Test 04 Flashcards

1
Q

Which cellular technology is compromised of LTE and LTE-A to provide higher data speeds than previous cellular data protocols?

A. 3G
B. 4G
C. 5G
D WMN

A

B.

The 4G cellular technology is made up of two different technologies: LTE and LTE-A. LTE (Long Term Evolution) is a converged 4G standard used by both GSM and CDMA cellular networks and provides average download speeds of 20 Mbps. LTE-A (LTE Advanced) is an upgraded version of LTE and supports an average download speed of 40 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which cellular technology is compromised of HSPA+ and EV-DO to provide higher data speeds than previous cellular data protocols?

A. 3G
B. 4G
C. 5G
D. LTE

A

A.

The 3G cellular technology is made up of two different technologies: HSPA+ and EV-DO. HSPA+ (Evolved High-Speed Packet Access) is a 3G standard used for GSM cellular networks and can support up to 168 Mbps downloads. EV-DO (Evolution-Data Optimized) is a 3G standard used for CDMA cellular networks and can support up to 3.1 Mbps downloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your boss has asked you to select the technology for a new wireless network for the office. She stated that the new network must allow users to connect their laptops, smartphones, and tablets wirelessly. The technology selected should utilize the longest range possible without signal loss. Which of the following wireless technologies should be selected to meet these requirements?

A. 802.11b
B. 802.11g
C. 802.11n
D. 802.11ac

A

D.

To meet these requirements, you should recommend 802.11ac because it allows for faster speeds than wireless b, g, and n, and it provides the longest ranges of the options provided. The 802.11ac wireless standard is capable of speeds up to 1300 megabits per second (Mbps). The 802.11ac can reach 115 feet (35 meters) using 8 MIMO streams for higher bandwidth, or up to 230 feet (70 meters) using only 4 MIMO streams to provider greater coverage at a lower bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are configuring a new client workstation on the network. Which type of IP address should you configure it with?

A. Dynamic
B. Static
C. APIPA
D. Link local

A

A.

A dynamic IP address should be used for client workstations and devices to ensure they are easy to configure and less prone to human error. When configuring a dynamic IP address, the DHCP server should issue the IP address, subnet mask, gateway, and DNS server’s IP address to the workstation or device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Due to the lack of fiber optic cabling near the Dion Training offices, the company has decided to purchase a ground-based microwave service for their primary internet connection. This provides the company with a 100 Mbps to 1 Gbps connection based on the service plan chosen. The technician installed a small directional antenna on the office roof and pointed it at an antenna on another building 5 miles away. Which technology is being used?

A. Satelite
B. ISDN
C. Line of Sight
D. HFC

A

C

Line of Sight (LOS) is a wireless connection method using ground-based microwave antennas aligned with one another. Endpoints can transmit signals to one another as long as they are unobstructed by physical objects. The antennas are mounted to the top of the building to reduce interference. LOS service is often low latency, or at least lower latency than traditional satellite internet service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which tool is used to connect a cable to the rear of a patch panel or network wall jack?

A. Cable tester
B. Punchdown tool
C. Cable stripper
D. Crimper

A

B.

A punchdown tool is used to press a wire into the terminal on the rear of a patch panel or network wall jack. The punchdown tool then cuts through the insulation to make an electrical connection with the terminal block. A 110-block is the standard patch panel used for computer networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have been asked by Dion Training to build a specialized computer that will be used exclusively for running numerous virtual machines simultaneously for their lab environment. Which of the following should you install to BEST meet the company’s needs? (Select TWO)

A. 64 GB of DDR4
B. Intel i3 with 2-cores
C. 8 GB of DDR3
D. Intel i9 with 8-cores
E. 1 TB SSD
F. 1 TB HDD
A

A,D

(Read instructions, only pick two)
Previous selection A,D,F

According to CompTIA, the two main things you need to include for a dedicated virtualization workstation are (1) maximum RAM and (2) multiple CPU cores. Based on the options provided, you should pick the 64 GB of DDR4 (maximum RAM) and the Intel i9 with 8-cores (multiple processor cores) for this workstation’s configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Linda wants to reduce the number of monitors, keyboards, and mice required to control the multiple servers she manages in the datacenter. Which of the following devices should she install to allow a single keyboard or mouse to control multiple systems?

A. USB splitter
B. PS/2 splitter
C. Video mirroring device
D. KVM

A

D.

A KVM (or Keyboard, Video, and Mouse) is a simple and easy to use hardware switching device that allows for multitasking on a single device. A KVM gives you the ability to connect 2 to 64 physical computers to a single set of hardware devices, such as a keyboard, monitor, and mouse. KVMs can be directly connected to the systems being controlled over USB, known as local remote. Modern KVMs can also operate over the network using KVM over IP, common in large datacenter implementations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are installing some new hard drives in a legacy Novell NetWare server in a closed IPX network. The hard drive has a 4-bit set of jumpers that must be configured to represent the device’s ID number (0-15) in the storage device chain. Which of the following types of connectors would you use for data transfer with these hard drives?

A. SCSI
B. SATA
C. USB
D. PATA

A

A.

Don’t be mistaken by all of the extra information provided in the question about the legacy (old) server in a closed IPX network. Focus on what the question is asking: what type of hard drive uses an ID number between 0-15 that must be set. The only types of hard drives or devices that use an ID number are narrow SCSI (0-7) and wide SCSI (0-15). Therefore, the correct answer is SCSI. The Small Computer System Interface (SCSI) is a set of parallel interface standards developed by the American National Standards Institute (ANSI) for attaching printers, disk drives, scanners, and other peripherals to computers. SCSI is supported by all major operating systems and was heavily used in older servers in the late 90s and early 2000s until SATA replaced it in most applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the name of the networking protocol used by macOS to find available printers on the network to use?

A. Internet Printing Protocol
B. Bonjour
C. Line Printer Daemon
D. Cloud Print

A

B.

Bonjour, Apple’s zero-configuration networking protocol, automates certain aspects of network configuration; the protocol enables devices connected to the local area network to discover and connect automatically. Businesses can use Bonjour to make the sharing of files and devices easier; the technology works with wired and wireless LANs. After enabling Bonjour on a workstation, other computers on the network can detect and install printers or scanners attached to the workstation or access files from shared folders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of connector is most commonly used to terminate an Ethernet cable?

A. RJ-45
B. RG-6
C. DB-9
D. RG-59

A

A.

An RJ-45 connector is usually used to terminate an Ethernet cable. Coaxial cables are normally terminated using an RG-59 connector but can also use an RG-6 connector. A DB-9 is usually used to terminate an RS-232 connection on a serial cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the smallest and fastest cache level that is located closest to the processor?

A. L4
B. L3
C. L2
D. L1

A

D.

Level 1 (L1) cache is the fastest and closest memory to the processor core. A CPU cache is a hardware cache used by the central processing unit (CPU) of a computer to reduce the average cost (time or energy) to access data from the main memory. A cache is a smaller, faster memory located closer to a processor core, storing copies of the data from frequently used main memory locations. Most CPUs have a hierarchy of multiple cache levels (L1, L2, L3, L4, etc.), with separate instruction-specific and data-specific caches at Level 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The large multi-function printer in your office is shared between 12 people. Unfortunately, it has stopped working, and the technicians have determined it must be replaced. A new printer has been ordered, but it will be 2 weeks until it arrives. The only other printer available in your office is the manager’s printer, but it is connected via USB to their workstation. One of the technicians would like to share the manager’s printer with the other 12 employees for the next 2 weeks as a temporary workaround. Unfortunately, there are no spare wired network jacks available in the office to connect the printer to the network directly, but there is a wireless access point nearby. Which of the following is the BEST way for the technician to allow the 12 employees to access the manager’s printer?

A. Provide a USB thumb drive to each employee so that they can transfer their files to the manager’s computer for direct printing
B. Purchase a portable wireless print server and connect the printer to it using USB
C. Configure a new printer on each user’s workstation and point it to the manager’s IP address
D. Share the printer directly from the manager’s computer by creating a share and giving the other employee’s access rights to the share

A

B.

The BEST solution would be to use a wireless print server to connect the printer to it using USB. This wireless print server can then receive the print jobs directly from all of the network users. It is not recommended that the technician create a share on the manager’s computer or set the printer configuration to the manager’s IP address since all print jobs would fail anytime the manager shut down or restarted their computer. Using a USB drive to transfer the files to the manager’s computer each time someone wanted to print is also not a good solution since this is difficult for the users and will be disrupting the manager’s work every time someone needed to print something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of network cable should be used to prevent crosstalk?

A. UTP
B. STP
C. Plenum
D. RJ-11

A

B.

A shielded twisted pair (STP) cable contains a shielded sheathing in the cable that can stop or prevent crosstalk. Cables are often clustered together with a high amount of data passing through from one device to another, causing EMI (electromagnetic interference). EMI causes signal interference and errors in the transfer of data, known as crosstalk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You want to buy a new computer that will allow you to run at least 3 virtual machines (VMs) at the same time to practice for your CompTIA A+ exam. You also know in the future that you would like to set up a virtual ethical hacking lab with numerous VMs to study for the CompTIA PenTest+ exam. Which TWO of the following components is the MOST important to upgrade if you want to simultaneously run numerous VMs simultaneously?

A. CPU
B. SDD
C. RAM
D. HDD
E. NIC
F. GPU
A

A,D

If you want good performance for a computer used for extensive virtualization (such as multiple virtual machines running at once), you should maximize the CPU and the RAM. These are the most important components when building a virtualization machine to support numerous VMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are connecting a laptop to a brand new digital high definition TV. Unfortunately, the laptop is a little outdated and only has an analog display output. Which of the following adapters could you use to convert the signal from analog to digital for use with the new television?

A. DVD-D to HDMI
B. VGA to DVI-D
C. HDMI to VGA
D. S-Video to RCA

A

B.

Since this question asks you to select the converter that can convert a signal from analog to digital, you need to consider which of the connectors are analog and which are digital. S-Video, RCA, and VGA are all analog. HDMI and DVI-D are both digital. Therefore, the correct answer is VGA (analog) to DVI-D (Digital).

17
Q

Which of the following types of connectors are used to terminate a serial cable for an external modem?

A. RG-6
B. RJ-11
C. RJ-45
D. DB-9

A

D.

DB-9 connectors are designed to work with the EIA/TIA 232 serial interface standard, which determined the function of all nine pins as a standard so that multiple companies could design them into their products. DB-9 connectors were commonly used for serial peripheral devices like keyboards, mice, joysticks, and data connectivity. Today, the DB9 has mostly been replaced by more modern interfaces such as USB, PS/2, Firewire, etc. However, there are still many legacy devices that use the DB-9 interface for serial communication.

18
Q

Your company has recently migrated much of your data center to the cloud. Now, your boss needs a method to monitor all services used in supporting your customers to be properly billed based on their usage. Which of the following cloud computing concepts is your boss describing?

A. Rapid elasticity
B. Resource pooling
C. On-demand
D. Measured services

A

D

Measured service is a term that IT professionals apply to cloud computing that references services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning.

19
Q

You are building a virtualization environment to host several secured Linux distributions as VMs. The VMs need to have access to the local corporate network and communicate with the host operating system, the other VMs, and the internal network clients. Still, they should not have access to the internet. Which of the following types of network connections should you configure for each VM?

A. External
B. Internal
C. Private
D. Localhost

A

B.

If you select internal, each VM can communicate between the host and the other VMs. If you select external, the VMs would have internet access. The private network connection type will create a switch that is usable only by the VMs. The VMs cannot use the switch to communicate with the host. If you select localhost, each VM could only communicate with itself.

20
Q

When using a Type 1 hypervisor virtualized environment, which of the following hardware types is necessary to connect the VMs to the corporate network?

A. VNC
B. Virtual NIC
C. VDI
D. VPN

A

B.

A virtual machine includes a virtual NIC. A virtual NIC is a type of virtual adapter that can be configured on logical partitions to provide a network interface. This virtual NIC can be paired and mapped to a physical NIC to get the VM onto the network.

21
Q

As a PC Technician, you are on the road most of the day and use a laptop. When you get back to your office at the end of the day, you want to be able to quickly connect a larger external monitor, keyboard, and mouse to your laptop through a single USB port to perform additional work on the larger screen. Which type of device should you choose to provide all the functionality above?

A. Port replicator
B. Docking station
C. Thunderbolt
D. USB 4-port hub

A

A.

A port replicator is a device used to connect multiple peripherals to a laptop quickly. The monitor, printer, network, keyboard, and mouse are permanently plugged into the port replicator, connecting to the laptop via the USB port. A docking station provides additional capability to a laptop and further expansion of its capabilities. For example, a docking station can provide power, external monitor connections, additional storage, and even CD/DVD drives in them. A USB 4-port hub will only provide USB expansion (which doesn’t support a monitor by default) and is therefore not a possible right answer to this question.

22
Q

Which cloud computing concept is BEST described as focusing on replacing the hardware and software required when creating and testing new applications and programs from a customer’s environment with cloud-based resources?

A. Paas
B. Saas
C. Iaas
D. SECaaS

A

A.

Platform as a Service (PaaS) provides the end-user with a development environment without all the hassle of configuring and installing it themselves. If you want to develop a customized or specialized program, PaaS helps reduce the development time and overall costs by providing a ready to use platform.

23
Q

You are setting up a new wireless network at the local brand of your community’s public library. Previously, the library only had a small wired network that relied on statically assigned IP addresses. You just finished installing all of the wireless access points. You configured a server to automatically provide an IP address to wireless clients when connecting to one of the wireless access points. To test the new wireless network, you turn on your wireless adapter on your laptop and connect to the network. Your laptop is automatically assigned an IP address of 192.168.1.12 from the DHCP server, and you can ping the default gateway of 192.168.1.1. You open a web browser and attempt to connect to diontraining.com, but you cannot connect and instead receive an error. You attempt to ping the IP address for the Google DNS server (8.8.8.8) and are successful. Which of the following should you attempt to do NEXT to resolve this issue?

A. Disable the Broadcast SSID option for the wireless access point
B. Enable DHCP inside of your laptop’s network adapter settings
C. Verify that the DHCP server is properly configured to provide the IP address of a DNS server
D. Disable the Windows Firewall to ensure it isn’t blocking your access to the website

A

C.

Since you are already connected to the wireless network and can ping the gateway using its IP address, you already know the SSID and DHCP are properly configured (therefore, you should not select these options). It is a poor security practice to disable the firewall, so it is not recommended that you choose this option. Since we cannot access a website using its domain name (diontraining.com), we can successfully ping a remote server using its IP address (8.8.8.8). This indicates that your laptop has not been properly assigned a DNS server to use by the DHCP server. Therefore, you need to verify the DHCP server is properly configured to provide the IP address of a DNS server to the clients when it assigned them their IP address configuration information.

24
Q

You are troubleshooting a storage issue on a customer’s computer. During the computer’s operation, you hear a loud, rhythmic sound. Which of the following storage components is likely failing?

A M.2. PCIe
B. SSD
C. RAM
D. HDD

A

D.

A hard disk drive (HDD) is a mechanical storage device that relies on a storage platter and a read arm. When a hard drive begins to fail, the drive will begin to make a loud clicking noise. This noise is usually rhythmic since the failed spot makes the noise every time the drive rotates during the read/write process. The other options (M.2 PCIe, SSD, and RAM) have no moving parts; therefore, no rhythmic noise would be created during their failure.

25
Q

Your friend just gave you his old laptop. Whenever you turn on the laptop, though, a black screen appears and asks you to enter an administrative password before the computer attempts to boot up. Unfortunately, your friend never gave you the password for this laptop. Which of the following actions should you take to resolve this issue and get past this password screen?

A. Remove the laptop’s battery, wait a few minutes, reinsert the battery, and then power on the laptop
B. Disconnect the hard drive from the motherboard for a few minutes, reconnect it, and then power on the laptop
C. Remove the CMOS battery, wait a few minutes, reinsert the battery, then power on the laptop
D. Press and hold the power button down for a few minutes, then attempt to power on the laptop

A

C.

This black screen asking for the administrative password appears to be a BIOS password required to be entered before the laptop being allowed to boot from the hard disk. Your best option is to clear the CMOS forcibly to remove the BIOS password from a workstation or laptop. To clear the CMOS, you must remove the CMOS battery from your computer, wait a few minutes, reinsert the CMOS battery, and then attempt to power on the computer again. This will cause the information stored in the CMOS (for example, BIOS settings and passwords) to be erased and restored to its default configuration.

26
Q

Tom is running some new CAT 5e cabling in an office building to connect a few offices. The ceiling is constructed as a drop’ ceiling with fluorescent lights and does not have any cable trays. Due to the proximity of the fluorescent lights to the cable being run, what type of CAT 5e cable should be run?

A. UTP
B. Coaxial
C. STP
D. Fiber

A

C

STP (Shielded Twisted Pair) is a type of cabling that can help prevent electrical interferences or cross talk. A cross-talk is when electrical interference data passing through can cause CRC (Cyclic Redundancy Check) errors. A CRC is used to calculate the before and after checksum is made when transferring data. If electrical interference gets in the way, such as proximity to fluorescent light bulbs, it can cause data to be corrupted and produce an error. UTP (Unshielded Twisted Pair) is cheaper and easier to work with but is subject to interference. Coaxial and fiber are not types of CAT 5e cabling.

27
Q

On Tuesday evening, the company just pushed a new Windows 10 security update to all of its workstations. On Wednesday morning, the help desk receives numerous complaints about the network being slower than normal. Previously, the network was baselined at 1 Gbps as each workstation uses a wired CAT 6 connection. Today, a technician ran a speed test and saw the network was only reaching speeds of 100 Mbps. Which of the following is the MOST likely cause of the network slowdown?

A. The network card drivers were updated last night
B. The network was reconfigured from DHCP to static
C. The incorrect DNS server configuration is being used
D. The incorrect DHCP server configuration is being used

A

A.

Often, security updates, patches and/or upgrades will reconfigure a network card’s drivers during a Windows security update. If this happens, the system may revert to a more generic version of the driver, decreasing speeds from 1 Gbps to 100 Mbps. The network card’s drivers should be rolled back to the previous driver to restore functionality and correct it.

28
Q

A client is attempting to power on their computer, but it keeps booting to the incorrect hard drive. Which of the following actions should you perform to attempt to fix this problem?

A. Unplug any external hard disks
B. Reconfigure the boot order within Windows
C. Reconfigure the boot order within the BIOS/UEFI
D. Press F8 repeatedly during the boot process to enter the boot menu

A

C.

If the system still fails to boot up from the correct drive, then go into the BIOS/UEFI setup program and check the existing boot order settings. If they are in the wrong order, reconfigure them to ensure the usual boot device is listed first in the list and then restart the computer.

29
Q

A user called the help desk to complain about an issue with their laptop’s keyboard. Every time they type a word like “help” or “none,” it is displaying as something cryptic like “he3p” or “n6ne”. Which of the following is the MOST likely cause of this issue with the laptop keyboard?

A. The keyboard is faulty and needs to be replaced
B. The keyboard has some crumbs or debris that has fallen under the keys
C. The NumLock has been enabled for the laptop
D. The keyboard driver needs to be updated

A

C.

Most keyboards have a numeric side (numbers only) and an alphanumeric side (numbers and letters and symbols). However, to minimize space usage, companies create some keyboards with the alphanumeric side only. This is quite common in laptops that insist on minimizing space for the sake of portability, as seen on mini-laptops and notebooks. Usually, the alphanumeric side is split into function keys (F1 to F12), followed by numeric keys (0-9) and then alphabetic keys (A-Z). To fix this, the fastest way to do this is to turn off NumLock using your laptop keyboard. If you hit the NumLock key, it will turn off. A light beside the key or on the laptop’s top will go off to confirm that the NumLock is disabled.

30
Q

You are setting up a projector and a laptop for a big presentation in the conference room. You start up the presentation software and mirror the laptop’s display to the projector. The image on the screen from the projector is flickering intermittently, but the image on the laptop’s display is working with no issues. You attempt to change the laptop’s resolution to a lower setting and a higher setting, but still, the projector’s flickering persists. Which of the following steps should you attempt NEXT?

A. Change the aspect ratio from 16:9 to 4:3 on the laptop
B. Ensure the project’s power cable is connected securely
C. Ensure the display cable is securely connected to both the laptop and the projector
D. Change the color depth setting on the projector

A

C

A flickering image on a projector is a common issue that can occur if the display cable between the laptop and the projector is not connected securely. This is especially common with older style display cables like VGA and DVI. Therefore, it is important to ensure a VGA cable is properly secured using the cable’s thumbscrews.

31
Q

You are troubleshooting a Windows 10 workstation for a customer. You have identified the problem and performed a quick backup of the system. What is the NEXT step in the troubleshooting methodology?

A. Establish a theory of probable cause
B. Document findings, actions, and outcomes
C. Test the theory to determine cause
D. Establish a plan of action to resolve the problem and implement the solution

A

A.

CompTIA uses a six-step troubleshooting methodology to resolve problems. (1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.

32
Q

You have just finished building a Windows server, installing its operating system, updating its security patches, formatting a dedicated data partition, and creating accounts for all of the company’s employees. What is the next thing that must be configured to provide users with the ability to access large multifunction devices across the network?

A. Print Server
B. RAID storage
C. File sharing
D. Audit logging

A

A.

Most of the options provided are reasonable next steps, but the question specifically states that you want to allow the users to access multifunction devices on the networks. This indicates that the users will need access to a print server since printers are multifunction devices.