Test 04 Flashcards
Which cellular technology is compromised of LTE and LTE-A to provide higher data speeds than previous cellular data protocols?
A. 3G
B. 4G
C. 5G
D WMN
B.
The 4G cellular technology is made up of two different technologies: LTE and LTE-A. LTE (Long Term Evolution) is a converged 4G standard used by both GSM and CDMA cellular networks and provides average download speeds of 20 Mbps. LTE-A (LTE Advanced) is an upgraded version of LTE and supports an average download speed of 40 Mbps.
Which cellular technology is compromised of HSPA+ and EV-DO to provide higher data speeds than previous cellular data protocols?
A. 3G
B. 4G
C. 5G
D. LTE
A.
The 3G cellular technology is made up of two different technologies: HSPA+ and EV-DO. HSPA+ (Evolved High-Speed Packet Access) is a 3G standard used for GSM cellular networks and can support up to 168 Mbps downloads. EV-DO (Evolution-Data Optimized) is a 3G standard used for CDMA cellular networks and can support up to 3.1 Mbps downloads.
Your boss has asked you to select the technology for a new wireless network for the office. She stated that the new network must allow users to connect their laptops, smartphones, and tablets wirelessly. The technology selected should utilize the longest range possible without signal loss. Which of the following wireless technologies should be selected to meet these requirements?
A. 802.11b
B. 802.11g
C. 802.11n
D. 802.11ac
D.
To meet these requirements, you should recommend 802.11ac because it allows for faster speeds than wireless b, g, and n, and it provides the longest ranges of the options provided. The 802.11ac wireless standard is capable of speeds up to 1300 megabits per second (Mbps). The 802.11ac can reach 115 feet (35 meters) using 8 MIMO streams for higher bandwidth, or up to 230 feet (70 meters) using only 4 MIMO streams to provider greater coverage at a lower bandwidth.
You are configuring a new client workstation on the network. Which type of IP address should you configure it with?
A. Dynamic
B. Static
C. APIPA
D. Link local
A.
A dynamic IP address should be used for client workstations and devices to ensure they are easy to configure and less prone to human error. When configuring a dynamic IP address, the DHCP server should issue the IP address, subnet mask, gateway, and DNS server’s IP address to the workstation or device.
Due to the lack of fiber optic cabling near the Dion Training offices, the company has decided to purchase a ground-based microwave service for their primary internet connection. This provides the company with a 100 Mbps to 1 Gbps connection based on the service plan chosen. The technician installed a small directional antenna on the office roof and pointed it at an antenna on another building 5 miles away. Which technology is being used?
A. Satelite
B. ISDN
C. Line of Sight
D. HFC
C
Line of Sight (LOS) is a wireless connection method using ground-based microwave antennas aligned with one another. Endpoints can transmit signals to one another as long as they are unobstructed by physical objects. The antennas are mounted to the top of the building to reduce interference. LOS service is often low latency, or at least lower latency than traditional satellite internet service.
Which tool is used to connect a cable to the rear of a patch panel or network wall jack?
A. Cable tester
B. Punchdown tool
C. Cable stripper
D. Crimper
B.
A punchdown tool is used to press a wire into the terminal on the rear of a patch panel or network wall jack. The punchdown tool then cuts through the insulation to make an electrical connection with the terminal block. A 110-block is the standard patch panel used for computer networks.
You have been asked by Dion Training to build a specialized computer that will be used exclusively for running numerous virtual machines simultaneously for their lab environment. Which of the following should you install to BEST meet the company’s needs? (Select TWO)
A. 64 GB of DDR4 B. Intel i3 with 2-cores C. 8 GB of DDR3 D. Intel i9 with 8-cores E. 1 TB SSD F. 1 TB HDD
A,D
(Read instructions, only pick two)
Previous selection A,D,F
According to CompTIA, the two main things you need to include for a dedicated virtualization workstation are (1) maximum RAM and (2) multiple CPU cores. Based on the options provided, you should pick the 64 GB of DDR4 (maximum RAM) and the Intel i9 with 8-cores (multiple processor cores) for this workstation’s configuration.
Linda wants to reduce the number of monitors, keyboards, and mice required to control the multiple servers she manages in the datacenter. Which of the following devices should she install to allow a single keyboard or mouse to control multiple systems?
A. USB splitter
B. PS/2 splitter
C. Video mirroring device
D. KVM
D.
A KVM (or Keyboard, Video, and Mouse) is a simple and easy to use hardware switching device that allows for multitasking on a single device. A KVM gives you the ability to connect 2 to 64 physical computers to a single set of hardware devices, such as a keyboard, monitor, and mouse. KVMs can be directly connected to the systems being controlled over USB, known as local remote. Modern KVMs can also operate over the network using KVM over IP, common in large datacenter implementations.
You are installing some new hard drives in a legacy Novell NetWare server in a closed IPX network. The hard drive has a 4-bit set of jumpers that must be configured to represent the device’s ID number (0-15) in the storage device chain. Which of the following types of connectors would you use for data transfer with these hard drives?
A. SCSI
B. SATA
C. USB
D. PATA
A.
Don’t be mistaken by all of the extra information provided in the question about the legacy (old) server in a closed IPX network. Focus on what the question is asking: what type of hard drive uses an ID number between 0-15 that must be set. The only types of hard drives or devices that use an ID number are narrow SCSI (0-7) and wide SCSI (0-15). Therefore, the correct answer is SCSI. The Small Computer System Interface (SCSI) is a set of parallel interface standards developed by the American National Standards Institute (ANSI) for attaching printers, disk drives, scanners, and other peripherals to computers. SCSI is supported by all major operating systems and was heavily used in older servers in the late 90s and early 2000s until SATA replaced it in most applications.
What is the name of the networking protocol used by macOS to find available printers on the network to use?
A. Internet Printing Protocol
B. Bonjour
C. Line Printer Daemon
D. Cloud Print
B.
Bonjour, Apple’s zero-configuration networking protocol, automates certain aspects of network configuration; the protocol enables devices connected to the local area network to discover and connect automatically. Businesses can use Bonjour to make the sharing of files and devices easier; the technology works with wired and wireless LANs. After enabling Bonjour on a workstation, other computers on the network can detect and install printers or scanners attached to the workstation or access files from shared folders.
What type of connector is most commonly used to terminate an Ethernet cable?
A. RJ-45
B. RG-6
C. DB-9
D. RG-59
A.
An RJ-45 connector is usually used to terminate an Ethernet cable. Coaxial cables are normally terminated using an RG-59 connector but can also use an RG-6 connector. A DB-9 is usually used to terminate an RS-232 connection on a serial cable.
What is the smallest and fastest cache level that is located closest to the processor?
A. L4
B. L3
C. L2
D. L1
D.
Level 1 (L1) cache is the fastest and closest memory to the processor core. A CPU cache is a hardware cache used by the central processing unit (CPU) of a computer to reduce the average cost (time or energy) to access data from the main memory. A cache is a smaller, faster memory located closer to a processor core, storing copies of the data from frequently used main memory locations. Most CPUs have a hierarchy of multiple cache levels (L1, L2, L3, L4, etc.), with separate instruction-specific and data-specific caches at Level 1.
The large multi-function printer in your office is shared between 12 people. Unfortunately, it has stopped working, and the technicians have determined it must be replaced. A new printer has been ordered, but it will be 2 weeks until it arrives. The only other printer available in your office is the manager’s printer, but it is connected via USB to their workstation. One of the technicians would like to share the manager’s printer with the other 12 employees for the next 2 weeks as a temporary workaround. Unfortunately, there are no spare wired network jacks available in the office to connect the printer to the network directly, but there is a wireless access point nearby. Which of the following is the BEST way for the technician to allow the 12 employees to access the manager’s printer?
A. Provide a USB thumb drive to each employee so that they can transfer their files to the manager’s computer for direct printing
B. Purchase a portable wireless print server and connect the printer to it using USB
C. Configure a new printer on each user’s workstation and point it to the manager’s IP address
D. Share the printer directly from the manager’s computer by creating a share and giving the other employee’s access rights to the share
B.
The BEST solution would be to use a wireless print server to connect the printer to it using USB. This wireless print server can then receive the print jobs directly from all of the network users. It is not recommended that the technician create a share on the manager’s computer or set the printer configuration to the manager’s IP address since all print jobs would fail anytime the manager shut down or restarted their computer. Using a USB drive to transfer the files to the manager’s computer each time someone wanted to print is also not a good solution since this is difficult for the users and will be disrupting the manager’s work every time someone needed to print something.
What type of network cable should be used to prevent crosstalk?
A. UTP
B. STP
C. Plenum
D. RJ-11
B.
A shielded twisted pair (STP) cable contains a shielded sheathing in the cable that can stop or prevent crosstalk. Cables are often clustered together with a high amount of data passing through from one device to another, causing EMI (electromagnetic interference). EMI causes signal interference and errors in the transfer of data, known as crosstalk.
You want to buy a new computer that will allow you to run at least 3 virtual machines (VMs) at the same time to practice for your CompTIA A+ exam. You also know in the future that you would like to set up a virtual ethical hacking lab with numerous VMs to study for the CompTIA PenTest+ exam. Which TWO of the following components is the MOST important to upgrade if you want to simultaneously run numerous VMs simultaneously?
A. CPU B. SDD C. RAM D. HDD E. NIC F. GPU
A,D
If you want good performance for a computer used for extensive virtualization (such as multiple virtual machines running at once), you should maximize the CPU and the RAM. These are the most important components when building a virtualization machine to support numerous VMs.