Jason Dion - CompTIA A+ 1001 Exam Prep #1 Flashcards

1
Q
  • You are working as part of a PC Refresh Team installing 150 Desktop Computers in Dion Training’s New Offices. When you boot up the 72nd Desktop you installed, you smell a foul-smelling chemical odor. You sniff the air again and confirm the smell isn’t a burning smell. Upon opening the case, which component should you inspect for damage and expect to replace?

Power Supply
GPU
Motherboard
System Fan

A

Motherboard

EXPLANATION:
A Foul Smell is usually indicative of a distended capacitor. Capacitors are small electrical components on the Motherboard. Therefore, you should inspect the Motherboard for replacement.

If there was a burning smell, then the Power Supply should be the first component inspected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

John is a small business owner who is always running between meetings. He wants to buy a Device that will let him quickly and easily see his email notifications, view his Instant Messages and Chats, and keep in touch with his executive assistant who is back at the office. Which device would BEST meet John’s needs?

Portable Hotspot
Fitness Monitor
Smartwatch
e-Reader

A

Smartwatch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dion Training’s Service Desk has received calls from numerous users stating they are receiving an error message concerning duplicate IP Addresses being detected on their Systems. These users also cannot access the Network’s File Server or browse any Websites. Which of the following Servers should the technician check first in troubleshooting this issue?

Proxy Server
DHCP Server
DNS Server
RADIUS Server

A

DHCP Server

EXPLANATION:
If duplicate IP addresses are being detected on Workstations across the Network, it is either an issue with the DHCP Server or someone has been statically assigning IP addresses to workstations improperly. A Dynamic Host Configuration Protocol (DHCP) Server is a Server configured with a range of Addresses to Lease. Hosts can be allocated an IP Address dynamically or be assigned a Reserved IP Address based on the Host’s MAC Address. The Server can also provide other configuration information, such as the location of DNS Servers.

A Domain Name System (DNS) Server is a Server that hosts the database of Domain Names and the IP Addresses mapped to those names. Each DNS Server is authoritative for certain Domain Names that their org owns.

A Proxy Server is a Server that acts as an intermediary between a client requesting a Resource and the Server that provides that Resource. A Proxy Server can be used to Filter Contents and Websites from Reaching a User.

An Authentication, Authorization, and Accounting (AAA) Server is a server used to identify (Authenticate), Approve (Authorize) and keep track of (Account For) users and their Actions. AAA Servers can also be classified based on the Protocol they use such as a RADIUS Server or a TACACS+ Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following devices combine an accurate geolocation system that communicates with a constellation of 24 Satellites continuously during it’s Operation?

Fitness Monitor
E-Readers
VR Headsets
GPS

A

GPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Jason is Teaching a CompTIA Course at a large company, but they do not allow non-employees to connect to their Network. Since Jason needs the Internet for an in class demonstration, he connects his laptop to his iPhone over WIFI and essentially connects to the Internet using the Smartphone as a Modem. Which of the following terms best describes this Configuration?

Tunneling
Baseband Update
USB Tethering
Hotspot

A

Hotspot

EXPLANATION:
A Portable Hotspot is a dedicated Mobile Device that connects to a Cellular Network and provides a Wireless (WIFI) Network for a small number of users. Most Smartphones can conduct Wireless Tethering as a form of creating a Hotspot.

Tethering uses the Cellular Data Plan of a Mobile Device to provide Internet Access to a Laptop or PC. The PC can be Tethered to the Mobile by USB, Bluetooth, or WIFI (A Mobile Hotspot). One method of doing this is to connect the laptop to the device using a WIFI connection and routing all of your data from your laptop to the phone over WIFI and then from the phone to the Internet using the phone’s built-in Cellular Modem.

Tunneling (Or Encapsulation) Protocol wraps up data from one protocol to transfer over a different type of Network. For example, PPP can carry TCP/IP data over a Dial-Up Line enabling a remote computer to communicate with the LAN.

A Baseband Update is the modification of the firmware of a Cellular Modem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Which type of Technology imitates Hardware without relying on the CPU being able to run the Software code directly?

Virtual Machine
Emulator
Hypervisor
Simulator

A

Emulator

EXPLANATION:
Emulators emulate Hardware without relying on the CPU being able to run Code directly.

Virtual Machines use CPU Self-Virtualization, to whatever extent it exists, to provide a Virtual interface to the real hardware.

A Simulator is a limited scope that is usually used in training to mimic a real system’s functionality.

Emulators were created before Virtualization and operate much slower than a True Virtualization environment with a Hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • What are the dimensions of a MicroATX Motherboard?

11” x 9.6”
6. 7” x 6.7”
9. 6” x 9.6”
3. 6” x 2.9”

A

9.6” x 9.6”

EXPLANATION:
The mATX (MicroATX) Motherboard's form factor is 9.6" x 9.6" in size (24 cm x 24cm). The mATX Form Factor is commonly used in smaller computer systems with a small form factor (SFF) case. An mATX Motherboard is backward-compatible with the Larger ATX Motherboard since it contains the same mounting point locations as the full-size board.

An ATX Motherboard’s form factor is 12” x 9.6” in size (305mm x 244mm).

ITX is a Series of Form Factors that begin with the mini-ITX, but there is no specific size called ITX. The mITX (Mini-ITX) Form Factor is 6.7” x 6.7” in size (17 cm x 17 cm). The mITX is commonly used in smaller computer systems with a small form factor (SFF) case. These Motherboards are usually used in computers designed for Passive Cooling and a Low Power consumption architecture, such as a Home Theater PC System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following technologies can provide up to 40 Gbps of Bandwidth?

Thunderbolt
USB 2.0
FireWire 800
eSATA

A

Thunderbolt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following Security features would allow a user to track their laptop’s location if it was stolen?

LoJack
Kensington Lock
TPM
Full Disk Encryption

A

LoJack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following Services does Apple use for Syncing their Data Across Multiple macOS and iOS Devices?

Google Drive
OneDrive
DropBox
iCloud

A

iCloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Which of the following refers to using Virtual Machines as a Method of Provisioning Workstations for Corporate users?

SaaS
VDI
IaaS
PaaS

A

VDI

EXPLANATION:
Virtual Desktop Infrastructure (VDI) or DaaS (Desktop as a Service) refers to using a VM as a means of provisioning Corporate Desktops. In a Typical VDI, desktop computers are replaced by low-spec, low-power thin Client computers. When the Thin Client starts, it boots a minimal OS, allowing the user to log onto the VM stored on the company Server or Cloud infrastructure. The user connects to the VM using some remote desktop protocol (Microsoft Remote Desktop or Citrix ICA). The Thing Client has to find the correct image and use an appropriate authentication mechanism.

Software as a Service (SaaS) is a Cloud Computing Service that enables a Service Provider to make applications available over the Internet to End-Users. This can be a Calendar, Scheduling, Invoicing, Word Processor, Database, and other programs. For Example: Google Docs, and Office 365 are both Word Processing SaaS Solutions.

Platform as a Service (PaaS) is a Cloud Computing Service that enables consumers to rent fully configured Systems that are set up for specific purposes.

Infrastructure as a Service (IaaS) is a Cloud Computing Service that enables a Consumer to outsource computing equipment purchases and running their own data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Cloud Computing concept is BEST described as focusing on the replacement of Physical Hardware at a Customer’s Location with Cloud-Based Resources?

PaaS
IaaS
SECaaS
SaaS

A

IaaS

EXPLANATION:
Infrastructure as a Service (IaaS) is a Cloud Computing Serice that enables a consumer to outsource computing equipment purchases and running their own data center. If you purchase a Server in the Cloud and then install and manage the OS and Software, this is IaaS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following Internet Connection types utilizes analog, audible signals, being passed over a traditional Phone Line to connect two Computer Systems?

Satellite
Dial-Up
Cable
Fiber

A

Dial-Up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • A Customer’s System Clock is continually resetting itself causes discrepancies with the Date and Time. Which of the following components of the System should you investigate as the Root Cause of the Issue?

BIOS
Power Supply
RAM
CPU

A

BIOS

EXPLANATION:
Basic Input/Output System (BIOS) is the program that a computer’s microprocessor uses to get the Computer System started after you turn it on. The BIOS settings are stored in CMOS (Complementary Metal-Oxide-Semiconductor). Some of the BIOS settings include the System Time and Date as well as Hardware Settings and Configurations. If the CMOS Battery dies, or the BIOS becomes faulty, then the System time and date will be affected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of Connector is used to Connect to a Serial Port or External Modem?

RJ-45
DB-9
FType
LC

A

DB-9

EXPLANATION:
DB-9 is a Standard type of Serial Connector used to connect to a Serial Port or External Modem. A DB-9 Connector is used to Terminate an RS-232 Serial Cable.

An RJ-45 Connector is used to Terminate a Copper Twisted-Pair Ethernet Cable.

FType Connector is used with Coaxial Cables.

ST, SC, LC, or MTRJ Connector is used to Terminate a Fiber Optical Cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Which type of Wireless Network Utilizes the 2.4 GHz or 5 GHz Frequency bands and reaches speeds of 108 Mbps to 600 Mbps?
  1. 11b
  2. 11n
  3. 11ax
  4. 11g
  5. 11a
  6. 11ac
A

802.11n

EXPLANATION:
802.11n (Wireless N) Standard utilizes 2.4 GHz Frequency to provide Wireless Networking at Speeds up to 108 Mbps or a 5.0 GHz Frequency to provide Wireless Networking at Speeds up to 600 Mbps. Wireless N supports the use of Multiple-Input-Multiple-Output (MIMO) Technology to use multiple antennas to transmit and receive data at higher speeds. Wireless N supports channel bonding by combining two 20 MHz Channels into a single 40 MHz Channel to provide additional bandwidth.

  1. 11a (Wireless A) Standard utilizes a 5 GHz Frequency to provide Wireless Networking at Speeds up to 54 Mbps.
  2. 11b (Wireless B) Standard utilizes 2.4 GHz Frequency to provide Wireless Networking at Speeds up to 11 Mbps.
  3. 11g (Wireless G) Standard utilizes a 2.4 GHz Frequency to provide Wireless Networking at Speeds up to 54 Mbps.

802.11ac (Wireless AC or WIFI5) Standard utilizes 5 GHz Frequency to provide Wireless Networking at theoretical Speeds up to 3.5 Gbps. Wireless AC uses Channel Bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) Technology to use Multiple Antennas to transmit and receive data at higher speeds.
Wireless AC also has a Version called WIFI6E that supports 6 GHz Frequency instead of the 2.4 GHz and 5 GHz Frequencies used in WIFI6.

802.11ax (Wireless AX or WIFI6) Standard utilizes 2.4 GHz and 5. GHz Frequencies to provide Wireless Networking at theoretical speeds up to 9.6 Gbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • Which of the following types of laptop displays would utilize a Fluorescent Backlight to illuminate the image?

LED
OLED
LCD
Plasma

A

LCD

EXPLANATION:
LCD (TFT) with fluorescent backlight has been the standard display technology for the last few years. The backlight is fluorescent bulb that illuminates the image, making it bright and clear. An inverter supplies the correct AC voltage to the backlight from the laptops DC power circuits.

More Modern laptops use LED displays that replace the fluorescent backlight with an LED backlight.

OLED and Plasma displays do not use a backlight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • Jay is complaining that the Speed at which the cursor moves across his laptops screen when using his Trackpad makes it difficult to properly control. Which setting could he use to slow down the Curser in Windows 10?

Settings > Devices > Touchpad > Speed
Settings > Devices > Touchpad > Touchpad Sensitivity
Settings > Devices > Mouse > Touchpad Sensitivity
Settings > Devices > Mouse > Speed

A

Settings > Devices > Touchpad > Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A Customer called the Servce Desk and complained that they could not reach the Internet on their Computer. You ask the Customer to open their Command Prompt, type in ipconfig, and read you the IP Address. The Customer reads the IP as 169.254.12.45. What is the Root Cause of the Customer’s issue based on what you know so far?

Their Workstation cannot reach the Web Server.
Their Workstation cannot reach the DHCP Server.
Their Workstation cannot reach the DNS Server.
Their Workstation cannot reach the Default Gateway.

A

Their Workstation cannot reach the DHCP Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the First Step in the CompTIA Troubleshooting Methodology?

Test the Theory to determine the Cause
Identify the Problem
Establish a Plan of Action to Resolve the problem and Implement the solution.
Establish a Theory of Probable Cause

A

Identify the Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • Which of the following is True of a Dedicated Video Card in a Computer System?

Less Expensive than an integrated Video Card
Can be upgraded or replaced.
Share the use of the System’s Memory
Cannot be upgraded or replaced.

A

Can be upgraded or replaced.

EXPLANATION:
It is more expensive to have a Dedicated GPU or Video Card, but it does provide Higher Performance than an Integrated GPU. A Dedicated GPU also can be upgraded with a Newer Graphics Card in the future to increase performance.

An Integrated Video card is built as part of the main system Motherboard or CPU. An Integrated GPU is cheaper than a Dedicated GPU, but it has limited performance and shares the use of the Computer’s System RAM. An Integrated Video Card cannot be upgraded since it is part of the Processor or Motherboard.

If a System is being designed for Gaming, Video Editing, or 3D Rendering, it should use a separate Video Card with a Dedicated GPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You are at the Grocery Store. At the Checkout, you place your Smartphone near the Payment Terminal to authorize the charge. Which of the following technologies did you use to make the purchase?

Smart Card
NFC
Zigbee
KVM

A

NFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the Third Step in the CompTIA Troubleshooting Methodology?

Establish a Plan of Action to resolve the problem and Implement a Solution.
Document Findings, Actions, and Outcomes
Test the Theory to determine the cause.
Verify Full System Functionality, and if applicable, implement preventative measures.

A

Test the Theory to determine the cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following ports is used by the Secure Message Block (SMB) Protocol to share files and printers on a Windows Network?

21
445
143
443

A

445

EXPLANATION:
Server Message Block (SMB) or Common Internet File System (CIFS) is a Protocol used for requesting files from Windows Servers and delivering them to Clients on Port 445.

HTTPS = 443
FTP = 20 and 21
IMAP = 143
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Sally is troubleshooting a customer’s PC that is operating extremely slowly. The customer works as a Video Editor and often downloads large files, edits them into new file, then deletes the original files from the hard disk to free up space. Sally performs a hard drive read/write test and verifies the drive is operating 60% slower than its baseline configuration speed. Which of the following should Sally do to speed up the drive?

Perform Disk Defragmentation on the Drive.
Perform a CHKDSK on the Drive.
Securely erase the drive and reimage the system.
Connect the Hard Drive over USB 3 to increase speed.

A

Perform Disk Defragmentation on the Drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You have bene asked to troubleshoot a Digital Projector in the home theater in your neighbor’s basement. Your neighbor attempted to replace the projector’s bulb, but after running for a few minutes, a message appears on the screen, and the projector turns itself off again. Based on these Symptoms, what are the MOST Likely causes of the Projector continually turning off after just a few minutes of usage with a New Bulb? (Select Two)

Incorrect Video Resolution settings.
The Video Driver on the media player needs to be updated.
The Bulb’s life counter needs to be reset.
A Higher Lumen Bulb must be installed.
The Cooling fan needs to be cleaned or replaced.
The brightness needs to be increased.

A

The Bulb’s life counter needs to be reset.

The Cooling Fan needs to be cleaned or replaced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Tony, a System Admin, set up a Printer on John’s Workstation. During the setup, Tony was able to print a Test Page. Later, when John attempted to print a document, an error message displayed that indicates access was denied to the Printer. John tried to restart the printer and workstation, but the same error message displayed when attemps to print a document. Which of the following MOST Likely caused this issue?

The Print Spooler is hung and must be restarted.
The printer lacks the memory required to process the document.
The printer is offline.
The user lacks adequate Security Permissions to the Printer.

A

The user lacks adequate Security Permissions to the Printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A user has reported that their workstation is running slowly. You perform a reboot on their workstation and receive a S.M.A.R.T error during the boot-up process. Which of the following actions should you perform first?

Backup the Hard Drive
Reformat the Hard Drive
Run CHKDSK
Run DISKPART

A

Backup the Hard Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

On Saturdays, your best friend goes to the local farmer’s market to sell his homemade craft root beer. He wants to add the ability to take credit card payments from customers on his mobile phone. Which of the following devices should he purchase and configure?

Bluetooth Card Reader
Memory Card Reader
IR Reader
DB-9 Reader

A

Bluetooth Card Reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  • An Inkjet Printer is printing images and text at an angle, and sometimes they don’t print at all. Which of the following would a technician perform to align a printer?

Replace the Print Head
Maintenance Cleaning
Calibration
Replace the Cartridge

A

Calibration

EXPLANATION:
The Tech should first calibrate the printer and perform a Print Test. Usually it aligns the print heads during calibration and prints out a test page with a code for the user to enter and print another test page to ensure it is properly aligned. A Printer that has alignment problems will not print documents accurately. Your printer can become misaligned if there is any paper stuck in the machine, print cartridges are clogged or dirty, improper installation of cartridges, and using low-quality cartridges. Additionally, a printer can become misaligned after the machine completes a large print job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  • Which of the following DC Voltages are NOT found within a Printer when the Laser Printer Converts AC Power into DC Power for use?

+24 VDC
-24 VDC
-5 VDC
+5 VDC

A

-24 VDC

EXPLANATION:
The DCPS (DC Power Supply/Source) of a Laser Printer is used to convert High Voltage AC into Low Voltage DC for the Printer. 

The DCPS Converts 114 VAC or 220 VAC Power into +5 VDC and -5 VDC for use by the Printer’s Logic Board, and +24 VDC to Power the motors that feed the paper through the Printing Path in the last printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which Port is used to Connect to an SMTP Server?

25
443
143
110

A

25

EXPLANATION:
SMTP is Simple Mail Transfer Protocol and uses TCP Port 25.

POP3 = 110
IMAP = 143
HTTPS = 443
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

You are building a New Server and want to ensure that its memory can allow the Server to continue working even if there is an issue that corrupts data held within the Memory Modules. Which of the following types of Memory should you select for the Server?

Dual-Channel
ECC
Non-Parity
Single-Channel

A

ECC

EXPLANATION:
Error Checking and Correcting or Error Correcting Code (ECC) is a Type of System Memory that has built-in error correction security. ECC is more expensive than normal Memory and requires support from the Motherboard. ECC is commonly used in production Servers and not in standard desktops or laptops.

Single-Channel Memory is any Memory using one 64-bit bus between the CPU and the RAM>

Dual-Channel Memory is a Memory Controller with two primary pathways through the bus to the CPU to transfer 128-bits of Data in each transaction.

Non-Parity Memory is a type of System Memory that does not perform error checking except when conducting the initial startup memory count.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Your company has an office in Boston and is worried that its employees may not reach the office during periods of heavy snowfall. You have been asked to select a Technology that would allow Employees to work remotely from their homes during poor weather conditions. Which of the following should you select?

IDS
VLAN
NAT
VPN

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

You are attempting to build a new gaming workstation and have just finished installing the Motherboard and the Processor. You are about to begin installing two memory modules, and notice 4 DIMM sockets on the motherboard labeled 0, 1, 2, and 3. Two of these are colored RED, and two are colored BLUE. Which of the following should you do FIRST?

Install 2 DDR4 Memory modules into Slots 0 and 1.
Consult your Motherboards Manual
Install 2 DDR4 Memory Modules into Slots 2 and 3.
Install 2 DDR4 Memory Modules into the RED Slots.
Install 2 DDR4 Memory Modules into the BLUE Slots.

A

Consult your Motherboards Manual

EXPLANATION:
You should consult your motherboard’s manual and documentation to determine the best method of installing the memory into the system. The system may support both single-channel and dual-channel memory configs, depending on how the memory is installed. Based on your specific customer needs, you may wish to install them as Single or Dual-Channel (Which may require installing the memory in certain slots).

Single-Channel Memory is any Memory using one 64-bit bus between the CPU and the RAM.

Dual-Channel Memory is a Memory controller with two primary pathways through the bus to the CPU to transfer 128-bits of data in each Transaction.

36
Q
  • USB with Red tab?

USB 2.0
USB-C
USB 3.0
FireWire

A

USB 3.0

37
Q

You are working at the Service Desk when a customer calls up and complains that their Laptop’s monitor looks strange. When pressed for further details, they state that there are black bars on the left and right sides of the screen and that the image appears squashed and distorted. What is MOST likely the cause of this issue?

Bad Video Card
External RF Interference
Incorrect Display Resolution
Incorrect Color Depth

A

Incorrect Display Resolution

38
Q
  • A Client has asked you to build a computer to use as part of their Home Theater (HTPC) System. The HTPC will be used primary to stream videos in their living room and must have a small form factor to fit into their entertainment center next to their surround sound system. Which of the following motherboards would be the BEST choice for an HTPC System?

ITX
ATX
Mini-ITX
Micro-ATX

A

Mini-ITX

EXPLANATION:
Mini-ITX is the most commonly used Form Factor for HTPC Systems because they require the smallest fans or passive cooling, which minimizes the noise productid by the system.

Micro-ATX Motherboards also require a larger (And Louder) Fan to keep the system cooled, so it is a poor choice for an HTPC.

An ATX or ITX Motherboard is a bad choice since they are larger and would not fit into a Traditional HTPC Case.

39
Q

Your Company has decided to move all of its data into the Cloud. Your company is concerned about the Privacy of its data due to some recent data breaches that have been in the news. Therefore, they have decided to purchase Cloud Storage resources that will be dedicated solely for their own use. Which of the following types of Clouds is your Company using?

Hybrid
Private
Public
Community

A

Private

EXPLANATION:
Private Cloud contains services offered either over the Internet or a Private Internal Network and only to select users instead of the General Public. A Private Cloud is usually managed via Internal Resources. The Terms Private Cloud and Virtual Private Cloud (VPC) are often used interchangeably.

A Public Cloud contains Services offered by Third-Party Providers over the Public Internet and is available to anyone who wants to use or purchase them. They may be Free or Sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume.

A Community Cloud is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (Security, Compliance, Jurisdiction, Etc.), whether managed internally or by a third party and hosted internally or externally.

40
Q

Dion Training’s File Server is using a RAID 5 with four disk drives as its data store. One of the drives in the Array has just failed. The RAID 5 is still operating and NO Data Loss has been experienced, but the Array is no longer providing any resiliency or redundancy. Which of the following actions should you take to restore this drive to normal operations?

Replace the Failed Disk and Perform a System Restore.
Remove the Failed Disk and Perform a System Restore.
Remove the Failed Disk and Rebuild the Array
Replace the Failed Disk and Rebuild the Array

A

Replace the Failed Disk and Rebuild the Array

EXPLANATION:
The Options to Perform a System Restore would result in Downtime and possible data loss.

41
Q

Your Network is running extremely slow. You have troubleshot the issue and determined that there are too many collisions on the Network. Your network currently has 20 computers, all connected to a signle 24-port hub on the Network. Which of the following devices should you install to decrease the number of Collisions?

Access Point
Repeater
Firewall
Switch

A

Switch

EXPLANATION:
A Hub provides NO Intelligence in its interconnection functions. Therefore, whatever is received on one port is repeated out every other port. This leads to many Collisions occurring on the Hub and increases the number of Rebroadcasts which can slow down the Entire Network. Replacing the Hub with a Switch will break down the Hub’s single collision domain into 24 separate Collision domains (One per port on the switch) and eliminate Collisions. This will increase overall speed of the Network. A Switch is a Network Device that receives incoming data into a Buffer, then the Destination MAC Address is compared with an Address Table so that the Data is only sent out to the Port with the corresponding MAC Address. In a Switched Network, each port is in a separate collision domain.

42
Q

What commands is used to test if your own Network Card’s Driver is working properly?

ping 8.8.8.8
ping 127.0.0.1
ping 192.168.1.1
ping 1.1.1.1

A

ping 127.0.0.1

EXPLANATION:
127.0.0.1 is the Localhost IP for Testing your Home Network Interface Card. This IP Address is reserved for use with a Loopback Test.

43
Q

Sarah is connecting a new wireless mouse to a client’s laptop. Which of the following technologies is MOST likely being used to connect the mouse to the laptop?

NFC
IR
USB
Bluetooth

A

Bluetooth

44
Q

You want to boot from a Removable USB Device to troubleshoot your Windows 10 laptop. During your Rebooting of the machine, which key should you press to enter the Boot Order Menu?

F2
F8
F12
F11

A

F12

EXPLANATION:
F12 is the most commonly used key used to enter the Boot Order Selection Screen. The Boot Order is a menu that allows you to select which device you wish to boot from, such as a Hard Drive, DVD< or a Removable USB device.

45
Q

Dion Consulting Group is working with a New Laptop manufacturer. The manufacture wants to create the thinnest and lightest laptops in the world. To do this, they need to choose the right technology for their displays. Which technology should Dion Consulting recommend allowing for the thinnest laptop displays?

OLED
IPS
LCD
LED

A

OLED

EXPLANATION:
OLED displays work without a backlight because it emits visible light. Thus, it can display deep black levels and be thinner and lighter than LCD. In Low Ambient light conditions (Such as a Darker Room), an OLED screen can achieve a higher contrast ration than an LCD, regardless of whether the LCD uses cold cathode fluorescent lamps or an LED backlight.

In-Plan Switching (IPS) LCD panel uses technology designed to resolve the quality issues inherent in TN Panel Technology, including strong viewing angle dependence and low-quality color reproduction.

LCD (Liquid Crystal Display) panel is a type of display technology where the image is made up of liquid crystal cells controlled by using Electrical charges. The LCD panel is backlight by a cold cathode fluorescent bulb. LCD panels are used on laptops that have replaced CRT monitors as a main type of computer display screen for desktops LED (Light Emitting Diode) display is an LCD panel that uses LED backlight instead of a CCFL backlight to provide its light source.

46
Q

Which of the following ports should you block at the Firewall if you want to Prevent a Remote Login to a Server from occuring?

80
22
143
21

A

22

EXPLANATION:
Secure Shell (SSH) is the Protocol used for Remote Administration and File Copying using TCP Port 22. SSH is considered secure since it uses authenticated and encrypted sessions for communication.
FTP = 20 and 21
HTTP = 80
IMAP = 143
47
Q
  • A Customer’s Computer has a noisy, whining sound coming from it when in use. You opened the case and did not see any dust on the fans. What should you attempt next to eliminate the noise?

Clean the fans using a damp cloth.
Replace the Fans.
Apply Compressed air to each of the fans.
Apply a small amount of oil to the fan’s bearings.

A

Apply a small amount of oil to the fan’s bearings.

EXPLANATION:
The best step would be to apply a small amount of oil to each of the fan’s bearings, as this will eliminate the noise. If the fans had been dusty, you would instead apply compressed air or clean the fan blades using a damp cloth. Since there was no dust noticed, this cannot be the whining source, and instead, you should apply the oil.

48
Q

Which of the following devices would allow you to control and provide input commands to multiple servers within the same server rack using a single set of input devices?

Mouse
Touchpad
Keyboard
KVM

A

KVM

49
Q
  • You are working as a laptop repair tech. You just received a laptop that was reported to have a glass of water spilled on it. You want to examine the components in the laptop to begin troubleshooting it. What are the first steps you should take as part of your troubleshooting process?

Watch a YouTube video for tutorials on how to fix this model of laptop.
Remove the external casing of the laptop and document the screw locations.
Consult your coworkers for suggestions and advice.
Submerge the laptop in a large bowl of rice to fully dry out the inner components.

A

Remove the external casing of the laptop and document the screw locations.

EXPLANATION:
When you are taking apart a laptop, it is important to keep track of each of the screws and the locations that they were removed from. Many of the screws may appear to be the same height or width, but they may be different.

50
Q
  • A Car dealer recently set up an impact printer in their automotive repair shop. Unfortunately, the printer’s output is now starting to crease the paper as it is printed which can lead to a paper jam during feeding. Which of the following might be causing these issues? (Choose Two)

Incorrect paper size.
Incorrect tension setting.
The print head needs to be replaced.
Excess paper in the feed path.

A

Incorrect paper size.
Excess paper in the feed path.

EXPLANATION:
Impact Printers are widely used in situations where multi-part documents, invoices, or contacts need to be produced on carbon paper. These printers use specialized paper fed through the printer by holes on the edges of the paper on what is called a Tractor. The paper can crease if the wrong size paper is used or excess paper in the feed path causes bunching up on the paper being fed.

The Print Head does not affect the feeding of the paper in an impact printer.

The Tension setting being incorrect will lead to the paper pooling or bulging up during feeding, but it wouldn’t necessarily cause creasing.

51
Q

An eSports participant wants to build a customer computer system that is extremely fast but also operates quetly. Which of the following options should they install as their Cooling Mechanism?

Liquid Cooling
Passive Cooling
Multiple Case Fans
Heat Sink

A

Liquid Cooling

52
Q
  • Which type of internet connection allows for high-speed bi-directional data communication over hybrid fiber-coaxial (HFC) Connection?

Cable
Fiber
Satellite
DSL

A

Cable

EXPLANATION:
A Cable Modem is a type of Network Bridge that provides bi-directional data communication via radio frequency channels on a hybrid fiber coaxial (HFC) radio frequency over glass (RFoG) and coaxial cable infrastructure. Cable modems are primarily used to deliver broadband internet access as cable internet, taking advantage of an HFC and RFoG network’s high bandwidth.

Fiber to X (FTTx) is commonly used to describe where the Fiber connection ends between the service and the subscriber. The closer the Fiber is to the user’s network the faster the service. FTTH (Fiber to the House) provides Fiber directly to the user’s home networking making it the fastest option.

DSL is a technology used to transmit multimedia traffic at high-bit rates over Twisted-Pair Copper Wire (Over ordinary telephone lines.)

53
Q
  • Which of the following types of encryption should be selected on a SOHO Access point if you are running a coffee shop and want all of your customers to be able to join it by default?

WPA
WPA2
Open
WEP

A

Open

EXPLANATION:
An “Open” Wireless Network is one in which no password or encryption is being used. If you have a Public Hotspot, such as in a Library or Coffee Shop, then you may wish to configure it as “Open.”

WEP is an older mechanism for Encrypting data sent over Wireless Connection. WEP is considered vulnerable to attacks that can break its encryption. WEP relies on the use of 24-bit initialization vector to secure it’s preshared key.

WPA is an improved encryption scheme for protecting WIFI communications designed to replace WEP. WPA uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in older WEP protection scheme.

WPA2 replaced the original version of WPA after the completion of the 802.11i Security Standard. WPA2 features an improved method of key distribution and authentication for enterprise networks, through the pre-shared Key method is still available for home and small office networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining message authentication (CCMP) for Encryption.

54
Q

Jason is configuring a VM to run a Minecraft server for his son. The network utilizes a DHCP server for all connected devices. Jason decided to configure the VM with the Static IP of 192.168.1.10 to make it easier to identify on the network. Ever since this static IP was issued, both the VM and a Printer on the network have had intermittent connectivity issues. What is the MOST likely the cause of these issues?

The DHCP IP address is expired.
The DNS Server IP is misconfigured.
The VM was placed in the wrong subnet.
There is an IP Conflict.

A

There is an IP Conflict.

55
Q

Your printer is connected directly to your computer using a USB Cable. Your coworker’s printer is broke, and they asked you to share your printer to allow them to print. Which of the following should you do as a Temporary solution to allow them to print without incurring any additional cost?

Enable Printer Sharing on your Windows System
Purchase an inexpensive printer for them to use temporarily.
Create a Guest Account on your computer for them to use when printing.
Purchase and install a wireless print server.

A

Enable Printer Sharing on your Windows System

56
Q

You are working as a Managed Service Provider for a Large chain of doctor’s office. The company is opening a New Office downtown. The office needs 2 computers to be installed at the receptionists’ desk to schedule appointments, read email, brows the web, and conduct basic word processing tasks. Which of the following type of computers would BEST meet the needs of this doctor’s office?

Thick Client
Audio/Video Editing Workstation
CAD Workstation
Touch Screen Kiosk

A

Thick Client

EXPLANATION:
Thick Client (Also called a Fat Client) is a computer that will perform the bulk of the data processing in client/server applications on the local computer. There is no need for continuous server communications with Thick Clients as it is mainly communicating archival storage information to the server. The Thick Client has an OS and Applications installed directly on its own hard drive. Thick Clients are considered the Standard Workstation in most business environments and can support email, web browsing, word processing, and other basic tasks.
57
Q

Which of the following describes the IP Address of a Router to which Packets destined for a remote Network should be sent by default?

Gateway
Dynamic IP
Subnet Mask
Static IP

A

Gateway

58
Q

You are installing a new wireless network in your office building and want to ensure it is secure. Which of the following configurations would create the MOST secure Wireless network?

WPA and MAC Filtering
WEP and TKIP
WPA2 and AES
WPA2 and RC4

A

WPA2 and AES

59
Q
  • A Customer is trying to configure an 802.11b Wireless Card in an old laptop to connect to an 802.11g wireless router. When the customer scans for the Wireless Network’s SSID (Dion-Corp), it is not displayed within Windows. What is the MOST likely reason that the SSID is not being displayed?

802.11g and 802.11b use different Frequencies
The Broadcast is Disabled on the Wireless Router
The Wireless Router is not Configured for DHCP Support
The Wireless Router is Configured with WPA2 Encryption

A

The Broadcast is Disabled on the Wireless Router

EXPLANATION:
Both Wireless B and G use the same Frequency band (2.4 GHz) and would not cause this issue.

60
Q

Which of the following is the Virtualization Technology supported by Most Modern AMD Processors?

HT
Intel-V
VT
AMD-V

A

AMD-V

61
Q
  • Due to the lack of fiber optic cabling near the Dion Training Office, the company has decided to purchase a ground-based microwave service for their primary Internet connection. This provides the company with a 100 Mbps to 1 Gbps connection based on the service plan chosen. The tech installed a small directional antenna on the office roof and pointed it at an antenna on another building 5 miles away. Which technology is being used?

Satellite
Line of Sight
Cable Modem
HFC

A

Line of Sight

EXPLANATION:
Light of Sight (LOS) is a Wireless Connection method using ground-based microwave antennas aligned with one another. Endpoints can transmit signals to one another as long as they are unobstructed by physical objects. The antennas are mounted too the top of the building to reduce interference. LOS service is often low latency, or at least lower latency than traditional satellite internet service.

A Cable Modem is a type of network bridge that provides bi-directional data communication via radio frequency channels on a hybrid fiber-coaxial radio frequency over glass and coaxial cable infrastructure. Cable modems are primarily used to deliver broadband internet access as cable internet, taking advantage of an HFC and RFoG networks high bandwidth.

Satellite systems provide far better areas of coverage that can be achieved using other technologies.

62
Q

Jason presents a “How to Pass your Certification exams on the first attempt” lesson for his students using an overhead projector. After 24 minutes, the project goes blank. Jason allows the students to take a 15-minute coffee break while he attempts to turn the project back on. The project runs for another 4 minutes and then turns off again. What is MOST likely wrong with the projector and the laptop setup?

The Projector is Overheating
The HDMI Cable is Unplugged
The Sleep Setting on the Laptop is too short.
The Laptop’s Display Driver needs to be Updated

A

The Projector is Overheating

63
Q
  • Which of the following Network Configurations on a Virtual Machine are used to prevent the VM from accessing the Internet, but still allow it to communicate with the other VMs on the Host and the Host Itself?

Private
Internal
LocalHost
External

A

Internal

EXPLANATION:
VMs can have their Network configured as Internal to prevent them from Communicating with the Internet. When configured to Internal, the VMs can communicate with each other and the Host Machine.

Private Network Connection type will create a Switch that is usable only by the VMs. The VMs cannot use the Switch to Communicate with the Host.

External, the VMs would have Internet Access.

LocalHost, each VM could only communicate with itself.

64
Q
  • A repeat customer is back with their laptop again. This is the third time they have dropped their laptop and caused their hard disk’s internal platters to fail. Which of the following devices should you replace in their internal hard drive with to prevent this issue from occurring again?

Hybrid HDD/SSD
NVMe
5400 RPM HDD
7200 RPM HDD

A

NVMe

EXPLANATION:
Since this customer is accident-prone, you should recommend they install an NVMe or SSD device. These solid-state devices are more resistant to drops since they have no moving parts or platters in them.

A Hybrid or HDD solution would not be effective as they both have moving platters in them that can be destroyed by a drop.

65
Q

The Video Editor at Dion Training has submitted a Trouble Ticket stating her editing workstation makes a loud clicking noise whenever she is editing videos for an upcoming course. You initially thought the system fans were causing the noise. You have replaced the fans, but the noise continues to be heard when applications are loaded or the videos are being edited. Which of the following actions should you take NEXT?

Perform a System Restore
Scan the System for Viruses
Replace the Hard Disk
Perform a Full Backup of the Hard Disk

A

Perform a Full Back of the Hard Disk

66
Q

Which of the following types of data should you transmit over TCP?

Streaming Video from YouTube
A Skype Phone Call with your Friend
Streaming Music while you work.
An Order for a $50,000 Stock Purchase

A

An Order for a $50,000 Stock Purchase

67
Q

What is a tool that would allow you to easily identify a network cable that was not labeled in the wiring closet during its installation?

Cable Tester
Punchdown Tool
Multimeter
Tone Generator and Probe

A

Tone Generator and Probe (Fox and Hound)

EXPLANATION:
A Tone Generator and Toner Probe is an excellent tool that allows you to easily detect which cable goes to which port on a Patch Panel in a Wiring Closet. While you could use a Cable Tester (If both ends of the Cable were available to the tech), a Tone Generator and Probe are much more efficient at identifying cables that were not properly labeled. A Tone Generator is connected to a Wall Jack, sends a repeating signal over the Cable. The Probe can then be used to detect which cable is connected to the Wall Jack by detecting the signal being sent by the Tone Generator. The Probe needs to be near or touch the cable with the tone generator attached to identify it positively.

A Cable Tester is used to ensure a cable is properly created as patch cable (Straight Through) or a Cross Over Cable. Cable Testers provide detailed information on the physical and electrical properties of a cable.

Punchdown Tools are used to connect an ethernet cable to the back of a Patch Panel, a punchdown block or the back of a network wall jack.

Multimeter can measure the Voltage or Amperage and Resistance of a Circuit. A Multimeter can be a hand-held device useful for basic fault finding and field service work or a bench instrument that can measure electricity with a High degree of accuracy.

68
Q
  • Which Cloud Computing concept is BEST described as Focusing on the Replacement of Applications and Programs on a Customer’s Workstation with Cloud-Based Resources?

SaaS
PaaS
DaaS
IaaS

A

SaaS (Software as a Service)

EXPLANATION:
SaaS is a Cloud Computing Service that enables a Service Provider to make Applications available over the Internet to End-Users. This can be a Calendar, Scheduling, Invoicing, Word Processing, Database, or other Programs. For Example: Google Docs, Office 365.

IaaS (Infrastructure as a Service) is Cloud Computing Service that enables a Consumer to outsource Computing Equipment purchases and running their own data center.

PaaS (Platform as a Service) is Cloud Computing Service that Enables Consumers to Rent Fully Configured Systems that are setup for specific purposes.

DaaS (Desktop as a Service) provides Full Virtualized Desktop Environments from within a Cloud-Based Service. This is also known as VDI (Virtualized Desktop Infrastructure) and is coming in large enterprise business focused on increasing their Security and Minimalizing their Operational Expenses.

69
Q
  • Which of the following Ports is used by LDAP by Default?

427
3389
53
389

A

389

EXPLANATION:
Lightweight Directory Access Protocol (LDAP) is a Protocol used to access and update information in an X.500-style Network resource directory.

SLP = 427
RDP = 3389
DNS = 53
70
Q
  • Which of the following Resources is used by a VM to communicate with other VMs on the Same Network but prevents them from Communicating with Resources on the Internet?

Network Address Translation
Virtual Internal Network
DNS
Virtual External Network

A

Virtual Internal Network

EXPLANATION:
Most VMs running on a Workstation will have their own Virtual Internal Network to communicate within the Virtual Environment while preventing them from communicating with the Outside world. If you are communicating Internally in the Virtual Network, there is no need for DNS or an External Network.

71
Q

Josie in Human Resources was just issued a new laptop by Dion Training. When she plugs the laptop into the Network’s Wall Jack and turns it on, she receives an error message. She calls the Service Desk to report that the Error Message being displayed states, “There is an IP Address conflict with another system on the Network.” You are working as a Field Service Tech and have been asked to resolve this error. What should you do?

Replace the Wired Network Adapter on the Laptop since it’s faulty.
Configure the Laptop’s Network Connections to use DHCP instead of a Static IP.
Disable the Wired Network Adapter and require the Laptop to use the Wireless Network Adapter instead.
Choose a New IP Address and Statically assign it to the Laptop.

A

Configure the Laptop’s Network Connections to use DHCP instead of a Static IP.

72
Q

You have just been hired as a consultant for the Navy to select the best form of Internet Connection for a Ship crossing the Atlantic Ocean. The Ship must remain connected to the Internet for the entire duration of its voyage. Which of the following types of connections do you recommend?

Fiber
Cable
Cellular
Satellite

A

Satellite

73
Q
  • A Computer tech is configuring a NAS for a company to store their corporate data. The tech has installed x3 6TB Hard Drives operating at 7200 RPM in a RAID 5 Config. HOw much usable storage space is contained in the NAS?

6TB
18TB
12TB
3TB

A

12TB

EXPLANATION:
RAID 5 provides block-level stripping with distributed parity to provide redundancy using a minimum of 3 Disks. Since the NAS uses a RAID 5 config, it is a stripped array with parity. The 3 6TB HDDs are installed, but 33% of the storage capacity will store the parity information. This leaves only 12 TB of usable storage space in the NAS when using the RAID 5 Config.

74
Q

Samatha recently purchased a touchscreen laptop to use for her child to do their schoolwork. Her child just came home from school and said that they accidently dropped their laptop earlier today. Samantha asked you to troubleshoot the issue. You open up the laptop and turn on the screen. You look over the laptop and the screen appear to have some spider web cracks in the panel, but you can still fully see the images on the display. You attempt to operate the laptop using the touchscreen, and it appears to be fully responsive to your touch. Which of the following components MOST likely needs to be replaced?

Digitizer
Inverter
GPU
LCD Panel

A

LCD Panel

75
Q

A Workstation is having intermittent issues and continues to receive system errors or freeze. You believe that the problem is being caused by the workstation’s motherboard, not getting the proper amount of power to it, and you want to perform a test to confirm your theory. Which of the following tools should you use to determine if the proper amount of power is being supplied to the motherboard?

POST Card
Multimeter
Loopback Plug
Cable Tester

A

Multimeter

EXPLANATION:
A Multimeter can measure the voltage, amperage, and resistance of a Circuit. A Multimeter can be a hand-held device useful for basic fault finding and field service work or a bench instrument that can measure electricity with a high degree of accuracy. Using a multimeter, you can determine the exact voltage being supplied to the motherboard from the workstation’s power supply.

A Post Card is a plug-in diagnostic interface card that displays progress and error codes generated during the Power-On Self-Test of a Computer.

A Loopback Plug is used to test a port. When you connect a loopback plug to a port, you can see a solid connection LED. You can also use a Loopback Plug in conjunction with diagnostic software.

A Cable Tester is used to ensure a Cable is properly created as a Patch Cable (Straight Through) or a Crossover Cable.

76
Q

Your friend just noticed their Smartphone’s battery is running low. Unfortunately, your friend isn’t very knowledgeable about computers and smartphones, so they don’t know what type of charging cable they need. They know their phone is running iOS 15. What kind of cable does your friend need to charge their phone?

Micro USB
Mini USB
Lightning
USB-C

A

Lightning

77
Q

A Technician needs to upgrade the RAM in a Database Server. The server’s memory must support maintaining the Highest Levels of Integrity. Which of the following type of RAM should the tech install?

SODIMM
Non-Parity
ECC
VRAM

A

ECC

EXPLANATION:
Error Checking and Correcting or Error Correcting Code (ECC) is a type of system memory that has built-in Error Correction Security. ECC is more expensive than normal memory and requires support from the motherboard. ECC is commonly used in Production Servers and not in standard desktops or laptops.

Non-Parity memory is a type of system memory that does not perform Error Checking except when conducting the initial startup memory Count.

VRAM (Video RAM) Refers to any type of random-access memory (RAM) specifically used to store image data for a computer display.

Small Outline Dual Inline Memory Module (SODIMM) can be purchased in various types and sizes to fit any Laptop, router, or other small form factor computing devices.

78
Q

A workstation in Dion Training’s conference room is experiencing an issue when trying to boot into Windows. When the workstation is powered on, the workstation is booting up into Kali Linux instead of Windows 10. The workstation is in a closed wooden cabinet under a large television. The technician shutdown the Workstation, opened the case, and verified that the memory modules and cables are properly connected. There is one hard drive installed in the workstation, but the tech does observe an 8GB USB thumb drive connected to a rear USB 3.0 port. Which of the following is the MOST likely reason for the workstation booting into Kali Linux instead of Windows?

The workstation is overheating.
The workstation’s hard drive is faililng.
The boot order of the devices is incorrect.
There is a mix of DDR3 and DDR4 modules installed.

A

The boot order of the devices is incorrect.

79
Q

Your boss is looking for a recommendation for a Cloud Solution that will only allow for both Onsite Systems and Cloud Services to work together seamlessly. What type of Cloud Model should you recommend?

Public Cloud
Private Cloud
Community Cloud
Hybrid Cloud

A

Hybrid Cloud

EXPLANATION:
A Hybrid Cloud Model allows for seamless integration of both Onsite and Cloud Services to the end-user simultaneously. Hybrid Clouds can be cost-efficient, flexible, easy to migrate to a complete cloud solution in the future and require less maintenance than completely onsite options.

80
Q

You are building a Virtualization Environment to host public-facing Servers that must connect to the Internet. This will require that you install several secured Linux Distros as VMs. The VMs need to have access to a Virtualized Network and Communicate with the host OS system and the Internet. Which of the following types of network connections should you configure for each VM?

Private
External
Internal
LocalHost

A

External

81
Q

An Employee is complaining that their workstation is not booting into Windows when they reboot their machine. You noticed that during the reboot, the system is loading into PXE-Based OS. What should you do next?

Boot into Recovery Mode to fix the boot order.
Press F12 to boot into boot mode and select the correct device.
Boot to the BIOS and select the HDD from the Boot Order.
Reboot PC to determine if it will boot from the HDD

A

Boot to BIOS and Select the HDD from the Boot Order

EXPLANATION:
PXE (Preboot Execution Environment) is a Network Boot Execution Process allowing you to retrieve an Image from a PXE Server. It is often used for reimaging computers in corporate deployments. To boot from the hard drive instead, the BIOS’s boot order should be changed from PXE to HDD.

Rebooting the Workstation will just reload the PXE-Based OS Again.

82
Q

Which network technology is used to Prioritize certain types of Network Traffic over others?

QoS
MAC Filtering
Allow List
ACL

A

QoS (Quality of Service)

83
Q

What type of Connector is most commonly used to terminate a Copper Twisted-Pair Ethernet Cable?

FType
DB-9
ST
RJ-45

A

RJ-45

84
Q

You are troubleshooting a Network Connection issue between the Wall Jack in a user’s office and the Switch in the communications closet. When you plug a Network Cable into the Wall Jack, there is No Connection. You check the Switch in the Communications Closet to determine if the Wall Jack is properly connected to the Switch. Unfortunately, none of the cables in the Communication Closet are labeled. Which of the following tools should you use to determine which cable in the communications closet is connected to the wall jack in the user’s office since none of the cables are properly labeled?

Loopback Plug
Tone Generator and Probe
Punchdown Tool
Multimeter

A

Tone Generator and Probe (Fox and Hound)

85
Q
  • The large multi-function printer in your office is shared between 12 people. Unfortunately, it has stopped working, and the Techs have determined it must be replaced. A New Printer has been ordered, but it will be 2 weeks until it arrives. The only other printer available in your office is the manager’s printer, but it is connected via USB to their Workstation. ONe of the Techs would like to share the Manager’s printer with the other 12 Employees for the next 2 weeks as a temporary workaround. Unfortunately, there is no space wired network jacks available in the office to connect the printer to the Network directly, but there is a Wireless Access point nearby. Which of the following is the BEST way for the Tech to allow the 12 employees to access the manager’s printer?

Configure a New Printer on each user’s workstation and point it to the Manager’s IP Address.
Share the Printer Directly from the Manager’s Computer by Creating a Share and giving the other employees access to the Share.
Purchase a Portable Wireless Print Server and Connect the Printer to it using a USB
Provide a USB thumb drive to each employee so they can transfer their files to the manager’s computer for direct printing.

A

Purchase a Portable Wireless Print Server and Connect the Printer to it using a USB.

EXPLANATION:
The BEST solution would be to use a wireless print server to connect the printer to it using USB. This wireless print server can then receive the print jobs directly from all of the network users.

It is not recommended that the technician create a share on the manager’s computer or set the printer configuration to the manager’s IP address since all print jobs would fail anytime the manager shut down or restarted their computer.

Using a USB drive to transfer the files to the manager’s computer each time someone wanted to print is also not a good solution since this is difficult for the users and will be disrupting the manager’s work every time someone needed to print something.