SG: Practice Exam 1 Flashcards
Which port number is used for SMTP when SSL is used to secure the connection?
A. 25
B. 465
C. 587
D. 993
B. 465
Simple Mail Transfer Protocol (SMTP) uses port 465 when secured with SSL. Port 25 is used with SMTP when an unsecure connection is used. SMTP uses port 587 when secured with TLS. Port 993 is used by secure IMAP.
You are troubleshooting a laser printer that is producing blank images. There seems to be toner all over the inside of the printer. Which of the following components in a laser printer is responsible for properly transferring toner from the drum to the paper?
A. Fuser
B. Transport corona
C. Transfer corona
D. Development wire
C. Transfer corona
The transfer corona in the laser printer puts a positive charge on the paper, forcing the toner on a negatively charged drum to transfer to the paper.
You need to replace memory in an older laptop. Which of the following standards are you likely to find? (Choose all that apply.)
A. MiniDIMM
B. MicroDIMM
C. SlotDIMM
D. SODIMM
B. MicroDIMM
D. SODIMM
The two laptop memory form factor standards are the SODIMM and MicroDIMM. There is no MiniDIMM or SlotDIMM memory.
You are configuring an IPv6 client on your network. Which of the following are valid ways to assign the interface ID portion of the IP address to the network card? (Choose all that apply.)
A. Obtain the address from a DHCPv6 server
B. Assign the address based on the CPU’s ID
C. Configure the address manually
D. Assign a random address
A. Obtain the address from a DHCPv6 server
C. Configure the address manually
D. Assign a random address
IPv6 interface IDs can be assigned in one of four ways. They can be assigned through a DHCPv6 server, based on the MAC address of the adapter, configured manually, or assigned randomly. They cannot be assigned based on any of the CPU’s identifying information.
A user wants to ensure that all contacts from her mobile device are copied onto her computer before migrating to a new device. Which of the following processes can accomplish this?
A. Mirroring
B. Synchronization
C. Calling each contact
D. Attaching the contacts to an email
B. Synchronization
Synchronization can copy all contacts, apps, email, pictures, music, videos, calendars, bookmarks, documents, location data, social media data, e-books, and passwords between a mobile device and a computer. Mirroring is a term reserved for when devices replicate themselves to similar devices. Calling the contacts won’t achieve the desired result, and emailing contacts is inefficient and does not immediately result in placing the contacts on the computer.
In the United States, military applications of GPS use which type(s) of data?
A. C/A code
B. P code
C. Y code
D. P and Y code
D. P and Y code
Military applications use Precise (P) code as well as encrypted Precise (Y) code. Using both makes it more accurate than using civilian Coarse Action (C/A) code.
Which of the following 802.11x standards provides data transmission speeds up to 54 Mbps and is backward compatible with a slower technology?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11i
C. 802.11g
Both 802.11a and 802.11g provide data transmission speeds of up to 54 Mbps, but only 802.11g is backward compatible with 802.11b. 802.11b goes up only to 11Mbps. 802.11i is a security standard.
Which of the following network standards will not work with Category 5 cable?
A. 10BaseT
B. 100BaseT
C. 100BaseTX
D. 100BaseFX
D. 100BaseFX
100BaseFX is a standard that uses fiber-optic cables. Therefore, CAT-5 cabling will not work.
Which of the following addresses is a non-routable IP address?
A. 172.36.32.1
B. 192.168.32.1
C. 168.192.32.1
D. 169.192.32.1
B. 192.168.32.1
Private, non-routable addresses are 10.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, and 192.168.0.0-192.168.255.255.
You push the power button on a desktop computer and the case fan comes on. However, there does not seem to be power to the rest of the computer, as it does not boot up. Which component should you first suspect of causing the problem?
A. Motherboard
B. CPU
C. RAM
D. Power supply
E. Power cord
D. Power supply
The most likely culprit is the power supply. It’s possible but highly unlikely that the motherboard, CPU, or RAM could be causing the issue. It’s definitely not the power cord, because the system is getting power.
You support an old impact printer at work. When the printer prints, the text is always goes from darker to lighter as it moves across the page. What is the most likely cause of the problem?
A. The print ribbon is old and needs to be replaced.
B. The print ribbon is not advancing properly.
C. The printhead needs to be replaced.
D. The wrong printer driver is installed.
B. The print ribbon is not advancing properly.
If an impact printer outputs dark to light across a page, that means that the printer ribbon is not advancing properly; the gear likely needs to be replaced. If the output were consistently faded, then you would replace the ribbon.
A smartphone user calls to report that she cannot decrypt encrypted emails, but other email seems to be fine. What is the most likely cause of this problem?
A. Corrupted email client software
B. GPS not functioning
C. Incorrect username or password
D. Improper S/MIME configuration
D. Improper S/MIME configuration
If a user can’t decrypt email, it is most likely because S/MIME settings are not properly enabled on the email account, which means installing the certificate (and by extension, a private key) on the mobile device. It could be that the email client software got corrupt, but that’s unlikely because other email works. The username and password are correct because the user is receiving other email. GPS has nothing to do with email.
Which of the following standards supports communications up to 54 Mbps?
A. 802.11i
B. 802.11b
C. 802.11g
D. Bluetooth
C. 802.11g
The 802.11g standard supports speeds up to 54 Mbps. 802.11i is a set of security standards, and 802.11b supports only up to 11 Mbps. Bluetooth is limited to 3 Mbps.
Which feature of cloud computing refers to the ability to obtain additional storage space or processing power at a moment’s notice?
A. Rapid elasticity
B. On-demand self-service
C. Resource pooling
D. Measured service
A. Rapid elasticity
The ability to quickly expand services is called rapid elasticity. On-demand self-service means that clients can get new resources without supplier intervention. Resource pooling is taking resources from multiple machines and making them available as one pool. Measured service is how many suppliers track usage and charge accordingly.
Which type of touchscreen is responsive to pressure and generally requires a stylus to operate?
A. Capacitive
B. Resistive
C. Pressurized
D. Contact
B. Resistive
The two major classifications of touchscreens are capacitive and resistive. Capacitive touchscreens are responsive to slight changes in electricity, and resistive touchscreens are responsive to pressure. Resistive touchscreens usually require the use of a hard object, such as a stylus.
You have been using your laser printer for just over five months. Recently, you noticed that the printed characters on the left side of your documents are faint compared to the letters on the right. How can you quickly resolve this problem?
A. Print your documents backward
B. Use different paper
C. Shake the toner cartridge
D. Blow the excess dust out of the cartridge
C. Shake the toner cartridge
Most documents have more characters printed on the left side of the paper than on the right side. Therefore, the toner from the left side of the cartridge runs out sooner, and the print on the left side of the documents will be faint. Shaking the toner cartridge redistributes the toner evenly on both sides.
You have a user who needs to connect to an external projector for a presentation. After he plugs in the projector, there is no display coming from it, even though the power is on. What should you advise him to do?
A. Reboot the laptop
B. Toggle the projector to the laptop input setting
C. Toggle the display output on the laptop using the function (Fn) key
D. Toggle the display output on the laptop using Windows Control Panel
C. Toggle the display output on the laptop using the function (Fn) key
Laptops have three or four video output settings: laptop only, duplicate, external monitor only, or extend the desktop. You can toggle through them using the function (Fn) key in combination with another key, such as F4 or F7. Rebooting is not necessary. There is likely not a laptop input setting on a projector, and the display output setting is not in Control Panel.
You are in a location with no Wi-Fi connectivity, but you have cellular reception. You need to have your Wi-Fi-enabled laptop send an urgent email. How can you have the laptop use Wi-Fi to send the email?
A. Use the cell phone to create a mobile hotspot.
B. Use the cell phone to create a Wi-Fi hotspot.
C. Use the laptop to create a mobile hotspot.
D. Use the laptop to create a Wi-Fi hotspot.
E. There is no Wi-Fi connectivity, so there is no way to send the email.
A. Use the cell phone to create a mobile hotspot.
By creating a mobile hotspot, the cell phone will allow the laptop to connect to it using Wi-Fi. Then use the cellular connection on the phone to get on the Internet.
Which of the following protocols can be used by a client to send email to an email server?
A. POP3
B. SMTP
C. IMAP
D. FTP
B. SMTP
SMTP is for sending email to an email server. The IMAP and POP3 protocols can be used to retrieve email from mail servers. FTP is for file transfers.
After printing documents, the toner smears on the output pages whenever you touch it. Otherwise, things appear to be working properly. What is the most likely cause of the problem?
A. The printer driver is faulty.
B. The fuser is not heating properly.
C. There is toner on the transfer corona wire.
D. There is a scratch on the EP drum.
B. The fuser is not heating properly.
If the fuser does not heat properly, toner will not bond to the paper, and you will have smearing. White streaks on printouts are most likely caused by toner on the transfer corona wire. Vertical black lines are caused by a scratch or a groove in the EP drum. Faulty printer drivers will cause garbage to print, or there will be no printing at all.
You are pairing two Bluetooth devices and have just entered the appropriate PIN code. What is the next step to pair the devices?
A. Turn them off and back on
B. Enable Bluetooth
C. Test connectivity
D. Find the device for pairing
C. Test connectivity
The steps for Bluetooth pairing are: enable Bluetooth, enable pairing, find a device for pairing, enter the appropriate PIN code, and test connectivity. Turning the devices off and back on is not required for pairing.
While configuring your firewall, you inadvertently block port 443. Which of the following will be unavailable?
A. HTTPS
B. HTTP
C. SSL
D. Telnet
A. HTTPS
Hypertext Transfer Protocol (Secure) is a combination of HTTP with Secure Sockets Layer (SSL) to make for a secure connection. It uses port 443 by default, and the beginning of the site address becomes https://. Telnet is an unsecure terminal-emulation protocol.
Which of the following are types of broadband access? (Choose all that apply.)
A. Dial-up
B. DSL
C. Cable
D. Fiber-optic
B. DSL
C. Cable
D. Fiber-optic
Dial-up is the predecessor to broadband access. Available broadband methods include DSL, cable, fiber-optic, and satellite.
You have just set up a network that will use the TCP/IP protocol, and you want client computers to be able to search for and communicate with other computers by using host names. Which type of server will help with this?
A. DNS
B. DHCP
C. Host name server
D. NetBIOS server
A. DNS
A Domain Name Service (DNS) server resolves host names to IP addresses. A Dynamic Host Configuration Protocol (DHCP) server provides IP configuration information to hosts when they join the network. There is no Host name server. There is no NetBIOS server. A NetBIOS name is a computer network name that was used exclusively in Microsoft networks, but it’s different from a host name.
Which of the following are wireless security protocols? (Choose two.)
A. SSID
B. MAC
C. WEP
D. WPA
C. WEP
D. WPA
WEP and WPA are wireless security standards. The SSID is the name of the wireless network. MAC is the hardware address built into network cards.
What is the maximum speed provided by dial-up Internet access?
A. 28.8 Kbps
B. 56 Kbps
C. 128 Kbps
D. 1 Mbps
B. 56 Kbps
Dial-up connections are limited to 56 Kbps.
You need to replace RAM in a laptop. How many pins does a DDR3 SODIMM memory module have?
A. 200
B. 204
C. 260
D. 288
B. 204
A DDR3 SODIMM has 204 pins. DDR4 SODIMMs have 260 pints. DDR2 SODIMMs have 200 pins. No SODIMMs currently have 288 pins.