different places; the performance will remain the same. Therefore, you should disable any regularly scheduled defragmentation tasks when using an SSD to extend its lifespan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You have been asked to develop a solution for one of your customers. The customer is a software development company, and they need to be able to test a wide variety of operating systems to test the software applications their company is developing internally. The company doesn’t want to buy a bunch of computers to install all of these operating systems for testing. Which of the following solutions would BEST meet the company’s requirements?

A

OBJ-4.2: Since the company’s main goal was to minimize the amount of hardware required, the BEST solution is to purchase a high-end computer that has a lot of CPU cores and RAM, install a hypervisor, and configure a virtual machine for each operating system that will be used to test the applications being developed. This allows a single machine to run multiple operating systems for testing with the least amount of hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Your boss is looking for a recommendation for a cloud solution that will only allow for both onsite systems and cloud services to work together seamlessly. What type of cloud model should you recommend?

A

OBJ-4.1: A hybrid cloud model allows for the seamless integration of both onsite and cloud services to the end-user simultaneously. Hybrid clouds can be cost-efficient, flexible, easy to migrate to a complete cloud solution in the future, and require less maintenance than completely onsite options. As with all cloud options, the contents must be properly secured due to the elastic storage nature of all cloud solutions and the possibility of data remnants. A public cloud contains services offered by third-party providers over the public Internet and is available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume. A private cloud contains services offered either over the Internet or a private internal network and only to select users instead of the general public. A community cloud is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third party and hosted internally or externally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following requirements should you consider when selecting the type of processors, storage, and RAM to utilize in a virtualization environment?

A

OBJ-4.2: Before you purchase a system to use as a virtualization environment, you should look at the minimum requirements for all operating systems you intend to host as guest VMs. This will ensure you can balance the performance needed and maintain a smooth-running environment without numerous conflicts or issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Dion Training has asked you to verify that a server rack has been properly installed and grounded. Which tool should you utilize to verify that the server rack is properly grounded?

A

OBJ-2.8: A multimeter can measure the voltage, amperage, and resistance of a circuit. If you use the lowest ohms (resistance) setting, you can touch the multimeter’s black lead to a grounded metal surface and touch the red lead to each circuit wire. If you get a meter reading of zero ohms (low resistance), this indicates that the circuit is properly grounded. If you get a meter reading of infinity, O.L., Open Loop, or a needle that pegs high on the meter, this indicates an open circuit with no path to ground. A voltmeter can only measure the voltage, not the amperage or resistance of the circuit. A loopback plug is used to test a port. When you connect a loopback plug to a port, you should see a solid connection LED. You can also use the loopback plug in conjunction with diagnostic software. A tone generator is connected to a wall jack and sends a repeating signal over the cable. The probe can then be used to detect which cable is attached to the wall jack by detecting the signal being sent by the tone generator. The probe needs to be near or touch the cable with the tone generator attached to identify it positively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.) Using the image of the motherboard below, which of the following correctly indicates the circled area?

A

OBJ-3.3: The area circled indicates the memory slots that contain the RAM. These are also considered DDR3 memory slots based on the key/notch location. For the exam, it is important that you can identify the different parts of the motherboard by sight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following devices is used to provide power to a wireless access point?

A

OBJ-2.2: A POE (power over ethernet) injector can provide electrical power to a device over a CAT 5e cable. The 802.3af (PoE) standard can support up to 15.4W of power at a distance of up to 100 meters. PoE can support low-powered devices such as VoIP handsets. The 802.3at (PoE+) standard can support up to 25W of power at a distance of up to 100 meters. PoE+ can support higher-powered devices such as PTZ cameras, door controllers, and thin client computers. A hub provides no intelligence in its interconnection functions so that whatever is received on one port is repeated out every other port. This leads to many collisions occurring on the hub and increases the number of rebroadcasts which slows down the entire network. A repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction. Repeaters may be wired or wireless, and they rebroadcast whatever signal is received through their transmitter. A cable modem is a type of network bridge that provides bi-directional data communication via radio frequency channels on a hybrid fiber-coaxial (HFC), radio frequency over glass (RFoG), and coaxial cable infrastructure. Cable modems are primarily used to deliver broadband internet access as cable internet, taking advantage of an HFC and RFoG network’s high bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following tools is used to identify why an 802.11g network is intermittently dropping network traffic?

A

OBJ-5.7: A WiFi analyzer can determine the wireless network’s signal strength, the frequencies in use, and any possible radio frequency interference. Based on the issue described in the question, the network may have dead zones that could be fixed by adding additional access points to increase the network’s wireless coverage. Another possible issue could be radio frequency interference from other devices, which a WiFi analyzer could help identify. A cable tester is used to ensure a cable is properly created as a patch cable (straight through) or a crossover cable. Cable testers provide detailed information on the physical and electrical properties of the cable. For example, they test and report cable conditions, crosstalk, attenuation, noise, resistance, and other cable run characteristics. A multimeter can measure the voltage, amperage, and resistance of a circuit. A multimeter can be a hand-held device useful for basic fault finding and field service work or a bench instrument that can measure electricity with a high degree of accuracy. A tone generator is connected to a wall jack and sends a repeating signal over the cable. The probe can then be used to detect which cable is attached to the wall jack by detecting the signal being sent by the tone generator. The probe needs to be near or touch the cable with the tone generator attached to identify it positively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An employee is complaining that their workstation is not booting into Windows when they reboot their machine. You noticed that during the reboot, the system is loading into a PXE-based OS. What should you do next?

A

OBJ-3.5: PXE (Preboot Execution Environment) is a network boot execution process allowing you to retrieve an image from a PXE server. It is often used for reimaging computers in corporate deployments. To boot from the hard drive instead, the BIOS’s boot order should be changed from PXE to HDD. Rebooting the workstation will just reload the PXE-based OS again. Since the system is booting to the PXE environment, it is bypassing the internal hard drive’s OS making recovery mode an invalid choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Your printer is connected directly to your computer using a USB cable. Your coworker’s printer is broken, and they asked you to share your printer to allow them to print. Which of the following should you do as a temporary solution to allow them to print without incurring any additional cost?

A

OBJ-3.10: In Windows 10, you can share your printer with many PCs on your network. To share a printer from the PC that the printer is connected to your system with a coworker’s computer that the printer is not directly connected to, you must set up sharing settings for the printer in Windows, ensure your computer remains online, and that the printer is connected to your computer at all times. This is a free solution that will let your coworker print to your computer over the network. While this isn’t an ideal long-term solution, it is a great workaround until their printer is fixed or a more expensive option (like a network printer or print server) can be purchased and installed. Purchasing a printer or a wireless print server would incur additional costs making them incorrect options. A guest account is not needed for them to print using your computer, but Printer Sharing must be enabled instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is categorized as a public IP address?

A

OBJ-2.6: To communicate on the Internet, a host must obtain a unique public IP address. Typically this is allocated by an Internet Service Provider. If an address is not an APIPA address (169.254.x.x), a private IP address (10.x.x.x, 172.16-31.x.x, or 192.168.x.x), or a localhost IP (127.0.0.1), then it is considered a public IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What type of Virtual Desktop should be chosen to reduce capital expenditures and have the hardware maintained by the cloud service provider?

A

OBJ-4.1: A remote hosted virtual desktop (HVD) is a full, thick-client user environment run as a virtual machine (VM) on a server and accessed remotely. Using a hosted virtual desktop allows a company to utilize the cloud for its desktop infrastructure, reduce its maintenance cost, and shift capital expenses (such as new desktops) to operational expenses (monthly fees to pay for virtual desktop services). Desktop as a Service (DaaS) provides a full virtualized desktop environment from within a cloud-based service. This is also known as VDI (Virtualized Desktop Infrastructure) and is coming in large enterprise businesses focused on increasing their security and minimizing their operational expenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You are attempting to build a new gaming workstation and have just finished installing the motherboard and the processor. You are about to begin installing two memory modules, and notice 4 DIMM sockets on the motherboard labeled 0, 1, 2, and 3. Two of these are colored red, and two are colored blue. Which of the following should you do FIRST?

A

OBJ-3.3: You should consult the motherboard’s manual and documentation to determine the best method of installing the memory into the system. The system may support both single-channel and dual-channel memory configurations, depending on how the memory is installed. Based on your specific customer needs, you may wish to install them as single or dual-channel (which may require installing the memory in certain slots). Single-channel memory is any memory using one 64-bit bus between the CPU and the RAM. Dual-channel memory is a memory controller with two primary pathways through the bus to the CPU to transfer 128-bits of data in each transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following wireless technologies allows a wireless device to automatically be configured for a SOHO wireless network with the push of a button?

A

OBJ-2.3: The Wi-Fi Protected Setup (WPS) is a mechanism for auto-configuring a WLAN securely for home users. On compatible equipment, users push a button on the access point and connect adapters to associate them securely. WPS is subject to brute force attacks against the PIN used to secure them, making them vulnerable to attack. Wired equivalent privacy (WEP) is an older mechanism for encrypting data sent over a wireless connection. WEP is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key. Wi-Fi protected access (WPA) is an improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. WPA uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme. Wi-Fi protected access version 2 (WPA2) replaced the original version of WPA after the completion of the 802.11i security standard. WPA2 features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the port cluster.) Using the image above, which of the following correctly indicates the port labeled as E?

A

OBJ-3.1: This port is the VGA connection. A video graphics array (VGA) connector is a 15-pin HD connector that has been used to connect the graphics adapter to a monitor since 1987. The use of digital flat-panel displays rather than CRTs has made this analog connector increasingly obsolete. For the exam, it is important that you can identify the different parts of a motherboard’s rear port cluster by sight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which type of internet connection is the slowest and has the least bandwidth?

A

OBJ-2.7: A dial-up link is a very low bandwidth and extremely slow. Dial-up is simply a telephone conversation between two computers. Whereas with DSL, this “conversation” is pushed to the higher frequency parts of the phone line, with dial-up, it occupies the whole frequency range, but not very efficiently. Ordinary telephone charges apply for each session’s duration, and the phone line cannot be used for voice calls at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

You have been asked to install a network cable in the crawl space between the ceiling in your office and the roof. You need to choose the right type of cable to ensure you do not violate the local fire codes. Which of the following cable types should you choose?

A

OBJ-3.1: Plenum-rated cable has a special insulation that has low smoke and low flame characteristics. Plenum cable is mandated to be installed in any air handling space. For example, most large office buildings use the space between the ceiling and the roof to return air to the AC unit. This qualifies this area as a plenum ceiling, and all the cables that go through that ceiling must be plenum rated. It is important to check your local building codes to see if you need to use plenum cable. These plenum cables cost more because the insulation material must meet the standards for plenum cables while also meeting the standards for their ethernet category such as 5e, 6a, or 7. Shielded cables contain a braided foil shield around the inner cabling to protect the data from the effects of electromagnetic interference (EMI). Coaxial cables are a specialized type of copper cabling that uses a copper core to carry the electrical signal while being enclosed by plastic insulation and shielding to protect the data transmission from the effects of electromagnetic interference (EMI). An optical fiber consists of an ultra-fine core of glass to carry the light signals surrounded by glass or plastic cladding that guides the light pulses along the core and a protective coating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What type of wiring standard is used with POTS?

A

OBJ-3.2: POTS (Plain Old Telephone System) is an older standard used for telephone systems. An RJ-11 wiring standard is used to terminate both ends of a standard phone line. This is also used for DSL lines and VoIP ATA (Analog Telephony Adapter) devices. An RJ-45 connector is used to terminate a copper twisted-pair Ethernet cable. The F-type connector is used with coaxial cables. A ST, SC, LC, or MTRJ connector is used to terminate a fiber optic cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A customer wants to enable TPM to add password protection as the system boots up for an added security layer. Which of the following should you check to determine if TPM is enabled on the system?

A

OBJ-3.5: You should check the BIOS settings to ensure that TPM (Trusted Platform Module) is enabled. TPM enables a system to encrypt the contents of the HDD/SDD and will require a password to be entered during the boot process for the HDD/SDD to be decrypted. A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.

36
Q

The customer service manager at Dion Training would like to conduct a two-way video conference with an employee in a remote office using Zoom. Which of the following devices should be installed on both of their computers to allow this to occur?

A

OBJ-1.2: To conduct a video conference, you will need to stream the video to the user at the distance end. A webcam is a video camera that feeds or streams an image or video in real-time to or through a computer to a computer network, such as the Internet. Webcams are typically small cameras that sit on a desk, attach to a user’s monitor, or are built into a laptop, desktop, or mobile device. While a microphone is also needed to communicate with the remote employee, almost every webcam comes with a microphone already built-in. A microphone is a device that converts sounds into an electrical signal through a transduction process. Microphones are commonly used for recording voice, conducting speech recognition, and using voice over IP (VoIP) applications. A scanner is a type of photocopier that can convert the image of a physical object into an electronic data file. The two main components of a scanner are the lamp, which illuminates the object, and the recording device, an array of CCDs (Charge Coupled Devices). There are flatbed and sheet-fed versions, with sheet-fed versions typically being incorporated with a printer and fax machine into a multifunction device. Scanners can output images directly to a printer or to a suitable file format (such as JPEG, PNG, or TIFF). A monitor is an output device that displays information in pictorial or text form. A user would not need a second monitor to perform a video conference using Zoom.

37
Q

Due to the lack of fiber optic cabling near the Dion Training offices, the company has decided to purchase a ground-based microwave service for their primary internet connection. This provides the company with a 100 Mbps to 1 Gbps connection based on the service plan chosen. The technician installed a small directional antenna on the office roof and pointed it at an antenna on another building 5 miles away. Which technology is being used?

A

OBJ-2.7: Line of Sight (LOS) is a wireless connection method using ground-based microwave antennas aligned with one another. Endpoints can transmit signals to one another as long as they are unobstructed by physical objects. The antennas are mounted to the top of the building to reduce interference. LOS service is often low latency, or at least lower latency than traditional satellite internet service. A cable modem is a type of network bridge that provides bi-directional data communication via radio frequency channels on a hybrid fiber-coaxial (HFC), radio frequency over glass (RFoG), and coaxial cable infrastructure. Cable modems are primarily used to deliver broadband internet access as cable internet, taking advantage of an HFC and RFoG network’s high bandwidth. Satellite systems provide far bigger areas of coverage than can be achieved using other technologies. A Very Small Aperture Terminal (VSAT) microwave antenna is aligned to an orbital satellite that can either relay signals between sites directly or via another satellite.

38
Q

Which of the following DC voltages are not found within a printer when the laser printer converts AC power into DC power for use?

A

OBJ-5.6: The DCPS (DC Power Supply/Source) of a laser printer is used to convert high voltage AC into lower voltage DC for the printer. The DCPS converts 115VAC or 220VAC power into +5 VDC and -5 VDC for use by the printer’s logic board, and +24 VDC to power the motors that feed the paper through the printing path in the last printer.

39
Q

You have just been hired as a consultant for the Navy to select the best form of internet connection for a ship crossing the Atlantic Ocean. The ship must remain connected to the internet for the entire duration of its voyage. Which of the following types of connections do you recommend?

A

OBJ-2.7: Satellite systems provide far bigger areas of coverage than can be achieved using other technologies. A Very Small Aperture Terminal (VSAT) microwave antenna is aligned to an orbital satellite that can either relay signals between sites directly or via another satellite. While satellite internet does have some latency issues, it is the only option that will provide coverage while crossing the ocean. Cable and fiber cannot be used since you cannot keep the ship plugged in and drag the cable behind you. Cellular won’t work once you get further than about 5 miles from the coastline due to the lack of cellular towers.

40
Q

Which of the following is an open-source wireless communication protocol operating in the 2.4 GHz frequency band and is primarily used for home automation?

A

OBJ-2.4: Zigbee is an open-source wireless communication protocol used for home automation. Zigbee is open-source, unlike Z-Wave, which is proprietary. Zigbee uses the 2.4 GHz frequency band. This higher frequency allows more data bandwidth at the expense of range than Z-Wave and the greater risk of interference from other 2.4 GHz radio communications. Zigbee supports more overall devices within a single network (65,000 compared to 232 for Z-wave), and there is no hop limit for communication between devices. Z-wave is a low-power wireless communications protocol used primarily for home automation. Z-wave uses radio frequencies in the 800 MHz and 900 MHz frequency ranges. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another.

41
Q

A customer is complaining that there is are intermittent problems with their PC. As a technician, you don’t know exactly what the errors are, so which tool should you use to determine what errors have previously occurred?

A

OBJ-5.2: You should use the Event Viewer to read the log entries within Windows to determine what errors have occurred in the past. Logs are a treasure trove of information on any workstation or server. The event viewer shows a log of application and system messages, including errors, information messages, and warnings. It’s a useful tool for troubleshooting all kinds of different Windows problems. If you use the Event Viewer, you can identify what was occurring at or around 2:35 am each day before the server crashed and use this to troubleshoot the problem. Performance monitor (perfmon.msc) is a performance monitoring and system monitoring utility in Windows that is used to monitor the activities on CPU and memory activity on a computer. The performance monitor is used to view performance data either in real-time or from a log file. The performance monitor can only monitor the resource utilization, but it cannot manage or terminate those processes. System information (msinfo32.exe) is a utility that gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues. Device manager (devmgmt.msc) is a utility used to view and control the hardware attached to the computer. The device manager will highlight a piece of hardware that is not working so that a technician can repair or replace it.

42
Q

Which of the following is the virtualization technology supported by most modern AMD processors?

A

OBJ-4.2: To use virtualization and have virtual machines running on a single workstation, you need to have a CPU specifically designed to support virtualization. For Intel processors, they must support Virtualization Technology (VT). If you are using an AMD processor, it should support AMD-V (AMD’s virtualization technology). HyperThreading (HT) is an Intel CPU architecture implemented to expose two or more logical processors to the OS to deliver performance benefits. Intel-V is a made-up term used as a distractor on this question.

43
Q

A client reports that their workstation is continually crashing when using certain applications on their Windows system. The system will stop working and display a BSOD error on the screen. Which of the following is the most likely cause of this BSOD error?

A

OBJ-5.2: The Blue Screen of Death (BSOD) is a “stop screen” that appears when the Windows operating system detects a critical error and literally stops the system so that the error doesn’t cause any loss of data. All operating systems have some form of “stop screen,” but the Windows version got the name BSOD since it was a screen with a full blue background and white text containing troubleshooting information and error codes. On a Mac (OS X) system, the BSOD is replaced by the “Pinwheel of Death,” which is an endlessly spinning mouse pointer displayed on the screen. This usually occurs due to a memory failure or memory corruption in the system.

44
Q

Jason’s son has broken the RJ-45 port of his laptop by sticking clay into it, and there are no wireless networks available in his office building. The manufacturer of the laptop said the port cannot be replaced for at least a week. Which of the following would be the MOST appropriate workaround to get the laptop connected to the wired network at Dion Training’s office quickly?

A

OBJ-1.1: Since the RJ-45 port on the laptop is most likely an integrated port on the motherboard, you will have to wait for the manufacturer to replace the motherboard for you. To get back onto the wired network at the office the quickest, you should purchase an external (USB) wired network adapter. These usually are small devices that will allow you to plug a wired network cable with an RJ-45 connector into the external adapter and connect it to the laptop using a USB port. This works just like the integrated RJ-45 adapter but can be installed in just a few seconds. Alternatively, you could use a port replicator or docking station if there was one available at the office. NIC teaming allows the grouping of multiple physical Ethernet network adapters into one or more software-based virtual network adapters for increased performance or fault tolerance. This would require multiple physical network interface cards to be installed in your laptop already, which is not the case in this scenario. Replacing the motherboard would work if you had one available, but the process can be time-consuming. It would be quicker and easier to simply use an external (USB) wired network interface adapter, instead. Airplane mode and 802.11ac adapters are used with wireless networks, therefore it cannot solve this issue since the office building does not have a wireless network available.

45
Q

What is the third step of the CompTIA troubleshooting methodology?

A

OBJ-5.1: For the exam, it is important that you can list and identify the 6 steps of the CompTIA troubleshooting methodology in order. (1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and then implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.

46
Q

Your boss is looking for a recommendation for a cloud solution that will only allow your company’s employees to use the service while preventing anyone else from accessing it. What type of cloud model would you recommend to ensure the contents are best secured from those outside your company?

A

OBJ-4.1: A private cloud service would be the best recommendation to protect and secure the services from those outside the company from accessing its contents. The private cloud is defined as computing services offered either over the Internet or a private internal network and only to select users instead of the general public. Private cloud computing gives businesses many of the benefits of a public cloud including self-service, scalability, and elasticity with the additional control and customization available from dedicated resources over a computing infrastructure hosted on-premises. Private clouds also deliver a higher level of security and privacy through both company firewalls and internal hosting to ensure operations and sensitive data are not accessible to third-party providers. A public cloud contains services offered by third-party providers over the public Internet and is available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume. A public cloud contains services offered by third-party providers over the public Internet and is available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume. A community cloud is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third party and hosted internally or externally.

47
Q

Which of the following ports should you unblock at the firewall if your workstation cannot access diontraining.com but can access the website by its IP address?

A

OBJ-2.1: The Domain Name System (DNS) servers provide resolution of host and domain names to their IP addresses and are essential for locating resources on the Internet. Most local networks also use DNS for name resolution. Typically, the DNS server would be the gateway address, though this may not be the case on all networks. Often two DNS server addresses (preferred and alternate) are specified for redundancy. DNS operates over TCP/UDP port 53, and if that is blocked, the client will be unable to convert the domain name (diontraining.com) to its IP address. The hypertext transfer protocol (HTTP) is a protocol used to provide web content to browsers using port 80. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443. The dynamic host control protocol (DHCP) is a protocol used to allocate IP addresses to a host when it joins a network. DHCP utilizes UDP ports 67 and 68.

48
Q

Which of the following technologies is commonly used to inventory the organization’s equipment by attaching a tag to the device containing a chip programmed with the assets data, allowing one-way communication to occur from the tag to the reader?

A

OBJ-2.4: An RFID tag contains an RFID chip programmed with the asset data. This is read wirelessly by an RFID (radio frequency identification) reader. RFID is a one-way communication mechanism, whereas NFC is two-way communication. Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another. Zigbee is a low-power wireless communications open-source protocol used primarily for home automation. Zigbee uses radio frequencies in the 2.4 GHz band and a mesh topology. Z-wave is a low-power wireless communications protocol used primarily for home automation. Z-wave uses radio frequencies in the 800 MHz and 900 MHz frequency ranges.

49
Q

John is a small business owner who is always running between meetings. He wants to buy a device that will let him quickly and easily see his email notifications, view his instant messages and chats, and keep in touch with his executive assistant who is back at the office. Which device would BEST meet John’s needs?

A

OBJ-1.4: A high-end smartwatch (for example, an Apple Watch) will allow the user to see their notifications, chat activity, and even make phone calls. A mid-range or low-end smartwatch can still have the ability to read your chat and notifications, but you may be unable to make phone calls from it. A fitness monitor is a wearable mobile device that focuses on tracking the health and exercise habits of its users. A high-end smartwatch usually includes fitness tracking functionality, as well. An e-Reader is a tablet-sized device designed for reading rather than general-purpose computing. For example, the Amazon Paperwhite is an example of a traditional e-Reader. A portable hotspot is a dedicated mobile device that connects to a cellular network and provides a wireless (Wi-Fi) network for a small number of users.

50
Q

Your friend just noticed their smartphone’s battery is running low. Unfortunately, your friend isn’t very knowledgeable about computers and smartphones, so they don’t know what type of charging cable they need. They know their phone is running iOS 15. What kind of cable does your friend need to charge their phone?

A

OBJ-1.5: Lightning cables are used by Apple’s iPhone, which are the only smartphones that run the iOS software. Since your friend is using iOS, he uses an iPhone (smartphone) or an older iPad (tablet). Lightning is a proprietary computer bus and power connector created by Apple. The lightning cable is used by every iPhone from the 5 to 13 series. Newer iPads have shifted to the use of USB-C for charging instead of the lightning cable, though. USB-C is the default standard used in USB 3.1 with a 24-pin connector. The connector is reversible and can be inserted in either direction. Micro USB is a miniaturized version of the Universal Serial Bus (USB) interface developed for connecting compact and mobile devices such as smartphones, Mp3 players, GPS devices, photo printers, and digital cameras. Micro USB connectors exist or have existed in three forms: micro A, micro B, and micro USB 3. Mini USB was introduced with USB 2.0 and was used with digital cameras and early tablets. Mini USB is not commonly used in modern devices.

51
Q

A computer technician is configuring a NAS for a company to store their corporate data. The technician has only two hard drives available for use and needs to ensure that the data’s fault tolerance and redundancy. Which of the following would be is the best configuration to implement?

A

OBJ-3.4: While either a RAID 0 or RAID 1 can be used with only two drives, only a RAID 1 will provide redundancy and fault tolerance. A RAID 0 provides disk striping (speed/performance) but not mirroring with a minimum of two disks. A RAID 1 provides mirroring (redundancy) but not disk striping with a minimum of two disks. With a RAID 1, one of the hard drives can fail while the other drive can still operate until the bad drive is replaced. A RAID 5 provides block-level striping with distributed parity to provide redundancy using a minimum of three disks. A RAID 10 combines disk mirroring and disk striping to protect data stored in the array and required a minimum of four disks. A RAID 5 requires at least three hard drives to operate, and a RAID 10 requires at least four hard drives to operate; therefore, neither is an acceptable solution to this problem.

52
Q

The large multi-function network printer has recently begun to print pages that appear to have a dust-like coating when handled by the users. Which of the following components should be replaced based on this description?

A

OBJ-5.6: The printer passes the paper through the fuser, a pair of heated rollers. As the paper passes through these rollers, the loose toner powder melts, fusing with the paper’s fibers. The fuser rolls the paper to the output tray, and you have your finished page. The fuser also heats the paper itself, of course, which is why pages are always hot when they come out of a laser printer or photocopier. If the paper feels dusty or the toner doesn’t adhere to the printer, this usually indicates a failing fuser that needs to be replaced.

53
Q

Which of the following DC voltages are not found within a printer when the laser printer converts AC power into DC power for use?

A

OBJ-5.6: The DCPS (DC Power Supply/Source) of a laser printer is used to convert high voltage AC into lower voltage DC for the printer. The DCPS converts 115VAC or 220VAC power into +5 VDC and -5 VDC for use by the printer’s logic board, and +24 VDC to power the motors that feed the paper through the printing path in the last printer.

54
Q

You are troubleshooting an issue with an impact printer in an automotive service department. The printer has begun to print unevenly. As the print head goes from left to right across the page, the printout goes from darker to lighter. What is the MOST likely cause of this issue?

A

OBJ-5.6: An impact printer has teeth along the paper’s edges that pull the paper along a tractor as it prints. This moves the paper up one line at a time. The print head moves from left to right across the page, impacting the print head through the ribbon to mark the paper. If the ribbon advance mechanism is defective, the ribbon will not advance as the print head goes across the page, leading to a lightening of the ink being marked on the paper. If the printer ribbon itself were worn out, it would be lighter in color as you went down the page (not from left to right).

55
Q

You are working as a technician for a college. One of the professors has submitted a trouble ticket stating that the projector connected to the workstation in his classroom is too dim. You look at the image being projected on the wall and notice it is dim, but the image appears to be displayed clearly and correctly. What is the FIRST thing you should do to make the image brighter?

A

OBJ-5.4: If the image being displayed is dim, this could be an issue with your project’s contrast. By increasing the contrast, you can increase the amount of light reflected from an all white image and an all black image. The higher the contrast ratio, the brighter the whites will appear in the image. For example, if you have a projector with a 3000:1 contrast ratio, this means that the white image is 3000 times brighter than the black image. The higher the contrast ratio, the more detail you can see on the projected image, regardless of whether it is numbers, pictures, graphs, text, or video. Contrast is what makes it possible for us to see the subtle shades of colors. If the project supports the contrast or contrast ratio adjustment, you should increase the contrast to brighten the screen’s image.

56
Q

What type of connector is most often used to connect to an older smartphone?

A

OBJ-1.5: icro USB is a miniaturized version of the Universal Serial Bus (USB) interface developed for connecting compact and mobile devices such as smartphones, MP3 players, GPS devices, photo printers, and digital cameras. Micro USB connectors exist or have existed in three forms: micro A, micro B, and micro USB 3. Mini USB was introduced with USB 2.0 and was used with digital cameras and early tablets. Mini USB is not commonly used in modern devices. Recently, though, the industry moved to the USB Type C (USB-C) connector for smartphones and many other devices as it is faster and easier to connect. USB-C is the default standard used in USB 3.1 with a 24-pin connector. The connector is reversible and can be inserted in either direction. USB Type B is a large form factor USB connector usually reserved for connecting to older printers and scanners.

57
Q

Which of the following refers to using virtual machines as a method of provisioning workstations for corporate users?

A

OBJ-4.1: Virtual Desktop Infrastructure (VDI) refers to using a VM as a means of provisioning corporate desktops. In a typical VDI, desktop computers are replaced by low-spec, low-power thin client computers. When the thin client starts, it boots a minimal OS, allowing the user to log on to a VM stored on the company server or cloud infrastructure. The user connects to the VM using some remote desktop protocol (Microsoft Remote Desktop or Citrix ICA, for instance). The thin client has to find the correct image and use an appropriate authentication mechanism. Software as a Service (SaaS) is a cloud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions. Platform as a Service (PaaS) is a cloud computing service that enables consumers to rent fully configured systems that are set up for specific purposes. Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center.

58
Q

Which of the following types of connectors are used to terminate a household telephone cable?

A

OBJ-3.2: An RJ-11 (Registered Jack 11) is a telephone interface that uses a cable of twisted wire pairs and a modular jack with two, four, or six contacts. RJ-11 is the common connector for plugging a household telephone into the wall and the telephone’s handset. A copper twisted pair Ethernet cable is usually terminated with a RJ-45 connector. Coaxial cables are normally terminated using a F type connector. A fiber optic cable normally uses a ST, SC, LC, or MTRJ connector.

59
Q

Dion Training recently hired a new graphic designer. You have been asked to install a new, high-end PCIe x16 graphics card into one of the standard corporate workstations so the new designer can get to work. After installing the card, you attempt to power on the computer. The computer makes some odd noises when you press the power button, but the monitor displays the words, ‘no source.’ What is MOST likely the issue?

A

OBJ-5.2: High-end graphics cards generally require additional power to operate. Most corporate workstations come with minimal power supplies (usually 250-300 watts) that cannot provide the additional power required to operate a high-end graphics card. In this case, the power supply should be upgraded to at least a 500-750 watt power supply to support the new graphics card.

60
Q

Which of the following synchronization methods does NOT work with Android devices?

A

OBJ-1.7: Android can not use iTunes to perform synchronization functions. The iTunes application only works with Apple devices, such as iPhones and iPads. Android devices can use Google Workspace with Gmail to sync emails and contacts. Android devices can also use Office 365 to sync emails, contacts, and other files if you are a Microsoft subscriber. Android devices can use Flickr to sync photos.

61
Q

Your friend just gave you his old laptop. Whenever you turn on the laptop, though, a blank screen appears and asks you to enter an administrative password before the computer attempts to boot up. Unfortunately, your friend never gave you the password for this laptop. Which of the following actions should you take to resolve this issue and get past this password screen?

A

OBJ-5.2: This blank screen asking for the administrative password appears to be a BIOS password required to be entered before the laptop is allowed to boot from the hard disk. Your best option is to clear the CMOS forcibly to remove the BIOS password from a workstation or laptop. To clear the CMOS, you must remove the CMOS battery from your computer, wait a few minutes, reinsert the CMOS battery, and then attempt to power on the computer again. This will cause the information stored in the CMOS (for example, BIOS settings and passwords) to be erased and restored to its default configuration. Removing and reinserting the laptop’s battery will not reset the BIOS password. Disconnecting and reconnecting the hard drive will not reset the BIOS password.

62
Q

Dion Training just installed a new webserver within a screened subnet. You have been asked to open up the port for secure web browsing on the firewall. Which port should you set as open to allow users to access this new server?

A

OBJ-2.1: The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443. The hypertext transfer protocol (HTTP) is a protocol used to provide web content to browsers using port 80. The hypertext transfer protocol (HTTP) is a protocol used to provide web content to browsers using port 80. The file transfer protocol (FTP) is the protocol used to transfer files across the internet over ports 20 and 21.

63
Q

Which of the following ports are used by the NetBIOS protocol to share files and printers on a Windows network? (Select ANY that apply)

A

OBJ-2.1: The network basic input/output system (NetBIOS)/NetBIOS over TCP/IP (NetBT) is a session management protocol used to provide name registration and resolution services on legacy Microsoft networks and those using WINS. NetBIOS/NetBT operates on TCP/UDP ports 137 and 139. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443. The file transfer protocol (FTP) is the protocol used to transfer files across the internet over ports 20 and 21. The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110.

64
Q

Which of the following cables supports both charging and data transfer with a non-directional connector inserted into a port on the device?

A

OBJ-3.1: USB-C can be inserted in any direction since it is designed as a non-directional connector. There are many other variations of USB cables in use today such as Micro-USB, Mini-USB, USB-A, and USB-B that can only be inserted into the port in a single direction due to the physical shape of their connector. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at a slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power.

65
Q

(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.) Using the image of the motherboard above, which of the following correctly indicates the circled area?

A

OBJ-3.5: The area circled indicates the CMOS battery on this motherboard. The CMOS battery is used to keep power to the BIOS configurations, such as the date and time, when the power is removed from a desktop or workstation. For the exam, it is important that you can identify the different parts of the motherboard by sight.

66
Q

(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.) Using the image of the motherboard above, which of the following correctly indicates the circled area?

A

OBJ-3.5: The area circled indicates the mainboard power. This is also considered an ATX 24-pin power connector to the motherboard. For the exam, it is important that you can identify the different parts of the motherboard by sight.

67
Q

You are troubleshooting a customer’s printer that is attached to their workstation by a USB cable. The printer is powered on, but it fails to print. You question the customer, but they claim that nothing has changed on the computer or the printer since it was printing earlier today. Which of the following should you do NEXT to determine the root cause of the printer failure?

A

OBJ-5.1: You should always question the obvious when establishing the theory of probable cause. In this case, you have not fully identified the problem yet, so you must establish a theory and test it. For the exam, it is important that you can list and identify the 6 steps of the CompTIA troubleshooting methodology in order. (1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and then implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.

68
Q

A car dealer recently set up an impact printer in their automotive repair shop. Unfortunately, the printer’s output is now starting to crease the paper as it is printed which can lead to a paper jam during feeding. Which of the following might be causing these issues? (Choose TWO)

A

OBJ-5.6: Incorrect paper size and Excess paper in the feed path. An impact printer is widely used in situations where multi-part documents, invoices, or contracts need to be produced on carbon paper. These printers use specialized paper fed through the printer by holes on the edges of the paper on what is called a tractor. The paper can crease if the wrong size paper is used or excess paper in the feed path causes bunching up of the paper being fed. The print head does not affect the feeding of the paper in an impact printer. The tension setting being incorrect will lead to the paper pooling or bubbling up during feeding, but it wouldn’t necessarily cause creasing.

69
Q

A computer technician is configuring a NAS for a company to store their corporate data. The technician has installed three 6 TB hard drives operating at 7200 RPM in a RAID 5 configuration. How much usable storage space is contained in this NAS?

A

OBJ-3.4: A RAID 5 provides block-level striping with distributed parity to provide redundancy using a minimum of three disks. Since the NAS uses a RAID 5 configuration, it is a stripped array with parity. The three 6 TB HDDs are installed, but 33% of the storage capacity will store the parity information. This leaves only 12 TB of usable storage space in the NAS when using the RAID 5 configuration.

70
Q

You have just connected an external monitor to a laptop for one of Dion Training’s employees. You now need to configure the laptop to mirror the internal laptop display to this monitor. Which of the following should you do next?

A

OBJ-1.3: Once the external display/monitor has been connected, you need to configure the display settings from within the operating system. The other options provided will not cause the displays to be mirrored as per the customer’s request. Some laptops have a special hotkey reserved for mirroring the internal display to an external monitor, as well.

71
Q

(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.) Using the image of the motherboard above, which of the following correctly indicates the circled area?

A

OBJ-3.5: The area circled indicates the front connector on the motherboard. This area connectors the various wires to the front panel to include the LED activity lights for the hard disk drive and the power/reset buttons. For the exam, it is important that you can identify the different parts of the motherboard by sight.

72
Q

(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.) Using the image of the motherboard above, which of the following correctly indicates the circled area?

A

OBJ-3.5: The area circled indicates the CPU power connector. This is an 8-pin power connector that connects the power supply to the CPU slot. For the exam, it is important that you can identify the different parts of the motherboard by sight.

73
Q

(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.) Using the image of the motherboard above, which of the following correctly indicates the circled area?

A

OBJ-3.5: The area circled indicates the CPU slot. This is where the processor is installed into the motherboard. For the exam, it is important that you can identify the different parts of the motherboard by sight.

74
Q

Tom is running some new Cat 5e cabling in an office building to connect a few offices. The ceiling is constructed as a drop ceiling with fluorescent lights and does not have any cable trays. Due to the proximity of the fluorescent lights to the cable being run, what type of CAT 5e cable should be run?

A

OBJ-5.7: STP (Shielded Twisted Pair) is a type of cabling that can help prevent electrical interferences or cross-talk. A cross-talk is when electrical interference data passing through can cause CRC (Cyclic Redundancy Check) errors. A CRC is used to calculate the before and after checksum is made when transferring data. If electrical interference gets in the way, such as proximity to fluorescent light bulbs, it can cause data to be corrupted and produce an error. UTP (Unshielded Twisted Pair) is cheaper and easier to work with but is subject to interference. Coaxial and fiber are not types of CAT 5e cabling. Coaxial and fiber are not Cat 5E cable types and cannot be used for this network.

75
Q

Jason is configuring a virtual machine to run a Minecraft server for his son. The network utilizes a DHCP server for all connected devices. Jason decided to configure the virtual machine with the static IP of 192.168.1.10 to make it easier to identify on the network. Ever since this static IP was issued, both the virtual machine and a printer on the network have had intermittent connectivity issues. What is MOST likely the cause of these issues?

A

OBJ-5.7: An IP conflict often causes this type of intermittent connectivity. An IP conflict can occur when a static IP is also part of a DHCP scope. In this example, it appears the printer received a DHCP IP address of 192.168.1.10, the same IP that Jason statically assigned to the virtual machine. Whenever you assign a static IP, you need to ensure those IP addresses are excluded from the available DHCP scope for other assignments.

76
Q

A customer contacts the service desk because their laptop will not power on when plugged in, and the battery is dead. The service desk replaces its battery, connects it to a different power adapter, and the laptop works all day until the battery runs out. Now, the laptop won’t turn on, and the battery won’t charge. Which of the following do you recommend to solve this issue?

A

OBJ-5.5: This scenario indicates that the DC jack is faulty. Since the battery was replaced and the laptop continues to work, this indicates it isn’t a battery issue but is, instead, most likely a DC jack issue. The DC jack often gets broken on a laptop, and if the jack is broken, the device cannot charge or receive power from the power adapter or wall outlet.

77
Q

You have been asked by Dion Training to build a specialized computer that will be used exclusively for video editing. Which of the following should you install to BEST meet the company’s needs? (Select THREE)

A

OBJ-3.8: According to CompTIA, the three main things you need to include for an audio/video editing workstation are (1) specialized audio and video card, (2) a large, fast hard drive, and (3) dual monitors. Based on the options provided, you should pick the video card, the 4 TB hard disk drive running at 10,000 RPMs, and the dual monitors for this workstation’s configuration.

78
Q

(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.) Using the image of the motherboard above, which of the following correctly indicates the circled area?

A

OBJ-3.4: The area circled indicates the SATA connectors on the motherboard. Serial ATA (SATA) is the most widely used interface for hard disks on modern desktop and laptop computers. SATA uses a 7-pin L-shaped data connector with one device per port. SATA operates at bandwidths of 1.5 Gbps, 3 Gbps, or 6 Gbps. SATA drives can also use a 15-pin power connector. For the exam, it is important that you can identify the different parts of the motherboard by sight.

79
Q

Dion Training has recently purchased a new wireless printer and has asked you to configure it in their office. You have installed the necessary printer drivers on your workstation and have plugged the printer into the power outlet. You just configured the printer to connect to the guest wireless network. Next, you try to print a test page, but nothing prints out. Which of the following is the most likely cause for the printer not printing the test page?

A

OBJ-5.6: Most corporate wireless networks are configured as two separate networks: one for the corporate wireless network traffic and another for any guests that might connect to the wireless network while visiting your offices. These two wireless networks are isolated from each other, so if you connect the printer to the guest wireless network then the workstations will be unable to reach the printer and print out any documents or test pages.

80
Q

Which of the following is a public IP address?

A

OBJ-2.6: IP addresses are either public, private, localhost, or APIPA addresses. Any address from 169.254.1.0 to 169.254.254.255 is considered an APIPA address. A private IP address is in the range of 10.x.x.x, 172.16-31.x.x, or 192.168.x.x. A localhost IP is 127.0.0.1. All others are considered public IP addresses.

81
Q

Which of the following tools would provide you with detailed information on the wiring of a CAT 6 cable?

A

OBJ-2.8: A cable tester is used to ensure a cable is properly created as a patch cable (straight through) or a crossover cable. Cable testers provide detailed information on the physical and electrical properties of the cable. For example, they test and report cable conditions, crosstalk, attenuation, noise, resistance, and other cable run characteristics. A crimper is a tool used to attach an RJ-45 plastic connector to an unshielded twisted pair (UTP) or shielded twisted pair (STP) cable. It pushes a portion of the plastic into the jacket of the cable to hold it in place. A loopback plug is used to test a port. It involves connecting pin 1 to pin 3 and pin 2 to pin 6. You can do this either by rewiring the jack or twisting the relevant pairs together on a cable stub. Alternatively, you can purchase a prefabricated loopback plug. When you connect a loopback plug to a port, you should see a solid connection LED. You can also use the loopback plug in conjunction with diagnostic software. A multimeter can measure the voltage, amperage, and resistance of a circuit. A multimeter can be a hand-held device useful for basic fault finding and field service work or a bench instrument that can measure electricity with a high degree of accuracy.

82
Q

Which of the following is a digital circuit-switched technology that combines voice, video, and data over one connection?

A

OBJ-2.7: ISDN (integrated services digital network) is a digital circuit-switched technology for voice, video, and data. ISDN is carried over a traditional phone line, but unlike dial-up, the service is fully digital and provides faster speeds. ISDN ranges from 128 kbps to 2 Mbps in speed. ISDN is an older technology that is only used in large organizations in remote areas in modern times.

83
Q

Susan sees streaks of toner across her papers when printing documents using the laser printer in her office. What is the MOST likely solution for this problem?

A

OBJ-5.6: The transfer roller is one of the most important components inside the printer, as it charges the toner in the drum before it transfers to the paper. If you see streaks of toner on your printouts, this is usually an indication of a dirty transfer roller. Consequently, occasionally cleaning the transfer roller can keep your printed documents clean and streak-free. You may print hundreds or even thousands of pages on your laser printer between toner cartridge changes, so it is prudent to clean the unit whenever you change the toner cartridge to keep used toner from building up and clogging the print mechanism.

84
Q

Which type of wireless network utilizes the 5 GHz frequency band and reaches speeds of up to 3.5 Gbps?

A

OBJ-2.3: The 802.11ac (Wireless AC or Wi-Fi 5) standard utilizes a 5 GHz frequency to provide wireless networking at theoretical speeds up to 3.5 Gbps. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. The 802.11ax (Wireless AX or Wi-Fi 6) standard utilizes 2.4 GHz and 5.0 GHz frequencies to provide wireless networking at theoretical speeds up to 9.6 Gbps. Wireless AC uses orthogonal frequency-division multiple access (OFDMA) to conduct multiplexing of the frequencies transmitted and received to each client to provide additional bandwidth. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless AC also has a version called Wi-Fi 6E that supports the 6GHz frequency instead of the 2.4 GHz and 5.0 GHz frequencies used in Wi-Fi 6. The 802.11a (Wireless A) standard utilizes a 5 GHz frequency to provide wireless networking at speeds up to 54 Mbps. The 802.11b (Wireless B) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 11 Mbps. The 802.11g (Wireless G) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 54 Mbps. The 802.11n (Wireless N) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 108 Mbps or a 5.0 GHz frequency to provide wireless networking at speeds up to 600 Mbps. Wireless N supports the use of multiple-input-multiple-output (MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless N supports channel bonding by combining two 20 MHz channels into a single 40 MHz channel to provide additional bandwidth.

85
Q

What type of expansion bus technology uses lanes with point-to-point communication paths between two components on the motherboard?

A

OBJ-3.5: PCIe (Peripheral Component Interconnect Express) uses lanes between any two intercommunicating devices. This utilizes a separated pair of wires for both directions of traffic. This increases the bus lanes’ speed since there is no possibility of collisions or waiting for other devices to finish communicating. PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has some PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. Graphics cards almost exclusively rely on PCIe x16 expansion slots for their connectivity. AGP, PCI, and PCI-X are older technologies that rely on shared busses for communication.