Study Guide Exam 220-1101 Flashcards

1
Q

What is another name for hard disk mirroring?

A

RAID 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which service helps manage corporate applications on mobile devices?

A

Mobile application management (MAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To secure a laptop from theft, use a _____.

A

Cable lock (or physical laptop lock)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FTP uses ports ___ and ___, and Telnet uses port ____.

A

20, 21, 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Class C private IP addresses are in the ____ range.

A

192.168.0.0 to 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In order to communicate on a network, TCP/IP hosts must have a unique _____ and valid _______.

TCP/IP stands for Transmission Control Protocol/Internet Protocol and is

A

IP address, subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name one of the common rotational speeds of a magnetic hard drive.

A

5400 rpm, 7200 rpm, 10,000 rpm, and 15,000 rpm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the function of the corona assembly?

A

The corona assembly gets the toner from the photosensitive drum onto the paper. p209

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a network dedicated to storage devices called?

A

Storage area network (SAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you fix a swollen battery on a mobile device?

A

Replace it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Two common types of laptop displays are ___ and ___.

A

LCD, OLED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The method that translates between private nonroutable IP addresses and public IP addresses is ____.

A

network address translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Two common types of internal expansion slots for laptops are ____ and ____.

A

Mini PCIe, M.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The last step in the EP imaging process is____.

A

cleaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If one end of an Ethernet patch cable is configured as T568B, the other end needs to be configured as _____.

A

T568B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To save heat, processors can use ____ to slow down and consume less energy.

A

Throttling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A ____ server can block objectionable content from users.

A

proxy

A proxy is a server or program that’s part of the gateway or another computer that separates a local network from outside networks. You can think of it as an intermediary between your computer and the web pages you access on the Internet. Proxies are useful because they can protect your computer from malware and unwanted access from third-party users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is jitter?

A

Variable latency on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____ are examples of print communication languages.

A

Printer Control Language (PCL), PostScript (PS), and Graphics Device Interface (GDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The component of a laptop’s video system responsible for sending the video signal is the ___.

A

Video card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What technology allows pairing of mobile devices and, on occasion, the ability to transfer files between them?

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When using the troubleshooting best practice methodology, what should you always consider?

A

Corporate policies, procedures, and impacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are three SSD communications interfaces?

A

NVMe, SATA, PCIe

SATA - serial AT attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the name of the network type that is segmented using a managed switch?

A

VLAN - virtual local area network, VLAN allows a network administrator to set up separate networks by configuring a network device, such as a router, without adjusting cabling. A VLAN allows a network to be divided, set up, and changed by a network administrator to organize and filter data accordingly.

VLANs are also critical because they improve overall network efficiency by grouping devices that most frequently communicate. VLANs offer protection in bigger networks by enabling a greater degree of control over the equipment. VLANs for enhanced traffic control are mostly set up by bigger organizations for repartition devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
With EP imaging process laser printers, the laser discharges the charged photosensitive drum to ____________________ VDC.
−100
26
What is the maximum speed of USB 3.0?
5 Gbps
27
Class A IP addresses will have a first octet of between ____ and ___.
1 and 126 The IP (Internet Protocol) is the fundamental protocol for communications on the Internet. It specifies the way information is packetized, addressed, transferred, routed, and received by networked devices. An IP address is a number identifying of a computer or another device on the Internet. It is similar to a mailing address, which identifies where postal mail comes from and where it should be delivered. IP addresses uniquely identify the source and destination of data transmitted with the Internet Protocol. Class Address range Supports Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks. Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks. Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks. Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups. Class E 240.0.0.0 to 254.255.255.254 Reserved for future use, or research and development purposes.
28
ATX and ITX are examples of what?
motherboard form factors
29
Which type of DNS TXT record authenticates an email server via IP address?
SPF
30
Which protocol in TCP/IP is responsible for resolving IP addresses to MAC addresses?
ARP (Address Resolution Protocol)
31
Using an employee’s physical ID to authenticate to a printer is called what?
badging
32
A simple hardware device that allows for longer cable runs is called a(n) ________.
Repeater or extender
33
Name six types of data that get synchronized between a mobile device and a desktop.
Contacts, applications, email, pictures, music, videos, calendar, bookmarks, documents, location data, social media data, E-books, and passwords
34
If when the computer is turned on, the fan spins but no devices seem to have power, which component is most likely at fault?
Power supply
35
What two things are combined in a hybrid drive?
A magnetic drive and a solid-state drive
36
The _ protocol is used to retrieve mail and operates on port _.
IMAP, 143 or POP3, 110
37
What is a name for a legacy system that manages industrial processes such as manufacturing or HVAC?
SCADA
38
To use a wireless network, clients must connect to what type of device?
wireless access point or wireless router
39
Two analog video connectors are ___ and ___.
VGA and DVI-A
40
Which TCP ports are used for unsecure and secure IMAP?
Port 143 and port 993, respectively
41
Which metric should be used to ensure that the PSU can power all components?
Wattage rating
42
The language of communication spoken between computers on a network is called a _______.
protocol
43
What is the term for cloud service where the provider offers applications?
software as a service (SaaS)
44
A device that combines firewall, IPS, and antimalware software in one is called what?
Unified Threat Management (UTM)
45
The database containing information the DHCP server gives to clients is called what?
scope
46
Which system component is most likely to overheat?
CPU
47
Order these from slowest to fastest: SAS-3, IDE, SATA 3.0
IDE (100 Mbps), SATA 3.0 (6 Gbps), SAS-3 (12 Gbps)
48
The add-on card that allows your computer to project on a monitor is called what?
Video card
49
The diagnostic routine built into the BIOS is called the _______.
Power-on self-test (POST)
50
Copying data, such as calendars, contacts, photos, and music, between a computer and a mobile device is referred to as what?
Synchronization
51
What should you apply between the CPU and heat sink to avoid overheating?
thermal compound, thermal paste, thermal pads, or thermal gel
52
If the video on a laptop is not working, what should you should plug in?
An external monitor
53
If you want to plug your laptop into a power outlet in your car, you need a _________ power adapter.
DC
54
What type of cloud is completely owned by a company like Google but used by business clients?
Public
55
Mini PCIe cards have ____ connectors.
52-pin card edge
56
Which troubleshooting device can help determine problems during the boot process?
POST card
57
What is the difference between USB 3.1 and USB-C?
USB 3.1 is a standard, and USB-C is a connector type.
58
Wireless networks use ____ to identify themselves.
SSIDs
59
The part of the LCD that is responsible for providing enough light is called the ____.
backlight
60
A DVD-R SS, DL has how much capacity?
8.5 GB
61
The wireless networking standard 802.11n operates at ____ (frequency) and supports _____ (speed).
2.4 and 5GHz, up to 600 Mbps
62
The e in eSATA stands for ______.
external
63
Unevenly spaced characters in output from an impact or inkjet printer could indicate what?
A problem with the stepper motor
64
What two categories of materials will 3D printers use to create images?
Filament and resin
65
The process that an inkjet printer goes through after installing a new print cartridge is called ________.
printhead alignment
66
____ is a term that refers to a 32-bit Intel CPU architecture.
x86
67
________ is essentially software implemented in hardware.
Firmware
68
What tool can be used to discover wireless network traffic?
A Wi-Fi analyzer or wireless locator
69
Class B private IP addresses are in the ____ range.
172.16.0.0 to 172.31.255.255
70
When configuring an Internet email account on a mobile device, what are the standard pieces of information required?
Username and password, outbound mail server and port (often based on secure SMTP), and inbound mail server and port (often based on secure POP3 or secure IMAP4)
71
Two examples of 4G technology are _____ and ______.
WiMAX, LTE
72
What are the three components of an LCD?
Inverter, screen, and backlight
73
Firewalls filter packets based on a set of rules called _____.
an ACL (access control list)
74
DNS server records for IPv4 and IPv6 hosts are ____ and ____.
A and AAAA
75
CPU cache is most commonly implemented using what type of memory?
Static RAM (SRAM)
76
What is the fifth step in the best practice troubleshooting methodology?
Verify full system functionality and, if applicable, implement preventive measures
77
If all computers on the network are in the same office, then the office is a ______.
local area network (LAN)
78
What connector type provides power to an IDE hard drive?
Molex
79
What is the name of the consumable in a 3D printer that comes on a spool and needs to be replaced periodically?
filament
80
What causes image smudging from a laser printer?
The fuser isn’t heating the toner and fusing it into the paper.
81
Which voltage is applied to the paper to transfer the toner to the paper in an EP process laser printer?
+600VDC
82
Two types of devices used to keep computer components cool are __________ and __________.
heat sinks, cooling fans
83
The most secure encryption protocol for 802.11 is ____.
WPA3
84
A firewall configuration where every computer is denied access except certain computers on a list is called a ___list.
White (or allow)
85
The series of print jobs waiting to use the printer is called the _________.
print queue
86
Two connector types used with twisted pair cabling are ____ and ____.
RJ-11 and RJ-45
87
What in the name of a Blu-ray disc indicates that it can be rewritten multiple times?
BD-RE
88
A paper jam in an inkjet printer is usually caused by what two things?
Worn pickup rollers or the wrong type of paper
89
What step of the EP imaging process uses a laser to discharge selected areas of the photosensitive drum, thus forming an image on the drum?
exposing
90
How many more pins does a dual-link DVI-D connector have than a single-link DVI-D connector?
6
91
Where can you obtain laptop service manuals?
From the manufacturer’s website
92
The ability to access extra cloud resources quickly is called what?
Rapid elasticity
93
Inkjet and laser printers are examples of _______ because they receive their print job instructions one page at a time.
page printers
94
When a Bluetooth network is created with a printer on the fly, what type of network is it?
ad hoc
95
DDR3 SODIMMs have ____ pins.
204
96
Thunderbolt is a combination of which two technologies?
DisplayPort and PCIe Peripheral Component Interconnect
97
____ is the form factor designed for laptop expansion devices and small hard drives.
mSATA
98
The seven steps in the EP printing process, in order, are ______.
processing, charging, exposing, developing, transferring, fusing, and cleaning
99
The wireless networking standard 802.11a operates at ____ (frequency) and supports _____ (speed).
5 GHz, 54 Mbps
100
WPA2 employs what security method?
AES-CCMP
101
STP designed for use outdoors or underground is called what?
Direct burial
102
A 10BaseT network uses _____ cabling and can transmit data at _______ (speed).
twisted pair (or UTP), 10 Mbps
103
The address fe80::/10 is an example of an IPv6 _____ address.
link-local
104
The roaming list on a mobile device is established by what?
The PRL (preferred roaming list)
105
DDR4 and DDR5 DIMMs have how many pins?
288
106
What type of hypervisor is also referred to as a bare-metal hypervisor?
Type 1
107
Ethernet uses _____ to send information on the network.
CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
108
When Windows quits unexpectedly, you may get a _________.
Blue Screen of Death (BSOD)
109
Unexpected shutdowns, system lockups, or continuous reboots are most often caused by which hardware components?
Motherboard, CPU, or RAM
110
TCP/IP is based on the ______ model.
United States Department of Defense (DoD)
111
Vertical white lines on the output of a laser printer are caused by what?
Foreign matter (more than likely toner) caught on the transfer corona wire
112
_________________ drives can be inserted and removed without turning off the system.
Hot-swappable A hot swap describes the act of removing components from or plugging them into a computer system while the power remains switched on.
113
The cable type with the longest range is _____.
fiber-optic
114
The network connectivity device that can connect multiple networks to each other is a ______.
router
115
The four common types of broadband are _______.
DSL (Digital Subscriber Line), cable, satellite, and fiber-optic
116
Technology that allows for electricity to be supplied over network cables is called ______.
Power over Ethernet (PoE)
117
The CPU feature that allows for multiple operating systems to run at once is called what?
Virtualization (or virtual technology)
118
What type of device provides network connections through an electrical outlet?
What type of device provides network connections through an electrical outlet?
119
What is the third step in the best practice troubleshooting methodology?
Test the theory to determine the cause
120
Three connector types for fiber-optic cable are ___, ___, and ___.
ST, SC, LC
121
Name three of the standard DC voltages supplied by a power supply.
+3.3VDC, +5VDC, −5VDC, +12VDC, or −12VDC
122
A ____ server provides IP configuration information to clients on the network.
DHCP (Dynamic Host Configuration Protocol)
123
Name three of the available memory-card formats
SD, micro-SD, mini-SD, xD, and CF
124
DHCP uses ports ____ and _____.
UDP port 67 and UDP port 68
125
Name two ways you can manually configure your laser printer’s IP address?
Through the control panel on the printer and using management software on your computer
126
A RADIUS server is an example of what type of server?
Authentication
127
If a laptop will not power up on battery power, you should try _____.
plugging it into an AC adapter
128
RAID 5 requires a minimum of how many hard drives?
3
129
Where is the Wi-Fi antenna typically found in a laptop?
In the display
130
What is a configured range of available IP addresses on a DHCP server called?
Scope
131
Smoke or a burning smell is most likely the fault of which component?
Power supply
132
TCP is a _______ protocol that operates at the ____ layer of the OSI model.
connection-oriented, transport
133
A passive connectivity device that amplifies a signal is called a ______.
repeater or active hub
134
Which TCP ports are most commonly used for unsecure and secure SMTP over SSL?
Port 25 and port 465, respectively
135
Name three types of internal hard drive cables.
SATA, IDE (PATA), and SCSI
136
What is the name of the Apple proprietary connector used on the iPhone 12?
Lightning
137
Where is the boot sequence stored in the computer?
BIOS/UEFI settings
138
Which RAID level provides no fault tolerance?
RAID 0
139
The ___ protocol is used to send mail and operates on port ___.
SMTP, 25
140
APIPA addresses are in the ____ range with a subnet mask of ___.
169.254.0.0 to 169.254.255.255, 255.255.0.0
141
When troubleshooting and identifying the problem, what two things should you do?
Gather information from the user and inquire regarding environmental or infrastructure changes
142
Multipart forms are used with this type of printer.
impact
143
Name three places network scan services can send files?
Scan to email, scan to network folder (with SMB), scan to cloud
144
What are the two socket types that require little to no force during CPU installation?
Zero Insertion Force (ZIF) and Land Grid Array (LGA)
145
The first step in the EP printing process is ______.
processing
146
What does RAID 0 not provide that other RAID levels do?
Fault tolerance
147
A ______ is a device primary used for storage on a network.
fileshare (or file server)
148
As opposed to a WLAN, a Bluetooth network is referred to as a ____.
wireless personal area network (WPAN)
149
How many pins are on a standard (Type-A) HDMI connector?
19
150
What technology is built into hard drives to detect problems?
S.M.A.R.T.
151
What hardware tool is used to trace cables through a wall?
Toner and probe
152
What tool is used to test a network card, without using a network cable?
Loopback adapter or plug
153
The macOS proprietary crash screen is called what?
Pinwheel
154
The service that formats jobs for the printer is called the ________.
print spooler
155
__________ and __________ modules both have 288 pins but are distinguished by the location of their keying notch.
DDR4, DDR5
156
What is the first step in the best practice troubleshooting methodology?
Identify the problem
157
A DB-9 connector is found on which type of cable?
Serial
158
A card with expansion slots on it that installs into a motherboard is known as a(n) __________ card.
riser
159
The functional components of a chipset are known as __________and __________.
Northbridge and Southbridge
160
UTP cable has a maximum segment length of _____.
100 meters
161
To communicate on a TCP/IPv4 network, which two things do you need?
A unique IP address and a valid subnet mask
162
Which TCP ports are used for unsecure and secure POP3?
110 and 995, respectively
163
Consistently light or faded characters on output from an impact printer likely indicates what?
The print ribbon is old and needs to be replaced.