Test 03 Flashcards
You are working on your laptop, and the image on the display suddenly becomes very dark and hard to see. You attempt to adjust the brightness and contrast of the laptop’s display using the special function keys, but this doesn’t really brighten the display much. You pull out a bright flashlight and can see the image displayed a little better when using it. Which of the following components is MOST likely faulty and needs to be replaced?
A. Inverter
B. Digitizer
C. GPU
D. LCD Panel
A.
The inverter (also known as inverter board, screen inverter, or LCD inverter) is a part of the laptop’s display assembly. The inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight.
A user is complaining that every time they enable airplane mode on their laptop, their external mouse and headphones stop working. Which of the following signals being disabled by airplane mode is likely causing the issues experienced by this user?
A. GPS
B. Wireless
C. Bluetooth
D. Cellular
C.
Bluetooth is a wireless connectivity method that is usually used by external mice and wireless headphones. When airplane mode is enabled, the GPS, cellular, wireless, and Bluetooth radios are disabled in smartphones, tablets, or laptops. If the Bluetooth radio is turned off/disabled, it will cause issues with Bluetooth-connected devices like mice and headphones for the end-user.
Which of the following ports is used by SNMP by default?
A. 25
B. 53
C. 139
D. 161
D.
SNMP works over UDP ports 161 and 162 by default. SNMP (Simple Network Management Protocol) is a protocol for monitoring and managing network devices. A management system collates data sent by agents running on each device. The agents maintain a Management Information Base of configuration and usage data. An agent can also generate a trap, alerting the management system of some notable event.
Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector?
A. WEP
B. WPA2
C. WPA
D. WPS
A.
The Wired Equivalent Privacy (WEP) encryption system is based on the RC4 cipher. WEP allows you to select from different key sizes (64-bit or 128-bit). A larger key makes it more difficult to attack the security system. Unfortunately, the system uses a 24-bit initialization vector, making it simple to hack and crack. You should never use WEP in your wireless networks.
Which of the following ports is used by the native file and printer sharing protocol for Mac computers and supports many unique Mac attributes that are not supported by other protocols?
A. 427
B. 67
C. 548
D. 445
C.
The Apple File Protocol (AFP) uses port 548 by default. AFP is the native file and printer sharing protocol for Mac computers. It supports many unique Mac attributes that are not supported by other protocols.
You have been asked to install a network cable in the crawl space between the ceiling in your office and the roof. You need to choose the right type of cable to ensure you do not violate the local fire codes. Which of the following cable types should you choose?
A. Fiber
B. Shielded
C. Plenum
D. Coaxial
C
Plenum-rated cable has special insulation that has low smoke and low flame characteristics. Plenum cable is mandated to be installed in any air handling space. For example, most large office buildings use the space between the ceiling and the roof to return air to the AC unit. This qualifies this area as a plenum ceiling, and all the cables that go through that ceiling must be plenum rated. It is important to check your local building codes to see if you need to use plenum cable. These plenum cables cost more because the insulation material must meet the standards for plenum cables while also meeting the standards for category 5e.
You have been asked by Dion Training to build a specialized computer that will be used exclusively as a gaming machine for beta testing some new video games they are developing. Which of the following should you install to BEST meet the company’s needs? (Select FOUR)
A. 1 TB HDD B. Dedicated video card with GPU C. Liquid cooling D. CPU with integrated GPU E. 512 GB SSD F. 7.1 Dolby Sound audio card
B,C,E,F
According to CompTIA, the four main things you need to include for a gaming PC are (1) a SSD, (2) high-end video/specialized GPU, (3) high-definition sound card, and (4) high-end cooling. Based on the options provided, you should pick the 512 GB SSD (instead of the 1 TB HDD), the dedicated video card with GPU (instead of the CPU with integrated GPU), the 7.1 Dolby Sound audio card (instead of integrated sound from the motherboard), and the high-end cooling (liquid cooling over fans) for this workstation’s configuration.
You have been asked to replace the processor in a workstation. You remove the old processor, install the new processor into the motherboard slot, attach the heat sink, and attempt to power on the workstation. The workstation boots up, but after a minute or two, the computer shuts itself down. Which of the following steps did you MOST likely forget to perform?
A. You forgot to close the ZIF socket
B. You forgot to reattach the power cable to the case fans
C. You forgot to replace the RAM with parity memory
D. You forgot to apply thermal paste to the processor during the installation
D.
When you install a processor, you need to ensure you install it in the processor socket on the motherboard, apply thermal paste to the backside of the processor, attach the heat sink, attach the processor fan to the heat sink, and then connect the power cable to the processor fan. If you neglect to apply the thermal paste between the processor and the heat sink, the heat sink cannot effectively dissipate all the heat from the processor, and the computer will shut itself down to protect the processor from becoming overheated.
A computer technician is building a server that will run multiple virtual machines simultaneously. Which CPU technology should be selected so that the processor can utilize two logical cores?
A. Hyperthreading
B. 32-bit CPU
C. Dedicated GPU
D. Multi-core processor
A.
Hyperthreading is a technology used to split the physical cores of a processor into multiple logical cores. This allows the system to run multiple cores for each operating system in a virtualized environment. Since the question asked about logical cores and not physical cores, the answer is hyperthreading and not a multi-core processor.
What type of cable is most commonly used to terminate a serial connection to a modem?
A. RG-59
B. RJ-45
C. DB-9
D. RJ-11
C.
A DB-9 is usually used to terminate an RS-232 connection on a serial cable. Coaxial cables are normally terminated using an RG-59 connector but can also use an RG-6 connector. An RJ-45 connector is usually used to terminate an Ethernet cable. An RJ-11 is usually used to terminate a phone line.
Which of the following security features would allow a user to track their laptop’s location if it was stolen?
A. Full disk encryption
B. TPM
C. LoJack
D. Kensington lock
C.
LoJack for Laptops is a proprietary laptop theft recovery software that grants remote access to lock, delete sensitive files, and locate the stolen laptop. The user will need to install a LoJack program on the laptop and create a security card with the laptop’s PIN/ID. This PIN/ID can be used to track down the laptop whenever it reconnects to the internet.
You are building a Gaming PC to support a high-end virtual reality headset. The computer needs a high-end processor, lots of RAM, and a dedicated high-end graphics card. This graphics card will be installed in one of your expansion slots on your motherboard. Which of the following motherboard connections will most likely be used to connect the graphics card?
A. AGP
B. PCIe
C. PCI
D. USB
B.
PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has some PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. Graphics cards almost exclusively rely on PCIe x16 expansion slots for their connectivity.
Which of the following cloud computing resources are MOST important when determining a cloud file-storage synchronization application’s performance?
A. CPU utilization
B. RAM utilization
C. Disk speed
D. I/O bandwidth
D.
I/O bandwidth is the measurement of the amount of input and output operations that can be performed within a given time. The higher the I/O bandwidth, the faster and more efficient a cloud file-storage synchronization application will become. Applications that rely on large amounts of reading and writing of data require a high amount of I/O bandwidth. Disk speed is not nearly as important since most cloud file-storage systems use a virtualized file system for storage and do not rely on a single disk. Instead, they rely on a storage area network or a virtualized storage solution.
Which type of technology imitates hardware without relying on the CPU being able to run the software code directly?
A. Hypervisor
B. Virtual machine
C. Simulator
D. Emulator
D.
Emulators emulate hardware without relying on the CPU being able to run code directly. Virtual machines use CPU self-virtualization, to whatever extent it exists, to provide a virtualized interface to the real hardware. A simulator is a limited scope that is usually used in training to mimic a real system’s functionality. Emulators were created before virtualization and operate much slower than a true virtualization environment with a hypervisor.
What is the sixth step of the CompTIA troubleshooting methodology?
A. Establish a plan of action to resolve the problem and implement the solution
B. Verify full system functionality and, if applicable, implement preventative measures
C. Document findings, actions, and outcomes
D. Test the theory to determine cause
C.
According to the CompTIA troubleshooting method, the sixth step is testing the theory to document findings, actions, and outcomes. First, identify the problem. Second, establish a theory of probable cause (question the obvious). Third, test the theory to determine the cause. Fourth, establish a plan of action to resolve the problem and implement the solution. Fifth, verify full system functionality and, if applicable, implement preventative measures. Sixth, document findings, action, and outcomes.