Practice test questions 2. Flashcards

1
Q

What requires the use of a physical printer to print a document?

A

Print to Network. Printing to a network printer still requires access to a physical device connected to the network. The other options (Print to Image, Print to PDF, Print to XPS, and similarly Print to File) are all virtual printing methods. These methods will create a file of a specific type with the contents of the printed information. These methods allow a user the ability to print to a file, a PDF (Portable Document Format), XPS (XML Paper Specification - a Microsoft alternative to PDF), or an image (photo).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What ports should you block at the firewall if you want to prevent a remote login to a server from occurring?

A
  1. Secure shell (SSH) is the protocol used for remote administration and file copying using TCP port 22. SSH is considered secure since it uses authenticated and encrypted sessions for communication. The file transfer protocol (FTP) is the protocol used to transfer files across the internet over ports 20 and 21. The hypertext transfer protocol (HTTP) is a protocol used to provide web content to browsers using port 80.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You work as a computer technician for a production company that travels worldwide while filming and editing music videos. Due to the nature of video editing, you will be building a video production workstation for the company that will have the maximum amount of RAM, an 8-core CPU, a dedicated GPU, and a redundant array of solid-state devices for storage. You are now determining which power supply to install in the system. What is the MOST important characteristic to consider when choosing a power supply?

A

Input Voltage. This question provides you with many details, but the key phrase in finding the answer is in the first sentence. This computer will be traveling worldwide, and the most important consideration will be the input voltage. If you choose a 120-volt power supply, it would be destroyed if plugged into a 240-volt outlet (commonly used outside the United States). Conversely, if you use a 240-volt power supply and plug it into a 120-volt outlet, it will not function due to the lower voltage. Therefore, you need to pick a power supply with dual voltage selection capability for maximum compatibility worldwide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What cloud computing resources are MOST important when determining a cloud file-storage synchronization application’s performance?

A

I/O bandwidth. I/O bandwidth is the measurement of the amount of input and output operations that can be performed within a given time. The higher the I/O bandwidth, the faster and more efficient a cloud file-storage synchronization application will become. Applications that rely on large amounts of reading and writing of data require a high amount of I/O bandwidth. Disk speed is not nearly as important since most cloud file-storage systems use a virtualized file system for storage and do not rely on a single disk. Instead, they rely on a storage area network or a virtualized storage solution. The CPU and RAM utilization on the system would not have as large of an impact on the performance as the I/O bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You want to build a virtualization workstation that will be used to run four different server operating systems simultaneously to create a test lab environment. Each guest operating system only requires 20 GB of storage on the host workstation. What is the MOST important piece of hardware needed for this system to run efficiently?

A

Multi-core processor. For a virtualization workstation, it is important to have a fast processor with multiple cores. In addition to a multi-core processor, it is good to have lots of memory and a fast HDD (but not necessarily a large HDD). A dedicated GPU (graphical processing unit) is not important for a virtualization workstation. Many virtualized servers run in text-only mode or with a headless display, making a dedicated GPU a poor choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The large multi-function printer in your office is shared between 12 people. Unfortunately, it has stopped working, and the technicians have determined it must be replaced. A new printer has been ordered, but it will be 2 weeks until it arrives. The only other printer available in your office is the manager’s printer, but it is connected via USB to their workstation. One of the technicians would like to share the manager’s printer with the other 12 employees for the next 2 weeks as a temporary workaround. Unfortunately, there are no spare wired network jacks available in the office to connect the printer to the network directly, but there is a wireless access point nearby. Which of the following is the BEST way for the technician to allow the 12 employees to access the manager’s printer?

A

Purchase a portable wireless print server and connect the printer to it using USB. The BEST solution would be to use a wireless print server to connect the printer to it using USB. This wireless print server can then receive the print jobs directly from all of the network users. It is not recommended that the technician create a share on the manager’s computer or set the printer configuration to the manager’s IP address since all print jobs would fail anytime the manager shut down or restarted their computer. Using a USB drive to transfer the files to the manager’s computer each time someone wanted to print is also not a good solution since this is difficult for the users and will be disrupting the manager’s work every time someone needed to print something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have been asked to install a network cable inside a conduit placed underground and connected to two buildings located about 1 KM apart. What cable types should you choose?

A

Fiber. A fiber optic cable is a network cable that contains strands of glass fibers inside an insulated casing. They’re designed for long-distance, high-performance data networking, and telecommunications. If you are dealing with connecting two networks over a long distance (over a few hundred meters), you should use a fiber optic cable. Shielded and plenum copper cables can only cover a distance of approximately 100 meters in length. Coaxial cables can cover a maximum distance of 200 to 500 meters in length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Samuel is building a backup file server, and he wants to ensure that he can minimize downtime. What considerations should be MOST important when choosing a storage controller card for this server?

A

Support for hot-swappable drives. The primary consideration for the storage controller card is that it supports hot-swappable drives. Being hot-swappable means that a bad HDD can be removed and replaced while the server runs, which prevents downtime. Data loss can be prevented by configuring a RAID 1, RAID 5, RAID 6, or RAID 10, and the RAID can automatically replicate the data to the new hard drive that is replaced during the hot swapping process without any downtime or data loss. While the other options may be good features to have, the most important feature is support for hot-swapping to minimize downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A computer technician is replacing a failed power supply in a customer’s gaming workstation that contains multiple hard drives and a dedicated graphics card. What are the two most important things for the technician to consider when selecting a power supply replacement for this system? (Select TWO)

A

Wattage rating, and number and type of connectors. The technician must ensure that they select a new power supply with a high enough wattage rating and the right number/type of connectors. Since this is a gaming workstation with several hard drives and a dedicated graphics card, it is likely to require a large wattage rating and many connectors. Wattage defines the amount of power needed to power all the hardware in the system. The number of connectors defines the number of devices that can be powered from the power supply. The number of connectors defines the types of devices that can be powered from the power supply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of wireless network utilizes the 2.4 GHz frequency band and reaches speeds of up to 54 MBPS?

A

802.11g. The 802.11g (Wireless G) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 54 MBPS. The 802.11a (Wireless A) standard utilizes a 5 GHz frequency to provide wireless networking at speeds up to 54 MBPS. The 802.11b (Wireless B) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 11 MBPS. The 802.11n (Wireless N) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 108 MBPS or a 5.0 GHz frequency to provide wireless networking at speeds up to 600 MBPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the lowest layer (bottom layer) of a bare-metal virtualization environment?

A

Physical Hardware. The bottom layer is physical hardware in this environment. It is what sits beneath the hypervisor and controls access to guest operating systems. The bare-metal approach doesn’t have a host operating system. A hypervisor is a program used to run and manage one or more virtual machines on a computer. A host operating system is an operating system that is running the hypervisor. A host operating system is an operating system that is running the hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your company’s network has 33 computers that are directly connected to two switches using CAT 5e cables. The two switches are interconnected using a fiber cable with MTRJ connectors at the end of the cables. All 33 computers and the 2 switches are located within the same office building. What types of networks would best describe this network configuration?

A

LAN. Since all of the computers and switches are located in the same building, it is best described as a Local Area Network (LAN) configuration. A local area network (LAN) is a network where all the nodes or hosts participating in the network are directly connected with cables or short-range wireless media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are attempting to install a full-sized PCIE network interface card into a 1U server, but it is too tall to fit into the machine. What do you need to install first to install the full-sized PCIE network interface card into the server?

A

Riser Card. A riser card is a right-angle expansion card used to extend a slot for a card in a computer to make room to plug it in. They are most commonly used in low-profile, 1U and 2U rackmount chassis or embedded systems. Riser cards plug into their respective bus (they are available for PCI, PCI-X, AGP, AGP Pro, PCI Express, ISA, or other busses) and rotate the peripheral cards plugged into the riser card so that they are parallel with the motherboard. Riser cards are available in 1-slot passive risers up to 3-slot passive riser cards for 2U rackmounts. An AGP, SCSI, or PCIE x16 expansion card is a fixed size and shape that cannot be reduced to fit in a 1U server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are building a virtualization environment to host public-facing servers that must connect to the internet. This will require that you install several secured Linux distributions as VMs. The VMs need to have access to a virtualized network and communicate with the host operating system and the internet. What types of network connections should you configure for each VM?

A

External. If you select external, the VMs would have internet access. If you select internal, each VM can communicate between the host and the other VMs. The private network connection type will create a switch that is usable only by the VMs. The VMs cannot use the switch to communicate with the host. If you select localhost, each VM could only communicate with itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You connected your laptop to a new wireless network and received an IP address automatically. What servers allowed this to occur?

A

DHCP server. A dynamic host configuration protocol (DHCP) serve is a server configured with a range of addresses to lease. Hosts can be allocated an IP address dynamically or be assigned a reserved IP address based on the host’s MAC address. The server can also provide other configuration information, such as the location of DNS servers. A domain name system (DNS) server is a server that hosts the database of domain names and the IP addresses mapped to those names. Each DNS server is authoritative for certain domain names that their organization owns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are installing some new hard drives in a legacy Novell NetWare server in a closed IPX network. The hard drive has a 4-bit set of jumpers that must be configured to represent the device’s ID number (0-15) in the storage device chain. What types of connectors would you use for data transfer with these hard drives?

A

SCSI. Don’t be mistaken by all of the extra information provided in the question about the legacy (old) server in a closed IPX network. Focus on what the question is asks: what type of hard drive uses an ID number between 0-15 that must be set. The only types of hard drives or devices that use an ID number are narrow SCSI (0-7) and wide SCSI (0-15). Therefore, the correct answer is SCSI. The Small Computer System Interface (SCSI) is a set of parallel interface standards developed by the American National Standards Institute (ANSI) for attaching printers, disk drives, scanners, and other peripherals to computers. SCSI is supported by all major operating systems and was heavily used in older servers in the late 90s and early 2000s until SATA replaced it in most applications.

17
Q

You have been asked by Dion Training to build a specialized computer that will be used exclusively for running numerous virtual machines simultaneously for their lab environment. What should you install to BEST meet the company’s needs? (Select TWO)

A

Intel i9 with 8-cores, 64 GB of DDR4. According to CompTIA, the two main things you need to include for a dedicated virtualization workstation are (1) maximum RAM and (2) multiple CPU cores. Based on the options provided, you should pick the 64 GB of DDR4 (maximum RAM) and the Intel i9 with 8-cores (multiple processor cores) for this workstation’s configuration. The CPU should support virtualization and be a multicore processor. The memory should be fast and contain at least 16 GB of RAM to host numerous VMs effectively.

18
Q

Which port is used to connect to an SMTP server?

A
  1. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them.
19
Q

You are trying to install Hyper-V on a new laptop, but you keep receiving an error during installation that the software cannot be installed. What characteristics of the laptop’s processor should you investigate as the MOST likely issue?

A

Virtualization (VT) Support. CPU Virtualization is a hardware feature found in all current AMD & Intel CPUs that allows a single processor to act as if it was multiple individual CPUs. This allows an operating system to more effectively & efficiently utilize the computer’s CPU power to run faster. This is enabled or disabled on supported processors within your system’s BIOS. Hyper Threading (HT) is an Intel CPU architecture implemented to expose two or more logical processors to the OS to deliver performance benefits. The cache is an extremely fast internal memory located in the CPU. The number of cores is defined by the processor’s multicore capability such as dual-core, quad-core, or octo-core.

20
Q

A customer is trying to configure an 802.11b wireless card in an old laptop to connect to an 802.11g wireless router. When the customer scans for the wireless network’s SSID (Dion-Corp), it is not displayed within Windows. What is the MOST likely reason that the SSID is not being displayed?

A

The broadcast is disabled on the wireless router. If the SSID (Secure Set Identifier) is disabled, then the wireless network name will not be broadcast to any available devices within range. Both Wireless B and G use the same frequency band (2.4 GHz) and would not cause this issue. Similarly, encryption that is enabled or disabled would not affect the SSID broadcast since the SSID is sent out in cleartext. DHCP support is used once a device connects to the network. Therefore it would not affect the SSID broadcast.

21
Q

What types of encryption is considered the most secure to utilize in a SOHO network?

A

WAPA3. Wi-Fi protected access version 3 (WPA3) has replaced WPA2 as the most secure wireless encryption method. WPA3 uses the simultaneous authentication of equals (SAE) to increase the security of pre shared keys. WPA3 provides the enhanced open mode that encrypts transmissions from a client to the access point when using an open network. WPA3 Enterprise mode supports the use of AES with the Galois/counter mode protocol (GCMP-256) for the highest levels of encryption. Wi-Fi protected access version 2 (WPA2) replaced the original version of WPA after the completion of the 802.11i security standard.

22
Q

A gaming computer system has 32 GB of RAM, a 1 TB HDD, a multicore CPU, and a dedicated GPU. The customer wants to increase the speed and performance of the system. What actions would you recommend performing?

A

Enter BIOS to enable overclocking of the CPU. To further increase the system’s performance, the system should be configured for overclocking the processor by entering the BIOS setup program and increasing the CPU clock speed using the Overclocking feature. Overclocking your CPU can make your processor run significantly faster by applying the right settings and having adequate cooling. Overclocking does typically lower the lifespan of a CPU, though. This system already has ample RAM (32 GB) and a dedicated GPU. A graphics card cannot be increased in speed using the control panel.

23
Q

You are configuring a SOHO network for a small coffee shop. They have found that certain customers will buy a single coffee cup and then sit at the coffee shop all day to use the Wi-Fi. The owner has asked you to block this customer’s laptop from connecting by placing it on a blocklist. What configurations would you use to blocklist this customer’s device based on its unique hardware identifier?

A

MAC filtering. MAC filtering is the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect. Port forwarding allows a router to take requests from the Internet for a particular application and send them to a designated host on the LAN. An allow list is a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied. For example, if you create an access control list that relies on an allow list, it would block every IP address that is not found in the allow list. A blocklist contains every address or port that is blocked from accessing the network.

24
Q

You are configuring a SOHO network that will contain 7 devices, but you only have a single public IP address. What concepts should be configured to allow the 7 devices to share that single IP when connecting to the internet?

A

NAT. Network address translation (NAT) is a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses. NAT can use static mappings but is commonly implemented as network port address translation (PAT) or NAT overloading, where a few public IP addresses are mapped to multiple LAN hosts using port allocations. The dynamic host control protocol (DHCP) is a protocol used to allocate IP addresses to a host when it joins a network.

25
Q

What is the name of the networking protocol used by macOS to find available printers on the network to use?

A

Bonjour. Bonjour, Apple’s zero-configuration networking protocol, automates certain aspects of network configuration; the protocol enables devices connected to the local area network to discover and connect automatically. Businesses can use Bonjour to make the sharing of files and devices easier; the technology works with wired and wireless LANs. After enabling Bonjour on a workstation, other computers on the network can detect and install printers or scanners attached to the workstation or access files from shared folders.

26
Q

What network technology is used to prioritize certain types of network traffic over others?

A

QOS. Quality of Service (QOS) means using a network protocol to prioritize certain traffic types over others. Enterprise networks can use QOS protocols to make sure traffic such as Voice over IP calling or video conferencing is given higher priority than traffic where packets’ timing is less important, such as ordinary file downloads. MAC filtering, allow lists, and ACLs are used to block traffic, not prioritize it.

27
Q

What does VDI stand for?

A

Virtual Desktop Infrastructure. VDI (Virtual Desktop Infrastructure) centralizes instances for desktops that run on a single server utilizing the resources and performance from a single server. A thin client or an end-user then accesses the virtual desktops through a web browser. It is important to have sufficient resources on the central server to reduce lag time and provide an adequate user experience. VDI (Virtualized Desktop Infrastructure) is used in large enterprise businesses to focus on increasing their security and minimizing their operational expenses.

28
Q

What ports is used by the Service Location Protocol when organizing and locating printers, databases, and other resources in a network?

A
  1. The Service Location Protocol (SLP) is a protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network. This is an alternative protocol to LDAP in newer networks. SLP uses port 427. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.
29
Q

What devices is installed in a communication closet to connect network wall jacks to a network switch using pre-wired RJ-45 ports?

A

Patch Panel. A patch panel is used in a structured cabling system. A computer is connected to a wall jack in this cable system and then connected to a patch panel by cabling running through the walls. A pre-wired RJ-45 port on the patch panel is then connected to a port on the switch using a straight-through or patch cable. A router is a network device that links dissimilar networks and can support multiple alternate paths between locations based upon the parameters of speed, traffic loads, and cost. Routers are used to logically divide networks into subnets

30
Q

You just received a phone call from one of your customers regarding an old monitor. The monitor uses a VGA port, and the customer is worried because they only have an old VGA cable that has a few pins broken off. The customer asks you what would happen if they used that cable to connect the monitor over VGA. What would MOST likely happen?

A

The display will show incorrect colors on the screen. Unfortunately, a missing or broken pin or two can cause an array of issues. Each of the 15 pins is used to create a composite image on the screen. There are three rows of pins, with 5 pins per row. Due to the pinout of a VGA cable, if pins 1, 2, or 3 are missing, the display will be miss-colored. If pins 13 or 14 are missing, the screen will not hold horizontal or vertical sync. The other pins are not used or are used as ground wires. Therefore, either the incorrect colors will show up on the screen, or the screen won’t display at all. The other options are not possible.

31
Q

Tamera just purchased a Wi-Fi-enabled Nest Thermostat for her home. She has hired you to install it, but she is worried about a hacker breaking into the thermostat since it is an IoT device. Which of the following is the BEST thing to do to mitigate Tamera’s security concerns? (Select TWO)

A

Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password, and configure the thermostat to use a segregated part of the network by installing it into a screened subnet. The BEST options are to configure the thermostat to use the WPA2 encryption standard (if supported) and place any Internet of Things (IoT) devices into a DMZ/screened subnet to segregate them from the production network. While enabling two-factor authentication on the device’s website is a good practice, it will not increase the IoT device’s security. While disabling the wireless connectivity to the thermostat will ensure it cannot be hacked, it also will make the device ineffective for the customer’s normal operational needs.

32
Q

What devices could be used to extend transmissions of a signal over longer distances by receiving and retransmitting a given signal at the lowest cost?

A

Repeater. A repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction. Repeaters may be wired or wireless, and they rebroadcast whatever signal is received through their transmitter.

33
Q

You are setting up a projector and a laptop for a big presentation in the Dion Training conference room. You start up the presentation software and mirror the laptop’s display to the projector. The image on the screen from the projector is flickering intermittently, but the image on the laptop’s display is working with no issues. You attempt to change the laptop’s resolution to a lower setting and a higher setting, but still, the projector’s flickering persists. What steps should you attempt NEXT?

A

Ensure the display cable is securely connected to both the laptop and the projector. A flickering image on a projector is a common issue that can occur if the display cable between the laptop and the projector is not connected securely. This is especially common with older-style display cables like VGA and DVI. Therefore, it is important to ensure a VGA or DVI cable is properly secured using the cable’s thumbscrews to prevent flickering of the image.