SG: Practice Exam 1 Flashcards

1
Q

Which port number is used for SMTP when SSL is used to secure the connection?

A. 25

B. 465

C. 587

D. 993

A

B. 465

Simple Mail Transfer Protocol (SMTP) uses port 465 when secured with SSL. Port 25 is used with SMTP when an unsecure connection is used. SMTP uses port 587 when secured with TLS. Port 993 is used by secure IMAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are troubleshooting a laser printer that is producing blank images. There seems to be toner all over the inside of the printer. Which of the following components in a laser printer is responsible for properly transferring toner from the drum to the paper?

A. Fuser

B. Transport corona

C. Transfer corona

D. Development wire

A

C. Transfer corona

The transfer corona in the laser printer puts a positive charge on the paper, forcing the toner on a negatively charged drum to transfer to the paper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You need to replace memory in an older laptop. Which of the following standards are you likely to find? (Choose all that apply.)

A. MiniDIMM

B. MicroDIMM

C. SlotDIMM

D. SODIMM

A

B. MicroDIMM

D. SODIMM

The two laptop memory form factor standards are the SODIMM and MicroDIMM. There is no MiniDIMM or SlotDIMM memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are configuring an IPv6 client on your network. Which of the following are valid ways to assign the interface ID portion of the IP address to the network card? (Choose all that apply.)

A. Obtain the address from a DHCPv6 server

B. Assign the address based on the CPU’s ID

C. Configure the address manually

D. Assign a random address

A

A. Obtain the address from a DHCPv6 server

C. Configure the address manually

D. Assign a random address

IPv6 interface IDs can be assigned in one of four ways. They can be assigned through a DHCPv6 server, based on the MAC address of the adapter, configured manually, or assigned randomly. They cannot be assigned based on any of the CPU’s identifying information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user wants to ensure that all contacts from her mobile device are copied onto her computer before migrating to a new device. Which of the following processes can accomplish this?

A. Mirroring

B. Synchronization

C. Calling each contact

D. Attaching the contacts to an email

A

B. Synchronization

Synchronization can copy all contacts, apps, email, pictures, music, videos, calendars, bookmarks, documents, location data, social media data, e-books, and passwords between a mobile device and a computer. Mirroring is a term reserved for when devices replicate themselves to similar devices. Calling the contacts won’t achieve the desired result, and emailing contacts is inefficient and does not immediately result in placing the contacts on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the United States, military applications of GPS use which type(s) of data?

A. C/A code

B. P code

C. Y code

D. P and Y code

A

D. P and Y code

Military applications use Precise (P) code as well as encrypted Precise (Y) code. Using both makes it more accurate than using civilian Coarse Action (C/A) code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following 802.11x standards provides data transmission speeds up to 54 Mbps and is backward compatible with a slower technology?

A. 802.11a

B. 802.11b

C. 802.11g

D. 802.11i

A

C. 802.11g

Both 802.11a and 802.11g provide data transmission speeds of up to 54 Mbps, but only 802.11g is backward compatible with 802.11b. 802.11b goes up only to 11Mbps. 802.11i is a security standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following network standards will not work with Category 5 cable?

A. 10BaseT

B. 100BaseT

C. 100BaseTX

D. 100BaseFX

A

D. 100BaseFX

100BaseFX is a standard that uses fiber-optic cables. Therefore, CAT-5 cabling will not work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following addresses is a non-routable IP address?

A. 172.36.32.1

B. 192.168.32.1

C. 168.192.32.1

D. 169.192.32.1

A

B. 192.168.32.1

Private, non-routable addresses are 10.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, and 192.168.0.0-192.168.255.255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You push the power button on a desktop computer and the case fan comes on. However, there does not seem to be power to the rest of the computer, as it does not boot up. Which component should you first suspect of causing the problem?

A. Motherboard

B. CPU

C. RAM

D. Power supply

E. Power cord

A

D. Power supply

The most likely culprit is the power supply. It’s possible but highly unlikely that the motherboard, CPU, or RAM could be causing the issue. It’s definitely not the power cord, because the system is getting power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You support an old impact printer at work. When the printer prints, the text is always goes from darker to lighter as it moves across the page. What is the most likely cause of the problem?

A. The print ribbon is old and needs to be replaced.

B. The print ribbon is not advancing properly.

C. The printhead needs to be replaced.

D. The wrong printer driver is installed.

A

B. The print ribbon is not advancing properly.

If an impact printer outputs dark to light across a page, that means that the printer ribbon is not advancing properly; the gear likely needs to be replaced. If the output were consistently faded, then you would replace the ribbon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A smartphone user calls to report that she cannot decrypt encrypted emails, but other email seems to be fine. What is the most likely cause of this problem?

A. Corrupted email client software

B. GPS not functioning

C. Incorrect username or password

D. Improper S/MIME configuration

A

D. Improper S/MIME configuration

If a user can’t decrypt email, it is most likely because S/MIME settings are not properly enabled on the email account, which means installing the certificate (and by extension, a private key) on the mobile device. It could be that the email client software got corrupt, but that’s unlikely because other email works. The username and password are correct because the user is receiving other email. GPS has nothing to do with email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following standards supports communications up to 54 Mbps?

A. 802.11i

B. 802.11b

C. 802.11g

D. Bluetooth

A

C. 802.11g

The 802.11g standard supports speeds up to 54 Mbps. 802.11i is a set of security standards, and 802.11b supports only up to 11 Mbps. Bluetooth is limited to 3 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which feature of cloud computing refers to the ability to obtain additional storage space or processing power at a moment’s notice?

A. Rapid elasticity

B. On-demand self-service

C. Resource pooling

D. Measured service

A

A. Rapid elasticity

The ability to quickly expand services is called rapid elasticity. On-demand self-service means that clients can get new resources without supplier intervention. Resource pooling is taking resources from multiple machines and making them available as one pool. Measured service is how many suppliers track usage and charge accordingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of touchscreen is responsive to pressure and generally requires a stylus to operate?

A. Capacitive

B. Resistive

C. Pressurized

D. Contact

A

B. Resistive

The two major classifications of touchscreens are capacitive and resistive. Capacitive touchscreens are responsive to slight changes in electricity, and resistive touchscreens are responsive to pressure. Resistive touchscreens usually require the use of a hard object, such as a stylus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have been using your laser printer for just over five months. Recently, you noticed that the printed characters on the left side of your documents are faint compared to the letters on the right. How can you quickly resolve this problem?

A. Print your documents backward

B. Use different paper

C. Shake the toner cartridge

D. Blow the excess dust out of the cartridge

A

C. Shake the toner cartridge

Most documents have more characters printed on the left side of the paper than on the right side. Therefore, the toner from the left side of the cartridge runs out sooner, and the print on the left side of the documents will be faint. Shaking the toner cartridge redistributes the toner evenly on both sides.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You have a user who needs to connect to an external projector for a presentation. After he plugs in the projector, there is no display coming from it, even though the power is on. What should you advise him to do?

A. Reboot the laptop

B. Toggle the projector to the laptop input setting

C. Toggle the display output on the laptop using the function (Fn) key

D. Toggle the display output on the laptop using Windows Control Panel

A

C. Toggle the display output on the laptop using the function (Fn) key

Laptops have three or four video output settings: laptop only, duplicate, external monitor only, or extend the desktop. You can toggle through them using the function (Fn) key in combination with another key, such as F4 or F7. Rebooting is not necessary. There is likely not a laptop input setting on a projector, and the display output setting is not in Control Panel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You are in a location with no Wi-Fi connectivity, but you have cellular reception. You need to have your Wi-Fi-enabled laptop send an urgent email. How can you have the laptop use Wi-Fi to send the email?

A. Use the cell phone to create a mobile hotspot.

B. Use the cell phone to create a Wi-Fi hotspot.

C. Use the laptop to create a mobile hotspot.

D. Use the laptop to create a Wi-Fi hotspot.

E. There is no Wi-Fi connectivity, so there is no way to send the email.

A

A. Use the cell phone to create a mobile hotspot.

By creating a mobile hotspot, the cell phone will allow the laptop to connect to it using Wi-Fi. Then use the cellular connection on the phone to get on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following protocols can be used by a client to send email to an email server?

A. POP3

B. SMTP

C. IMAP

D. FTP

A

B. SMTP

SMTP is for sending email to an email server. The IMAP and POP3 protocols can be used to retrieve email from mail servers. FTP is for file transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

After printing documents, the toner smears on the output pages whenever you touch it. Otherwise, things appear to be working properly. What is the most likely cause of the problem?

A. The printer driver is faulty.

B. The fuser is not heating properly.

C. There is toner on the transfer corona wire.

D. There is a scratch on the EP drum.

A

B. The fuser is not heating properly.

If the fuser does not heat properly, toner will not bond to the paper, and you will have smearing. White streaks on printouts are most likely caused by toner on the transfer corona wire. Vertical black lines are caused by a scratch or a groove in the EP drum. Faulty printer drivers will cause garbage to print, or there will be no printing at all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You are pairing two Bluetooth devices and have just entered the appropriate PIN code. What is the next step to pair the devices?

A. Turn them off and back on

B. Enable Bluetooth

C. Test connectivity

D. Find the device for pairing

A

C. Test connectivity

The steps for Bluetooth pairing are: enable Bluetooth, enable pairing, find a device for pairing, enter the appropriate PIN code, and test connectivity. Turning the devices off and back on is not required for pairing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

While configuring your firewall, you inadvertently block port 443. Which of the following will be unavailable?

A. HTTPS

B. HTTP

C. SSL

D. Telnet

A

A. HTTPS

Hypertext Transfer Protocol (Secure) is a combination of HTTP with Secure Sockets Layer (SSL) to make for a secure connection. It uses port 443 by default, and the beginning of the site address becomes https://. Telnet is an unsecure terminal-emulation protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following are types of broadband access? (Choose all that apply.)

A. Dial-up

B. DSL

C. Cable

D. Fiber-optic

A

B. DSL

C. Cable

D. Fiber-optic

Dial-up is the predecessor to broadband access. Available broadband methods include DSL, cable, fiber-optic, and satellite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You have just set up a network that will use the TCP/IP protocol, and you want client computers to be able to search for and communicate with other computers by using host names. Which type of server will help with this?

A. DNS

B. DHCP

C. Host name server

D. NetBIOS server

A

A. DNS

A Domain Name Service (DNS) server resolves host names to IP addresses. A Dynamic Host Configuration Protocol (DHCP) server provides IP configuration information to hosts when they join the network. There is no Host name server. There is no NetBIOS server. A NetBIOS name is a computer network name that was used exclusively in Microsoft networks, but it’s different from a host name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following are wireless security protocols? (Choose two.)

A. SSID

B. MAC

C. WEP

D. WPA

A

C. WEP

D. WPA

WEP and WPA are wireless security standards. The SSID is the name of the wireless network. MAC is the hardware address built into network cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the maximum speed provided by dial-up Internet access?

A. 28.8 Kbps

B. 56 Kbps

C. 128 Kbps

D. 1 Mbps

A

B. 56 Kbps

Dial-up connections are limited to 56 Kbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You need to replace RAM in a laptop. How many pins does a DDR3 SODIMM memory module have?

A. 200

B. 204

C. 260

D. 288

A

B. 204

A DDR3 SODIMM has 204 pins. DDR4 SODIMMs have 260 pints. DDR2 SODIMMs have 200 pins. No SODIMMs currently have 288 pins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A mobile user has a large number of videos to synchronize to another device. If security is of the utmost concern to the user, which synchronization option should she choose?

A. Automobile

B. Email

C. Desktop

D. Cloud

A

C. Desktop

The three synchronization options are to the desktop, to the cloud, and to the automobile. There is no email synchronization option. For security, the best option is to avoid an Internet connection and sync to the desktop. Automobiles are not typically designed to hold large numbers of videos.

29
Q

You are buying a new Mini PCIe network card for a laptop and want to make sure it uses the same power as the old card. Which of the following are valid power options for Mini PCIe cards? (Choose all that apply.)

A. 1.5V

B. 2.3V

C. 3.3V

D. 5V

A

A. 1.5V

C. 3.3V

Mini PCIe cards can use either 1.5V or 3.3V. They do not use 2.3V or 5V.

30
Q

You are configuring two email servers on your company’s network, and they are on opposite sides of a router. Which port do you need to make sure is open to traffic for the servers to be able to transfer mail to each other?

A. 23

B. 25

C. 110

D. 143

E. 443

A

B. 25

The SMTP protocol is used to transfer email between servers, and it uses port 25. Telnet uses port 23. POP3 uses port 110. IMAP4 uses port 143. HTTPS uses port 443.

31
Q

If a user wanted to disable Location Services on an iPhone, where would they do that?

A. Settings ➢ Location Services

B. Settings ➢ Communications

C. Settings ➢ Privacy

D. Settings ➢ GPS

A

C. Settings ➢ Privacy

In iOS (at least through iOS 12), Location Services are under Settings ➢ Privacy. There are no Location Services, Communications, or GPS sections directly in Settings.

32
Q

You are giving a seminar to new laptop technicians. What are the current types of displays you should discuss? (Choose two.)

A. CRT

B. CCFL

C. LCD

D. OLED

A

C. LCD

D. OLED

The two current laptop display technologies are liquid crystal display (LCD) and organic light-emitting diode (OLED). CRT is an old display technology used for desktop monitors. Cold cathode fluorescent lamp (CCFL) is a display backlight technology.

33
Q

You have recently installed a DHCP server on your network, and you notice that network performance has slowed down considerably. When monitoring the network traffic, you see excessive amounts of DHCP packets. What should you do to resolve this issue?

A. Decrease the DHCP lease time

B. Increase the DHCP lease time

C. Install a DHCP relay agent

D. Uninstall the DHCP server

A

B. Increase the DHCP lease time

DHCP clients broadcast to get an IP address from the server. When their lease is close to expiration, they will broadcast again to renew the lease. Increasing the lease time will resolve this issue. Uninstalling the DHCP server would too, but that also eliminates the benefit of using DHCP.

34
Q

Your network has two subnets separated by a router. To make network administration easier, you install a DHCP server on subnet A. Clients on subnet B are not getting IP addresses automatically. What is the best way to resolve this?

A. Install a DHCP relay agent on subnet A

B. Install a DHCP relay agent on subnet B

C. Install a second DHCP server on subnet B

D. Configure the router to forward broadcast messages

A

B. Install a DHCP relay agent on subnet B

DHCP requests are made via broadcast and will not travel through the router. It’s never a good idea to allow routers to forward broadcasts. You could install a second DHCP server, but that’s inefficient. Install a DHCP relay agent on subnet B.

35
Q

Which of the following standards would you want to use if you needed high-bandwidth wireless network communications?

A. Bluetooth

B. Wireless Ethernet

C. Cellular

D. Infrared

A

B. Wireless Ethernet

Wireless Ethernet is the best of the four wireless communication methods for networking, and it has the highest bandwidth of all four options.

36
Q

Which of the following is a requirement for installing iTunes version 12 on a Mac?

A. 4 GB of RAM

B. macOS 9.2.2

C. Safari

D. 1 GB of available disk space

A

C. Safari

A Mac needs to have a later version of Safari loaded before you can install iTunes. The most RAM required is only 2 GB, allowing 1080p video to be played. Depending on the version of iTunes, some version of macOS is required. macOS 9 will not support the latest version of iTunes. You can install iTunes on a Mac with only 400 MB of available disk space.

37
Q

Which device, when introduced into the market, caused a large number of privacy concerns?

A. Apple Watch

B. Smartphone

C. Lightning

D. Google Glass

A

D. Google Glass

Google Glass, which is an augmented reality (AR) headset, caused a great deal of controversy because of its camera and privacy issues.

38
Q

Which cloud term refers to the process by which a provider charges for resources used?

A. Rapid elasticity

B. On-demand self-service

C. Resource pooling

D. Measured service

A

D. Measured service

Providers typically measure the amount of resources used by clients and charge them for what has been used. This is called a measured service, and it functions much like utilities. The ability to quickly expand services is called rapid elasticity. On-demand self-service means that clients can get new resources without supplier intervention. Resource pooling is taking resources from multiple machines and making them available as one pool.

39
Q

Which TCP/IP protocol uses port 110?

A. HTTP

B. HTTPS

C. SNMP

D. POP3

A

D. POP3

POP3 uses port 110. HTTP uses port 80. HTTPS uses port 443. SNMP uses ports 161 and 162.

40
Q

Which identifier is the unique serial number on each cellular device and can be used to disable the phone if it’s stolen?

A. IMEI

B. IMSI

C. ICCID

D. SEID

A

A. IMEI

The International Mobile Equipment Identity (IMEI) is a 15-digit serial number that identifies the phone and can be used to disable the phone if it’s stolen. The International Mobile Subscriber Identity (IMSI) identifies the specific mobile user and their network. The Integrated Circuit Card Identifier (ICCID) is the SIM chip’s identifier number. The Secure Element Identifier (SEID) is a long code used for security applications and NFC.

41
Q

If a DNS server is unable to resolve a name, what will it do?

A. Check its cache file

B. Query the top-level DNS server

C. Query the root DNS server

D. Nothing

A

C. Query the root DNS server

If a DNS server is unable to resolve a name (and it checks its cache after it checks its zone file), it will query the root DNS server. There is no top-level DNS server; that’s what the root DNS server essentially is.

42
Q

You are troubleshooting a computer that is frequently rebooting on its own. Which of the following should you do as part of the first step in troubleshooting?

A. Review system and application logs

B. Document findings and actions

C. Question the obvious

D. Conduct internal or external research based on symptoms

A

A. Review system and application logs

The first step in the troubleshooting process is to identify the problem. The three sub-steps to identify the problem are: question the user and identify user changes to computer, inquire regarding environmental or infrastructure changes, and review system and application logs. Documenting findings and actions, while helpful all throughout the troubleshooting process, is the last official step. Questioning the obvious and conducting internal or external research are parts of the second step, establishing a theory of probable cause.

43
Q

Tablet computers generally have screen sizes of what size?

A. Smaller than 5″

B. Between 5″ and 7″

C. Between 7″ and 13″

D. Larger than 13″

A

C. Between 7″ and 13″

Most tablets are between 7″ and 13″ in size, although some can be larger. Smartphones are commonly between 5″ and 7″ today.

44
Q

You are replacing a Mini PCIe wireless card in an older laptop. What type of connector does a Mini PCIe card have?

A. 52-pin card edge

B. 66-pin card edge

C. 100-pin card edge

D. 124-pin card edge

A

A. 52-pin card edge

Mini PCIe cards have 52-pin card edge connectors. M.2 slots have 66 pins. There is a legacy Mini PCI card standard, and those devices used either a 100-pin stacking connector or a 124-pin card edge connector. (You won’t be tested on Mini PCI.)

45
Q

What would be the first step to perform if you are getting garbled print jobs?

A. Check the printer cable

B. Reinstall the printer driver

C. Change the font used in the print job

D. Replace the toner cartridge

A

B. Reinstall the printer driver

Garbled print usually indicates an invalid or out-of-date printer driver. If there were a cabling issue, the printer would not print at all. Bad toner would tend to produce faint or blurry print jobs.

46
Q

You believe that your laser printer has a power issue. Using a multimeter, what reading should you get from pin 5?

A. +5V

B. –5V

C. +24V

D. –24V

A

B. –5V

Pin 5 on a laser printer should read –5V. Pin 1 is +5V, and pin 9 is +24V.

47
Q

You need to configure the IP address of your new laser printer. Which of the following are ways you may be able to do this? (Choose all that apply.)

A. Use the printer’s loopback connector

B. Use the printer’s control panel

C. FTP in to the printer’s management software

D. Use the printer’s management software that you installed on your workstation

A

B. Use the printer’s control panel

D. Use the printer’s management software that you installed on your workstation

The IP address of your printer can be configured in several ways. They include through the printer’s control panel and using the printer management software from your workstation.

48
Q

You are replacing an LCD display on a laptop. Which LCD component is responsible for providing the right kind of power to the display?

A. Backlight

B. Inverter

C. Screen

D. Backdrop

A

B. Inverter

The inverter provides power to the backlight. The backlight provides light to the LCD screen, and the screen displays the picture. There is no backdrop component.

49
Q

A laser printer does not appear to be working properly. The display keeps showing various internal errors that may relate to the corona wires. Which internal component provides electricity to the corona wires?

A. Corona assembly

B. HVPS

C. ACPS

D. DCPS

A

B. HVPS

The high-voltage power supply (HVPS) provides power to the corona wires in most laser printers.

50
Q

What is it called when a DHCP server specifies that a certain host will always receive the same IP address?

A. A reservation

B. A Lightweight Directory Access Protocol

C. A Network Address Translation

D. A Common Internet File System

A

A. A reservation

On the DHCP server, you can specify that certain hosts will always receive the same IP address, which is called a reservation. Lightweight Directory Access Protocol (LDAP) is a protocol designed to speed up an administrator’s organization of and access to critical network directories. LDAP uses port 389. Network Address Translation (NAT) is a service that translates private, non-routable IP addresses into public addresses that can be used on the Internet. The Common Internet File System (CIFS) is TCP/IP protocol that uses port 445. It is used to share files and printers between computers, regardless of the operating system that they run.

51
Q

A laser printer in your office keeps getting paper jams. What is the most likely cause of the problem?

A. Worn paper-feed rollers

B. Faulty stepper motor

C. Faulty fuser assembly

D. EP drum not advancing properly

A

A. Worn paper-feed rollers

Of the causes listed, the most likely cause is a worn paper-feed roller. Stepper motors control the back-and-forth motion of a print head in an inkjet printer. If the fuser assembly were faulty, the images would smear. If the EP drum doesn’t advance properly, multiple parts of the image will appear on top of each other.

52
Q

A computer you are troubleshooting can’t get on the Internet or access local resources. You run ipconfig, and the system has an IP address of 169.254.18.36 and a subnet mask of 255.255.0.0. Computers on the network get their IP configuration information from a DHCP server. What appears to be the issue?

A. The computer has an incorrect subnet mask.

B. The network card is failing.

C. The client cannot reach the DHCP server.

D. There is an IP address conflict.

A

C. The client cannot reach the DHCP server.

If a DHCP client can’t access a DHCP server, it will autoconfigure with an APIPA address. Any address starting with 169.254.x.x is an APIPA address. Such systems will not be able to get on the Internet or access local resources, unless those resources somehow have an APIPA address as well.

53
Q

A user calls to complain that his computer sometimes makes a horrible grinding sound. When you investigate, he says it only happens when he uses his DVD-ROM drive. What should you do?

A. Clean the DVD-ROM drive

B. Replace the DVD-ROM drive

C. Try a different DVD

D. Check the user manual for a solution

A

B. Replace the DVD-ROM drive

If the drive is grinding whenever you put a DVD into it, it’s likely that the drive needs to be replaced. If it won’t read properly or consistently, then it might need to be cleaned.

54
Q

Which of the following is an Internet mail protocol used to send email from a mobile device?

A. IMAP4

B. POP3

C. Exchange

D. SMTP

A

D. SMTP

Simple Mail Transfer Protocol (SMTP) is used for sending Internet (TCP/IP-based) mail from a client to a recipient’s server. IMAP4 and POP3 are used for retrieving mail, and Exchange is a proprietary messaging system, not an Internet protocol.

55
Q

You are connecting several NFC devices together. Which of the following is not an NFC communication mode?

A. Host mode

B. Card emulation mode

C. Reader/writer mode

D. Peer-to-peer mode

A

A. Host mode

There is no NFC host mode. All the others choices are valid NFC modes.

56
Q

You have just installed a new printer. After it is installed, it prints only garbled text. Which of the following is likely the problem?

A. Wrong IP address

B. Worn print head

C. Incorrect printer drivers

D. Unsupported printer

A

C. Incorrect printer drivers

If a printer is using out-of-date or incorrect printer drivers, the printer may produce pages of garbled text. The solution is to ensure that the most recent printer drivers are downloaded from the manufacturer’s website.

57
Q

What can disabling cellular data networking on a mobile device accomplish?

A. Prevent large updates from occurring

B. Prevent overages in the subscriber’s data plan

C. Force calls to go out over Wi-Fi

D. Allow the use of caller ID to reject unwanted incoming calls

A

B. Prevent overages in the subscriber’s data plan

The use of the cellular data network counts against the subscriber’s monthly data plan. Disabling the cellular data connection does not change how calls are processed or presented. Updates will not occur over the cellular network when cellular data is disabled but can still occur over Wi-Fi.

58
Q

What is the lowest grade of cable required to run 100BaseT?

A. UTP CAT-3

B. UTP CAT-5

C. UTP CAT-5e

D. Multimode fiber

A

B. UTP CAT-5

In order to run 100BaseT, you need CAT-5 or better. The T in 1000BaseT indicates twisted-pair cable, not fiber-optic cable.

59
Q

You want to ensure that a certain data stream receives guaranteed bandwidth. What level of QoS should you specify in the SLA?

A. 0

B. 1

C. 5

D. 6

A

C. 5

In the Quality of Service (QoS) service-level agreement (SLA), you should specify level 5. Higher numbers indicate higher levels of service, but the highest level anyone can configure is 5. Levels 6 and 7 are reserved for control data.

60
Q

You have blocked port 110 on your firewall. Based on this action, which of the following may be true?

A. Clients on your network will not be able to access web pages.

B. Clients on your network will not be able to send email.

C. Clients on your network will not be able to retrieve email unless their email client supports POP3.

D. Clients on your network will not be able to retrieve email unless their email client supports IMAP.

A

D. Clients on your network will not be able to retrieve email unless their email client supports IMAP.

Port 110 is used for POP3, which is an email-retrieval protocol. Client computers with email software that supports IMAP may still be able to download email.

61
Q

Your laptop has 8 GB of installed memory and uses shared video memory. If the video card is using 1 GB, how much is left for the rest of the system?

A. 1 GB

B. 7 GB

C. 8 GB

D. 9 GB

A

B. 7 GB

If the laptop is using shared video memory, then the system memory is shared with the video card. If the video card is using 1 GB, and the system has 8 GB total, then 7 GB is left for the system.

62
Q

Which of the following is true for computers configured with APIPA?

A. They will be able to communicate with other APIPA-configured computers on their local network.

B. They will not be able to communicate with other APIPA-configured computers on their local network.

C. They will be able to communicate with any computer on their local network.

D. They will not be able to communicate with any computer on their local network.

A

A. They will be able to communicate with other APIPA-configured computers on their local network.

Computers configured with APIPA will have an IP address in the 169.254.0.0 range with a subnet mask of 255.255.0.0. They will be able to communicate with other computers on the local network that have the same network address. They will not be able to get on the Internet.

63
Q

Every time you turn on a laptop computer, you need to re-enter the correct time and date. What is the most likely cause of the problem?

A. Failed CMOS battery

B. Corrupted BIOS

C. Failed motherboard

D. Incorrect POST settings

A

A. Failed CMOS battery

Whenever a system fails to hold the time and date when it’s powered off, the most likely culprit is the CMOS battery. It’s a lot like a watch battery and is usually easy to replace. Simply replace it, and the system should work normally.

64
Q

You have been given a new toolkit for troubleshooting computer problems. In it is a device marked “loopback.” What is the function of a loopback plug?

A. It tests a telephone line.

B. It terminates a SCSI cable.

C. It tests the functionality of a NIC.

D. It measures the signal strength of an Ethernet cable.

A

C. It tests the functionality of a NIC.

Loopback plugs take the signal going out on the transmit path and connects it back to the receive path. This allows you to test certain legacy ports as well as Ethernet NICs to make certain they are working correctly.

65
Q

Which of the following is the best way to ensure that only clients with the correct hardware addresses access your wireless router?

A. Enable MAC filtering

B. Disable SSID broadcasts

C. Leave the SSID as the default

D. Use WEP instead of WPA

A

A. Enable MAC filtering

Enabling MAC filtering allows only specific computers to use the wireless router. Disabling an SSID broadcast makes it so the router doesn’t broadcast its name, which can make it seem “invisible” to a casual snoop. It’s not a reliable security procedure, though. Changing the SSID from the default is always a good idea. You should use some sort of wireless security, but WPA is more secure than WEP.

66
Q

A user reports that his laptop has a number of places on the display that do not light up, even when the screen should be entirely white. What is the most likely cause of this problem?

A. Burn-in

B. Artifacts

C. Distorted image

D. Dead pixels

E. Faulty video driver

A

D. Dead pixels

Dead pixels occur when certain points on the screen will not light up. The only solution is to replace the display unit. Burn-in and artifacts are when other, dim images show up on the computer along with the intended image. Distorted images look pulled or stretched. Faulty video drivers do not cause burn-in, artifacts, distorted images, or dead pixels.

67
Q

Which of the following mobile phone components is responsible for managing wireless communications?

A. Baseband OS

B. SIM OS

C. NFC OS

D. iOS or Android OS

A

A. Baseband OS

All wireless communications are handled by the baseband system in the phone, sometimes referred to as the radio or the modem. The baseband OS manages the baseband system and communicates to the phone’s primary OS. The SIM OS manages data transfers between the smartphone and the SIM memory chip. There is no NFC OS. iOS and Android OS do not manage wireless communications.

68
Q

A user is having difficulty printing to a network printer. Other users are using the printer without a problem. What should you try first?

A. Print a test page from the user’s computer

B. Delete and reinstall the printer

C. Print a test page by using the printer’s self-test

D. Open Microsoft Word and try to print a document

A

A. Print a test page from the user’s computer

Printing a test page is the best place to start. If that does not work, you may want to delete and reinstall the printer. Printing a test page using the printer’s self-test will only tell you if the printer is printing fine, not if that one user is having a problem. Always use the test page feature from the printer properties, not from an application, to test printing.

69
Q

A user calls to report that her desktop computer will not power on. Which of the following should you do to help identify the problem? (Choose all that apply.)

A. Review system and application logs

B. Question the user and identify user changes to the computer

C. Inquire regarding environmental changes

D. Conduct internal or external research based on symptoms

A

B. Question the user and identify user changes to the computer

C. Inquire regarding environmental changes

The three sub-steps to identify the problem are: question the user and identify user changes to computer, inquire regarding environmental or infrastructure changes, and review system and application logs. In this case, since the system will not power on, system and application logs are unavailable. Conducting internal or external research is part of establishing a theory of probable cause.