Exam Topic Q's Pt. 5 Flashcards
A user entered a help desk ticket stating the latest calendar updates have no appeared on the user’s corporate mobile device for several days, even though updates do appear on the user’s laptop. Which of the following actions will MOST likely enable calendar alerts?
Checking that the ringer volume on the device is high enough to be audible
Ensuring the corporate password is saved correctly in the calendar.
Installing a third-party calendar application and synchronizing it with the corporate calendar.
Remotely wiping the mobile device and reinstalling all applications.
Ensuring the corporate passowrd is saved correctly in the calendar application.
A technical lead wants to migrate all common business applications, including email and file shares, to the cloud. Which of the following cloud concepts should be used?
MaaS
PaaS
SaaS
IaaS
SaaS
One Drive - SaaS
Google Drive -SaaS
DropBox - SaaS
A new verison of Windows was released and a piece of aoftware vital to the engineering department will not run on the new version. Which of the following is the BEST option to enable this department to be able to continue using this software?
Do not upgrade any workstations within the organization.
Upgrade all workstations and provide a virtual environment for the legacy software
Upgrade all workstations except those used by the engineering department.
Purchase new workstations for the engineering department
Upgrade all workstations and provide a virtual environment for the legacy software
A technician made several upgrades to a computer and then determined the power supplied by the PSU is insufficient. Which of the following would MOST likely cause the insufficiency? (Choose two.)
Replacing the HDD with an SSD
Upgrading the firmware
Adding an optical drive
Adding more RAM
Adding a CMOS battery
Upgrading the graphics card
Adding an optical drive
Upgrading the graphics card
These two consume the most power.
A technician is replacing a computer with a connected point-of-sale system using a 9-pin serial adapter. The new computer does not have a 9-pin serial port.
Which of the following ports can an adapter be installed on in order to connect to the point-of-sale system?
HDMI
Bluetooth
USB
Lightning
USB
Which of the following network types would be used in a server room to connect virtual servers to high-speed storage?
WAN
PAN
MAN
SAN
SAN
Storage Area Network (SAN) is a dedicated, independent high-speed network that interconnects and delivers shared pools of storage devices to multiple servers. Each server can access shared storage as if it were a drive directly attached to the server.
A desktop support technician is tasked with upgrading a laptop so that it has the fastest data access possible. Which of the following BEST satisfies this requirement?
mSATA SSD
M.2 NVMe SSD
2.5 SATA SSD
2.5 SAS HHD
M.2 NVMe SSD
The M.2 NVMe SSD (Non-Volatile Memory Express) is the fastest data storage device that can be installed on a laptop. It offers much faster data
access speeds compared to other storage options like SATA or SAS.
The Chief Executive Officer wants to ensure company data is stored in a manner that provides the company with complete control over how the data is managed.
Which of the following is the BEST cloud deployment model for this request?
Community
Hybrid
Public
Private
Private
A user sends a print job to a network printer, and the print job uses double the amount of paper as expected. Which of the following should the user configure to get the expected result?
Duplex
Collate
Landscape
Transparency
Duplex
A big print job utilizing both sides of the paper would decrease paper usage.
A help desk technician thinks a desktop PC has failed due to a defective power supply. Which of the following steps should the technician take NEXT?
Inquire about environmental or infrastructure changes.
Conduct external or internal research based on symptoms.
Establish a plan of action to resolve the problem and implement the solution.
Document the findings, actions, and outcomes.
Inquire about envrionmental or infrastructure changes
A startup company is outgrowing its current office space and is requiring employees to work remotely. The company must comply with government-enforced requirements to safe guard all aspects of data, so the IT department plans to maintain complete control over users’ operating systems. Which of the following should the IT department implement?
VDI
IaaS
VPN
SaaS
VDI
VDI environment is highly secure because the entire infrastructure is under enterprise control. Sensitive data from multiple
virtual desktops sit on a single physical server. You can secure this centrally managed server or host server.
Which of the following would be the BEST reason to use a virtual machine as a sandbox?
To test new software in a safe environment.
To increase the efficient use of computing resources.
To run multiple machines on the same hardware.
To have dedicated hardware for single system.
To test software in a safe environment.
Which of the following would MOST likely be used to connect one or more devices to the internet in a SOHO?
Hub
Ethernet gateway
Wireless access point
Router
Router
A router is a networking device that directs data packets between networks. In a SOHO environment, a router is typically used to provide Internet connectivity to multiple devices by connecting to a broadband modem. The router acts as a bridge between the local network and the internet,
A technician is preparing to set up a gaming computer with the following components:
- Descrete, high-end graphics card
- Video capture card
- High-end processor
- Multiple hard drives
- USB 3.0 hub
- Sound card
Which of the following options is the MOST important for the technician to consider before building the gaming computer?
Redundant power supply
Modular power supply
20-pin vs. 24-pin power adapter
Power supply wattage rating
Power supply wattage rating
Which of the following is the PRIMARY security concern with virtual machine escape?
Cross-site scripting
Compromising the hypervisor
Overutilization of resources
Rogue virtual machines installed on the hypervisor
Compromising the hypervisor