Infrastructure Flashcards

1
Q

Which of the following storage provisioning methods is implemented at the hardware level of a SAN and can be completed in either a soft or hard basis?

A. LUN masking
​B. Network share creation
C. Zoning
D. Multipathing

A

C. Zoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

For which of the following protocols will an administrator configure a trap to collect system state data?

A. SNMP
​B. FTPS ​
C. IPMI
D. SMTP

A

A. SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following commands provides measurements of round-trip network latency?

A. ping
​B. route
​C. arp
D. nslookup

A

A. ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compared to Type II hypervisors, Type I hypervisors generally have lower:

A. numbers of VMs per host
​B. requirements for host overhead
​C. numbers of hosts installed in data centers
D. costs

A

​B. requirements for host overhead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following methods can an Administrator use to force an array to allow data to be distributed one node at a time in a private cloud implementation?

A. Least connections ​
B. Least used
​C. Best bandwidth
​D. Round robin

A

​D. Round robin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following should an administrator use when marking VLAN traffic?

A. Virtual Local Area Network tagging
​B. Network Address Translation
​C. Subnetting
D. Port Address Translation

A

A. Virtual Local Area Network tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following will allow an administrator to quickly revert a VM back to a previous state?

A. Metadata
​B. Snapshots
​C. Extended metadata
D. Cloning

A

​B. Snapshots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is the meaning of IaaS?

A. IT as a Service
​B. Information as a Service ​
C. Infrastructure as a Service
D. Identity as a Service

A

C. Infrastructure as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the meaning of Paas?

A. Ping as a Service
​B. Process as a Service
​C. Programming as a Service
D. Platform as a Service

A

D. Platform as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the meaning of SaaS?

A. Solutions as a Service
​B. Software as a Service ​
C. Servers as a Service
D. Security as a Service

A

​B. Software as a Service ​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A community name is used by:

A. WMI
​B. SMTP
​C. SNMP
​D. SMS

A

​C. SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following high availability solutions would a cloud service provider use when deploying Software as a Service?

​A. Virtual switches
​B. Multipathing
​C. Load balancing
​D. Clustering servers

A

​D. Clustering servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following hypervisor types requires the least overhead?

​A. Type II
​B. open source ​
C. Type I
​D. hosted

A

C. Type I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In a RAID 6 environment a technician is trying to calculate how many read operations would be made. How many read operations would be required in RAID 6?

​A. One
​B. Four ​
C. Two
​D. Three

A

​D. Three

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following allows authentication based on something you are? (Select TWO)

​A. Passwords
​B. Access badge 
​C. Retina scan
​D. Key fobs
​E. Voice recognition ​
F. PIN
A

​C. Retina scan

​E. Voice recognition ​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which the following expansion card ports is the fastest?

A. ISA
B. PCI
C. PCIx
D. PCle

A

D. PCle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following BEST describes an HCL?

A. A list of permissions for network access and routing
B. A list of approved hardware
Help
C. A list of permissions for file sharing
D. A method of attaching a server to a SAN

A

B. A list of approved hardware

Help

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following expansion cards should be installed to give a server FireWire connectivity?

A. IEEE 802.11
B. NIC
C. HBA
D. IEEE 1394

A

D. IEEE 1394

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following file systems is native to an ESX server?

A. NTFS
B. EXT3
C. FAT32
D. VMFS

A

D. VMFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

As a best practice, in which of the following locations should antivirus software be installed? (Select TWO)

A. Only on the administrator’s workstation
B. Only on the domain controller
C. Only on the general manager’s workstation
D. On all servers
E. On all workstations

A

D. On all servers

E. On all workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is a benefit of hot-swappable parts?

A. Ability to utilize logical unit numbers (LUNs)
B. Ability to implement USB devices
C. Ability to utilize flash memory
D. Ability to replace hardware without interrupting the server’s power

A

D. Ability to replace hardware without interrupting the server’s power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following should an administrator utilize when installing a new server to ensure that best practices are followed?

A. Service Level Agreement (SLA)
B. Warranty regulations
C. Vendor support documentation
D. Equipment disposal policies

A

C. Vendor support documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following involves the copying off and removal of data from file servers?

A. Backing up
B. Archiving
C. Recovery
D. Replicating

A

B. Archiving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An administrator recently performed a NIC driver upgrade on several servers and now is seeing lost packets and some disconnected switches. Which of the following is the BEST course of action for an administrator to take to resolve this issue?

A. Restart the server and see if the issue still remains. If the issue still exists open a case with the OEM of the NIC.
B. Call the OEM of the NIC and open a case with them to investigate the issue. Roll back the NIC driver to the previous working revision.
C. Call the OEM of the NIC and open a case with them to investigate the issue.
D. Go to the OEM’s website and download another NIC driver to test.

A

B. Call the OEM of the NIC and open a case with them to investigate the issue. Roll back the NIC driver to the previous working revision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following step should a technician use to verify if a server is under warranty?

A. Escalate the problem to upper management.
B. Assume the part is no longer under warranty, and order a replacement part.
C. Perform a root cause analysis.
D. Contact the OEM to verify the warranty status, and then document the findings.

A

D. Contact the OEM to verify the warranty status, and then document the findings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A network technician is connecting to a switch to modify the configuration. DHCP is not enabled on the management port. Which of the following does the technician need to configure to connect to the device?

A. IP address
B. Default Gateway
C. DNS address
D. Loopback address

A

A. IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An architect designs the building blueprint for a new office. The IT team has to purchase equipment and cabling. Upon inspection of the building layout, it is discovered that no designation was made for network infrastructure wiring, cabling, and services for the building. Which of the following needs to be documented in the blueprint for building connectivity?

A. HVAC
B. Server room
C. MDF
D. Mechanical room

A

C. MDF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A network technician has been notified that an available wireless SSID is using insecure WEP encryption and has been asked to investigate what other options are available on the existing wireless hardware. The technician has found that the WAPs support AES-CCMP. Which of the following should the technician configure?

A. WPA2
B. MAC filtering
C. MD5
D. WPS

A

A. WPA2

29
Q

A technician is called to troubleshoot a client PC that is not connecting to the network. The technician first examines the LEDs on the NIC and connection to the wall jack. Then the technician runs a loopback test on the NIC. Which of the following troubleshooting skills is the technician demonstrating?

A. Inductive reasoning
B. OSI model bottom-to-top
C. Trial-and-error
D. Divide and conquer

A

B. OSI model bottom-to-top

30
Q

Users within an office building report wireless connectivity is sporadic. A wireless technician troubleshooting the issue notices there are multiple WAPs visible in the same hallway within 20ft (6m) of one another. Which of the following is causing the issue?

A. Incorrect antenna type
B. Interference
C. Frequency mismatch
D. Signal reflection

A

B. Interference

31
Q

A network technician is tasked with troubleshooting intermittent network connectivity issues within an organization. Which of the following are possible network service issues? (Select TWO).

A. Duplicate IP address
B. Phishing
C. MAC filtering
D. Exhausted DHCP scope 
E. NIC teaming
F. Content filter
A

A. Duplicate IP address

D. Exhausted DHCP scope

32
Q

Which of the following components should be used to manage multiple virtual machines existing on one host?

A. Hypervisor
B. Virtual router
C. Virtual switch
D. Virtual NIC

A

A. Hypervisor

33
Q

Which of the following is aimed at irreversibly damaging and disabling IoT devices?

A. PDoS
B. Spoofing
C. Ransomware
D. Logic bomb E. MITM

A

A. PDoS

34
Q

In troubleshooting network performance issues on a computer, a technician finds that the CAT5e cable was run through a conduit with power lines. There is plenty of spare room in the conduit, and a cable continuity test is successful. Which of the following is the MOST likely issue?

A. Attenuation
B. Crosstalk
C. Incorrect cable type
D. EMI
E. VLAN misconfiguration
A

D. EMI

35
Q

One purpose of network segmentation is to:

A. protect sensitive data from the rest of the network.
B. make file transfers easier for end-users.
C. allow certain services to talk to each other without a choke point
D. hold all hardened baseline images for deployment.

A

A. protect sensitive data from the rest of the network.

36
Q

Which of the following is used for temporary storage of program data that is cleared when the computer is turned off?

A. CPU
​B. SSD
​C. Hard drive
D. System memory

A

D. System memory

37
Q

Which of the following methods of patching allows for vendor controlled updates, reduced user interaction, and increased security of the operating system or application?

A. Upgrading on a periodic basis
​B. Frequent patching
​C. Automatic updates
D. Patching scheduled daily

A

​C. Automatic updates

38
Q

Which of the following security threats would the use of cable locks reduce?

A. Shoulder surfing
​B. Phishing
​C. Hardware theft
D. Dumpster diving

A

​C. Hardware theft

39
Q

Which of the following is a reason why password complexity is a best practice?

A. It makes passwords harder to crack.
​B. It encourages users to write down passwords so they are not forgotten.
​C. It forces users to develop typing skills.
​D. It discourages users from using the same password with different accounts.

A

A. It makes passwords harder to crack.

40
Q

A user receives an email containing a link. When they hover the mouse over the link, the actual URL does not match the text in the body of the email and appears to be a string of random characters. Which of the following is the BEST course of action?

A. Forward the email to a friend to ask for advice.
​B. Reply to the sender asking for confirmation that it is safe to open. ​
C. Delete the email without clicking on the link.
D. Click the link because malware protection software is installed on the computer.

A

C. Delete the email without clicking on the link.

41
Q

Which of the following components serves as temporary storage for computer operations?

A. System board
​B. Central processing unit
​C. Random access memory
D. Expansion card

A

​C. Random access memory

42
Q

The extension .rtf is an example of which of the following file types?

A. Document
B. Executable
​C. Audio
​D. Spreadsheet

A

A. Document

43
Q

Which of the following is a common way to prevent physical theft of a laptop or workstation?

​A. Shred any sensitive information to prior to disposal.
​B. Avoid storing passwords near the computer.
​C. Practice good awareness skills when entering passwords/PINs.
​D. Cable and lock device securely attached to a solid object.

A

​D. Cable and lock device securely attached to a solid object.

44
Q

After installing a new software application, a user notices that the application launches in demo mode. Which of the following needs to be done to fully activate the software package?

​A. Enter a product or license key.
​B. Contact the vendor support.
​C. Reinstall the software application.
​D. Complete the software installation.

A

​A. Enter a product or license key.

45
Q

A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another user’s laptop. How could the user have prevented this breach?

​A. Disable file and print sharing on the laptop. ​
B. Delete unused drives from the network.
​C. Remove shared keys from the key ring.
​D. Set the read-only attribute on the files.

A

​A. Disable file and print sharing on the laptop. ​

46
Q

A user’s government identification number, birth date, and current address are considered which of the following?

​A. IMAP
​B. HTTP
​C. PII
​D. HTTPS

A

​C. PII

47
Q

Which of the following is the function of a CPU?

​A. Encrypts data for remote transmission
​B. Performs data computation
​C. Supplies electricity to components
​D. Provides storage location for files

A

​B. Performs data computation

48
Q

When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?

​A. Social engineering
​B. Phishing
​C. Virus attack
​D. License theft

A

​D. License theft

49
Q

A user is configuring a SOHO wireless router. The user should change the router’s default administrator password for which of the following reasons?

​A. To prevent improper data transmission encryption ​
B. To prevent unauthorized configuration changes ​
C. To prevent social engineering attacks
​D. To increase wireless signal strength

A

B. To prevent unauthorized configuration changes ​

50
Q

A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the following operating system types is required?

​A. 8-bit
​B. 16-bit ​
C. 32-bit ​
D. ​64-bit

A

D. ​64-bit

51
Q

Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?

​A. Large USB flash drive connected to a PC
​B. Medium capacity SATA hard drive
​C. Network attached storage appliance
​D. Firewall with security management

A

​C. Network attached storage appliance

52
Q

Which of the following is the component responsible for interconnectivity of internal system devices?

​A. System case
​B. Power supply
​C. Motherboard
​D. Expansion card

A

​C. Motherboard

53
Q

Which of the following software types protects a desktop from malicious attacks?

​A. Backup
​B. Antivirus
​C. Diagnostic
​D. Screensaver

A

​B. Antivirus

54
Q

Which of the following internal computer components is used to connect video, audio, and network cards?

​A. CPU
​B. Motherboard
​C. Hard drive
​D. Modem

A

​B. Motherboard

55
Q

Which of the following is MOST important to ensure a computer temperature is maintained within normal limits?

​A. Maintaining constant power output
​B. Ensuring sufficient airflow
​C. Keeping the case open
​D. Turning the wireless off when not needed

A

​B. Ensuring sufficient airflow

56
Q

An employee is using a desk phone that is connected only via a network cable. Which of the following technologies is the phone using?

​A. LTE
​B. GSM
​C. VoIP
​D. CDMA

A

​C. VoIP

57
Q

Which of the following file types is used to consolidate a group of files?

​A. .rtf ​
B. .m3u ​
C. .avi
​D. .rar

A

​D. .rar

58
Q

Which of the following permissions is required to run a .bat file?

​A. Delete
​B. Execute
​C. Write
​D. Modify

A

​B. Execute

59
Q

After installing the OS on a workstation, a technician notices that everything is displayed in large windows and the viewing area is limited. Which of the following will the technician need to adjust to resolve this issue?

​A. Color depth
​B. Orientation ​
C. DPI settings
​D. Resolution

A

​D. Resolution

60
Q

Which of the following connector types can be used by both mice and keyboards? (Select TWO).

​A. Thunderbolt ​
B. eSATA
​C. USB
​D. PS/2
​E. FireWire
A

​C. USB

​D. PS/2

61
Q

Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?

​A. Micro SD card ​
B. Bluetooth
​C. USB connection ​
D. Infrared

A

B. Bluetooth

62
Q

An end-user has 16GB of RAM installed on a computer system. Which of the following describes why the OS only uses a maximum of 4GB of RAM?

​A. The operating system is 16-bit.
​B. The computer has corrupted RAM.
​C. The computer has a defective motherboard. ​
D. The operating system is 32-bit.
​D. The computer has a virus.
A

D. The operating system is 32-bit.

63
Q

A technician just installed a new computer. Which of the following is the BEST way to manage the cables?

​A. Line the cables up neatly and wrap them together with cable ties.
​B. Leave the cables loose to prevent interference between wires.
​C. Nail the cables to the wall.
​D. Tuck the cables neatly underneath the carpet.

A

​A. Line the cables up neatly and wrap them together with cable ties.

64
Q

A user wants to run a major update on a laptop. Which of the following should be considered before running any major updates?

​A. Restore folders from back up
​B. Change administrator account password ​
C. Back up important folders
​D. Print all personal documents

A

C. Back up important folders

65
Q

Which of the following allows for the FASTEST printer connections?

A. Bluetooth
​B. USB
​C. Parallel ​
D. Serial

A

​B. USB

66
Q

A user needs to establish an initial password for an email account. Which of the following is the BEST example of a complex password?

​A. 01#iWant!2686612338 ​
B. iWantobeaCosmonau#
​C. 01c234n56789v9876x21
​D. 012iWanttobe210

A

​A. 01#iWant!2686612338 ​

67
Q

Which of the following is an advantage of using a 64-bit operating system?

​A. Ability to recognize an SSD
​B. Ability to obtain an IPv6 address3
​C. Ability to utilize a larger amount of RAM ​
D. Ability to add two or more hard drives

A

​C. Ability to utilize a larger amount of RAM ​

68
Q

A user has finished browsing the Internet on a public hotel workstation. Which of the following steps should be taken to BEST secure PII?

​A. Log out of the guest account and reboot
​B. Update the browsers, extensions and plugins ​
C. Run a virus scan on the workstation
​D. Clear the browser cache, cookies and history

A

​D. Clear the browser cache, cookies and history