Questions from Practice Exams II Flashcards
You have been asked to set up the corporate email on several mobile devices for Dion Training’s employees. The employees will use their mobile devices to check their email when out of the office, but they will also need to check their email from their desktop computers. Which of the following mail protocols should you configure to allow the employees to receive their mail and maintain the read/unread status across all of their devices?
OBJ-1.4: You should configure IMAP because it will leave the email on the server and allow for synchronizing the mail to all devices, including each email’s read state. If you configure POP3, the mail is downloaded to the device and removed the mail from the server’s mailbox by default. SMTP is used to send emails, not receive them. HTTPS is used for web browsing, not for receiving emails. The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.
Your friend just gave you his old laptop. Whenever you turn on the laptop, though, a blank screen appears and asks you to enter an administrative password before the computer attempts to boot up. Unfortunately, your friend never gave you the password for this laptop. Which of the following actions should you take to resolve this issue and get past this password screen?
OBJ-5.2: This blank screen asking for the administrative password appears to be a BIOS password required to be entered before the laptop is allowed to boot from the hard disk. Your best option is to clear the CMOS forcibly to remove the BIOS password from a workstation or laptop. To clear the CMOS, you must remove the CMOS battery from your computer, wait a few minutes, reinsert the CMOS battery, and then attempt to power on the computer again. This will cause the information stored in the CMOS (for example, BIOS settings and passwords) to be erased and restored to its default configuration. Removing and reinserting the laptop’s battery will not reset the BIOS password. Disconnecting and reconnecting the hard drive will not reset the BIOS password.
Which of the following DC voltages are not found within a printer when the laser printer converts AC power into DC power for use?
1. -24 VDC
2. +24 VDC
3. +5 VDC
4. -5 VDC
-24 VDC
OBJ-3.7: The DCPS (DC Power Supply/Source) of a laser printer is used to convert high voltage AC into lower voltage DC for the printer. The DCPS converts 115VAC or 220VAC power into +5 VDC and -5 VDC for use by the printer’s logic board, and +24 VDC to power the motors that feed the paper through the printing path in the last printer.
Tim, a help desk technician, receives a call from a frantic executive who states that their company-issued smartphone was stolen during their lunch meeting with a rival company’s executive. Tim quickly checks the MDM administration tool and identifies that the user’s smartphone is still communicating with the MDM, and displays its location on a map. What should Tim do next to ensure the stolen device’s data remains confidential and inaccessible to the thief?
1. reset the password
2. perform remote wipe
3. remotely encrypt
4. identify the ip
- perform remote wipe
OBJ-1.4: To ensure the data remains confidential and is not accessed by the thief, Tim should perform a remote wipe of the device from the MDM. This will ensure any corporate data is erased before anyone accesses it. Additionally, Tim could reset the device’s password, but if the thief can guess or crack the password, they would have access to the data. Identifying the smartphone’s IP address is not a useful step in protecting the data on the device. Additionally, devices should be encrypted BEFORE they are lost or stolen, not after. Therefore, the option to remotely encrypt the device is provided as a wrong answer and a distractor.
Which cellular technology is compromised of HSPA+ and EV-DO to provide higher data speeds than previous cellular data protocols?
1. LTE
2. 5G
3. 4G
4. 3G
- 3G
OBJ-1.4: 3G cellular technology is made up of two different technologies: HSPA+ and EV-DO. HSPA+ (Evolved High-Speed Packet Access) is a 3G standard used for GSM cellular networks and can support up to a theoretical download speed of 168 Mbps and a theoretical upload speed of 34 Mbps. In the real world, though, HSPA+ normally reaches speeds around 20 Mbps. EV-DO (Evolution-Data Optimized) is a 3G standard used for CDMA cellular networks and can support up to 3.1 Mbps downloads. 4G cellular technology is made up of LTE and LTA-A. Long Term Evolution (LTE) is a packet data communications specification providing an upgrade path for both GSM and CDMA2000 cellular networks. LTE has a theoretical speed of 150 Mbps and a real-world speed of around 20 Mbps. LTE Advanced (LTE-A) has a theoretical speed of 300 Mbps and a real-world speed of around 40 Mbps. 5G cellular technology is made up of three different types: low-band, mid-band, and high-band mmWave technology. Low-band 5G reaches an average speed of 55 Mbps with a theoretical speed of 150 Mbps. Mid-band 5G reaches an average speed of 150 Mbps with a theoretical speed of 1.5 Gbps. High-band 5G reaches an average speed of 3 Gbps with a theoretical speed of up to 70 Gbps.
You have been asked to fix an old computer whose CD-ROM has stopped working. The CD-ROM drive is using a 40-pin ribbon cable, and you suspect the cable is defective. Which cable should you buy to replace the cable?
1. SATA
2. IDE
3. eSATA
4. USB
- IDE
OBJ-3.1: An IDE (Integrated Drive Electronics) cable is an older cable interface that used to be used for the transmission of data between the motherboard and various internal devices like hard drives and CD-ROM drives. An IDE cable is a 40-pin ribbon cable that operated at relatively slow speeds (less than 50 Mbps). IDE cables were also known as PATA (Parallel ATA) cables, as opposed to SATA (Serial ATA) cables. You will rarely come across an IDE cable in use today, but if you are working on a very old computer in an office (legacy machine) then you may find one in use
You work as a computer technician for a production company that travels worldwide while filming and editing music videos. Due to the nature of video editing, you will be building a video production workstation for the company that will have the maximum amount of RAM, an 8-core CPU, a dedicated GPU, and a redundant array of solid-state devices for storage. You are now determining which power supply to install in the system. What is the MOST important characteristic to consider when choosing a power supply?
1. Number of SATA connectors
2. Input voltage
3. Efficiency rating
4. Amperage of 12V rail
- Input voltage
OBJ-3.5: This question provides you with many details, but the key phrase in finding the answer is in the first sentence. This computer will be traveling worldwide, and the most important consideration will be the input voltage. If you choose a 120-volt power supply, it would be destroyed if plugged into a 240-volt outlet (commonly used outside the United States). Conversely, if you use a 240-volt power supply and plug it into a 120-volt outlet, it will not function due to the lower voltage. Therefore, you need to pick a power supply with dual voltage selection capability for maximum compatibility worldwide.
What type of connector provides power to an internal hard drive from the computer’s power supply using a 4-pin connector?
1. SCSI
2. SATA
3. Thunderbolt
4. Molex
- Molex
OBJ-3.1: A Molex connector provides DC power to the various drives inside a computer case. Molex and Mini-Molex are both 4-pins connectors, with Mini-Molex only being used to support floppy disk drives. The large-sized one is used for hard disk drives, CD-ROM drives, and DVD drives. SATA connectors have 15 pin and 7 pin varieties. Thunderbolt has 20 and 24 pin varieties. SCSI has 50 and 36 pin varieties.
You are traveling to Thailand on a business trip. Your laptop’s touchscreen display is visibly flickering between being too bright and too dim when plugged into the power outlet at a local coffee shop. You take your laptop to your hotel room, and you notice it doesn’t flicker when plugged in there. Which of the following is the MOST likely cause of this issue?
1. Coffee shop was experiencing power fluctuations that led to the flickering of the display
2. The battery of the laptop is failing to charge
3. The inverter of the laptop is faulty
4. The digitizer of the laptop is faulty
- Coffee shop was experiencing power fluctuations
OBJ-5.4: Since the only change between the flickering and non-flickering was the change in location and the power source, it is likely the cause of the issue. In some areas of the world, power is less stable and reliable than in more industrialized countries like the United States, Canada, England, and Japan. Some locations around the world have less reliable power that is subject to more power fluctuations. Flicker is a visible change in a lamp’s brightness due to rapid fluctuations in the power supply voltage. The voltage drop is generated over the grid’s source impedance by the changing load current of equipment or facility. These fluctuations can generate the visible flicker noticed by the user of the device.
You have been asked to set up the email on a corporate laptop. The employees of Dion Training are only allowed to receive their email on one device. The email should be removed from the server’s mailbox whenever the client connects to the server to download the messages. Which of the following mail protocols should you configure to allow an employee to receive their mail on their laptop and meet these requirements?
1. POP3
2. IMAP
3. SMTP
4. HTTPS
- POP3
OBJ-1.4: You should configure POP3 because the mail is downloaded to the device and removes mail from the server’s mailbox by default. IMAP does not remove the mail from the server when the client connects but instead maintains a copy on the server indefinitely until the user forces it to be deleted. SMTP is used to send emails, not receive them. HTTPS is used for web browsing, not for receiving emails. The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.
You just received a phone call from one of your customers regarding an old monitor. The monitor uses a VGA port, and the customer is worried because they only have an old VGA cable that has a few pins broken off. The customer asks you what would happen if they used that cable to connect the monitor over VGA. What would MOST likely happen?
1. The monitor will be dim or start to flicker
2. The display will show incorrect colors
3. The monitor will be in black and white
4. The monitor will cause distorted images on the screen
- The display will show incorrect colors
OBJ-5.4: Unfortunately, a missing or broken pin or two can cause an array of issues. Each of the 15 pins is used to create a composite image on the screen. There are three rows of pins, with 5 pins per row. Due to the pinout of a VGA cable, if pins 1, 2, or 3 are missing, the display will be miscolored. If pins 13 or 14 are missing, the screen will not hold horizontal or vertical sync. The other pins are not used or are used as ground wires. Therefore, either the incorrect colors will show up on the screen, or the screen won’t display at all. The other options are not possible.
Which of the following components of a color laser printer is used to combine the 4 colors before printing them to the paper in one pass?
1. Pickup roller
2. Duplex assembly
3. Transfer roller
4. Transfer belt
- Transfer belt
OBJ-3.7: The transfer belt is the component in a color laser printer that combines the 4 colors before printing it to the paper in one pass. The transfer roller is the component in a laser printer that applies an electric charge to the paper to attract toner from the photoconductor during the imaging process. The pickup roller is the component in a laser printer that turns above a stack of paper to feed a sheet into the feed roller. The duplexing assembly is a component that enables a printer or scanner to use both sides of a page automatically.
Users are complaining that they are unable to connect to the wireless network when seated in the breakroom. You are troubleshooting the issue and have questioned the employees in the area about the issue. You have determined that it was working properly yesterday, but this morning it stopped working. You also determined that there was a power outage earlier this morning for about 10 minutes. After gathering this information and identifying the symptoms of the problem, what should you do NEXT according to the network troubleshooting methodology?
Establish a theory of probable cause
OBJ-5.1: The troubleshooting steps are to (1) Identify the problem, (2) Establish a theory of probable cause, (3) Test the theory to determine the cause, (4) Establish a plan of action to resolve the problem and identify potential effects, (5) Implement the solution or escalate as necessary, (6) Verify full system functionality and if applicable implement preventative measures, and (7) Document findings, actions, outcomes, and lessons learned. Based on the scenario presented, you have already gathered information, questioned users, identified symptoms, and determined if anything changed, so you have completed the first step: identify the problem. Now, you should begin to establish a theory of probable cause by questioning the obvious and using a top-to-bottom, bottom-to-top, or divide and conquer approach to troubleshooting.
What ports do FTP and SFTP utilize?
21, 22
OBJ-2.1: FTP (File Transfer Protocol) uses ports 20 and 21. SFTP (Secure File Transfer Protocol) uses port 22. Port 23 is used by Telnet. If this were a question on the real exam, you would see a list of ports on one side and a list of protocols on the other, and you would drag and drop each one to match them up. (It might also have 4-6 different pairs to match up.)
Your company has decided to upgrade its legacy phone system to use VoIP devices instead. The new phones will download the configurations from a server each time they boot up. Which of the following ports needs to be opened on the firewall to ensure the phones can communicate with the TFTP server and download their boot-up configurations?
69
OBJ-2.1: Trivial File Transfer Protocol (TFTP) is a simple protocol that provides a basic file transfer function with no user authentication. TFTP uses port 69 to communicate. TFTP is intended for applications that do not need the sophisticated interactions that File Transfer Protocol (FTP) provides. The File Transfer Protocol is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP uses port 21 to communicate. The Domain Name System (DNS) is used to translate requests for names into IP addresses, controlling which server an end-user will reach when they type a domain name into their web browser. DNS uses port 53 to communicate. The Simple Network Management Protocol (SNMP) is a networking protocol used for the management and monitoring of network-connected devices in Internet Protocol networks. SNMP uses port 161 to communicate.