Udemy 1 Flashcards

1
Q

Question 1:
Which of the following ports is used by SNMP by default?
139
53
25
161

A

1395325Correct answer161Overall explanationOBJ-2.1: The simple network management protocol (SNMP) is a protocol for monitoring and managing network devices over UDP ports 161 and 162. A management system collates data sent by agents running on each device. The agents maintain a Management Information Base of configuration and usage data. An agent can also generate a trap, alerting the management system of some notable event. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53. The network basic input/output system (NetBIOS)/NetBIOS over TCP/IP (NetBT) is a session management protocol used to provide name registration and resolution services on legacy Microsoft networks and those using WINS. NetBIOS/NetBT operates on TCP/UDP ports 137 and 139.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question 2:
You are trying to select the best device to install to proactively stop outside attackers from reaching your internal network. Which of the following devices would be the BEST for you to select?
Proxy server
Syslog server
IDS
IPS

A

Proxy serverSyslog serverIDSCorrect answerIPSOverall explanationOBJ-2.4: An intrusion prevention system (IPS) is a form of network security that detects and prevents identified threats. Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents, and capturing information about them. An IPS can block malicious network traffic, unlike an IDS, which can only log them. A proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. System Logging Protocol (Syslog) uses port 514 and is a way network devices can use a standard message format to communicate with a logging server. It was designed specifically to make it easy to monitor network devices. Devices can use a Syslog agent to send out notification messages under a wide range of specific conditions.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question 3:
Tom is running some new Cat 5e cabling in an office building to connect a few offices. The ceiling is constructed as a drop ceiling with fluorescent lights and does not have any cable trays. Due to the proximity of the fluorescent lights to the cable being run, what type of CAT 5e cable should be run?
STP
Fiber
UTP
Coaxial

A

Correct answerSTPFiberUTPCoaxialOverall explanationOBJ-5.7: STP (Shielded Twisted Pair) is a type of cabling that can help prevent electrical interferences or cross-talk. A cross-talk is when electrical interference data passing through can cause CRC (Cyclic Redundancy Check) errors. A CRC is used to calculate the before and after checksum is made when transferring data. If electrical interference gets in the way, such as proximity to fluorescent light bulbs, it can cause data to be corrupted and produce an error. UTP (Unshielded Twisted Pair) is cheaper and easier to work with but is subject to interference. Coaxial and fiber are not types of CAT 5e cabling. Coaxial and fiber are not Cat 5E cable types and cannot be used for this network.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question 4:
Which of the following ports should you unblock at the firewall if your workstation cannot access http://www.diontraining.com but can access https://www.diontraining.com?
445
443
53
80

A

44544353Correct answer80Overall explanationOBJ-2.1: HyperText Transfer Protocol (HTTP) is the basis for the World Wide Web. HTTP enables clients (typically web browsers) to request resources from an HTTP server. A client connects to the HTTP server using its TCP port (the default is port 80) and submits a resource request using a Uniform Resource Locator (URL). HTTPS (HTTP Secure) uses port 443. In this question, it states that the user can access HTTPS but not HTTP, indicating that port 80 is blocked. The server message block (SMB)/common internet file system (CIFS) is a protocol used for requesting files from Windows servers and delivering them to clients. SMB allows machines to share files and printers, thereby making them available for other machines to use. Samba software allows UNIX and Linux servers or NAS appliances to run SMB services for Windows clients. SMB operates on port 445. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question 5:
Which of the following devices have most of the same functionality as a personal computer but can be operated with a single hand?
Smartwatch
Tablet
Smartphone
Laptop

A

SmartwatchTabletCorrect answerSmartphoneLaptopOverall explanationOBJ-1.4: A smartphone is a device with roughly the same functionality as a personal computer operated with a single hand. Most smartphones have a screen size between 4.5” and 5.7”. Leading smartphones provide high-resolution screens. Smartphones have fast multicore CPUs, anywhere between 2 and 6 GB system memory, and 16 GB+ flash memory storage. They come with premium front and back digital cameras, input sensors like accelerometers, and Global Positioning System (GPS) chips. They can establish network links using Wi-Fi and a cellular data plan. A high-end smartwatch (for example, an Apple Watch) will allow the user to see their notifications, chat activity, and even make phone calls. A mid-range or low-end smartwatch can still have the ability to read your chat and notifications, but you may be unable to make phone calls from it. A smartwatch is not a replacement for a laptop or desktop, but a high-end smartphone can be.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question 6:
Both Apple and Samsung have released their own version of contactless mobile payment solutions. For example, Apple Pay allows users to place their iPhone or Apple Watch within an inch of a credit card machine at a store to make a payment. Which of the following wireless technologies do these types of payment systems rely upon?
Bluetooth
Wi-Fi
Infrared
NFC

A

BluetoothWi-FiInfraredCorrect answerNFCOverall explanationOBJ-1.3: NFC, or near-field communication, is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Infrared (IR) was a wireless networking standard supporting speeds up to about 4 Mbps with a direct line of sight for communications. Infrared sensors are used in mobile devices and with IR blasters to control appliances. While infrared (IR) used to be commonly used to connect wireless mice and keyboards to a laptop in the 1990s, it has fallen out of favor in the last 10-15 years since Bluetooth is more reliable and does not require a direct line of sight between the device and the laptop. Wi-Fi is the IEEE 802.11 standard for wireless networking based on spread spectrum radio transmission in the 2.4 GHz and 5 GHz bands. The standard has six main iterations (a, b, g, n, ac, and ax), describing different modulation techniques, supported distances, and data rates.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question 7:
Jason has just returned to his office after vacation and is attempting to access diontraining.com. He receives an error that he cannot connect to the website. He then tries to connect to the company’s local intranet server, which he can connect to without any issues. Next, he pings the IP address for diontraining.com and gets a successful connection. Finally, he tries to ping diontraining.com by its domain name, and then he receives an error. Which of the following commands should Jason enter NEXT to try and resolve this issue
ipconfig /all
ipconfig /release
ipconfig /renew
ipconfig /flushdns

A

ipconfig /allipconfig /releaseipconfig /renewCorrect answeripconfig /flushdnsOverall explanationOBJ-5.7: Whenever you have an issue where you can ping the server’s IP, but you cannot access it by its domain name, it has something to do with DNS. Being able to troubleshoot issues with internet connections is an important part of being an IT technician or administrator. The ipconfig /flushdns command provides you with a means to flush and reset the contents of the DNS client resolver cache. During DNS troubleshooting, if necessary, you can use this procedure to discard negative cache entries from the cache, as well as, any other dynamically added entries. Resetting the cache does not eliminate entries that are preloaded from the local Hosts file. To eliminate those entries from the cache, remove them from the hosts.ini file instead.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question 8:
Which of the following cloud services should an organization choose in order to deliver virtual desktops to end-users over the Internet on a per-user license basis?
SaaS
DaaS
PaaS
IaaS

A

SaaSCorrect answerDaaSPaaSIaaSOverall explanationOBJ-4.1: Desktop as a Service (DaaS) is a cloud computing offering where a service provider delivers virtual desktops to end-users over the Internet, licensed with a per-user subscription. DaaS is often combined with Virtual Desktop Infrastructure. Platform as a Service (PaaS) is a complete development and deployment environment in the cloud, with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications. Infrastructure as a Service (IaaS) is a type of cloud computing service that offers essential compute, storage, and networking resources on-demand, on a pay-as-you-go basis. Software as a Service (SaaS) allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools (such as Microsoft Office 365). SaaS provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question 9:
A computer technician is building a server that will run multiple virtual machines simultaneously. Which CPU technology should be selected so that the processor can utilize two logical cores?
32-bit CPU
Hyperthreading
Dedicated GPU
Multi-core processor

A

32-bit CPUCorrect answerHyperthreadingDedicated GPUMulti-core processorOverall explanationOBJ-3.4: HyperThreading (HT) is an Intel CPU architecture implemented to expose two or more logical processors to the OS to deliver performance benefits. This allows the system to run multiple cores for each operating system in a virtualized environment. Since the question asked about logical cores and not physical cores, the answer is hyperthreading and not a multi-core processor. A 32-bit CPU is a hardware item and used by low-end notebooks or thin clients. A dedicated GPU is a graphics card and would not help with running multiple virtual machines.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question 10:
Which of the following is a security concern with using a cloud service provider and could result in a data breach caused by data remnants?
Resource Pooling
Metered services
Rapid elasticity
On-Demand

A

Resource PoolingMetered servicesCorrect answerRapid elasticityOn-DemandOverall explanationOBJ-4.1: Rapid elasticity can be a security threat to your organization’s data due to data remanences. Data remanence is the residual representation of digital data that remains even after attempts have been made to remove or erase it. So, when a cloud resource is deprovisioned and returned to the cloud service provider, it can be issued to another organization for use. If the data was not properly erased from the underlying storage, it could be exposed to the other organization. For this reason, all cloud-based storage drives should be encrypted by default to prevent data remanence from being read by others. Metered services are pre-paid, a-la-carte, pay-per-use, or committed offerings. A metered service like a database may charge its users based on the actual usage of the service resources on an hourly or monthly basis. For example, Dion Training used the AWS Lambda serverless product in some of our automation. This service charges us $0.20 for every 1 million requests processed. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. On-demand refers to the fact that a consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question 11:
Molly enjoys playing an online MMORPG each day after work. To access the game, she simply enters the website address and logs in to begin playing. Today, she tried to access the game from her laptop at work, but she couldn’t launch the game. What is most likely causing the issue?
Incorrect NIC settings
Blocklisted by firewall
Metered services
Poor WiFi connection

A

Incorrect NIC settingsCorrect answerBlocklisted by firewallMetered servicesPoor WiFi connectionOverall explanationOBJ-4.1: The company firewall may be blocking any gaming-related websites and applications to improve security. Adding the website or a category of websites to the firewall’s blocklist would prevent all corporate users from accessing the content. When using cloud-based resources, it is important that all of the right ports and protocols are allowed through the firewall.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question 12:
On Tuesday evening, the company just pushed a new Windows 10 security update to all of its workstations. On Wednesday morning, the help desk receives numerous complaints about the network being slower than normal. Previously, the network was baselined at 1 Gbps as each workstation uses a wired CAT 6 connection. Today, a technician ran a speed test and saw the network was only reaching speeds of 100 Mbps. Which of the following is the MOST likely cause of the network slowdown?
The network was reconfigured from DHCP to static
The incorrect DHCP server configuration is being used
The network card drivers were updated last night
The incorrect DNS server configuration is being used

A

The network was reconfigured from DHCP to staticThe incorrect DHCP server configuration is being usedCorrect answerThe network card drivers were updated last nightThe incorrect DNS server configuration is being usedOverall explanationOBJ-5.7: Often, security updates, patches, and upgrades will reconfigure a network card’s drivers during a Windows security update. If this happens, the system may revert to a more generic version of the driver, decreasing speeds from 1 Gbps to 100 Mbps. The network card’s drivers should be rolled back to the previous driver to restore functionality and correct it. If there were configuration changes to the DNS or DHCP server, it would limit connectivity completely instead of simply slowing down the connection. If the network changed from DHCP to static assignments, the workstations would not get an APIPA address and would not have connected to the network at a slower speed.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question 13:
Which of the following ports is used by the Service Location Protocol when organizing and locating printers, databases, and other resources in a network?
427
389
443
445

A

Correct answer427389443445Overall explanationOBJ-2.1: The Service Location Protocol (SLP) is a protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network. This is an alternative protocol to LDAP in newer networks. SLP uses port 427. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443. The lightweight directory access protocol (LDAP) is a protocol used to access and update information in an X.500-style network resource directory. LDAP uses port 389. The server message block (SMB)/common internet file system (CIFS) is a protocol used for requesting files from Windows servers and delivering them to clients. SMB allows machines to share files and printers, thereby making them available for other machines to use. Samba software allows UNIX and Linux servers or NAS appliances to run SMB services for Windows clients. SMB operates on port 445.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question 14:
Which of the following types of connectors are used to terminate a CAT 5e network cable?
RJ-45
F type
Molex
RJ-11

A

Correct answerRJ-45F typeMolexRJ-11Overall explanationOBJ-3.1: RJ-45 refers to a cable termination specification that specifies physical male and female connectors and the pin assignments of data jacks that can be used for networks and VOIP telephone cables. RJ-45 is an 8-pin/8-position plug or jack commonly used to connect computers onto Ethernet-based local area networks (LAN) and consists of two wiring schemes: T568A and T568B. An RJ-11 connector is used to terminate cables used for phone lines. A Molex connector is used to provide power to internal components of a computer from the power supply.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question 15:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name on top of the appropriate cable’s connector.)
Using the image above, which of the following correctly identifies the fiber optic connector shown as Connector C?
LC
F
ST
SC

A

Correct answerLCFSTSCOverall explanationOBJ-3.1: This is an LC connector. A ST, SC, LC, or MTRJ connector is used to terminate a fiber optic cable. An LC, or Lucent connector, is a small form factor connector that combines the transmit and receive cables into a single square, snap-in connector. The F-type connector is used with coaxial cables, not fiber optic cables. An SC, or subscriber connector, is a general-purpose push/pull style connector that has a square, snap-in connector that latches with a simple push-pull motion. SC connectors are widely used in single-mode fiber optic systems. An ST, or straight tip, connector is a quick-release bayonet-style connector that has a long cylindrical connector.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question 16:
Which of the following is used to capture the logs from different devices across the network to correlate different events across multiple servers and clients?
Proxy server
Syslog server
DNS server
DHCP server

A

Proxy serverCorrect answerSyslog serverDNS serverDHCP serverOverall explanationOBJ-2.4: A Syslog server is used to capture logs from different devices. It allows for the correlation of logs to simplify log review and an analyst’s ability to respond to alerts. For example, Syslog messages can be generated by Cisco routers and switches, servers and workstations, and collected in a central database for viewing and analysis. A proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. The Domain Name System (DNS) uses port 53 and is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. The Dynamic Host Configuration Protocol (DHCP) uses port 67 and is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client-server architecture.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Question 17:
Which of the following statements about the 5.0 GHz wireless frequency used by Wi-Fi is correct?
The 5.0 GHz frequency has a shorter wavelength that allows the signal to travel further than 2.4 GHz using the same power levels
The 5.0 GHz frequency is less effective at penetrating solid surfaces than 2.4 GHz
The 5.0 GHz frequency has fewer channels available than 2.4 GHz
The 5.0 GHz frequency supports lower data rates than 2.4 GHz

A

The 5.0 GHz frequency has a shorter wavelength that allows the signal to travel further than 2.4 GHz using the same power levelsCorrect answerThe 5.0 GHz frequency is less effective at penetrating solid surfaces than 2.4 GHzThe 5.0 GHz frequency has fewer channels available than 2.4 GHzThe 5.0 GHz frequency supports lower data rates than 2.4 GHzOverall explanationOBJ-2.3: The longer wavelength of 2.4 GHz makes it better at propagating through solid surfaces than the 5.0 GHz frequency. The 2.4 GHz frequency has a longer wavelength than the 5.0 GHz frequency. The longer wavelength gives it the ability to cover a longer range using the same power output levels as the 5.0 GHz frequency. The 5.0 GHz frequency supports higher data rates than the 2.4 GHz frequency due to lower levels of congestion and interference. The 5.0 GHz frequency has more individual channels giving it less congestion and interference than the 2.4 GHz frequency.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Question 18:
You are building a virtualization environment to host several secured Linux distributions as VMs. The VMs need to have access to the local corporate network and communicate with the host operating system, the other VMs, and the internal network clients. Still, they should not have access to the internet. Which of the following types of network connections should you configure for each VM?
Localhost
External
Internal
Private

A

LocalhostExternalCorrect answerInternalPrivateOverall explanationOBJ-4.2: If you select internal, each VM can communicate between the host and the other VMs. If you select external, the VMs would have internet access. The private network connection type will create a switch that is usable only by the VMs. The VMs cannot use the switch to communicate with the host. If you select localhost, each VM could only communicate with itself.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Question 19:
Which of the following is a connection-oriented protocol that utilizes TCP?
SNMP
TFTP
HTTPS
DHCP

A

SNMPTFTPCorrect answerHTTPSDHCPOverall explanationOBJ-2.1: The transmission control protocol (TCP) is a protocol in the TCP/IP suite that operates at the transport layer to provide connection-oriented, guaranteed delivery of packets. Hosts must first establish a session to exchange data and then confirm the delivery of packets using acknowledgments when using TCP. TCP is relatively slow in comparison to UDP. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over TCP port 443. The simple network management protocol (SNMP) is a protocol for monitoring and managing network devices over UDP ports 161 and 162. A management system collates data sent by agents running on each device. The agents maintain a Management Information Base of configuration and usage data. An agent can also generate a trap, alerting the management system of some notable event (such as a printer that is out of paper). The trivial file transfer protocol (TFTP) is a protocol used to get a file from a remote host or put a file onto a remote host. TFTP is commonly used with embedded devices or systems that retrieve firmware, configuration information, or a system image during the boot process. TFTP operates over UDP port 69. The dynamic host control protocol (DHCP) is a protocol used to allocate IP addresses to a host when it joins a network. DHCP utilizes UDP ports 67 and 68.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Question 20:
You are attempting to troubleshoot a computer for a user. When you attempt to turn on the computer by pressing the power button, the computer turns on, and the fan spins normally. There is no output displayed on the screen from the PCIe x16 video card. You turn off the computer, remove the processor and the memory, and attempt to power on the computer again. During the boot-up sequence, you do not hear any POST beep codes, but the fans still spin normally. Which of the following is the MOST likely cause of his issue?
The power supply’s voltage switch is set to 240V but the power outlet is providing 110V
The motherboard has failed and needs to be replaced
The power supply wattage is too low for the components in the computer
The CMOS battery needs to be replaced

A

The power supply’s voltage switch is set to 240V but the power outlet is providing 110VThe motherboard has failed and needs to be replacedCorrect answerThe power supply wattage is too low for the components in the computerThe CMOS battery needs to be replacedOverall explanationOBJ-5.2: If your computer won’t boot, but fans spin continuously, it indicates a problem with the power supply, the motherboard, or overheating could be occurring. When the power supply to your computer fails, it won’t start or power up, but the fans spin (as described in this question). One of the reasons your computer won’t boot but the fans spin could be a bad processor or memory chip. To isolate this as a reason, you should remove the processor and memory and then attempt to boot up the computer and listen for a POST beep code. In this case, we could eliminate the motherboard, processor, and memory as the issue’s source since no POST beep codes were heard. Based on the symptoms and actions performed, it appears that the power supply is not providing enough wattage to all the components of the computer, which is why the fans are spinning (they use low wattage) while the rest of the system fails to boot.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Question 21:
You and your friends are hanging out in a bar downtown and notice that the entire area around the bar has a great wireless network called “Downtown Metro.” This wireless network was built by the city and currently covers about 5 square blocks of the downtown area. What type of network best classifies this wireless network?
MAN
LAN
WAN
PAN

A

Correct answerMANLANWANPANOverall explanationOBJ-2.7: A metropolitan area network (MAN) is a computer network that interconnects users with computer resources in a geographic region of the size of a metropolitan or city area. This usually works by providing municipal broadband via Wi-Fi to large parts or all of a municipal area by deploying a wireless mesh network. A wireless mesh network (WMN) is a wireless network topology where all nodes, including client stations, can provide forwarding and path discovery to improve coverage and throughput compared to using just fixed access points and extenders. The typical deployment design uses hundreds of wireless access points deployed outdoors, often on poles. A local area network (LAN) is a network where all the nodes or hosts participating in the network are directly connected with cables or short-range wireless media. A personal area network (PAN) is a close-range network that is usually based on Bluetooth or NFC for communications between personal devices, such as smartphones, laptops, printers, and other peripheral devices. A wide area network (WAN) is a network that spans multiple geographic locations such as the internet. Wide area networks are often established with leased telecommunication circuits.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Question 22:
You work as a computer technician for a production company that travels worldwide while filming and editing music videos. Due to the nature of video editing, you will be building a video production workstation for the company that will have the maximum amount of RAM, an 8-core CPU, a dedicated GPU, and a redundant array of solid-state devices for storage. You are now determining which power supply to install in the system. What is the MOST important characteristic to consider when choosing a power supply?
Amperage of 12V rail
Number of SATA connectors
Efficiency rating
Input voltage

A

Amperage of 12V railNumber of SATA connectorsEfficiency ratingCorrect answerInput voltageOverall explanationOBJ-3.5: This question provides you with many details, but the key phrase in finding the answer is in the first sentence. This computer will be traveling worldwide, and the most important consideration will be the input voltage. If you choose a 120-volt power supply, it would be destroyed if plugged into a 240-volt outlet (commonly used outside the United States). Conversely, if you use a 240-volt power supply and plug it into a 120-volt outlet, it will not function due to the lower voltage. Therefore, you need to pick a power supply with dual voltage selection capability for maximum compatibility worldwide.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Question 23:
Jason’s laptop display appears to be extremely dim. He set the brightness to the highest level and attempted to adjust the control, but the image still appears extremely dim. Jason notices that if he points his smartphone’s flashlight at the screen, then he can see the image better. Which of the following components on the laptop should he replace to fix this issue?
LCD panel
Graphics card
Digitizer
Inverter

A

LCD panelGraphics cardDigitizerCorrect answerInverterOverall explanationOBJ-5.4: The inverter (also known as inverter board, screen inverter, or LCD inverter) is a part of the laptop’s display assembly. The inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight. The digitizer is a touch-sensitive glass panel covering the LCD in a touchscreen assembly. The digitizer is used to convert touch events to digital signals that can be interpreted as different types of input. A liquid crystal display (LCD) panel is a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. The LCD panel is backlight by a cold cathode fluorescent (CCFL) bulb. A graphics processing unit (GPU) is a microprocessor used on dedicated video adapter cards or within a CPU with integrated graphics capability to handle the mathematical calculations required to create immersive and 3D graphics.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Question 24:
Dion Consulting Group is working with a new laptop manufacturer. The manufacturer wants to create the thinnest and lightest laptops in the world. To do this, they need to choose the right technology for their displays. Which technology should Dion Consulting recommend to allow for the thinnest laptop displays?
LCD
IPS
LED
OLED

A

LCDIPSLEDCorrect answerOLEDOverall explanationOBJ-1.2: An OLED display works without a backlight because it emits visible light. Thus, it can display deep black levels and be thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions (such as a darker room), an OLED screen can achieve a higher contrast ratio than an LCD, regardless of whether the LCD uses cold cathode fluorescent lamps or an LED backlight. An in-plane switching (IPS) LCD panel uses technology designed to resolve the quality issues inherent in TN panel technology, including strong viewing angle dependence and low-quality color reproduction. A liquid crystal display (LCD) panel is a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. The LCD panel is backlight by a cold cathode fluorescent (CCFL) bulb. LCD panels are used on laptops and have replaced CRT monitors as the main type of computer display screen for desktops, as well. A light-emitting diode (LED) display is an LCD panel that uses a LED backlight instead of a CCFL backlight to provide its light source.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Question 25:
A customer recently purchased a touchscreen laptop to use for her schoolwork. It has been working well for about 3 weeks, but today she has brought it into your store for repair because it is not working properly. When she touches an icon on the screen, the program fails to load. You look over the laptop, and the screen appears to be fully intact with no dark blobs or spider web cracks in the panel. You attempt to operate the laptop using the touchscreen, but it appears non-responsive to your touch. You can, however, click on the icons using the laptop’s touchpad without any issues. Which of the following components MOST likely needs to be replaced?
LCD panel
GPU
Inverter
Digitizer

A

LCD panelGPUInverterCorrect answerDigitizerOverall explanationOBJ-1.2: The digitizer is a touch-sensitive glass panel covering the LCD in a touchscreen assembly. The digitizer is used to convert touch events to digital signals that can be interpreted as different types of input. The digitizer can be touched and inspected without taking apart the device. A liquid crystal display (LCD) panel is a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. The LCD panel is backlight by a cold cathode fluorescent (CCFL) bulb. LCD panels are used on laptops and have replaced CRT monitors as the main type of computer display screen for desktops, as well. The LCD screen is the panel that is inside the device, which displays the image. You cannot get to the LCD without taking the device apart first. When only the touch screen is broken, you should still see what is happening on the screen, and the screen should still function as normal. When only the LCD is broken, you can still use the touchscreen, but the panel will have dark blobs or spider web cracks (or both). When both LCD and touchscreen are damaged, you may still be able to use portions of the touchscreen, and some parts of the LCD may display the image, but you will incur obvious difficulties in using the device as normal. The inverter (also known as inverter board, screen inverter, or LCD inverter) is a part of the laptop’s display assembly. The inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight. A graphics processing unit (GPU) is a microprocessor used on dedicated video adapter cards or within a CPU with integrated graphics capability to handle the mathematical calculations required to create immersive and 3D graphics.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Question 26:
Susan, a computer technician, received a complaint from a client about an issue with their laptop. Based on the symptoms observed, she believes that there is an issue with the laptop’s memory. Which of the following symptoms was MOST likely observed during their troubleshooting?
Continuous reboots
POST code beeps
Incorrect time in the BIOS
Distended capacitor

A

Correct answerContinuous rebootsPOST code beepsIncorrect time in the BIOSDistended capacitorOverall explanationOBJ-5.2: A bad or faulty RAM module can cause system reboots, diminished system performance, and slow loading of websites and programs. This gradual deterioration of performance, especially with memory-intensive programs, may indicate a problem with the laptop’s system memory. The system memory should be tested and replaced (if needed) to allow the laptop to begin working efficiently.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Question 27:
Which of the following virtualization concepts refers to a VM’s ability to have memory allocated for its use?
Resource pooling
Synchronization
Virtual application streaming
Measured service

A

Correct answerResource poolingSynchronizationVirtual application streamingMeasured serviceOverall explanationOBJ-4.1: Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. Measured service is a term that IT professionals apply to cloud computing that references services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning. Using a synchronization app can allow the files to be stored on both the laptop and the cloud service while maintaining the latest versions in both places. This allows a user to synchronize content between all of their own devices and share their cloud storage content with other users. Multiple users can simultaneously access the content to work collaboratively, or they can access it at different times. Each user’s changes are typically marked with a flag or color highlighting to indicate who made changes to what content. Virtual application streaming allows an application to be delivered to a workstation from the cloud.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Question 28:
Dion Security Group has established a Security Operations Center (SOC) that operates 24/7. They have several 65” plasma TVs at the front of the room that are used as computer displays to show open tickets. You turned off the televisions to clean the screens and noticed that the company logo is still visible in each of the screens’ upper left corners. Which of the following should you do to correct this?
Replace the plasma TVs
Replace the video card
Replace the HDMI cable
Degauss the television

A

Correct answerReplace the plasma TVsReplace the video cardReplace the HDMI cableDegauss the televisionOverall explanationOBJ-5.4: The logo in the upper left corner has been burned into the display since it is a static image. This is common with plasma displays and TVs. To fix this, you need to replace the TVs. If you plan to have a lot of static content on a display, you should use an OLED or LED display instead. If burn-in was experienced on old CRT monitors, you could run a degaussing program to erase the burn-in. Unfortunately, this will not work for plasma, LED, or OLED displays, though.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Question 29:
Your laptop currently has a 128 GB SSD installed and currently running out of internal storage space. You want to upgrade the workstation with more internal storage to store additional videos, photos, and backups. Still, you don’t want to sacrifice data access speed for increased storage. Which of the following is the BEST storage solution to store more data while maintaining fast data access speeds?
5 TB NAS
50 TB SAN
1 TB SSD
3 TB HDD

A

5 TB NAS50 TB SANCorrect answer1 TB SSD3 TB HDDOverall explanationOBJ-1.1: Since you need an internal storage solution, you cannot use a NAS or SAN (since these are both network storage solutions). Instead, you have to select from the SSD or the HDD. In this question, we are primarily worried about the storage’s speed being installed and not the storage size. Therefore, we should choose the 1 TB SSD (solid-state drive) over the 3 TB HDD (hard disk drive) due to its faster speeds.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Question 30:
You are installing a new projector in a customer’s home theater room. After connecting the projector and powering it on, you notice some odd debris displayed on the screen. Which of the following should you do to correct this?
Replace the bulb with correct lumens
Adjust incorrect color pattern
Clean artifacts on the protective glass
Degauss the projector

A

Replace the bulb with correct lumensAdjust incorrect color patternCorrect answerClean artifacts on the protective glassDegauss the projectorOverall explanationOBJ-5.4: Based on the situation described, there appears to be some odd debris being displayed on the screen. This sounds like some artifacts or debris on the lens or protective glass of the projector. If this is cleaned, the image should be resolved back to a clear picture. This is the first and cheapest option to attempt. If this doesn’t work, then you may need to replace the bulb since a failing bulb can create artifacts, as well.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Question 31:
Samantha, a consultant, is working onsite at a large corporation’s headquarters this week. She takes out her iPad and attempts to launch an application. She notices that the application will not launch, even though she is connected to the wireless network and has properly established internet connectivity. Which of the following should she do to fix this issue and allow the application to launch properly?
Factory reset the tablet, reload the latest iOS, reinstall the application, then launch the app
Close all open applications, shut down the iPad, power on the iPad, then launch the app again
Ship the iPad back to Apple to replace it under her AppleCare warranty
Charge the battery and then try reloading the application

A

Factory reset the tablet, reload the latest iOS, reinstall the application, then launch the appCorrect answerClose all open applications, shut down the iPad, power on the iPad, then launch the app againShip the iPad back to Apple to replace it under her AppleCare warrantyCharge the battery and then try reloading the applicationOverall explanationOBJ-5.5: Applications often run in the background and do not get properly closed when you finish using them. This can cause them to hang and lock up when a user tries to reopen them. By closing all open applications, shutting down the iPad, then rebooting it and launching the app again will ensure that the application is freshly loaded and overcome many issues. This will ensure that the cache is cleared before attempting to reload the application. While a factory reset and iOS reload would also work, it would take much longer and cause extensive data loss on the device.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Question 32:
What describes an IPv6 address of ::1?
Multicast
Public
Broadcast
Loopback

A

MulticastPublicBroadcastCorrect answerLoopbackOverall explanationOBJ-2.5: In IPv6, ::1 is the loopback address. In IPv4, the loopback address is 127.0.0.1. The loopback address is used to send a test signal sent to a network destination to diagnose problems. A broadcast address is an IP address that is used to target all systems on a specific subnet network instead of single hosts. A multicast address is a logical identifier for a group of hosts in a computer network that are available to process datagrams or frames intended to be multicast for a designated network service. The address shown is not a broadcast or multicast address. A public address is routable over the internet but ::1 is a loopback address and therefore not publicly routable on the internet.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Question 33:
You have been asked to fix an old computer whose CD-ROM has stopped working. The CD-ROM drive is using a 40-pin ribbon cable, and you suspect the cable is defective. Which cable should you buy to replace the cable?
SATA
eSATA
IDE
USB

A

SATAeSATACorrect answerIDEUSBOverall explanationOBJ-3.1: An IDE (Integrated Drive Electronics) cable is an older cable interface that used to be used for the transmission of data between the motherboard and various internal devices like hard drives and CD-ROM drives. An IDE cable is a 40-pin ribbon cable that operated at relatively slow speeds (less than 50 Mbps). IDE cables were also known as PATA (Parallel ATA) cables, as opposed to SATA (Serial ATA) cables. You will rarely come across an IDE cable in use today, but if you are working on a very old computer in an office (legacy machine) then you may find one in use.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Question 34:
Which cellular technology is comprised of HSPA+ and EV-DO to provide higher data speeds than previous cellular data protocols?
5G
LTE
3G
4G

A

5GLTECorrect answer3G4GOverall explanationOBJ-1.4: 3G cellular technology is made up of two different technologies: HSPA+ and EV-DO. HSPA+ (Evolved High-Speed Packet Access) is a 3G standard used for GSM cellular networks and can support up to a theoretical download speed of 168 Mbps and a theoretical upload speed of 34 Mbps. In the real world, though, HSPA+ normally reaches speeds around 20 Mbps. EV-DO (Evolution-Data Optimized) is a 3G standard used for CDMA cellular networks and can support up to 3.1 Mbps downloads. 4G cellular technology is made up of LTE and LTA-A. Long Term Evolution (LTE) is a packet data communications specification providing an upgrade path for both GSM and CDMA2000 cellular networks. LTE has a theoretical speed of 150 Mbps and a real-world speed of around 20 Mbps. LTE Advanced (LTE-A) has a theoretical speed of 300 Mbps and a real-world speed of around 40 Mbps. 5G cellular technology is made up of three different types: low-band, mid-band, and high-band mmWave technology. Low-band 5G reaches an average speed of 55 Mbps with a theoretical speed of 150 Mbps. Mid-band 5G reaches an average speed of 150 Mbps with a theoretical speed of 1.5 Gbps. High-band 5G reaches an average speed of 3 Gbps with a theoretical speed of up to 70 Gbps.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Question 35:
Which of the following is the MOST dangerous type of threat when using virtualization?
Rogue VM
VM escape
Virtual NIC duplication
VM sprawl

A

Rogue VMCorrect answerVM escapeVirtual NIC duplicationVM sprawlOverall explanationOBJ-4.2: VM escape refers to malware running on a guest OS jumping to another guest or the host. As with any other software type, it is vital to keep the hypervisor code up-to-date with patches for critical vulnerabilities. VM escape is the biggest threat to virtualized systems. A virtual network interface card (vNIC) represents the configuration of a VM connected to a network. A VM can be configured to have multiple vNICs. A rogue VM is one that has been installed without authorization. VM sprawl is the uncontrolled deployment of more and more VMs.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Question 36:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard above, which of the following correctly indicates the circled area?
PCI
PCIe x1
AGP
PCIe x4

A

PCICorrect answerPCIe x1AGPPCIe x4Overall explanationOBJ-3.4: The area circled indicates the PCIe x1 slots. PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has some PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. PCIe x1 slots are usually used for external input/output devices such as network interface cards. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Question 37:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name on top of the appropriate cable’s connector.)
Using the image above, which of the following correctly identifies the fiber optic connector shown as Connector B?
SC
ST
LC
F

A

SCCorrect answerSTLCFOverall explanationOBJ-3.1: This is an ST connector. A ST, SC, LC, or MTRJ connector is used to terminate a fiber optic cable. An ST, or straight tip, connector is a quick-release bayonet-style connector that has a long cylindrical connector. An SC, or subscriber connector, is a general-purpose push/pull style connector that has a square, snap-in connector that latches with a simple push-pull motion. SC connectors are widely used in single-mode fiber optic systems. An LC, or Lucent connector, is a small form factor connector that combines the transmit and receive cables into a single square, snap-in connector. The F-type connector is used with coaxial cables, not fiber optic cables.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Question 38:
A client has a workstation with a RAID 5 configuration and reports that slower than normal performance occurs when reading/writing files to the RAID. You run a diagnostic program against the RAID, and the system passes all of the diagnostic tests without any issues. While you are running the tests, though, you heard clicking noises coming from the RAID. Which of the following is the MOST likely cause of the slow performance being experienced by the client?
Cooling fan
RAID controller
Hard drive
SSD

A

Cooling fanRAID controllerCorrect answerHard driveSSDOverall explanationOBJ-5.3: Based on the symptoms described, the RAID itself is fully functional, so the RAID controller is not causing any problems. This could be caused by a failing hard drive or the system overheating due to the slow performance. Since there is a clicking noise, this is most likely a hard drive failure since a cooling fan makes a whirring or grinding noise instead. Therefore, we can assume the RAID is made up of magnetic hard drives, and one of those hard disks is starting to fail. To replace the hard drive, you need to find a comparable drive that will work in the array, reboot the computer, and enter the RAID setup program to rebuild the array after replacing that hard drive. If you use a RAID 1, RAID 5, or RAID 10, the system will continue to operate normally, but with slower performance, until you replace the hard drive and rebuild the RAID.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Question 39:
Your friend just gave you his old laptop. Whenever you turn on the laptop, though, a blank screen appears and asks you to enter an administrative password before the computer attempts to boot up. Unfortunately, your friend never gave you the password for this laptop. Which of the following actions should you take to resolve this issue and get past this password screen?
Remove the CMOS battery, wait a few minutes, reinsert the battery, then power on the laptop
Press and hold the power button down for a few minutes, then attempt to power on the laptop
Remove the laptop’s battery, wait a few minutes, reinsert the battery, and then power on the laptop
Disconnect the hard drive from the motherboard for a few minutes, reconnect it, and then power on the laptop

A

Correct answerRemove the CMOS battery, wait a few minutes, reinsert the battery, then power on the laptopPress and hold the power button down for a few minutes, then attempt to power on the laptopRemove the laptop’s battery, wait a few minutes, reinsert the battery, and then power on the laptopDisconnect the hard drive from the motherboard for a few minutes, reconnect it, and then power on the laptopOverall explanationOBJ-5.2: This blank screen asking for the administrative password appears to be a BIOS password required to be entered before the laptop is allowed to boot from the hard disk. Your best option is to clear the CMOS forcibly to remove the BIOS password from a workstation or laptop. To clear the CMOS, you must remove the CMOS battery from your computer, wait a few minutes, reinsert the CMOS battery, and then attempt to power on the computer again. This will cause the information stored in the CMOS (for example, BIOS settings and passwords) to be erased and restored to its default configuration. Removing and reinserting the laptop’s battery will not reset the BIOS password. Disconnecting and reconnecting the hard drive will not reset the BIOS password.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Question 40:
You connected your laptop to a new wireless network and received an IP address automatically. Which of the following servers allowed this to occur?
Proxy server
DHCP server
DNS server
TACACS+ server

A

Proxy serverCorrect answerDHCP serverDNS serverTACACS+ serverOverall explanationOBJ-2.4: A dynamic host configuration protocol (DHCP) serve is a server configured with a range of addresses to lease. Hosts can be allocated an IP address dynamically or be assigned a reserved IP address based on the host’s MAC address. The server can also provide other configuration information, such as the location of DNS servers. A domain name system (DNS) server is a server that hosts the database of domain names and the IP addresses mapped to those names. Each DNS server is authoritative for certain domain names that their organization owns. An authentication, authorization, and accounting (AAA) server is a server use to identify (authenticate), approve (authorize), and keep track of (account for) users and their actions. AAA servers can also be classified based on the protocol they use, such as a RADIUS server or TACACS+ server. A proxy server is a server that acts as an intermediary between a client requesting a resource and the server that provides that resource. A proxy server can be used to filter content and websites from reaching an end user.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Question 41:
Dion Training uses a large laser printer to print documents in its office. The laser printer has recently begun creating printouts that contain a double image or ghost image appearance to them. Jason just printed out a test page:
Which of the following components is most likely to cause a ghost image to appear on the printout such as the one above?
Toner cartridge
Scanner assembly
Drum
Fuser

A

Toner cartridgeScanner assemblyCorrect answerDrumFuserOverall explanationOBJ-5.6: Double images or ghost printing occurs when an image or text is repeated more than once on a printed page. This often occurs due to an issue with the drum unit. If the drum unit is not being properly charged by the corona wire, ghost prints can become a problem with the unit.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Question 42:
Tamera was responding to a complaint that one of the employees is having problems with the wired network connection on their laptop. She investigated the issue to see why it will not connect to the network. Tamera looked at the indicator lights, but she doesn’t see the blinking she expected to view. Instead, the light is steady. What is MOST likely the issue?
Low RF signal
Incorrect TCP/IP configuration
No network activity
Intermittent connectivity

A

Low RF signalIncorrect TCP/IP configurationCorrect answerNo network activityIntermittent connectivityOverall explanationOBJ-5.7: If the lights are steady on a network interface card (NIC), it indicates that there is no network activity. If it is blinking, this indicates that data is passing over the NIC to the network. Even if there were an incorrect TCP/IP configuration or intermittent connectivity, there would be blinking lights to indicate transmission attempts. Since this is a wired network connection, it cannot be a low RF signal as that is a wireless network problem.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Question 43:
Which of the following requirements should you consider when selecting the type of processors, storage, and RAM to utilize in a virtualization environment?
Resource requirements
Security requirements
Network requirements
Emulator requirements

A

Correct answerResource requirementsSecurity requirementsNetwork requirementsEmulator requirementsOverall explanationOBJ-4.2: Before you purchase a system to use as a virtualization environment, you should look at the minimum requirements for all operating systems you intend to host as guest VMs. This will ensure you can balance the performance needed and maintain a smooth-running environment without numerous conflicts or issues.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Question 44:
Your company has recently migrated much of your data center to the cloud. Now, your boss needs a method to monitor all services used in supporting your customers to be properly billed based on their usage. Which of the following cloud computing concepts is your boss describing?
Measured services
Rapid elasticity
On-demand
Resource pooling

A

Correct answerMeasured servicesRapid elasticityOn-demandResource poolingOverall explanationOBJ-4.1: Measured service is a term that IT professionals apply to cloud computing that references services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning. Rapid elasticity is used to describe scalable provisioning or the capability to provide scalable cloud computing services. Rapid elasticity is very critical to meet the fluctuating demands of cloud users. The downside of rapid elasticity implementations is that they can cause significant loading of the system due to the high resource number of allocation and deallocation requests. On-demand refers to the fact that a consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Question 45:
A network technician connects three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up, and the network technician can ping network devices in all of the office trailers. However, users are complaining that they are experiencing sporadic connectivity. What is the MOST likely cause of this issue?
Latency
Throttling
Split horizon
Interference

A

LatencyThrottlingSplit horizonCorrect answerInterferenceOverall explanationOBJ-5.7: Microwave links require a direct line of sight (LoS) between the antennas to maintain a strong and effective link. These line-of-sight microwave link uses highly directional transmitter and receiver antennas to communicate via a narrowly focused radio beam. Since this microwave-based network is being run in a wooded area, there are likely some trees or leaves that are blocking the line of sight between the antennas. To solve this issue, they should trim the trees and branches to provide a clear light of sight or move the antennas to reestablish a clear line of sight. Latency is the time delay between when a packet is sent and received. While latency will increase with an obstructed microwave line of sight link, latency is an effect of this issue and not the cause of the issue. Throttling is the intentional slowing or speeding of an internet service by an Internet service provider to regulate network traffic and minimize bandwidth congestion. This again is not a cause of intermittent connectivity, but would instead occur if the microwave link was overutilized beyond its SLA contract limitations. Split horizon is a form of route advertisement that prohibits a router from advertising back a route to the same interface from which it learned it. This does not affect the issues experienced with the microwave line. Another way to approach this question is to use the process of elimination: throttling slows down the speed, and latency slows down speed even further. Split horizon prevents loops, so it only makes sense that interference is the correct choice since interference can cause drops in connections in many situations.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Question 46:
Dion Training has recently purchased a new wireless printer and has asked you to configure it in their office. You have installed the necessary printer drivers on your workstation and have plugged the printer into the power outlet. You just configured the printer to connect to the guest wireless network. Next, you try to print a test page, but nothing prints out. Which of the following is the most likely cause for the printer not printing the test page?
You didn’t configure the printer to use the Internet Printing Protocol (IPP)
You forgot to configure your workstation as a print server
You didn’t enable DHCP on your workstation
You connected the printer to the guest wireless network instead of the corporate wireless network

A

You didn’t configure the printer to use the Internet Printing Protocol (IPP)You forgot to configure your workstation as a print serverYou didn’t enable DHCP on your workstationCorrect answerYou connected the printer to the guest wireless network instead of the corporate wireless networkOverall explanationOBJ-5.6: Most corporate wireless networks are configured as two separate networks: one for the corporate wireless network traffic and another for any guests that might connect to the wireless network while visiting your offices. These two wireless networks are isolated from each other, so if you connect the printer to the guest wireless network then the workstations will be unable to reach the printer and print out any documents or test pages.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Question 47:
A computer technician is replacing a failed power supply in a customer’s gaming workstation that contains multiple hard drives and a dedicated graphics card. Which of the following are the two most important things for the technician to consider when selecting a power supply replacement for this system? (Select TWO)
Dual rail
Number and type of connectors
Wattage rating
Dual voltage

A

Dual railCorrect selectionNumber and type of connectorsCorrect selectionWattage ratingDual voltageOverall explanationOBJ-3.5: The technician must ensure that they select a new power supply with a high enough wattage rating and the right number/type of connectors. Since this is a gaming workstation with several hard drives and a dedicated graphics card, it is likely to require a large wattage rating and many connectors. Wattage defines the amount of power needed to power all the hardware in the system. The number of connectors defines the number of devices that can be powered from the power supply. The number of connectors defines the types of devices that can be powered from the power supply.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Question 48:
What type of cloud model would allow the sharing of resources by multiple organizations to create a service that benefits all of its members?
Hybrid Cloud
Private Cloud
Community Cloud
Public Cloud

A

Hybrid CloudPrivate CloudCorrect answerCommunity CloudPublic CloudOverall explanationOBJ-4.1: A community cloud in computing is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns, whether managed internally or by a third party and hosted internally or externally. Community Cloud is a hybrid form of private cloud. They are multi-tenant platforms that enable different organizations to work on a shared platform. Community Cloud may be hosted in a data center, owned by one of the tenants, or by a third-party cloud services provider and can be either on-site or off-site. A public cloud contains services offered by third-party providers over the public Internet and is available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume. A private cloud contains services offered either over the Internet or a private internal network and only to select users instead of the general public. A hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud, and third-party public cloud services with orchestration between these platforms. This typically involves a connection from an on-premises data center to a public cloud.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Question 49:
You are troubleshooting a workstation for a customer. The workstation will not boot. When it is powered on, an error message of “OS not found” is displayed on the screen. What is the MOST likely solution to fix this error?
Repartition the drive
Replace the HDD with an SSD
Perform a chkdsk
Repair the GPT

A

Repartition the driveReplace the HDD with an SSDPerform a chkdskCorrect answerRepair the GPTOverall explanationOBJ-5.3: The “OS not found” error at boot time is an indication that the MBR (Master Boot Record) or GPT (Globally Unique ID Partition Table) is corrupted or faulty. If this occurs, you should reboot into the Windows recovery mode and use the ‘bootrec /fixboot’ command to fix the GPT.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Question 50:
What describes how many times the image on the monitor changes per second?
Frame rate
Resolution
Refresh rate
Aspect ratio

A

Frame rateResolutionCorrect answerRefresh rateAspect ratioOverall explanationOBJ-1.2: Refresh rate is defined by the vertical scan frequency of a monitor and how many times in one second an image can be redrawn on the screen. LCD monitors have a fixed refresh rate based on the specifications of their panel. Generally, a monitor is rated with a refresh rate of 60 Hz, 72 Hz, or 120 Hz, with the higher refresh rate being considered better quality and easier on the user’s eyes. For high-performance gaming systems, a 120 Hz monitor is desired for smoother motion and graphics. The aspect ratio is defined as the ratio of width to height in a display. The frame rate is defined as the number of times the image in a video stream changes per second as expressed in Hertz (Hz) or Frames per Second (fps). The yaw rate is a made-up term for the exam and is used as a distractor in this question. The resolution is the measure of the number of picture elements (pixels) that an imaging device can use to sample or display the image as measured in pixels per inch (PPI).Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Question 51:
Your desktop computer is currently running out of internal storage space. You want to upgrade the workstation with more internal storage to store additional videos, photos, and backups. Which of the following is the BEST storage solution to avoid having to expand again next year while still meeting your need to store more data?
1 TB SSD
5 TB NAS
3 TB HDD
50 TB SAN

A

1 TB SSD5 TB NASCorrect answer3 TB HDD50 TB SANOverall explanationOBJ-3.3: Since you need an internal storage solution, you cannot use a NAS or SAN (since these are both network storage solutions). Instead, you have to select from the SSD or the HDD. In this question, we are primarily worried about the size of the storage being installed and not the storage speed. Therefore, we should choose the 3 TB HDD (hard disk drive) over the 1 TB SSD (solid-state drive) due to its larger size.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Question 52:
Which of the following statements about an eSATA connection is correct?
eSATA is used to add additional internal storage devices
eSATA is used to add additional external storage devices
eSATA is slower than USB 3.0
eSATA uses unshielded cables

A

eSATA is used to add additional internal storage devicesCorrect answereSATA is used to add additional external storage deviceseSATA is slower than USB 3.0eSATA uses unshielded cablesOverall explanationOBJ-3.1: The External Serial Advanced Technology Attachment (or eSATA) is used for connecting external drives to provide additional storage. When connecting a cable to an eSATA port, you must use a shielded cable. SATA is an internal connector for adding storage, while eSATA is reserved for external use. USB 3.0 can operate at speeds up to 5 Gbps, while eSATA can operate at speeds of up to 6 Gbps.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Question 53:
You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the “Operating System Not Found” error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error?
An incompatible partition is marked as active
An unsupported version of Linux is installed
Windows Startup services are not properly running
The MBR bootloader was installed accidentally

A

Correct answerAn incompatible partition is marked as activeAn unsupported version of Linux is installedWindows Startup services are not properly runningThe MBR bootloader was installed accidentallyOverall explanationOBJ-5.3: This issue may occur if one or more of the following conditions are true: (1) the basic input/output system (BIOS) does not detect the hard disk, (2) the hard disk is damaged, (3) sector 0 of the physical hard disk drive has an incorrect or malformed master boot record (MBR), (4) an incompatible partition is marked as Active, or (5) a partition that contains the MBR is no longer active. The only option provided in this list is that an incompatible partition is marked as active.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Question 54:
You are connecting a laptop to a brand new digital high definition TV. Unfortunately, the laptop is a little outdated and only has an analog display output. Which of the following adapters could you use to convert the signal from analog to digital for use with the new television?
S-Video to RCA
DVI-D to HDMI
VGA to DVI-D
HDMI to VGA

A

S-Video to RCADVI-D to HDMICorrect answerVGA to DVI-DHDMI to VGAOverall explanationOBJ-3.1: Since this question asks you to select the converter that can convert a signal from analog to digital, you need to consider which of the connectors are analog and digital. S-Video, RCA, and VGA are all analog. HDMI and DVI-D are both digital. Therefore, the correct answer is VGA (analog) to DVI-D (Digital). HDMI to VGS would be digital to analog. S-Video to RCA would be analog to analog. DVI-D to HDMI would be digital to digital.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Question 55:
Which of the following types of USB connections can support up to 4.5 watts of power per connected device?
USB 3.0
USB 2.0
USB 1.1
USB 1.0

A

Correct answerUSB 3.0USB 2.0USB 1.1USB 1.0Overall explanationOBJ-3.1: USB 3.0 can support providing up to 4.5 watts of power per connected device. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at the slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Question 56:
You just heard of a new ransomware attack that has been rapidly spreading across the internet that takes advantage of a vulnerability in the Windows SMB protocol. To protect your network until Microsoft releases a security update, you want to block the port for SMB at your firewall to prevent becoming a victim of this attack. Which of the following ports should you add to your blocklist?
123
445
143
514

A

123Correct answer445143514Overall explanationOBJ-2.1: Server Message Block (SMB) uses ports 139 and 445, and is a network file sharing protocol that runs on top of the NetBIOS architecture in Windows environments. When the WannaCry ransomware was spreading rapidly across the internet, you could help protect your organization’s network by blocking ports 139 and 445 at your firewall to prevent your machines from getting infected over the internet. Network Time Protocol (NTP) uses port 123 and is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. Internet Message Access Protocol (IMAP) uses port 143 and is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. System Logging Protocol (Syslog) uses port 514 and is a way network devices can use a standard message format to communicate with a logging server. It was designed specifically to make it easy to monitor network devices. Devices can use a Syslog agent to send out notification messages under a wide range of specific conditions.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Question 57:
Which of the following types of networking hardware is used to deliver broadband internet access using a hybrid fiber-coaxial (HFC) infrastructure?
Cable modem
Software-defined networking
Digital subscriber line
Optical network terminal

A

Correct answerCable modemSoftware-defined networkingDigital subscriber lineOptical network terminalOverall explanationOBJ-2.2: A cable modem is a type of network bridge that provides bi-directional data communication via radio frequency channels on a hybrid fiber-coaxial (HFC), radio frequency over glass (RFoG), and coaxial cable infrastructure. Cable modems are primarily used to deliver broadband internet access as cable internet, taking advantage of an HFC and RFoG network’s high bandwidth. DSL is a technology used to transmit multimedia traffic at high-bit rates over twisted-pair copper wire (over ordinary telephone lines). This allows the telecommunications company to connect a user’s home to the local switching center using normal telephone lines, then connect that local switching center (using a DSLAM to multiplex the connections) to the central office over a single high-speed cable (such as a fiber connection). An optical network terminal (ONT) is a device that connects fiber optics cables to other types of wiring such as Ethernet and phone lines by converting the signal from optical to electrical and vice versa. An ONT is commonly used with fiber to the house (FTTH) installations. Software-defined networking (SDN) is an approach to network management that enables dynamic, programmatically efficient network configuration to improve network performance and monitoring, making it more like cloud computing than traditional network management. Software-defined networking (SDN) uses Application Programming Interfaces (API) and compatible hardware that allows for the programming of network appliances and systems.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Question 58:
You are setting up a projector and a laptop for a big presentation in the Dion Training conference room. You start up the presentation software and mirror the laptop’s display to the projector. The image on the screen from the projector is flickering intermittently, but the image on the laptop’s display is working with no issues. You attempt to change the laptop’s resolution to a lower setting and a higher setting, but still, the projector’s flickering persists. Which of the following steps should you attempt NEXT?
Ensure the display cable is securely connected to both the laptop and the projector
Ensure the project’s power cable is connected securely
Change the color depth setting on the projector
Change the aspect ratio from 16:9 to 4:3 on the laptop

A

Correct answerEnsure the display cable is securely connected to both the laptop and the projectorEnsure the project’s power cable is connected securelyChange the color depth setting on the projectorChange the aspect ratio from 16:9 to 4:3 on the laptopOverall explanationOBJ-5.4: A flickering image on a projector is a common issue that can occur if the display cable between the laptop and the projector is not connected securely. This is especially common with older-style display cables like VGA and DVI. Therefore, it is important to ensure a VGA or DVI cable is properly secured using the cable’s thumbscrews to prevent flickering of the image.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Question 59:
You have been asked to set up the corporate email on several mobile devices for Dion Training’s employees. The employees will use their mobile devices to check their email when out of the office, but they will also need to check their email from their desktop computers. Which of the following mail protocols should you configure to allow the employees to receive their mail and maintain the read/unread status across all of their devices?
POP3
IMAP
HTTPS
SMTP

A

POP3Correct answerIMAPHTTPSSMTPOverall explanationOBJ-1.4: You should configure IMAP because it will leave the email on the server and allow for synchronizing the mail to all devices, including each email’s read state. If you configure POP3, the mail is downloaded to the device and removed the mail from the server’s mailbox by default. SMTP is used to send emails, not receive them. HTTPS is used for web browsing, not for receiving emails. The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Question 60:
A client reports that their workstation is continually crashing when using certain applications on their macOS system. The system will stop working and display a spinning rainbow pinwheel on the screen. Which of the following is the most likely cause of this error?
Failure of the graphics card
Failure of the processor
Failure or corruption of the memory
Failure of the power supply

A

Failure of the graphics cardFailure of the processorCorrect answerFailure or corruption of the memoryFailure of the power supplyOverall explanationOBJ-5.2: On a Mac (OS X) system, the “Pinwheel of Death” is used to indicate an error. The pinwheel appears as an endlessly spinning rainbow mouse pointer displayed on the screen. This usually occurs due to a memory failure or memory corruption in the system. The pinwheel is like the BSOD used in Windows. The Blue Screen of Death (BSOD) is a “stop screen” that appears when the Windows operating system detects a critical error and literally stops the system so that the error doesn’t cause any loss of data. All operating systems have some form of “stop screen,” but the Windows version got the name BSOD since it was a screen with a full blue background and white text containing troubleshooting information and error codes.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Question 61:
You are configuring a new client workstation on the network. Which type of IP address should you configure it with?
APIPA
Link-local
Static
Dynamic

A

APIPALink-localStaticCorrect answerDynamicOverall explanationOBJ-2.5: A dynamic IP address should be used for client workstations and devices to ensure they are easy to configure and less prone to human error. When configuring a dynamic IP address, the DHCP server should issue the IP address, subnet mask, gateway, and DNS server’s IP address to the workstation or device. A static IP address should be used for servers to ensure they are easy to find, access, and manage on the network. When configuring a static IP address, you need to include the IP address, subnet mask, gateway, and DNS server’s IP address. A static IP address is used when the DHCP server is disabled and clients are configured manually to join the network properly. Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function. When a host uses an APIPA address, it can communicate with other hosts on the same network using APIPA. Still, it cannot reach other networks or communicate with hosts who have managed to obtain a valid DHCP lease. An APIPA address is also known as a link-local address.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Question 62:
Which cloud computing concept is BEST described as focusing on the replacement of applications and programs on a customer’s workstation with cloud-based resources?
PaaS
DaaS
SaaS
IaaS

A

PaaSDaaSCorrect answerSaaSIaaSOverall explanationOBJ-4.1: Software as a Service (SaaS) is a cloud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions. Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center. Platform as a Service (PaaS) is a cloud computing service that enables consumers to rent fully configured systems that are set up for specific purposes. Desktop as a Service (DaaS) provides a full virtualized desktop environment from within a cloud-based service. This is also known as VDI (Virtualized Desktop Infrastructure) and is coming in large enterprise businesses focused on increasing their security and minimizing their operational expenses.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Question 63:
Which of the following type of hard disk drives would be installed in a low-end office desktop?
10,000 rpm
7200 rpm
15,000 rpm
5400 rpm

A

10,000 rpm7200 rpm15,000 rpmCorrect answer5400 rpmOverall explanationOBJ-3.3: Hard drive performance is limited based on the number of revolutions per minute (RPM) the disk can spin. If a disk can spin faster, it can retrieve or store data on the disk quicker. For low-end office desktops, using a 5,400 rpm hard disk drive to save money is acceptable. For a high-performance gaming computer, a 15,000 rpm hard disk drive or an SSD should be used instead.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Question 64:
Tim, a help desk technician, receives a call from a frantic executive who states that their company-issued smartphone was stolen during their lunch meeting with a rival company’s executive. Tim quickly checks the MDM administration tool and identifies that the user’s smartphone is still communicating with the MDM, and displays its location on a map. What should Tim do next to ensure the stolen device’s data remains confidential and inaccessible to the thief?
Identify the IP address of the smartphone
Remotely encrypt the device
Perform a remote wipe of the device
Reset the device’s password

A

Identify the IP address of the smartphoneRemotely encrypt the deviceCorrect answerPerform a remote wipe of the deviceReset the device’s passwordOverall explanationOBJ-1.4: To ensure the data remains confidential and is not accessed by the thief, Tim should perform a remote wipe of the device from the MDM. This will ensure any corporate data is erased before anyone accesses it. Additionally, Tim could reset the device’s password, but if the thief can guess or crack the password, they would have access to the data. Identifying the smartphone’s IP address is not a useful step in protecting the data on the device. Additionally, devices should be encrypted BEFORE they are lost or stolen, not after. Therefore, the option to remotely encrypt the device is provided as a wrong answer and a distractor.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Question 65:
What type of connector provides power to an internal hard drive from the computer’s power supply using a 4-pin connector?
SATA
Molex
SCSI
Thunderbolt

A

SATACorrect answerMolexSCSIThunderboltOverall explanationOBJ-3.1: A Molex connector provides DC power to the various drives inside a computer case. Molex and Mini-Molex are both 4-pins connectors, with Mini-Molex only being used to support floppy disk drives. The large-sized one is used for hard disk drives, CD-ROM drives, and DVD drives. SATA connectors have 15 pin and 7 pin varieties. Thunderbolt has 20 and 24 pin varieties. SCSI has 50 and 36 pin varieties.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Question 66:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard above, which of the following correctly indicates the circled area?
Mini PCIe
Reset jumper
CMOS battery
Memory slot

A

Mini PCIeReset jumperCorrect answerCMOS batteryMemory slotOverall explanationOBJ-3.4: The area circled indicates the CMOS battery on this motherboard. The CMOS battery is used to keep power to the BIOS configurations, such as the date and time, when the power is removed from a desktop or workstation. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Question 67:
Which of the following types of USB connections can support data rates of up to 480 Mbps?
USB 2.0
USB 1.0
USB 1.1
USB 3.0

A

Correct answerUSB 2.0USB 1.0USB 1.1USB 3.0Overall explanationOBJ-3.1: USB 2.0 can support data rates up to 480 Mbps. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at a slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Question 68:
Jason booted up a Windows 10 laptop and noticed that the icon appeared very large and the image appeared blurry. What is the most LIKELY cause of these issues?
Incorrect color depth
Incorrect resolution
Incorrect cable used
Faulty digitizer

A

Incorrect color depthCorrect answerIncorrect resolutionIncorrect cable usedFaulty digitizerOverall explanationOBJ-5.4: This is likely a screen resolution problem. Each LCD/LED has a native resolution that fits perfectly on the screen. If a resolution other than the native resolution is used, the screen could become squished, distorted, or have black vertical or horizontal lines filling up the excess space. For example, if the computer rebooted into Safe Mode, it will default back to 800x600 pixel resolution instead of the 16:9 ratio of 1920x1080 pixels used by modern laptops. This is also referred to as VGA mode.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Question 69:
Which of the following DC voltages are not found within a printer when the laser printer converts AC power into DC power for use?
+24 VDC
-5 VDC
+5 VDC
-24 VDC

A

ERROR!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Question 70:
Which of the following synchronization methods does NOT work with Android devices?
iTunes
Flickr
Office 365
Google Workspace

A

Correct answeriTunesFlickrOffice 365Google WorkspaceOverall explanationOBJ-1.4: Android can not use iTunes to perform synchronization functions. The iTunes application only works with Apple devices, such as iPhones and iPads. Android devices can use Google Workspace with Gmail to sync emails and contacts. Android devices can also use Office 365 to sync emails, contacts, and other files if you are a Microsoft subscriber. Android devices can use Flickr to sync photos.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Question 71:
Which of the following Wi-Fi channels in the 2.4 GHz frequency band are only supported in Europe and Japan due to government regulations?
13
11
6
1

A

Correct answer131161Overall explanationOBJ-2.3: The Wi-Fi frequency band for 2.4 GHz is split into 14 channels of 5 MHz each. In the United States and Canada, only channels 1 through 11 may be used. In Europe, channels 1 through 13 may be used. In Japan, channels 1 through 14 may be used. Since each Wi-Fi communication requires approximately 20 MHz to operate effectively, users should set their wireless access points to channels 1, 6, and 11 to minimize interference and avoid overlapping channels.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Question 72:
You work for the city’s Department of Motor Vehicles (DMV). There are five DMV locations spread out across the city that you have been asked to connect with a network. You have created a list of requirements for this network, including that it must be wired and support at least 1 Gbps of bandwidth. Which of the following network types would MOST likely be used for the DMV to connect their internal networks across the city securely?
LAN
PAN
MAN
WAN

A

LANPANCorrect answerMANWANOverall explanationOBJ-2.7: A metropolitan area network (MAN) is a computer network that interconnects users with computer resources in a geographic region of the size of a metropolitan or city area. This is the most appropriate choice based on the requirements provided. MAN is a term applied to the interconnection of local area networks (LANs) or campus area networks (CANs) across a city into a single larger network. A MAN is larger than a CAN or LAN but smaller than a WAN. A local area network (LAN) is a network where all the nodes or hosts participating in the network are directly connected with cables or short-range wireless media. A wide area network (WAN) is a network that spans multiple geographic locations such as the internet. Wide area networks are often established with leased telecommunication circuits. A personal area network (PAN) is a close-range network that is usually based on Bluetooth or NFC for communications between personal devices, such as smartphones, laptops, printers, and other peripheral devices.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Question 73:
A customer contacts the service desk because their laptop will not power on when plugged in, and the battery is dead. The service desk replaces its battery, connects it to a different power adapter, and the laptop works all day until the battery runs out. Now, the laptop won’t turn on, and the battery won’t charge. Which of the following do you recommend to solve this issue?
Replace the power adapter
Replace the battery
Connect the laptop to a 220v outlet
Replace the DC jack

A

Replace the power adapterReplace the batteryConnect the laptop to a 220v outletCorrect answerReplace the DC jackOverall explanationOBJ-5.5: This scenario indicates that the DC jack is faulty. Since the battery was replaced and the laptop continues to work, this indicates it isn’t a battery issue but is, instead, most likely a DC jack issue. The DC jack often gets broken on a laptop, and if the jack is broken, the device cannot charge or receive power from the power adapter or wall outlet.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Question 74:
Which of the following is an open-source wireless communication protocol operating in the 2.4 GHz frequency band and is primarily used for home automation?
Z-Wave
Zigbee
Bluetooth
NFC

A

Z-WaveCorrect answerZigbeeBluetoothNFCOverall explanationOBJ-2.4: Zigbee is an open-source wireless communication protocol used for home automation. Zigbee is open-source, unlike Z-Wave, which is proprietary. Zigbee uses the 2.4 GHz frequency band. This higher frequency allows more data bandwidth at the expense of range than Z-Wave and the greater risk of interference from other 2.4 GHz radio communications. Zigbee supports more overall devices within a single network (65,000 compared to 232 for Z-wave), and there is no hop limit for communication between devices. Z-wave is a low-power wireless communications protocol used primarily for home automation. Z-wave uses radio frequencies in the 800 MHz and 900 MHz frequency ranges. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Question 75:
During a disaster recovery, which of the following statements is true?
Both a virtual machine and a physical server has the same downtime
A virtual machine has more downtime than a physical server
A virtual machine has less downtime than a physical server
A virtual machine cannot be used for redundancy or load balancing

A

Both a virtual machine and a physical server has the same downtimeA virtual machine has more downtime than a physical serverCorrect answerA virtual machine has less downtime than a physical serverA virtual machine cannot be used for redundancy or load balancingOverall explanationOBJ-4.1: A virtual machine can usually be restored much faster than a physical server. Physical servers must be modified to fit the right drivers for the disk drives, NIC, and other necessary components whenever they must be rebuilt after a crash. Often, a new physical server will also be required to replace a faulty one, and then the right drivers are needed to ensure a smooth transition. Conversely, a virtual machine can be recreated using another instance, clone, or restoration from a backup in much less time. Therefore, the downtime associated with virtual machines and their restoral is much lower.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Question 76:
You are building a Desktop PC for a newly hired employee at Dion Training. The computer’s motherboard doesn’t have a wireless network adapter integrated into it, so you need to purchase an expansion card to provide this functionality. Which of the following motherboard connections will most likely be used to connect the wireless network adapter card?
PCIe x1
PCIe x16
AGP
eSATA

A

Correct answerPCIe x1PCIe x16AGPeSATAOverall explanationOBJ-3.4: PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has several PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. Network adapters and Wi-Fi network cards almost exclusively rely on PCIe x1 expansion slots or a USB connection for their connectivity. Graphics cards usually rely on a PCIe x16 expansion slot. eSATA is an external SATA port used to connect an external storage device such as a hard drive. The accelerated graphics port (AGP) is a parallel expansion card standard that was originally designed for attaching a video card to a computer system to assist in the acceleration of 3D computer graphics. AGP has been replaced with PCIe due to its faster speeds.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Question 77:
Which of the following locations are you likely to find the antenna wires located within a laptop or mobile device?
Connected externally via USB
Located under the keyboard
Laying on top of the battery
Positioned around the display panel

A

Connected externally via USBLocated under the keyboardLaying on top of the batteryCorrect answerPositioned around the display panelOverall explanationOBJ-1.2: The antenna wires for the wireless cards and cellular radios are usually routed around the screen within the casing of the laptop or mobile device. The antenna connections can be tricky to install/remove and are delicate. When updating or replacing a wireless or cellular card, the technician must be careful to reconnect the antenna wires and reinstall them in the proper location. External antennas are available only when connected to an external wireless card.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Question 78:
Which of the following is an example of a valid IPv4 address?
192.168.1.254
::1
192:168:1:55
00:AB:FA:B1:07:34

A

Correct answer192.168.1.254::1192:168:1:5500:AB:FA:B1:07:34Overall explanationOBJ-2.5: An IPv4 address consists of 32 bits. IPv4 addresses are written in dotted octet notation, such as 192.168.1.254. MAC addresses are written as a series of 12 hexadecimal digits, such as 00:AB:FA:B1:07:34. IPv6 addresses are written as a series of up to 32 hexadecimal digits but can be summarized using a :: symbol. The ::1 is the IPv6 address for the localhost. The other option, 192:168:1:55 is not a valid address since it uses : instead of a . in between the octets.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Question 79:
A technician at Dion Training is troubleshooting an issue with a workstation. The technician believes that the power supply needs to be replaced based on the symptoms they observed. Which of the following symptoms did the technician likely observe to lead them to this conclusion?
Continuous reboot
Distended capacitors
Incorrect date/time on the workstation
Burning smell

A

Continuous rebootDistended capacitorsIncorrect date/time on the workstationCorrect answerBurning smellOverall explanationOBJ-5.2: A burning smell is indicative of a bad power supply. A foul odor is indicative of a distended capacitor. The incorrect date/time on the workstation is indicative of a dead CMOS battery. Hardware failure or system instability can cause the computer to reboot continuously. The problem could be the RAM, hard drive, power supply, graphics card, or external devices. Based on the symptoms of a continuous reboot, the supervisor likely suspected the RAM as the cause of the issue.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Question 80:
You just rebooted your Windows 10 workstation, and the desktop’s background picture looks strange. Upon closer examination, you notice that only a few hundred unique colors are being shown in the image. Which of the following settings should you reconfigure?
Color depth
Refresh rate
Resolution
App size

A

Correct answerColor depthRefresh rateResolutionApp sizeOverall explanationOBJ-5.4: Color depth is either the number of bits used to indicate the color of a single pixel in a bitmapped image or video frame buffer or the number of bits used for each color component in a single pixel. In Windows 10, you can display up to 32-bits of color depth if your monitor supports it. A larger color depth number allows more unique colors to be displayed. If you only have 4-bit color, for example, you can only have 16 colors. With an 8-bit color depth, you can see 256 colors. Normally, most Windows systems are set to 16-bit (65,536 colors), 24-bit (16.7 million colors), or 32-bit (4.2 billion colors).Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Question 81:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard above, which of the following correctly indicates the circled area?
USB connector
Audio connector
Reset jumper
Fan power

A

USB connectorAudio connectorCorrect answerReset jumperFan powerOverall explanationOBJ-3.4: The area circled indicates the reset jumper on this motherboard. A reset jumper is a small plastic block with a metal connection inside. To reset the motherboard’s BIOS, you would connect the jumper over this area to make an electrical connection between the two pins. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Question 82:
Your computer keeps losing track of time and the date in the system. Which of the following is MOST likely causing this issue?
The memory is corrupted
The power supply is faulty
The motherboard’s device drivers need to be updated
The CMOS battery is dead and needs to be replaced

A

The memory is corruptedThe power supply is faultyThe motherboard’s device drivers need to be updatedCorrect answerThe CMOS battery is dead and needs to be replacedOverall explanationOBJ-5.2: Most motherboards (especially older ones) have a small coin-sized battery installed on them to power the CMOS RAM when the computer is powered down. This is where the BIOS settings and date/time are saved when power is removed from a workstation. If a computer continually loses track of the day/time, this is a classic sign that the CMOS battery is dead and needs to be replaced. Please note that some newer motherboards have replaced the need for a CMOS battery by replacing it with an area of nonvolatile memory used instead to store the BIOS settings and the date/time.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Question 83:
Which of the following ports is used by LDAP by default?
3389
389
53
427

A

3389Correct answer38953427Overall explanationOBJ-2.1: The lightweight directory access protocol (LDAP) is a protocol used to access and update information in an X.500-style network resource directory. LDAP uses port 389. The service location protocol (SLP) is a protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network. This is an alternative protocol to LDAP in newer networks. SLP uses port 427. The remote desktop protocol (RDP) is a protocol used for the remote administration of a host using a graphical user interface. RDP operates over TCP port 3389. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Question 84:
You have been asked to set up the corporate email on several mobile devices for Dion Training’s employees. The employees will use their mobile devices to send their emails when out of the office. Which of the following mail protocols should you configure to allow the employees to send their mail?
IMAP
SMTP
POP3
HTTPS

A

IMAPCorrect answerSMTPPOP3HTTPSOverall explanationOBJ-1.4: You should configure SMTP since it is the only protocol used to send emails. POP3 and IMAP are used to receive emails. HTTPS is used for web browsing, not for receiving emails. The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Question 85:
Johnny is trying to download a file from a remote FTP server but keeps receiving an error that a connection cannot be opened. Which of the following should you do FIRST to resolve the problem?
Flush the DNS cache on the local workstation
Ensure that port 20 is open
Validate the security certificate from the host
Ensure that port 161 is open

A

Flush the DNS cache on the local workstationCorrect answerEnsure that port 20 is openValidate the security certificate from the hostEnsure that port 161 is openOverall explanationOBJ-5.7: Executing an FTP connection from a client is a two-stage process requiring the use of two different ports. Once the user enters the name of the server and the login credentials in the FTP client’s authorization fields, the FTP connection is attempted over port 21. Once the connection is established, FTP sends the data over port 20 back to the client from the server. For FTP to function properly, you should have both ports 20 and 21 open.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Question 86:
Dion Training wants to install a network cable to run a television signal between two buildings. Which of the following cable types should it utilize?
Coaxial
Shielded
Plenum
Fiber

A

Correct answerCoaxialShieldedPlenumFiberOverall explanationOBJ-3.1: A coaxial cable is a cable used to transmit video, communications, and audio. A coaxial or coax cable is most commonly used as a cable to connect a TV to a cable TV service. Coaxial cables are a specialized type of copper cabling that uses a copper core to carry the electrical signal while being enclosed by plastic insulation and shielding to protect the data transmission from the effects of electromagnetic interference (EMI). Plenum-rated cable has a special insulation that has low smoke and low flame characteristics. Plenum cable is mandated to be installed in any air handling space. Shielded cables contain a braided foil shield around the inner cabling to protect the data from the effects of electromagnetic interference (EMI). An optical fiber consists of an ultra-fine core of glass to carry the light signals surrounded by glass or plastic cladding, which guides the light pulses along the core, and a protective coating. The fiber optic cable is contained in a protective jacket and terminated by a connector. Fiber optic cables use light signals to carry data across a cable at extremely high bandwidths.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Question 87:
Which of the following technologies can provide the precise latitude and longitude of a device’s location when it is located outdoors?
GPS
Bluetooth
Wi-Fi
Cellular

A

Correct answerGPSBluetoothWi-FiCellularOverall explanationOBJ-1.4: Location services enable the device to know its position using its internal GPS receiver or its approximate location using its cellular radio. A mobile device can use its internal GPS, cellular, Bluetooth, or Wi-Fi radios to identify its location. A GPS (global positioning system) device is used to determine a receiver’s position on the Earth based on information received from 24 GPS satellites, which operate in a constellation in Medium Earth Orbit (MEO). The receiver must have a line-of-sight to four of the GPS satellites continuously to accurately determine its position on the earth (latitude, longitude, and altitude). The device’s GPS receiver can provide an accurate location up to 10 meters. Cellular radios can provide an approximate location based upon the triangulation of your position between different cellular towers. Bluetooth can be used within a building to provide an accurate of the device within 3-4 meters. Wi-Fi positioning systems use the signal strength or angle of arrival of a signal to determine the device’s location within 1-4 meters. The use of Bluetooth and Wi-Fi to determine the device’s location is known as an internal positioning system (IPS).Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Question 88:
The touch screen on your Windows 10 laptop is not working properly. You have been asked to troubleshoot the laptop. What should you check FIRST?
Device manager
System configuration
Digitizer settings
Performance monitor

A

Device managerSystem configurationCorrect answerDigitizer settingsPerformance monitorOverall explanationOBJ-5.5: Most laptops have a digitizer and an LCD screen if they are touchscreen devices. The digitizer is a piece of glass glued to the LCD’s surface and is used to capture your touches and translate them into input for your system. If the touch screen is not working, but the display doesn’t look cracked or broken, this is often a sign that the digitizer settings are incorrect or the digitizer is defective.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Question 89:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the port cluster.)
Using the image above, which of the following correctly indicates the port labeled as J?
eSATA
USB 3.0
FireWire
USB 2.0

A

eSATAUSB 3.0FireWireCorrect answerUSB 2.0Overall explanationOBJ-3.1: These ports are the USB 2.0 connections. This is indicated by their black color (instead of being red or blue for USB 3.0 ports). Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at a slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power. For the exam, it is important that you can identify the different parts of a motherboard’s rear port cluster by sight.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Question 90:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard above, which of the following correctly indicates the circled area?
Memory slot
CPU slot
Mini PCIe
CPU power

A

Memory slotCorrect answerCPU slotMini PCIeCPU powerOverall explanationOBJ-3.4: The area circled indicates the CPU slot. This is where the processor is installed into the motherboard. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Question 1:
A customer is trying to configure an 802.11b wireless card in an old laptop to connect to an 802.11g wireless router. When the customer scans for the wireless network’s SSID (Dion-Corp), it is not displayed within Windows. What is the MOST likely reason that the SSID is not being displayed?
The wireless router is not configured for DHCP support
802.11g and 802.11b use different frequencies
The wireless router is configured with WPA2 encryption
The broadcast is disabled on the wireless router

A

The wireless router is not configured for DHCP support802.11g and 802.11b use different frequenciesThe wireless router is configured with WPA2 encryptionCorrect answerThe broadcast is disabled on the wireless routerOverall explanationOBJ-5.7: If the SSID (Secure Set Identifier) is disabled, then the wireless network name will not be broadcast to any available devices within range. Both Wireless B and G use the same frequency band (2.4 GHz) and would not cause this issue. Similarly, encryption that is enabled or disabled would not affect the SSID broadcast since the SSID is sent out in cleartext. DHCP support is used once a device connects to the network. Therefore it would not affect the SSID broadcast.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Question 2:
The printer in the Dion Training offices routinely has issues anytime there is a power outage. The printer is a multi-function, network-enabled printer that connects directly to the network switch using a CAT 5e cable. Which of the following should you do to resolve this continuing issue?
Disable the SSID broadcast on the wireless access point
Rollback the print drivers on the print server
Update the print drivers on each employee’s machine
Configure a static IP for the printer

A

Disable the SSID broadcast on the wireless access pointRollback the print drivers on the print serverUpdate the print drivers on each employee’s machineCorrect answerConfigure a static IP for the printerOverall explanationOBJ-5.7: Since the problem always occurs after a power outage, the printer is likely turning on faster than the DHCP server. This could lead to the printer not getting a new IP address properly or the clients not locating the printer on the network. Therefore, you should configure a static IP for the printer (and any servers) on the network. Servers and shared printers should use a static IP instead of a dynamic assignment to prevent issues.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Question 3:
Your boss is looking for a recommendation for a cloud solution that will only allow for both onsite systems and cloud services to work together seamlessly. What type of cloud model should you recommend?
Private Cloud
Community Cloud
Public Cloud
Hybrid Cloud

A

Private CloudCommunity CloudPublic CloudCorrect answerHybrid CloudOverall explanationOBJ-4.1: A hybrid cloud model allows for the seamless integration of both onsite and cloud services to the end-user simultaneously. Hybrid clouds can be cost-efficient, flexible, easy to migrate to a complete cloud solution in the future, and require less maintenance than completely onsite options. As with all cloud options, the contents must be properly secured due to the elastic storage nature of all cloud solutions and the possibility of data remnants. A public cloud contains services offered by third-party providers over the public Internet and is available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume. A private cloud contains services offered either over the Internet or a private internal network and only to select users instead of the general public. A community cloud is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third party and hosted internally or externally.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Question 4:
Which of the following types of networking hardware is installed in a computer or server to connect to an ethernet switch using a CAT 6 cable?
Cable modem
Digital subscriber line
Network interface card
Optical network terminal

A

Cable modemDigital subscriber lineCorrect answerNetwork interface cardOptical network terminalOverall explanationOBJ-2.2: A network interface card is an expansion card that enables a PC to connect to a LAN. Network interface cards are also referred to as network adapters. A cable modem is a type of network bridge that provides bi-directional data communication via radio frequency channels on a hybrid fiber-coaxial (HFC), radio frequency over glass (RFoG), and coaxial cable infrastructure. Cable modems are primarily used to deliver broadband internet access as cable internet, taking advantage of an HFC and RFoG network’s high bandwidth. DSL is a technology used to transmit multimedia traffic at high-bit rates over twisted-pair copper wire (over ordinary telephone lines). This allows the telecommunications company to connect a user’s home to the local switching center using normal telephone lines, then connect that local switching center (using a DSLAM to multiplex the connections) to the central office over a single high-speed cable (such as a fiber connection). An optical network terminal (ONT) is a device that connects fiber optics cables to other types of wiring such as Ethernet and phone lines by converting the signal from optical to electrical and vice versa. An ONT is commonly used with fiber to the house (FTTH) installations.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Question 5:
Which of the following cables supports both charging and data transfer with a non-directional connector inserted into a port on the device?
Mini-USB
USB-C
USB-A
Micro-USB

A

Mini-USBCorrect answerUSB-CUSB-AMicro-USBOverall explanationOBJ-3.1: USB-C can be inserted in any direction since it is designed as a non-directional connector. There are many other variations of USB cables in use today such as Micro-USB, Mini-USB, USB-A, and USB-B that can only be inserted into the port in a single direction due to the physical shape of their connector. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at a slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Question 6:
Which of the following types of power supplies allows the installer to attach or remove cables from the power supply as needed to reduce cable clutter inside the computer’s case?
Dual voltage power supply
Modular power supply
Redundant power supply
750 watt rated power supply

A

Dual voltage power supplyCorrect answerModular power supplyRedundant power supply750 watt rated power supplyOverall explanationOBJ-3.5: A modular power supply will allow the user to attach or detach cables to the power supply as needed. This helps reduce the cable clutter inside of the case and increases airflow for cooling. A redundant power supply is when a single piece of computer equipment operates using two or more physical power supplies. Each of the power supplies will have the capacity to run the device on its own, which will allow it to operate even if one goes down. A 750-watt power supply is commonly used in gaming computers since they have high-powered graphics cards. A dual voltage power supply allows the power supply to use either 115 VAC or 230 VAC as its input.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Question 7:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the port cluster.)
Using the image above, which of the following correctly indicates the port labeled as K?
SPDIF
Audio cluster
RG-6
DVI-I

A

SPDIFCorrect answerAudio clusterRG-6DVI-IOverall explanationOBJ-3.1: This port is the audio cluster on the rear of this motherboard. This contains the audio inputs and outputs in mini-jack format. For the exam, it is important that you can identify the different parts of a motherboard’s rear port cluster by sight.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Question 8:
What is the fifth step of the CompTIA troubleshooting methodology?
Test the theory to determine the cause
Establish a plan of action to resolve the problem and implement the solution
Document findings, actions, and outcomes
Verify full system functionality and, if applicable, implement preventative measures

A

Test the theory to determine the causeEstablish a plan of action to resolve the problem and implement the solutionDocument findings, actions, and outcomesCorrect answerVerify full system functionality and, if applicable, implement preventative measuresOverall explanationOBJ-5.1: For the exam, it is important that you can list and identify the 6 steps of the CompTIA troubleshooting methodology in order. (1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and then implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Question 9:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard above, which of the following correctly indicates the circled area?
CPU slot
AGP
Mini PCIe
CMOS battery

A

CPU slotAGPCorrect answerMini PCIeCMOS batteryOverall explanationOBJ-3.4: The area circled indicates the Mini PCIe slot. Mini PCIe (mPCIe) are smaller form factor versions of standard PCI Express expansions cards used with laptops and other small form factor computing devices. Mini PCIe expansion cards provide the ability to add wireless networking or cellular data cards to a laptop. These slots can also be used to connect motherboard mounted solid-state storage devices. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Question 10:
What is the simplest and most cost-efficient way to allow other network users to access a printer if the printer does not have an RJ-45 or WiFi adapter available?
Establish a print share on the local host
Establish a printer share on the network switch
Order another printer with network capabilities and share it on the network
Order a printer port converter to share a non-networked printer

A

Correct answerEstablish a print share on the local hostEstablish a printer share on the network switchOrder another printer with network capabilities and share it on the networkOrder a printer port converter to share a non-networked printerOverall explanationOBJ-5.6: The simplest and most cost-efficient way to share a printer is to share the printer via the local host and allow sharing across everyone to access the printer. While this costs nothing to establish and requires no additional hardware, it does require that the local host remains on 24 hours a day so that others can print to it at any time. If you are willing to spend a little money, though, you can purchase a wireless print server or a new network-capable printer instead.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Question 11:
Jason recently purchases a wearable fitness tracker to count the number of steps he is taking each day. Which of the following technologies is used to determine how many steps he takes each day?
Accelerometer
Digitizer
Inverter
NFC

A

Correct answerAccelerometerDigitizerInverterNFCOverall explanationOBJ-1.3: Most wearable fitness devices come with a 3-axis accelerometer to track movement in every direction. Some more advanced trackers will also use a gyroscope to measure the orientation and rotation of the device. However, the accelerometer is still the crucial component to measure the activity of the user. The data collected is then converted into steps and activity and from then into calories and sleep quality. Near field communications (NFC) is a standard for peer-to-peer (2-way) radio communications over very short (around 4”) distances that facilitate contactless payment and similar technologies. The inverter (also known as inverter board, screen inverter, or LCD inverter) is a part of the laptop’s display assembly. The inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight. The digitizer is a touch-sensitive glass panel covering the LCD in a touchscreen assembly. The digitizer is used to convert touch events to digital signals that can be interpreted as different types of input. The digitizer can be touched and inspected without taking apart the device.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Question 12:
Which of the following ports is used for the request and distribution of DHCP configuration information?
80
162
67
53

A

80162Correct answer6753Overall explanationOBJ-2.1: The dynamic host control protocol (DHCP) is a protocol used to allocate IP addresses to a host when it joins a network. DHCP utilizes UDP ports 67 and 68. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53. The hypertext transfer protocol (HTTP) is a protocol used to provide web content to browsers using port 80. The simple network management protocol (SNMP) is a protocol for monitoring and managing network devices over UDP ports 161 and 162. A management system collates data sent by agents running on each device. The agents maintain a Management Information Base of configuration and usage data. An agent can also generate a trap, alerting the management system of some notable event (such as a printer that is out of paper).Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Question 13:
While troubleshooting a switch at the Dion Training offices, you believe that one of the ports on a switch is defective. To prove your hypothesis, which of the following tools should you use?
Punchdown tool
Cable tester
Crimper
Loopback plug

A

Punchdown toolCable testerCrimperCorrect answerLoopback plugOverall explanationOBJ-2.8: A loopback plug is used to test a port. It involves connecting pin 1 to pin 3 and pin 2 to pin 6. You can do this either by rewiring the jack or twisting the relevant pairs together on a cable stub. Alternatively, you can purchase a prefabricated loopback plug. When you connect a loopback plug to a port, you should see a solid connection LED. You can also use the loopback plug in conjunction with diagnostic software. A crimper is a tool used to attach an RJ-45 plastic connector to an unshielded twisted pair (UTP) or shielded twisted pair (STP) cable. It pushes a portion of the plastic into the jacket of the cable to hold it in place. A cable tester is used to ensure a cable is properly created as a patch cable (straight through) or a crossover cable. Cable testers provide detailed information on the physical and electrical properties of the cable. For example, they test and report cable conditions, crosstalk, attenuation, noise, resistance, and other cable run characteristics. Punchdown tools are used to connect an ethernet cable to the back of a patch panel, a punchdown block, or the back of a network wall jack.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Question 14:
Which of the following cellular technologies was not widely used outside of the United States?
3G
GSM
CDMA
4G

A

3GGSMCorrect answerCDMA4GOverall explanationOBJ-1.4: The code division multiple access (CDMA) communication standard for cellular radio communications and data transfer uses a method of multiplexing a communications channel using a code to key the modulation of a particular signal. CDMA was only popular in the United States with a few providers (Verizon and Sprint). Most of the world instead uses GSM. The global system for mobile (GSM) communication standard for cellular radio communications and data transfer uses a SIM card to identify the subscriber and network provider. 3G cellular technology is made up of two different technologies: HSPA+ and EV-DO. HSPA+ (Evolved High-Speed Packet Access) is a 3G standard used for GSM cellular networks and can support up to a theoretical download speed of 168 Mbps and a theoretical upload speed of 34 Mbps. In the real world, though, HSPA+ normally reaches speeds around 20 Mbps. EV-DO (Evolution-Data Optimized) is a 3G standard used for CDMA cellular networks and can support up to 3.1 Mbps downloads. 4G cellular technology is made up of LTE and LTA-A. Long Term Evolution (LTE) is a packet data communications specification providing an upgrade path for both GSM and CDMA2000 cellular networks. LTE has a theoretical speed of 150 Mbps and a real-world speed of around 20 Mbps. LTE Advanced (LTE-A) has a theoretical speed of 300 Mbps and a real-world speed of around 40 Mbps.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Question 15:
An auto mechanic needs to purchase a new printer for their shop. The printer will be used to create estimates and invoices for their customers. The printer must support the ability to create duplicate invoices using multiple sheets of paper separated by carbon paper using tractor-fed paper. Which of the following types of printers should be used?
Inkjet
Laser
Impact
Thermal

A

InkjetLaserCorrect answerImpactThermalOverall explanationOBJ-3.7: An impact or dot-matrix printer is an older type of printer that works by pressing a ribbon of ink onto the top sheet of paper using a series of dots. This is called an impact printer because it pushes the ribbon against the paper to create the image or text using a series of dots to create the image or text. These printers are most commonly used when multiple copies of a document must be created at once (like a 3-part form or contract to be signed). As these older printers are being retired and it is harder to find impact printers to purchase, most organizations are now switching to laser or inkjet printers and requiring customers to sign multiple copies of the same invoice after they are printed using a laser printer. Thermal printers are commonly used for receipts such as those at the grocery store or a restaurant.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Question 16:
Jason is attending the CompTIA Partner’s Summit convention this year. While at the conference, Jason will need to ensure his smartphone has enough battery power to last the entire day without having to recharge it since it is hard to find an available electrical outlet in the conference rooms. Jason needs to ensure his smartphone is always available for use to receive updates from his team back home, as well. Which of the following would you recommend Jason use to ensure he can use the phone all day without his smartphone running out of power?
Use a wireless charging pad
Set the smartphone to airplane mode
Use a smartphone case with a built-in battery
Bring a power strip so that more than one person can use an electrical wall outlet

A

Use a wireless charging padSet the smartphone to airplane modeCorrect answerUse a smartphone case with a built-in batteryBring a power strip so that more than one person can use an electrical wall outletOverall explanationOBJ-1.3: To extend the device’s battery life and enable Jason to use it continuously throughout the day, it is recommended that he use a smartphone case with a built-in battery. These cases can provide enough battery power for an additional 8-12 hours of use. A wireless charging pad is a bad choice since you cannot easily use the phone while it is on the charger, and the charger still needs a power source (like an outlet). A power strip would also be a poor choice because it assumes there is a wall outlet available. Airplane mode is a bad choice because it may reduce the power needed (and therefore extend the battery life), but it also will prevent any connectivity over the cellular network.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Question 17:
Which of the following ports are used by the NetBIOS protocol to share files and printers on a Windows network? (Select ANY that apply)
110
443
21
139

A

11044321Correct answer139Overall explanationOBJ-2.1: The network basic input/output system (NetBIOS)/NetBIOS over TCP/IP (NetBT) is a session management protocol used to provide name registration and resolution services on legacy Microsoft networks and those using WINS. NetBIOS/NetBT operates on TCP/UDP ports 137 and 139. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443. The file transfer protocol (FTP) is the protocol used to transfer files across the internet over ports 20 and 21.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Question 18:
You want to build a virtualization workstation that will be used to run four different server operating systems simultaneously to create a test lab environment. Each guest operating system only requires 20 GB of storage on the host workstation. Which of the following is the MOST important piece of hardware needed for this system to run efficiently?
Dedicated GPU
ATX motherboard
Multi-core processor
5400 RPM hard disk drive

A

Dedicated GPUATX motherboardCorrect answerMulti-core processor5400 RPM hard disk driveOverall explanationOBJ-4.2: For a virtualization workstation, it is important to have a fast processor with multiple cores. In addition to a multi-core processor, it is good to have lots of memory and a fast HDD (but not necessarily a large HDD). A dedicated GPU (graphical processing unit) is not important for a virtualization workstation. Many virtualized servers run in text-only mode or with a headless display, making a dedicated GPU a poor choice.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Question 19:
Jason presents a “how to pass your certification exams on the first attempt” lesson for his students using an overhead projector. After 24 minutes, the project goes blank. Jason allows the students to take a 15-minute coffee break while he attempts to turn the project back on. The project runs for another 4 minutes and then turns off again. What is MOST likely wrong with the projector and the laptop setup?
The laptop’s display driver needs to be updated
The projector is overheating
The sleep setting on the laptop is too short
The HDMI cable is unplugged

A

The laptop’s display driver needs to be updatedCorrect answerThe projector is overheatingThe sleep setting on the laptop is too shortThe HDMI cable is unpluggedOverall explanationOBJ-5.4: The most likely cause is that the projector is overheating. A faulty or clogged cooling fan could cause this. If the projector overheats, it will turn off the projector’s bulb to reduce the machine’s heat load. The laptop’s sleep setting is not the cause since it is randomly turning off at different amounts of time.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Question 20:
You are traveling to Thailand on a business trip. Your laptop’s touchscreen display is visibly flickering between being too bright and too dim when plugged into the power outlet at a local coffee shop. You take your laptop to your hotel room, and you notice it doesn’t flicker when plugged in there. Which of the following is the MOST likely cause of this issue?
The coffee shop was experiencing power fluctuations that led to the flickering of the display
The battery of the laptop is failing to charge
The inverter of the laptop is faulty
The digitizer of the laptop is faulty

A

Correct answerThe coffee shop was experiencing power fluctuations that led to the flickering of the displayThe battery of the laptop is failing to chargeThe inverter of the laptop is faultyThe digitizer of the laptop is faultyOverall explanationOBJ-5.4: Since the only change between the flickering and non-flickering was the change in location and the power source, it is likely the cause of the issue. In some areas of the world, power is less stable and reliable than in more industrialized countries like the United States, Canada, England, and Japan. Some locations around the world have less reliable power that is subject to more power fluctuations. Flicker is a visible change in a lamp’s brightness due to rapid fluctuations in the power supply voltage. The voltage drop is generated over the grid’s source impedance by the changing load current of equipment or facility. These fluctuations can generate the visible flicker noticed by the user of the device.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Question 21:
Which of the following network standards allows a networking device to provide up to 15.4W of power to a connected device?
802.3af
802.11s
802.11ac
802.3at

A

Correct answer802.3af802.11s802.11ac802.3atOverall explanationOBJ-2.2: Power over Ethernet (POE) switches provide power over ordinary data cabling to devices such as VoIP handsets and wireless access points. PoE can support up to 15.4W and PoE+ can support up to 25W. The 802.3af (PoE) standard can support up to 15.4W of power at a distance of up to 100 meters. PoE can support low-powered devices such as VoIP handsets. The 802.3at (PoE+) standard can support up to 25W of power at a distance of up to 100 meters. PoE+ can support higher-powered devices such as PTZ cameras, door controllers, and thin client computers. The 802.11ac standard defines a 5 GHz wireless networking standard. The 802.11s standard defines the usage of wireless mesh technology.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Question 22:
Dion Training just installed a file server in VLAN 101 and their user workstations in VLAN 102. The users are unable to access the new file server from their workstations. Which of the following devices needs to be installed to allow users in VLAN 102 to access the resources in VLAN 101?
Hub
Unmanaged switch
Router
Wireless access point

A

HubUnmanaged switchCorrect answerRouterWireless access pointOverall explanationOBJ-5.7: A router or other gateway device must be installed between two VLANs to allow connections to be routed between them. A Virtual LAN (VLAN) is a logically separate network that is created using switching technology. Even though hosts on two VLANs may be physically connected to the same cabling, local traffic is isolated to each VLAN so they must use a router to communicate. A hub provides no intelligence in its interconnection functions so that whatever is received on one port is repeated out every other port. A wireless access point (WAP), or access point, connects directly to a wired local area network and the AP then provides wireless connections using Wi-Fi for other devices to use that wired connection. An unmanaged switch operates out-of-the-box without any setup or configuration by switching network traffic based on MAC addresses and putting each switch port into its own collision domain. A hub, access point, and unmanaged switch are unable to route traffic and therefore would be unable to connect the two VLANs.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Question 23:
You want to build a new gaming computer but intend to reuse as many of the parts as possible from your old computer. You have determined that the motherboard and the case will be reused, and you will purchase a new graphics card, sound card, network interface card, and a USB 3.0 expansion card to increase your system’s overall speed and performance. You are a bit worried that your old computer’s power supply may not be able to support all of these new expansion cards. Which of the following cards is MOST likely to consume the most power during operations and require you to purchase a new power supply to support it?
Sound card
NIC
USB 3.0
Graphics card

A

Sound cardNICUSB 3.0Correct answerGraphics cardOverall explanationOBJ-3.5: The power consumption of today’s graphics cards has increased a lot. The top models demand between 110 and 270 watts from the power supply; in fact, a powerful graphics card under full load requires as much power as the rest of the components of a PC system combined. If your old computer didn’t have a dedicated graphics card, it is unlikely that the power supply will be powerful enough to support one without replacing the power supply. Most business computers have a 300-watt power supply. Most low-end gaming computers have a power supply of 450 to 500 watts. If you are building a high-end gaming workstation, you may require a power supply with 750 watts to 850 watts to support all processing power, graphics processing, and other expansion cards installed in the system.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Question 24:
Which of the following technologies would allow your laptop to share content with a mobile device wirelessly using touchless transfer?
NFC
NVMe
USB-C
mPCIe

A

Correct answerNFCNVMeUSB-CmPCIeOverall explanationOBJ-1.1: Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another. Mini PCIe (mPCIe) are smaller form factor versions of standard PCI Express expansions cards used with laptops and other small form factor computing devices. Mini PCIe expansion cards provide the ability to add wireless networking or cellular data cards to a laptop. Non-volatile memory express (NVMe) is an interface for connecting flash memory devices, such as SSDs, directly to a PCI Express bus. NVMe allows much higher transfer rates than SATA/AHCI. USB-C is the default standard used in USB 3.1 with a 24-pin connector. The connector is reversible and can be inserted in either direction.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Question 25:
You have just installed a second monitor for a salesperson’s workstation. The user wants to clone the display so that both monitors show the exact same image. This will allow them to see one of the displays while their customer sees the other from across their desk. When you connect the second monitor and clone the display, the second monitor displays text twice as large as the other monitor. Which of the following settings should you configure?
Extended mode
Resolution
Color depth
Refresh rate

A

Extended modeCorrect answerResolutionColor depthRefresh rateOverall explanationOBJ-5.4: Most monitors have a default or native resolution. When you first connect a monitor to a Windows workstation, this native resolution is detected, and Windows attempts to configure itself automatically. If this creates an imbalance between the two monitors, a technician can adjust the screen’s resolution by changing it in the Display settings area of Windows 10. Color depth defines how many unique colors can be displayed by the projected image at once. Refresh rate is the measure of how fast an image can be updated on a monitor or display. If a monitor has a lower refresh rate, then blurring and ghosting can occur. The extended mode allows the Windows output to be stretched across two or more monitors as if they were a single monitor. This can be configured under the Display settings in Windows 10.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Question 26:
A user has reported that their workstation is running slowly. You perform a reboot of their workstation and receive a S.M.A.R.T. error during the boot-up process. Which of the following actions should you perform FIRST?
Run chkdsk
Backup the hard drive
Reformat the hard drive
Run diskpart

A

Run chkdskCorrect answerBackup the hard driveReformat the hard driveRun diskpartOverall explanationOBJ-5.3: S.M.A.R.T. is an acronym for Self-Monitoring and Repair Tool. It is a feature in all modern magnetic hard drives (non-SSD drives) that monitors the hard drive to ensure it performs properly. S.M.A.R.T. can detect when the failure of a drive is imminent and can alert the user so that they can back up the drive before a complete failure occurs. If your hard drive produces a S.M.A.R.T. failure, you should immediately back up the drive. Once a backup has been completed, you can instead focus on repairing the drive using chkdsk.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Question 27:
You have been asked to set up the email on a corporate laptop. The employees of Dion Training are only allowed to receive their email on one device. The email should be removed from the server’s mailbox whenever the client connects to the server to download the messages. Which of the following mail protocols should you configure to allow an employee to receive their mail on their laptop and meet these requirements?
POP3
HTTPS
SMTP
IMAP

A

Correct answerPOP3HTTPSSMTPIMAPOverall explanationOBJ-1.4: You should configure POP3 because the mail is downloaded to the device and removes mail from the server’s mailbox by default. IMAP does not remove the mail from the server when the client connects but instead maintains a copy on the server indefinitely until the user forces it to be deleted. SMTP is used to send emails, not receive them. HTTPS is used for web browsing, not for receiving emails. The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Question 28:
Jason is teaching a CompTIA course at a large company, but they do not allow non-employees to connect to their network. Since Jason needs the Internet for an in-class demonstration, he connects his laptop to his iPhone over Wi-Fi and essentially connects to the Internet using the smartphone as a modem. Which of the following terms best describes this configuration?
Tunneling
Baseband update
Hotspot
USB tethering

A

TunnelingBaseband updateCorrect answerHotspotUSB tetheringOverall explanationOBJ-1.3: A portable hotspot is a dedicated mobile device that connects to a cellular network and provides a wireless (Wi-Fi) network for a small number of users. Most smartphones can conduct wireless tethering as a form of creating a hotspot. Tethering uses the cellular data plan of a mobile device to provide Internet access to a laptop or PC. The PC can be tethered to the mobile by USB, Bluetooth, or Wi-Fi (a mobile hotspot). One method of doing this is to connect the laptop to the device using a Wi-Fi connection and routing all of your data from your laptop to the phone over Wi-Fi and then from the phone to the Internet using the phone’s built-in cellular modem. A tunneling (or encapsulation) protocol wraps up data from one protocol for transfer over a different type of network. For example, PPP can carry TCP/IP data over a dial-up line, enabling a remote computer to communicate with the LAN. A baseband update is the modification of the firmware of a cellular modem.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Question 29:
Jason is building a new gaming computer for his son. Jason has calculated that the required wattage needed is 420 watts to the video card and all of the other internal devices. Which of the following power supplies should Jason purchase to meet the minimum power requirements for this computer?
525 W
350 W
750 W
250 W

A

Correct answer525 W350 W750 W250 WOverall explanationOBJ-3.5: When purchasing a new power supply, it is important to understand the wattage requirements. Since the new computer needs a minimum of 420 watts of power, you must find a power supply that is large enough to meet this demand. In this case, the minimum rating that would meet this requirement is the 525-watt power supply. If a power supply doesn’t have a high enough wattage rating to provide the power needed, some or all of the devices will not power on or function properly. If a power supply is chosen that is too large, it will generate excessive heat that can overheat the computer and its components.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Question 30:
Tom, a salesman, is trying to print a 3-page report to the network printer located in the Sales department’s office space. He walks over to the printer but doesn’t see the pages in the printer’s output tray. He checks the on-screen display of the printer, but he doesn’t see any errors listed. Tom tries a few more times, but he gets the same results. Frustrated, Tom selects the network printer for the Customer Service department and sends his print job there. He walks over to their offices and finds his 3-page report sitting in that printer’s output tray. Tom asks you to help him solve this printing problem. What action should you take FIRST to help solve Tom’s problem?
Stop and restart the PC’s print spooler service using your administrator account
Log in to the network’s print server, stop and restart all of the shared printer queues, and then try to reprint the document
Ask one of Tom’s coworkers to attempt to print something to the Sales department’s printer to verify it is working properly
Verify that Tom has been sending the document to the correct network printer’s queue

A

Stop and restart the PC’s print spooler service using your administrator accountLog in to the network’s print server, stop and restart all of the shared printer queues, and then try to reprint the documentAsk one of Tom’s coworkers to attempt to print something to the Sales department’s printer to verify it is working properlyCorrect answerVerify that Tom has been sending the document to the correct network printer’s queueOverall explanationOBJ-5.6: The first thing you should do is verify that this problem is not caused by user error. To do this, you should verify which network printer queue Tom had been sending the document to the first few times. You may wish to ask a coworker to print to the Sales department’s printer, but that would be your second step AFTER verifying the user was printing to that print queue properly first. Since the print job was successful once Tom switched to another printer, the PC’s print spooler worked properly, so you don’t need to restart it. You should not restart all of the shared printer queues unless it is necessary because this would affect all company employees and is not necessary to solve this issue.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Question 31:
Dion Training’s video editor wants to install a new dedicated GPU using an expansion card. Which of the following should they verify before installing the new card?
The power supply’s efficiency rating
The number of SATA connectors available
The power supply’s wattage rating
The power supply supports a 12 VDC input

A

The power supply’s efficiency ratingThe number of SATA connectors availableCorrect answerThe power supply’s wattage ratingThe power supply supports a 12 VDC inputOverall explanationOBJ-3.5: Dedicated graphics cards use the most power of any component in a computer. If someone is installing or replacing a graphics card, it is important to compare the current system’s power usage to the wattage rating of the power supply to ensure it can support the new graphics card. SATA connectors are not used with graphics cards but are instead used for storage devices and optical drives. The power supply should support 115 VAC or 230 VAC as its input and provide 12 VDC, 5 VDC, and 3.3 VDC as its output. The power supply’s efficiency rating would tell the user how much of the input power is being converted to output power, but this is not important in deciding if the power supply can support the new graphics card.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Question 32:
What command is used to test if your own network card’s driver is working properly?
ping 192.168.1.1
ping 8.8.8.8
ping 1.1.1.1
ping 127.0.0.1

A

ping 192.168.1.1ping 8.8.8.8ping 1.1.1.1Correct answerping 127.0.0.1Overall explanationOBJ-5.7: The IP Address 127.0.0.1 is a localhost IP for testing your network interface card (NIC). This IP address is reserved for use with a loopback test. If there is no communication of the return packet, this indicates the network card is faulty, the cable/loopback is loose, or there is bad wiring of the loopback plug. Using ping with public IP addresses or the gateway address, such as 1.1.1.1, 8.8.8.8, and 192.168.1.1, would instead verify the entire path and not just NIC’s driver.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Question 33:
Which of the following is the virtualization technology supported by most modern Intel processors?
AMD-V
HT
Intel-V
VT

A

AMD-VHTIntel-VCorrect answerVTOverall explanationOBJ-3.4: To use virtualization and have virtual machines running on a single workstation, you need to have a CPU specifically designed to support virtualization. For Intel processors, they must support VT or Virtualization Technology. If you are using an AMD processor, it should support AMD-V (AMD’s virtualization technology). HyperThreading (HT) is an Intel CPU architecture implemented to expose two or more logical processors to the OS to deliver performance benefits. Intel-V is a made-up term used as a distractor on this question.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Question 34:
Your office has a legacy wide-format printer that must be connected to your network. The connection on the printer is an older DB-9 serial connection. What is the BEST option for connecting this legacy device to your corporate network?
Purchase an inexpensive RS-232 to USB adapter to connect it the network
Configure a reverse proxy on the printer as a DNS workaround
Purchase a wireless print server and connect it to the printer via USB
Purchase an RS-232 to RJ-45 adapter so that you can connect it to the network

A

Purchase an inexpensive RS-232 to USB adapter to connect it the networkConfigure a reverse proxy on the printer as a DNS workaroundPurchase a wireless print server and connect it to the printer via USBCorrect answerPurchase an RS-232 to RJ-45 adapter so that you can connect it to the networkOverall explanationOBJ-3.6: The most convenient and least expensive way to connect the printer would be to buy an RS-232 to RJ-45 adapter, which will allow you to connect the legacy printer to the network directly. Then, the printer will be accessed by all users directly from their computers while printing to it using the appropriate print drivers. Networks do not have USB connections, so you need to select a network connection type like RJ-45 to use instead.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Question 35:
Jason’s new iPhone has locked up, and the touchscreen is unresponsive. He tries to tap the screen, press the buttons, and still, nothing happens. What should he do next?
Hold down the home button for 10 seconds, then slide to power off
Hold down power and home buttons simultaneously for 10 seconds, then slide to power off
Hold down power and volume down buttons simultaneously for 10 seconds, then slide to power off
Hold down the power button and then the sleep/wake button simultaneously for about 10 seconds

A

Hold down the home button for 10 seconds, then slide to power offHold down power and home buttons simultaneously for 10 seconds, then slide to power offCorrect answerHold down power and volume down buttons simultaneously for 10 seconds, then slide to power offHold down the power button and then the sleep/wake button simultaneously for about 10 secondsOverall explanationOBJ-5.5: Smartphones can become frozen, hung up, or locked up to the point they are unresponsive to touch or some button presses. The best solution is to hold down the power and volume down buttons simultaneously on an iPhone and then slide to power off.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Question 36:
Which of the following components of a color laser printer is used to combine the 4 colors before printing them to the paper in one pass?
Pickup roller
Duplexing assembly
Transfer roller
Transfer belt

A

Pickup rollerDuplexing assemblyTransfer rollerCorrect answerTransfer beltOverall explanationOBJ-3.7: The transfer belt is the component in a color laser printer that combines the 4 colors before printing it to the paper in one pass. The transfer roller is the component in a laser printer that applies an electric charge to the paper to attract toner from the photoconductor during the imaging process. The pickup roller is the component in a laser printer that turns above a stack of paper to feed a sheet into the feed roller. The duplexing assembly is a component that enables a printer or scanner to use both sides of a page automatically.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Question 37:
You work as a PC Technician for a real estate company. The company has decided to use laptops instead of desktops in the office so that the real estate agents can easily take their laptops with them when they leave to show properties for sale. You want to create an easy solution for the agents to quickly connect an external monitor, keyboard, mouse, a wired network connection, and an additional hard drive for storage to the laptop whenever they come back into the office. Unfortunately, the laptops used by the agents don’t have a built-in wired network connection. Which type of device should you choose to provide all the functionality above?
Thunderbolt
USB 4-port hub
Docking station
Port replicator

A

ThunderboltUSB 4-port hubCorrect answerDocking stationPort replicatorOverall explanationOBJ-1.3: A docking station is a sophisticated type of port replicator designed to provide additional ports (such as network or USB) and functionality (such as expansion slots and drives) to a portable computer when used at a desk. A port replicator is a simple device to extend the range of ports (for example, USB, DVI, HDMI, Thunderbolt, network, and so on) available for a laptop computer when it is used at a desk. The difference between a docking station and a port replicator is that a docking station can add additional capabilities beyond what is already integrated into the laptop whereas a port replicator can only reproduce the same ports that already exist on the laptop. Thunderbolt is a connector type that can be used either as a display interface (like DisplayPort) or as a general peripheral interface (like USB 3). Thunderbolt 3 uses USB-C connectors. A USB hub is a device that connects to a USB port to allow additional USB devices to be connected to the PC, essentially increasing the number of USB ports available.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Question 38:
Which of the following is true of a dedicated video card in a computer system?
Share the use of the system’s memory
Can be upgraded or replaced
Cannot be upgraded or replaced
Less expensive than an integrated video card

A

Share the use of the system’s memoryCorrect answerCan be upgraded or replacedCannot be upgraded or replacedLess expensive than an integrated video cardOverall explanationOBJ-3.4: It is more expensive to have a dedicated GPU or video card, but it does provide higher performance than an integrated GPU. A dedicated GPU also can be upgraded with a newer graphics card in the future to increase performance. An integrated video card is built as part of the main system motherboard or CPU. An integrated GPU is cheaper than a dedicated GPU, but it has limited performance and shares the use of the computer system’s RAM. An integrated video card cannot be upgraded since it is part of the processor or motherboard. If a system is being designed for gaming, video editing, or 3D rendering, it should use a separate video card with a dedicated GPU.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Question 39:
You are troubleshooting a network connection issue between the wall jack in a user’s office and the switch in the communications closet. When you plug a network cable into the wall jack, there is no connection. You check the switch in the communications closet to determine if the wall jack is properly connected to the switch. Unfortunately, none of the cables in the communication closet are labeled. Which of the following tools should you use to determine which cable in the communications closet is connected to the wall jack in the user’s office since none of the cables are properly labeled?
Punchdown tool
Loopback plug
Tone generator and probe
Multimeter

A

Punchdown toolLoopback plugCorrect answerTone generator and probeMultimeterOverall explanationOBJ-2.8: A tone generator is connected to a wall jack and sends a repeating signal over the cable. The probe can then be used to detect which cable is attached to the wall jack by detecting the signal being sent by the tone generator. The probe needs to be near or touch the cable with the tone generator attached to identify it positively. While a multimeter could be used (in resistance mode) to determine if two ends of a cable are attached to the same cable, the distance between the user’s office and the communication closet would prevent a multimeter from being used in this case. A tone generator is connected to a wall jack and sends a repeating signal over the cable. The probe can then be used to detect which cable is attached to the wall jack by detecting the signal being sent by the tone generator. The probe needs to be near or touch the cable with the tone generator attached to identify it positively. Punchdown tools are used to connect an ethernet cable to the back of a patch panel, a punchdown block, or the back of a network wall jack.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Question 40:
The projector in the Dion Training conference room is creating a distorted image when in use. The technician measures the top of the screen at 72” wide and the bottom of the screen at only 66” wide. The technician checks the projector’s resolution and the resolution in the operating system’s display settings. They notice that they are both set correctly to HDTV (1920 x 1080) mode. Which of the following settings on the project should the technician adjust to fix this distortion?
Contrast
Brightness
Keystone
Color depth

A

ContrastBrightnessCorrect answerKeystoneColor depthOverall explanationOBJ-5.4: A keystone effect occurs when the top of a projected image is wider or narrower than the bottom of the image. This creates a trapezoid instead of a rectangular image and leads to distortion. To fix the keystone effect in an image, you need to adjust the keystone setting in the projector. The brightness setting will increase or decrease the number of lumens of the projected image to make it lighter or darker. The contrast is the amount of difference between the whiteness and darkness in a projected image. Color depth defines how many unique colors can be displayed by the projected image at once. Brightness, contrast, and color depth do not affect the size or shape of the image being projected.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Question 41:
You are installing Windows 2019 on a rack-mounted server and hosting multiple virtual machines within the physical server. You just finished the installation and now want to begin creating and provisioning the virtual machines. Which of the following should you utilize to allow you to create and provision virtual machines?
Device manager
Disk management
Terminal services
Hypervisor

A

Device managerDisk managementTerminal servicesCorrect answerHypervisorOverall explanationOBJ-4.2: A hypervisor, also known as a virtual machine monitor, is a process that creates and runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, like memory and processing. To create and provision virtual machines within the Windows 2019 operating system, you can use a Type II hypervisor like VM Ware or VirtualBox. Disk Management is a system utility in Windows that enables you to perform advanced storage tasks. Device Manager is a component of the Microsoft Windows operating system that allows users to view and control the hardware attached to the computer. Remote Desktop Services, known as Terminal Services in Windows Server 2008 and earlier, is one of the components of Microsoft Windows that allow a user to take control of a remote computer or virtual machine over a network connection.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Question 42:
Which of the following is a security concern when dealing with virtual machines?
Rogue VM
Resource pooling
Virtual NIC
Symmetric multiprocessing

A

Correct answerRogue VMResource poolingVirtual NICSymmetric multiprocessingOverall explanationOBJ-4.2: The process of developing, testing, and deploying images brings about the first major security concern with the virtual platform itself. This is the problem of rogue VMs. A rogue VM is one that has been installed without authorization. The uncontrolled deployment of more and more VMs is referred to as VM sprawl. After all, it is a lot easier to add a guest image to a server than it is to plug a new hardware server into the network. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. Symmetric multiprocessing (SMP) is the processing of programs by multiple processors that share a common operating system and memory. A virtual network interface card (vNIC) represents the configuration of a VM connected to a network. A VM can be configured to have multiple vNICs.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Question 43:
Several users at an adjacent office building report intermittent connectivity issues after a new flag pole was installed between the two offices. The network technician has determined the adjacent office building is connected to the main office building via an 802.11ac bridge. The network technician logs into the AP and confirms the SSID, encryption, and channels are all correct. Which of the following is MOST likely the cause of this issue?
Bandwidth saturation
Incorrect antenna type
Signal attenuation
DHCP exhaustion

A

Bandwidth saturationIncorrect antenna typeCorrect answerSignal attenuationDHCP exhaustionOverall explanationOBJ-5.7: The most likely reason is signal attenuation from the new flag being placed between the signal path which may be obstructing the line-of-sight between the antennas. Based on where the flag is precisely located, it is possible to only block the signal when the wind is blowing in a certain direction. This would lead to the intermittent connectivity experienced by the users caused by the signal attenuation when the flag is blocking the communication path between the antennas. DHCP exhaustion occurs when the DHCP server runs out of available IP addresses and stops issuing DHCP bindings. If DHCP exhaustion occurred, the users would not have received an IP address and they would have no connectivity instead of intermittent connectivity. The question does not mention anything about the antennas being moved or replaced recently, so it is unlikely to be an issue with the antennas since they worked previously with the same wireless network and distanced. Bandwidth saturation occurs if too many devices are on one WAN link, but nothing in the question indicates that more users have been added and causing an issue.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Question 44:
What type of network cable should be used to prevent crosstalk?
Plenum
RJ-11
UTP
STP

A

PlenumRJ-11UTPCorrect answerSTPOverall explanationOBJ-3.1: Shielded cables contain a braided foil shield around the inner cabling to protect the data from the effects of electromagnetic interference (EMI). Cables are often clustered together with a high amount of data passing through from one device to another, causing EMI (electromagnetic interference). EMI causes signal interference and errors in the transfer of data that is known as crosstalk. Unshielded cables do not contain this braided foil shield and are more affected by EMI than a shielded cable. Plenum-rated cable has a special insulation that has low smoke and low flame characteristics. Plenum cable is mandated to be installed in any air handling space. An RJ-11 connector is used to terminate cables used for phone lines.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Question 45:
You connect a VOIP device on a user’s desk and need to connect it to a PoE-enabled switch located in a communications closet about 150 feet (approximately 50 meters) away. Which of the following cables should you select to connect the VOIP device to the switch?
Coaxial
Fiber
CAT 6
CAT 3

A

CoaxialFiberCorrect answerCAT 6CAT 3Overall explanationOBJ-2.2: VOIP (Voice over IP) devices that rely on PoE (Power over Ethernet) should use a CAT 5e, CAT 6, or higher cable to make the connection. This allows a single cable (CAT 5e or CAT 6) to carry both the data and the device’s power. Fiber, coaxial, and CAT 3 cables cannot carry power to the VOIP device and cannot be used to meet this requirement. Using a CAT 5e or CAT 6 cable, you can connect two devices of approximately 300 feet (100 meters) without any need to repeat the signal.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Question 46:
Which of the following types of networking hardware is used to create network infrastructures within the cloud?
Digital subscriber line
Cable modem
Software-defined networking
Optical network terminal

A

Digital subscriber lineCable modemCorrect answerSoftware-defined networkingOptical network terminalOverall explanationOBJ-2.2: Software-defined networking (SDN) is an approach to network management that enables dynamic, programmatically efficient network configuration to improve network performance and monitoring, making it more like cloud computing than traditional network management. Software-defined networking (SDN) uses Application Programming Interfaces (API) and compatible hardware that allows for the programming of network appliances and systems. A cable modem is a type of network bridge that provides bi-directional data communication via radio frequency channels on a hybrid fiber-coaxial (HFC), radio frequency over glass (RFoG), and coaxial cable infrastructure. Cable modems are primarily used to deliver broadband internet access as cable internet, taking advantage of an HFC and RFoG network’s high bandwidth. DSL is a technology used to transmit multimedia traffic at high-bit rates over twisted-pair copper wire (over ordinary telephone lines). This allows the telecommunications company to connect a user’s home to the local switching center using normal telephone lines, then connect that local switching center (using a DSLAM to multiplex the connections) to the central office over a single high-speed cable (such as a fiber connection). An optical network terminal (ONT) is a device that connects fiber optics cables to other types of wiring such as Ethernet and phone lines by converting the signal from optical to electrical and vice versa. An ONT is commonly used with fiber to the house (FTTH) installations.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Question 47:
A client’s laptop appears to have been infected with malware. You have begun troubleshooting, established a plan of action, and have already implemented your proposed solution. According to the best practice troubleshooting methodology, what is the NEXT step you should take?
Document findings, actions, and outcomes
Test the theory to determine the cause
Verify full system functionality
Identify the problem

A

Document findings, actions, and outcomesTest the theory to determine the causeCorrect answerVerify full system functionalityIdentify the problemOverall explanationOBJ 5.1 - For the exam, it is important that you can list and identify the 6 steps of the CompTIA troubleshooting methodology in order. (1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and then implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Question 48:
Which of the following ports should you block at the firewall if you want to prevent a remote login to a server from occurring?
21
22
80
143

A

21Correct answer2280143Overall explanationOBJ-2.1: Secure shell (SSH) is the protocol used for remote administration and file copying using TCP port 22. SSH is considered secure since it uses authenticated and encrypted sessions for communication. The file transfer protocol (FTP) is the protocol used to transfer files across the internet over ports 20 and 21. The hypertext transfer protocol (HTTP) is a protocol used to provide web content to browsers using port 80. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Question 49:
(This is a simulated Performance-Based Question. On the real exam, you may be given a chart with numerous ports and protocols and be asked to drag and drop them to match the ports with the protocols. Note: there is no chart for this question in this practice exam.) What ports do FTP and SFTP utilize?
21, 22
20, 21
22, 23
21, 23

A

Correct answer21, 2220, 2122, 2321, 23Overall explanationOBJ-2.1: FTP (File Transfer Protocol) uses ports 20 and 21. SFTP (Secure File Transfer Protocol) uses port 22. Port 23 is used by Telnet. If this were a question on the real exam, you would see a list of ports on one side and a list of protocols on the other, and you would drag and drop each one to match them up. (It might also have 4-6 different pairs to match up.)Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Question 50:
Your company uses a virtual desktop infrastructure (VDI) environment for employees to access their desktop applications. To allow employees access to the VDI environment, the company is installing thin clients in each employee’s office. Which THREE of the following tasks must you first complete to install a thin client for a new employee?
Connect the thin client to a printer
Install the operating system
Install the necessary applications
Install the latest security updates
Connect the thin client to the network
Connect the device to a second monitor

A

Connect the thin client to a printerInstall the operating systemCorrect selectionInstall the necessary applicationsCorrect selectionInstall the latest security updatesCorrect selectionConnect the thin client to the networkConnect the device to a second monitorOverall explanationOBJ-4.2: A thin client is a stateless, fanless desktop terminal that has no hard drive. All features typically found on the desktop PC, including applications, sensitive data, memory, etc., are stored back in the data center when using a thin client, most typically in a VDI or other environment. To set up a thin client, you will first connect it to the network, update its security software, and then install/configure any applications needed to access the VDI environment.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Question 51:
Which of the following components would require you to de-solder the old part from the laptop to install and solder in a new one?
Battery
Screen
Cellular card
DC jack

A

BatteryScreenCellular cardCorrect answerDC jackOverall explanationOBJ-1.1: It is relatively common for the DC jack to fail over time. The DC jack can become loose over time, or the jack itself can become separated from the motherboard. Replacing a DC jack requires disassembling the laptop, de-soldering and removing the old jack, then soldering the new jack into place. Most laptop DC jacks are specific to the manufacturer and the laptop model. Cellular cards are usually installed in a Mini PCIe expansion card slot and are not soldered to the motherboard. The screen and the battery are not soldered in most laptops and can be replaced by removing and replacing screws. Some manufacturers have begun soldering screens and batteries in some of their models, but this is still not considered common practice. A DC jack is always solder to the motherboard in a laptop, therefore it is the best answer to this question.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Question 52:
An employee’s workstation will operate for a short period of time, but then it unexpectedly shuts down. When you check the workstation, you hear the hum of the cooling fans. What is most likely the issue?
CPU overheated
GPU overheated
Defective case fan
Defective NIC card

A

Correct answerCPU overheatedGPU overheatedDefective case fanDefective NIC cardOverall explanationOBJ-5.2: If a computer’s CPU becomes overheated, the system will unexpectedly shut down the computer to protect the processor from damage. This usually occurs if the CPU’s cooling fan isn’t working properly, the heat sink is dislodged, or the thermal paste breaks down. In this case, you would need to remove the heat sink, remove the processor, reseat the processor, reapply thermal paste, reattach the heat sink, and reconnect the processor fan before rebooting the computer to solve this issue.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Question 53:
Tim’s laptop was recently upgraded to Windows 11 but is now running more slowly due to the increased memory requirements. He has decided to install some additional RAM to speed up the laptop. Which of the following should he install?
SODIMM
GDDR5
VRAM
DIMM

A

Correct answerSODIMMGDDR5VRAMDIMMOverall explanationOBJ-1.1: Laptops and integrated PCs usually use SODIMM memory due to the memory module’s smaller footprint. A small outline dual inline memory module (SODIMM) can be purchased in various types and sizes to fit any laptop. A dual in-line memory module (DIMM) comprises a series of dynamic random-access memory integrated circuits. A DIMM is used in workstations and printers due to its larger size and shape. VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display. GDDR5 is the DDR5 memory for a graphics card, not a laptop. For the exam, if you are ever asked about installing memory in a small form factor device or a laptop, the answer will usually be SODIMM.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Question 54:
Eleanor, a user, contacts the help desk to report that her workstation will not boot up this morning. The help desk technician verifies that the workstation’s memory, power supply, and monitor function properly. The technician believes that the hard drive is not recognized by the system based on an error message displayed on the screen. Which of the following error messages was being displayed?
NTLDR not found
Operating system not found
No boot device available
BIOS ROM checksum error

A

NTLDR not foundOperating system not foundCorrect answerNo boot device availableBIOS ROM checksum errorOverall explanationOBJ-5.3: “No boot device available” is an error message that indicates the workstation is not recognizing the hard drive. If the error message were “Operating system not found” or “NTLDR not found,” this would indicate that the hard drive was recognized but that the Windows OS was not installed properly. The “BIOS ROM checksum error” would indicate an issue with the BIOS, not the hard drive.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Question 55:
Which of the following types of networking hardware is used to connect two dissimilar networks such as connecting a local area network (LAN) to the wide area network (WAN)?
Access point
Managed switch
Router
Hub

A

Access pointManaged switchCorrect answerRouterHubOverall explanationOBJ-2.2: A router is a network device that links dissimilar networks and can support multiple alternate paths between locations based upon the parameters of speed, traffic loads, and cost. Routers are used to logically divide networks into subnets. A hub provides no intelligence in its interconnection functions so that whatever is received on one port is repeated out every other port. This leads to many collisions occurring on the hub and increases the number of rebroadcasts which slows down the entire network. A wireless access point (WAP), or access point, connects directly to a wired local area network and the AP then provides wireless connections using Wi-Fi for other devices to use that wired connection. An AP supports the connection of multiple wireless devices through their one wired connection. A switch is a network device that receives incoming data into a buffer, then the destination MAC address is compared with an address table so that data is only sent out to the port with the corresponding MAC address. In a switched network, each port is in a separate collision domain. A managed switch is a switch with advanced networking functions and security settings that can be enabled and configured by an administrator.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Question 56:
Which of the following is NOT an example of another name for a Crash Screen?
DoS
Kernel Panic
BSOD
Pinwheel of Death

A

Correct answerDoSKernel PanicBSODPinwheel of DeathOverall explanationOBJ 5.3 - DoS stands for Denial of Service. It is a form of cyber attack, not a name for a crash screen. Crash screens are referred to by different names based on the operating system. BSOD (Blue Screen of Death) is used for Windows. The Pinwheel of Death is used for MacOS. Kernel Panic is used for Linux.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Question 57:
An employee at Dion Training complains that their smartphone is broken. They state that it cannot connect to the internet, nor can it make or receive phone calls and text messages. You ask them to start up the music player on his phone, and it opens without any issues. It appears the common issue has to do with the device’s network connectivity. Which of the following is MOST likely the problem with this smartphone?
The VPN password was entered incorrectly
The cellular radio in it is broken
The Bluetooth connection is disabled
Airplane mode is enabled on the device

A

The VPN password was entered incorrectlyThe cellular radio in it is brokenThe Bluetooth connection is disabledCorrect answerAirplane mode is enabled on the deviceOverall explanationOBJ-1.4: If the smartphone is functioning properly except for applications that require network connectivity, then the issue is either a misconfiguration (like enabling airplane mode by mistake), a defective cellular radio chip, or a similar issue. The most likely cause is that the employee accidentally enabled the airplane mode on the device that turns off the cellular radio for the smartphone and can cause the network connectivity to be lost. A technician should first verify that airplane mode is disabled and that the cellular radio is enabled. If that doesn’t solve the problem, then the technician should investigate whether it is a hardware issue (such as a broken cellular radio chip). The Bluetooth connection being disabled would affect paired devices like a headset or wireless speaker, not the ability of the device to connect to the internet. According to the scenario presented, there is no mention of a VPN, so the VPN password being incorrectly answered is not correct.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Question 58:
A computer technician tries to determine if a computer with an Intel i7 processor has virtualization enabled to run a second operating system within VirtualBox. Which of the following should be checked to determine if the system can run a virtual machine?
Enable virtualization within Windows
Enable virtualization within the BIOS
Verify AMD-V is installed
Verify Hyper-V is installed

A

Enable virtualization within WindowsCorrect answerEnable virtualization within the BIOSVerify AMD-V is installedVerify Hyper-V is installedOverall explanationOBJ-4.2: By checking the settings in the BIOS, it can be determined if virtualization was enabled. For an Intel processor, this option is usually listed as VT (Virtualization Technology). For an AMD processor, this is usually listed as AMD-V. Virtualization allows the system to run another operating system within a virtualized environment, such as VirtualBox, VM Ware, or Hyper-V.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Question 59:
A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network. Which of the following should the technician check FIRST during troubleshooting?
Encryption type
WAP placement
WAP SSID
Bandwidth saturation

A

Encryption typeCorrect answerWAP placementWAP SSIDBandwidth saturationOverall explanationOBJ-5.7: For optimal network performance, the placement of the Wireless Access Point (WAP) guidelines should be taken into consideration to ensure that the building’s construction doesn’t cause interference with the wireless signals. To determine if adequate coverage and signal strength is being received in the building, you can conduct a wireless site survey. The service set identifier (SSID) is a group of wireless network devices which share a common natural language label, such as a network name. The SSID would not affect the devices and cause sporadic connection drops. Bandwidth saturation is a phenomenon that occurs when all of a circuit’s available bandwidth in a given direction is being utilized by a large upload or download which can result in high latency and performance issues. Bandwidth saturation would not cause the wireless connection to drop, though. Encryption type refers to the type of security used on a wireless network, such as WEP, WPA, WPA2, or WPA3. The security type used on a network would not cause sporadic drops of the network connection, though.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Question 60:
Which RAID solution will provide the BEST speed and redundancy for a backup and disaster recovery server?
RAID 1
RAID 0
RAID 10
RAID 5

A

RAID 1RAID 0Correct answerRAID 10RAID 5Overall explanationOBJ-3.3: RAID 10 provides the system with both speed and efficiency. With RAID 10, the system has a mirror of striped disks for full redundancy and double fault tolerance. RAID 10 configuration (also known as RAID 1+0) requires a minimum of four disks and mirrors data across a striped disk pair. This is not only the best option presented in this question but also the most expensive option. A RAID 0 provides disk striping (speed/performance) but not mirroring with a minimum of two disks. A RAID 1 provides mirroring (redundancy) but not disk striping with a minimum of two disks. A RAID 5 provides block-level striping with distributed parity to provide redundancy using a minimum of three disks.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Question 61:
Which button on a desktop computer begins a reboot of the computer without power being removed from the computer’s components?
Reset
Suspend
Power
Hibernate

A

Correct answerResetSuspendPowerHibernateOverall explanationOBJ-3.4: The reset button is usually located on the front panel of a desktop computer next to the power button. When the reset button is pressed, it allows the user to reboot the computer without releasing power from the system’s components. This is often used when software has malfunctioned and caused the computer to halt or lock up. The power button is used to shut down or put the computer to sleep. There is usually not a dedicated suspend or hibernate button, but these are instead provided as software buttons in the operating system.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Question 62:
When using a Type 1 hypervisor virtualized environment, which of the following hardware types is necessary to connect the VMs to the corporate network?
Virtual NIC
VNC
VDI
VPN

A

Correct answerVirtual NICVNCVDIVPNOverall explanationOBJ-4.2: A virtual machine includes a virtual NIC. A virtual NIC is a type of virtual adapter that can be configured on logical partitions to provide a network interface. This virtual NIC can be paired and mapped to a physical NIC to get the VM onto the network. Virtual Desktop Infrastructure (VDI) is a software technology that separates the desktop environment and associated application software from the physical client device that is used to access it. A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Virtual Network Computing (VNC) is a cross-platform screen sharing system that was created to remotely control another computer from a distance by a remote user from a secondary device as though they were sitting right in front of it.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Question 63:
Which of the following network configurations on a virtual machine are used to prevent the VM from accessing the internet, but still allow it to communicate with other VMs on the host and the host itself?
Internal
Private
Localhost
External

A

Correct answerInternalPrivateLocalhostExternalOverall explanationOBJ-4.2: Virtual machines can have their network configured as internal to prevent them from communicating with the internet. When configured to internal, the VMs can communicate with each other and the host machine. The private network connection type will create a switch that is usable only by the VMs. The VMs cannot use the switch to communicate with the host. If you select external, the VMs would have internet access. If you select localhost, each VM could only communicate with itself.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Question 64:
Your company has decided to upgrade its legacy phone system to use VoIP devices instead. The new phones will download the configurations from a server each time they boot up. Which of the following ports needs to be opened on the firewall to ensure the phones can communicate with the TFTP server and download their boot-up configurations?
53
69
21
161

A

53Correct answer6921161Overall explanationOBJ-2.1: Trivial File Transfer Protocol (TFTP) is a simple protocol that provides a basic file transfer function with no user authentication. TFTP uses port 69 to communicate. TFTP is intended for applications that do not need the sophisticated interactions that File Transfer Protocol (FTP) provides. The File Transfer Protocol is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP uses port 21 to communicate. The Domain Name System (DNS) is used to translate requests for names into IP addresses, controlling which server an end-user will reach when they type a domain name into their web browser. DNS uses port 53 to communicate. The Simple Network Management Protocol (SNMP) is a networking protocol used for the management and monitoring of network-connected devices in Internet Protocol networks. SNMP uses port 161 to communicate.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Question 65:
You are setting up a new wireless network at the local branch of your community’s public library. Previously, the library only had a small wired network that relied on statically assigned IP addresses. You just finished installing all of the wireless access points. You configured a server to automatically provide an IP address to wireless clients when connecting to one of the wireless access points. To test the new wireless network, you turn on your wireless adapter on your laptop and connect to the network. Your laptop is automatically assigned an IP address of 192.168.1.12 from the DHCP server, and you can ping the default gateway of 192.168.1.1. You open a web browser and attempt to connect to diontraining.com, but you cannot connect and instead receive an error. You attempt to ping the IP address for the Google DNS server (8.8.8.8) and are successful. Which of the following should you attempt to do NEXT to resolve this issue?
Disable the Windows Firewall to ensure it isn’t blocking your access to the website
Verify that the DHCP server is properly configured to provide the IP address of a DNS server
Enable DHCP inside of your laptop’s network adapter settings
Disable the Broadcast SSID option for the wireless access point

A

Disable the Windows Firewall to ensure it isn’t blocking your access to the websiteCorrect answerVerify that the DHCP server is properly configured to provide the IP address of a DNS serverEnable DHCP inside of your laptop’s network adapter settingsDisable the Broadcast SSID option for the wireless access pointOverall explanationOBJ-5.7: Since you are already connected to the wireless network and can ping the gateway using its IP address, you already know the SSID and DHCP are properly configured (therefore, you should not select these options). It is a poor security practice to disable the firewall, so it is not recommended that you choose this option. Since we cannot access a website using its domain name (diontraining.com), we can successfully ping a remote server using its IP address (8.8.8.8). This indicates that your laptop has not been properly assigned a DNS server to use by the DHCP server. Therefore, you need to verify the DHCP server is properly configured to provide the IP address of a DNS server to the clients when it assigned them their IP address configuration information.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Question 66:
Dion Training has asked you to consult on the installation of their new file server. The current server consists of a RAID 5 array with three 1 TB 7200 RPM hard disk drives. Due to the increased reliance on the new file server, you have been asked to recommend a RAID solution that will help ensure there is no unscheduled downtime, no data loss, and increase speed/performance over the current file server. Based on these requirements, which of the following RAID solutions should you recommend?
RAID 5
RAID 0
RAID 1
RAID 10

A

RAID 5RAID 0RAID 1Correct answerRAID 10Overall explanationOBJ-3.3: A RAID 10 is the best solution to meet all of these requirements since it provides a fully redundant RAID with both the advantages of mirroring and disk striping. RAID 5 provides redundancy, but it will not improve the speed/performance over the current file server in use since it was also a RAID 5. A RAID 0 provides disk striping (speed/performance) but not mirroring with a minimum of two disks. A RAID 1 provides mirroring (redundancy) but not disk striping with a minimum of two disks. A RAID 5 provides block-level striping with distributed parity to provide redundancy using a minimum of three disks.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Question 67:
Which of the following types of optical discs can only support storing up to 700 MB on a single piece of media?
SD
DVD-R
BD-R
CD-RW

A

SDDVD-RBD-RCorrect answerCD-RWOverall explanationOBJ-3.3: A CD can store up to 700 MB. A DVD can store 4.7 GB for a single-layer disc or 8.5 GB for a dual-layer disc. A Blu-ray disc can store up to 25 GB for a single-layer disc or 50 GB for a dual-layer disc. A SD card is a type of memory card and is not considered an optical disc.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Question 68:
Your boss is looking for a recommendation for a backup solution that can backup non-sensitive data in the most cost-efficient way. The company already has an Office 365 subscription for each employee. The employees should be able to backup and access their data from anywhere using their laptops, smartphones, or tablets. Which of the following solutions should you recommend?
OneDrive
G Suite
iCloud
AWS S3

A

Correct answerOneDriveG SuiteiCloudAWS S3Overall explanationOBJ-4.1: OneDrive is a Microsoft product that comes as part of the Office 365 subscription package. The other options can also provide the capabilities requested, but there would be a separate cost to utilize them. Therefore, you should recommend OneDrive in this scenario. OneDrive can utilize the storage that is easy to access from a laptop, smartphone, or tablet while the employees are away from their offices. Software as a Service (SaaS) is a cloud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

Question 69:
Which of the following describes the IP address of a router to which packets destined for a remote network should be sent by default?
Gateway
Static IP
Subnet mask
Dynamic IP

A

Correct answerGatewayStatic IPSubnet maskDynamic IPOverall explanationOBJ-2.5: The default gateway parameter is the IP address of a router to which packets destined for a remote network should be sent by default. This setting is not required, but if you do not have one included, your network traffic can never leave the local area network. A static IP address is used when the DHCP server is disabled and clients are configured manually to join the network properly. A dynamic IP address is configured automatically by a DHCP server when a new host joins the network. The subnet mask is used in IPv4 to distinguish these two components within a single IP address. The subnet mask differentiates the two portions of an IP address into the Network ID and the Host ID.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Question 70:
You are troubleshooting a computer that will not boot. You do not hear anything when you attempt to boot the computer, but you smell something that reminds you of burning plastic. Which of the following tools should you use to diagnose the problem with this computer?
Power supply tester
Toner probe
Cable tester
ESD strap

A

Correct answerPower supply testerToner probeCable testerESD strapOverall explanationOBJ-5.2: The smell of burning plastic and the computer not turning on are symptoms of a power supply issue. Therefore, you should use a power supply (PSU) tester. A burning smell emitting from your laptop indicates that your machine’s cooling system is not functioning properly. If your laptop smells like something is burning, this usually means that your computer is overheating. This can be caused by a fan not working properly. For example, if the power supply unit’s fan isn’t working properly, the unit can overheat, and the wiring in the power supply’s transformer can start to burn or melt. This can then cause the power supply unit to fail, too.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Question 71:
Which of the following is used when a CDMA smartphone attempts to connect to the cellular network while traveling? (Select ANY that apply)
Baseband
Firmware
PRI
PRL

A

BasebandFirmwareCorrect selectionPRICorrect selectionPRLOverall explanationOBJ-1.4: The PRI and PRL must be updated and referenced when traveling. The preferred roaming index (PRI) is an index that works with the PRL to provide the best data/voice quality to a phone while roaming. The preferred roaming list (PRL) is a database built by CDMA service carriers to indicate which radio bands should be used when connecting to a cell tower. The baseband is the embedded operating system in the firmware of a smartphone or other cellular device. The firmware is a set of software instructions stored semi-permanently (embedded) on a hardware device. Modern types of firmware are stored in flash memory and can be updated more easily than legacy programmable Read-Only Memory (ROM) types. The baseband and firmware would not be updated or changed based on your location. The baseband is changed or updated when a security update is needed.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Question 72:
Which of the following is an APIPA or link-local address?
33.52.7.83
127.0.0.1
169.254.64.23
192.168.1.34

A

33.52.7.83127.0.0.1Correct answer169.254.64.23192.168.1.34Overall explanationOBJ-2.5: IP addresses are either public, private, localhost, or APIPA addresses. Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function. When a host uses an APIPA address, it can communicate with other hosts on the same network using APIPA. Still, it cannot reach other networks or communicate with hosts who have managed to obtain a valid DHCP lease. Any address from 169.254.1.0 to 169.254.254.255 is considered an APIPA address. An APIPA address is also referred to as a link-local address. A private IP address is in the range of 10.x.x.x, 172.16-31.x.x, or 192.168.x.x. A localhost IP is 127.0.0.1. All others are considered public IP addresses.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Question 73:
What is used to distribute traffic across multiple sets of devices or connections to increase the overall efficiency of the network and its data processing?
Load balancing
High availability
Traffic shaping
Fault tolerance

A

Correct answerLoad balancingHigh availabilityTraffic shapingFault toleranceOverall explanationOBJ-2.4: Load balancing refers to the process of distributing a set of tasks over a set of resources to make their overall processing more efficient. Load balancing can optimize the response time and avoid unevenly overloading some compute nodes while other compute nodes are left idle. Traffic shaping, also known as packet shaping, is the manipulation and prioritization of network traffic to reduce the impact of heavy users or machines from affecting other users. Traffic shaping is used to optimize or guarantee performance, improve latency, or increase usable bandwidth for some kinds of packets by delaying other kinds. High availability (HA) is a component of a technology system that eliminates single points of failure to ensure continuous operations or uptime for an extended period. Fault tolerance refers to the ability of a system (computer, network, cloud cluster, etc.) to continue operating without interruption when one or more of its components fail.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Question 74:
You are configuring a workstation to be used as a point of sale (POS) device. Which of the following peripherals should you install with the device?
Webcam
Flatbed scanner
Memory card reader
Signature pad

A

WebcamFlatbed scannerMemory card readerCorrect answerSignature padOverall explanationOBJ-1.3: A signature pad is a common peripheral used with a point of sale workstation. This allows a customer to sign a contract or sales receipt digitally. A webcam is a video camera that feeds or streams an image or video in real-time to or through a computer to a computer network, such as the Internet. Webcams are typically small cameras that sit on a desk, attach to a user’s monitor, or are built into a laptop, desktop, or mobile device. A memory card reader is a device containing one or more slots to accommodate reading (and writing) memory cards. A scanner is a type of photocopier that can convert the image of a physical object into an electronic data file. The two main components of a scanner are the lamp, which illuminates the object, and the recording device, an array of CCDs (Charge Coupled Devices). There are flatbed and sheet-fed versions, with sheet-fed versions typically being incorporated with a printer and fax machine into a multifunction device.Domain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Question 75:
Tony, a system administrator, set up a printer on John’s workstation. During the setup, Tony was able to print a test page. Later, when John attempted to print a document, an error message was displayed that indicates access was denied to the printer. John tried to restart the printer and workstation, but the same error message is displayed when he attempts to print a document. Which of the following MOST likely caused this issue?
The printer lacks the memory required to process the document
The user lacks adequate security permissions to the printer
The printer is offline
The print spooler is hung and must be restarted

A

The printer lacks the memory required to process the documentCorrect answerThe user lacks adequate security permissions to the printerThe printer is offlineThe print spooler is hung and must be restartedOverall explanationOBJ-5.6: A printer needs the user to have the proper permissions to print. Since Tony was a system administrator, he had adequate permissions to print the test page. But, if Tony neglected to add the proper permissions to John’s account, then John would be unable to print. This is indicated by the access denied error message received when he attempts to print a document. The printer is not offline since it is powered on and properly connected to the workstation. The print spooler is not hung as evidenced by the system administrator can print to it. Memory limitations can be a factor, but that produces a different error message.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Question 76:
Jason is printing out a copy of Dion Training’s new logo on his color laser printer. When the logo is printed, the blue color does not appear to be the same as the one on the screen. Jason believes the issue is an incorrect chroma display between the monitor and the printer. Which of the following solutions would best fix this issue?
Update the print drivers to ensure they are operating properly
Set the color profile to a sepia tone to eliminate the issue
Calibrate the monitor and printer to use the same color profile
Replace the toner cartridge since the printout is faded

A

Update the print drivers to ensure they are operating properlySet the color profile to a sepia tone to eliminate the issueCorrect answerCalibrate the monitor and printer to use the same color profileReplace the toner cartridge since the printout is fadedOverall explanationOBJ-5.6: Incorrect chroma display occurs when the printer and the monitor are using different color profiles. To fix this issue, it is important to calibrate both the printer and the monitor to the same standard so that the colors will match. Changing the color to a sepia tone would make the printout appear brown which would not solve this issue. Replacing the toner would help if the printout is faded, but that is not occurring in this scenario. The print drivers would not cause the color to be incorrect, only the incorrect chroma settings and calibration would.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Question 77:
Your company’s printer is displaying an error of “Replace cartridge 1. Filament is empty.” Based on this error, what kind of printer is your company using?
3-D
Impact
Inkjet
Laser
Thermal

A

Correct answer3-DImpactInkjetLaserThermalOverall explanationOBJ-3.7: 3-D printers use a filament to create the objects being printed. A 3D printing filament is a thermoplastic feedstock for fused deposition modeling by 3D printers. There are many types of filament available with different properties, requiring different temperatures to print the final product or object. On the exam, you should be thinking about a 3D printer anytime you see the word filament. An inkjet cartridge is used with an inkjet printer. Toner is used with a laser printer. Ribbon is used with an impact printer. Ribbon or special thermal paper is used with a thermal printer.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Question 78:
You just received a phone call from one of your customers regarding an old monitor. The monitor uses a VGA port, and the customer is worried because they only have an old VGA cable that has a few pins broken off. The customer asks you what would happen if they used that cable to connect the monitor over VGA. What would MOST likely happen?
The monitor will be black and white
The monitor will be dim or start to flicker
The display will show incorrect colors on the screen
The monitor will cause distorted images on the screen

A

The monitor will be black and whiteThe monitor will be dim or start to flickerCorrect answerThe display will show incorrect colors on the screenThe monitor will cause distorted images on the screenOverall explanationOBJ-5.4: Unfortunately, a missing or broken pin or two can cause an array of issues. Each of the 15 pins is used to create a composite image on the screen. There are three rows of pins, with 5 pins per row. Due to the pinout of a VGA cable, if pins 1, 2, or 3 are missing, the display will be miscolored. If pins 13 or 14 are missing, the screen will not hold horizontal or vertical sync. The other pins are not used or are used as ground wires. Therefore, either the incorrect colors will show up on the screen, or the screen won’t display at all. The other options are not possible.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Question 79:
A computer technician is configuring a NAS for a company to store their corporate data. The technician has only two hard drives available for use and needs to ensure that the data’s fault tolerance and redundancy. Which of the following would be is the best configuration to implement?
RAID 0
RAID 5
RAID 10
RAID 1

A

RAID 0RAID 5RAID 10Correct answerRAID 1Overall explanationOBJ-3.3: While either a RAID 0 or RAID 1 can be used with only two drives, only a RAID 1 will provide redundancy and fault tolerance. A RAID 0 provides disk striping (speed/performance) but not mirroring with a minimum of two disks. A RAID 1 provides mirroring (redundancy) but not disk striping with a minimum of two disks. With a RAID 1, one of the hard drives can fail while the other drive can still operate until the bad drive is replaced. A RAID 5 provides block-level striping with distributed parity to provide redundancy using a minimum of three disks. A RAID 10 combines disk mirroring and disk striping to protect data stored in the array and required a minimum of four disks. A RAID 5 requires at least three hard drives to operate, and a RAID 10 requires at least four hard drives to operate; therefore, neither is an acceptable solution to this problem.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Question 80:
Dion Training has recently installed a new VoIP telephone service in their offices. The employees are now complaining that their phone calls are being dropped during the middle of their conversations. The company has a single 48-port gigabit ethernet layer 3 switch that supports their desktops, laptops, and VoIP devices. Which of the following should the company do to prevent VoIP calls from dropping?
Increase the MTU
Enforce MAC filtering
Implement QoS
Configure the DHCP server

A

Increase the MTUEnforce MAC filteringCorrect answerImplement QoSConfigure the DHCP serverOverall explanationOBJ-5.7: To prevent the calls from being dropped, quality of service should be implemented on the switch. Quality of Service (QoS) means using a network protocol to prioritize certain traffic types over others. Enterprise networks can use QoS protocols to make sure traffic such as Voice over IP calling or video conferencing is given higher priority than traffic where packets’ timing is less important, such as ordinary file downloads. MAC Filtering refers to a security access control method whereby the MAC address assigned to each network card is used to determine access to the network. The dynamic host control protocol (DHCP) is a protocol used to allocate IP addresses to a host when it joins a network. DHCP utilizes UDP ports 67 and 68. MTU is the largest unit that can be transmitted across a network. If the MTU is set at a value above 1500, the network is configured to support jumbo frames.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Question 81:
On Saturdays, your best friend goes to the local farmer’s market to sell his homemade craft root beer. He wants to add the ability to take credit card payments from customers on his mobile phone. Which of the following devices should he purchase and configure?
Bluetooth card reader
Memory card reader
DB-9 reader
IR reader

A

Correct answerBluetooth card readerMemory card readerDB-9 readerIR readerOverall explanationOBJ-1.3: A Bluetooth card reader can be used to capture the purchaser’s credit card details. These Bluetooth card readers may support magnetic card reading capabilities (swiping a card), smart chip reading capabilities (chip and pin), or even NFC reading capabilities (Google Pay, Apple Pay, etc.). For example, in the United States, Square’s mobile payment terminal is popular for small businesses and entrepreneurs. By capturing the credit card details electronically (instead of just typing them in), the merchant pays a lower payment processing fee and saves on credit card fees charged when a customer makes a purchase. DB-9 is a type of serial port connector used on legacy desktops and laptops. Infrared (IR) was a wireless networking standard supporting speeds up to about 4 Mbps with a direct line of sight for communications. Infrared sensors are used in mobile devices and with IR blasters to control appliances. While infrared (IR) used to be commonly used to connect wireless mice and keyboards to a laptop in the 1990s, it has fallen out of favor in the last 10-15 years since Bluetooth is more reliable and does not require a direct line of sight between the device and the laptop. A memory card reader is a device containing one or more slots to accommodate reading (and writing) memory cards. A memory card is a flash drive typically used for digital cameras and smartphonesDomain1 - Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Question 82:
What type of expansion bus technology uses lanes with point-to-point communication paths between two components on the motherboard?
PCI-X
PCIe
PCI
AGP

A

PCI-XCorrect answerPCIePCIAGPOverall explanationOBJ-3.4: PCIe (Peripheral Component Interconnect Express) uses lanes between any two intercommunicating devices. This utilizes a separated pair of wires for both directions of traffic. This increases the bus lanes’ speed since there is no possibility of collisions or waiting for other devices to finish communicating. PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has some PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. Graphics cards almost exclusively rely on PCIe x16 expansion slots for their connectivity. AGP, PCI, and PCI-X are older technologies that rely on shared busses for communication.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Question 83:
Which of the following is NOT considered part of the Internet of Things?
ICS
Laptop
Smart television
SCADA

A

ICSCorrect answerLaptopSmart televisionSCADAOverall explanationOBJ-2.4: Supervisory control and data acquisition (SCADA) systems, industrial control systems (ICS), internet-connected televisions, thermostats, and many other things examples of devices classified as the Internet of Things (IoT). A laptop would be better classified as a computer or host than part of the Internet of Things. The Internet of things (IoT) is a system of interrelated computing devices, mechanical and digital machines provided with unique identifiers (UIDs), and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Question 84:
Which of the following protocols operates over port 3389 by default?
RDP
POP3
Telnet
SSH

A

Correct answerRDPPOP3TelnetSSHOverall explanationOBJ-2.1: The remote desktop protocol (RDP) is a protocol used for the remote administration of a host using a graphical user interface. RDP operates over TCP port 3389. Secure shell (SSH) is the protocol used for remote administration and file copying using TCP port 22. SSH is considered secure since it uses authenticated and encrypted sessions for communication. Telnet is the protocol used for remote command-line administration of a host using TCP port 23. Telnet is considered insecure since it is unauthenticated and unencrypted. The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Question 85:
A client claims that their computer keeps rebooting itself without warning. Which of the following is the BEST action you should take to investigate and troubleshoot this issue?
Reinstall the operating system
Replace the cooling fan
Replace the power supply
Test the power supply

A

Reinstall the operating systemReplace the cooling fanReplace the power supplyCorrect answerTest the power supplyOverall explanationOBJ-5.2: A computer that keeps rebooting itself is a symptom of a faulty power supply or a computer that is overheating. If the power supply is faulty, the computer will reboot itself. If the issue is caused by an overheating issue (such as a cooling fan failure), the computer will usually reboot itself after running for 15-20 minutes (once enough heat is built-up). Therefore, you should test the power supply first to determine if that is the root cause of the issue, and then replace the power supply, if required.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Question 86:
What is the name of the networking protocol used by macOS to find available printers on the network to use?
Cloud Print
Internet Printing Protocol
Line Printer Daemon
Bonjour

A

Cloud PrintInternet Printing ProtocolLine Printer DaemonCorrect answerBonjourOverall explanationOBJ-3.6: Bonjour, Apple’s zero-configuration networking protocol, automates certain aspects of network configuration; the protocol enables devices connected to the local area network to discover and connect automatically. Businesses can use Bonjour to make the sharing of files and devices easier; the technology works with wired and wireless LANs. After enabling Bonjour on a workstation, other computers on the network can detect and install printers or scanners attached to the workstation or access files from shared folders. The Internet Printing Protocol (IPP) is a specialized Internet protocol for communication between client devices and printers (or print servers) using the HTTP protocol for data transport. The Line Printer Daemon (LPD) protocol is a network printing protocol for submitting print jobs to a remote printer. LPD is an older protocol than IPP. Cloud Print is a service that allows users to print from any device in the network cloud to any printer that has Cloud Print support enabled.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Question 87:
What type of connector can be inserted into the port in either direction without damaging the port?
USB Type B
USB Type A
FireWire
USB Type C

A

USB Type BUSB Type AFireWireCorrect answerUSB Type COverall explanationOBJ-3.1: A USB Type C (USB-C) is a 24-pin USB connector with a rotational symmetrical connector, which means it can be plugged into the port in either direction. USB-C makes it easier and more convenient to plug into a USB-C female port than previous versions like Type A and Type B. FireWire and USB Type B use a d-shaped connector that can only be inserted in one direction. USB Type A uses a rectangular connector with a protrusion on one half of the connector to force insertion in only one direction.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Question 88:
You are working at the service desk when a customer calls up and complains that their laptop’s monitor looks strange. When pressed for further details, they state that there are black bars on the left and right sides of the screen and that the image appears squashed and distorted. What is MOST likely the cause of this issue?
External RF interference
Incorrect color depth
Bad video card
Incorrect display resolution

A

External RF interferenceIncorrect color depthBad video cardCorrect answerIncorrect display resolutionOverall explanationOBJ-5.4: This is likely a screen resolution problem. Each LCD/LED has a native resolution that fits perfectly on the screen. If a resolution other than the native resolution is used, the screen could become squished, distorted, or have black vertical or horizontal lines filling up the excess space. For example, most laptops operate as a 16:9 or 16:10 aspect ratio. Older VGA monitors relied on a 4:3 aspect ratio using 1024x768 pixels whereas newer monitors use a 16:9 ratio at 1920x1080 pixels.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Question 89:
You are troubleshooting an older wireless network that is running Wireless G (802.11g). This network appears to have a lot of collisions and interference. You look up the configuration on two of the three access points in the areas and see they are using Channel 1 and Channel 6. To prevent interference and ensure non-overlapping of the channels, what channel should the third access point utilize?
Channel 12
Channel 11
Channel 10
Channel 9

A

Channel 12Correct answerChannel 11Channel 10Channel 9Overall explanationOBJ-2.3: With wireless access points that run 2.4 GHz frequencies, you can only select channels between 1 and 11 in the United States. This includes 802.11b, 802.11g, 802.11n, and 802.11ax networks. To prevent overlapping of the channels, you should select channels 1, 6, and 11. By doing so, you can increase the reliability and throughput of your wireless network.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

Question 90:
What type of cloud service provides instant access to servers and switches, quickly provisioned, and available for management over the internet?
PaaS
SaaS
IaaS
DaaS

A

PaaSSaaSCorrect answerIaaSDaaSOverall explanationOBJ-4.1: Infrastructure as a service (IaaS) is an instant computing infrastructure, provisioned, and managed over the internet. Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center. IaaS quickly scales up and down with demand, letting you pay only for what you use. It helps you avoid the expense and complexity of buying and managing your physical servers and other data center infrastructure. Each resource is offered as a separate service component, and you only need to rent a particular one for as long as you need it. A cloud computing service provider manages the infrastructure while you purchase, install, configure, and manage your software. Platform as a Service (PaaS) is a cloud computing service that enables consumers to rent fully configured systems that are set up for specific purposes. Software as a Service (SaaS) is a cloud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions. Desktop as a Service (DaaS) provides a full virtualized desktop environment from within a cloud-based service. This is also known as VDI (Virtualized Desktop Infrastructure) and is coming in large enterprise businesses focused on increasing their security and minimizing their operational expenses.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

Question 1:
A military contracting firm is worried about proprietary corporate information being removed from the company’s network. To combat this, they have created strict rules regarding what types of information can leave their office building. You have been asked to fix a workstation for the company and have been brought on-site to troubleshoot the issue. You have properly followed the troubleshooting steps and have created a plan of action to fix the workstation. Unfortunately, your solution will require that the workstation be taken back to your off-site repair shop to solve the workstation’s problems fully. What is the NEXT thing you should do to fix this workstation?
Format the hard drive of the workstation to delete all proprietary data before taking the workstation to your repair shop
Remove the internal hard disk drive and then take the workstation with you to your repair shop to fix it
Verify the contracting firm’s corporate polices regarding the removal of a workstation for repairs
Ask the employee who usually works on the workstation if you can take it to your repair shop

A

Format the hard drive of the workstation to delete all proprietary data before taking the workstation to your repair shopRemove the internal hard disk drive and then take the workstation with you to your repair shop to fix itCorrect answerVerify the contracting firm’s corporate polices regarding the removal of a workstation for repairsAsk the employee who usually works on the workstation if you can take it to your repair shopOverall explanationOBJ-5.1: You should always verify the company’s corporate policies you are working with for any specialized procedures or requirements involved when you are asked to work on a machine containing proprietary information. Based on their corporate policies, they may require you to remove the hard drive, delete the information on the hard drive, or follow other technical or administrative procedures before you can remove the workstation from their facility. It is not simply enough to ask the employee who normally works on that computer since they may not be authorized to make that decision (based on their corporate policies).Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

Question 2:
Which cloud computing concept allows users to store files on a cloud-based server when necessary and copy that data from the cloud, and put it back on the device when space once again becomes available on the device?
On-demand
Shared resources
Synchronization application
Resource pooling

A

Correct answerOn-demandShared resourcesSynchronization applicationResource poolingOverall explanationOBJ-4.1: On-demand refers to the fact that a consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. In this question, the cloud storage is provisioned and deprovisioned automatically for the user, and thereby it would be categorized as on-demand. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. Using a synchronization app can allow the files to be stored on both the laptop and the cloud service while maintaining the latest versions in both places. This allows a user to synchronize content between all of their own devices as well as share their cloud storage content with other users. Multiple users can simultaneously access the content to work collaboratively, or they can access it at different times. Each user’s changes are typically marked with a flag or color highlighting to indicate who made changes to what content. Shared resources are any resources shared by multiple users or systems within an internal or cloud-based network.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Question 3:
A technician at Dion Training is troubleshooting an issue with a workstation. The technician believes that the motherboard needs to be replaced based on the symptoms they observed. Which of the following symptoms did the technician likely observe to lead them to this conclusion?
Distended capacitors
Incorrect date/time on the workstation
Continuous reboot
Burning smell

A

Correct answerDistended capacitorsIncorrect date/time on the workstationContinuous rebootBurning smellOverall explanationOBJ-5.2: A foul odor is indicative of a distended capacitor. The incorrect date/time on the workstation is indicative of a dead CMOS battery. A burning smell is indicative of a bad power supply. Hardware failure or system instability can cause the computer to reboot continuously. The problem could be the RAM, hard drive, power supply, graphics card, or external devices. Based on the symptoms of a continuous reboot, the supervisor likely suspected the RAM as the cause of the issue.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Question 4:
Dion Training has just installed a new web server and created an A record for DionTraining.com. When users try entering www.DionTraining.com, though, they get an error. You tell their network administrator that the problem is because he forgot to add the appropriate DNS record to create an alias for www to the domain’s root. Which type of DNS record should be added to fix this issue?
AAAA
NS
PTR
CNAME

A

AAAANSPTRCorrect answerCNAMEOverall explanationOBJ 2.6: A CNAME record is a canonical name or alias name, which associates one domain name as an alias of another (like beta.diontraining.com and www.diontraining.com could refer to the same website using a CNAME). An AAAA record associates your domain name with an IPv6 address. A Name Server (NS) is for identifying authoritative name servers. A Pointer (PTR) is for reverse DNS lookups.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Question 5:
Which of the following provides a cryptographic authentication mechanism to positively identify an organization as the authorized sender of email for a particular domain name?
SMTP
DKIM
DMARC
SPF

A

SMTPCorrect answerDKIMDMARCSPFOverall explanationOBJ-2.6: DomainKeys Identified Mail (DKIM) provides a cryptographic authentication mechanism. This can replace or supplement SPF. To configure DKIM, the organization uploads a public key as a TXT record in the DNS server. Sender Policy Framework (SPF) uses a DNS record published by an organization hosting an email service. The SPF record identifies the hosts authorized to send emails from that domain, and there must be only one per domain. SPF does not provide a cryptographic authentication mechanism like DKIM does, though. The Domain-Based Message Authentication, Reporting, and Conformance (DMARC) framework can ensure that SPF and DKIM are being utilized effectively. DMARC relies on DKMI for the cryptographic authentication mechanism, making it the incorrect option for this question. The simple mail transfer protocol (SMTP) is a communication protocol for electronic mail transmission, which does not utilize cryptographic authentication mechanisms by default.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

Question 6:
Samuel is building a backup file server, and he wants to ensure that he can minimize downtime. Which of the following considerations should be MOST important when choosing a storage controller card for this server?
Support for at least 100 TB of connected storage
Support for hot-swappable drives
Support for the fastest speeds available
Providing the least expensive option available

A

Support for at least 100 TB of connected storageCorrect answerSupport for hot-swappable drivesSupport for the fastest speeds availableProviding the least expensive option availableOverall explanationOBJ-3.3: The primary consideration for the storage controller card is that it supports hot-swappable drives. Being hot-swappable means that a bad HDD can be removed and replaced while the server runs, which prevents downtime. Data loss can be prevented by configuring a RAID 1, RAID 5, RAID 6, or RAID 10, and the RAID can automatically replicate the data to the new hard drive that is replaced during the hot swapping process without any downtime or data loss. While the other options may be good features to have, the most important feature is support for hot-swapping to minimize downtime.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Question 7:
Which of the following tools is used to identify why an 802.11g network is intermittently dropping network traffic?
Cable tester
Tone generator and probe
WiFi analyzer
Multimeter

A

Cable testerTone generator and probeCorrect answerWiFi analyzerMultimeterOverall explanationOBJ-5.7: A WiFi analyzer can determine the wireless network’s signal strength, the frequencies in use, and any possible radio frequency interference. Based on the issue described in the question, the network may have dead zones that could be fixed by adding additional access points to increase the network’s wireless coverage. Another possible issue could be radio frequency interference from other devices, which a WiFi analyzer could help identify. A cable tester is used to ensure a cable is properly created as a patch cable (straight through) or a crossover cable. Cable testers provide detailed information on the physical and electrical properties of the cable. For example, they test and report cable conditions, crosstalk, attenuation, noise, resistance, and other cable run characteristics. A multimeter can measure the voltage, amperage, and resistance of a circuit. A multimeter can be a hand-held device useful for basic fault finding and field service work or a bench instrument that can measure electricity with a high degree of accuracy. A tone generator is connected to a wall jack and sends a repeating signal over the cable. The probe can then be used to detect which cable is attached to the wall jack by detecting the signal being sent by the tone generator. The probe needs to be near or touch the cable with the tone generator attached to identify it positively.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

Question 8:
Your boss is looking for a recommendation for a cloud solution that will only allow your company’s employees to use the service while preventing anyone else from accessing it. What type of cloud model would you recommend to ensure the contents are best secured from those outside your company?
Hybrid Cloud
Public Cloud
Community Cloud
Private Cloud

A

Hybrid CloudPublic CloudCommunity CloudCorrect answerPrivate CloudOverall explanationOBJ-4.1: A private cloud service would be the best recommendation to protect and secure the services from those outside the company from accessing its contents. The private cloud is defined as computing services offered either over the Internet or a private internal network and only to select users instead of the general public. Private cloud computing gives businesses many of the benefits of a public cloud including self-service, scalability, and elasticity with the additional control and customization available from dedicated resources over a computing infrastructure hosted on-premises. Private clouds also deliver a higher level of security and privacy through both company firewalls and internal hosting to ensure operations and sensitive data are not accessible to third-party providers. A public cloud contains services offered by third-party providers over the public Internet and is available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume. A public cloud contains services offered by third-party providers over the public Internet and is available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume. A community cloud is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third party and hosted internally or externally.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

Question 9:
Which of the following devices is installed in a communication closet to connect network wall jacks to a network switch using pre-wired RJ-45 ports?
Access point
Router
Hub
Patch panel

A

Access pointRouterHubCorrect answerPatch panelOverall explanationOBJ-2.2: A patch panel is used in a structured cabling system. A computer is connected to a wall jack in this cable system and then connected to a patch panel by cabling running through the walls. A pre-wired RJ-45 port on the patch panel is then connected to a port on the switch using a straight-through or patch cable. A router is a network device that links dissimilar networks and can support multiple alternate paths between locations based upon the parameters of speed, traffic loads, and cost. Routers are used to logically divide networks into subnets. A wireless access point (WAP), or access point, connects directly to a wired local area network and the AP then provides wireless connections using Wi-Fi for other devices to use that wired connection. An AP supports the connection of multiple wireless devices through their one wired connection. A hub provides no intelligence in its interconnection functions so that whatever is received on one port is repeated out every other port. This leads to many collisions occurring on the hub and increases the number of rebroadcasts which can slow down the entire network.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

Question 10:
Jason’s iPad only had 12% battery remaining at the end of the day, so he connected his iPad to the lightning cable and wall adapter last night before going to bed. In the morning, Jason tried to turn on the iPad, but it appeared to be completely powered down, and the battery was drained. Jason connected the lightning cable to his iPhone, and the iPhone began charging. Which of the following is MOST likely the reason that the iPad didn’t charge overnight?
Defective battery
Defective lightning cable
Defective AC adapter
Defective charging port on the iPad

A

Defective batteryDefective lightning cableDefective AC adapterCorrect answerDefective charging port on the iPadOverall explanationOBJ-5.5: Since the iPad didn’t charge overnight, but the iPhone could charge with the same wall adapter and lightning cable, so we must suspect that the charging port or the battery on the iPad is defective. Since the iPad’s battery was working yesterday during the day (as noted by the 12% battery remaining at the end of the day), it is MOST likely that the charging port is defective.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

Question 11:
Dion Training’s file server uses a RAID 5 for its main data store. Recently, the RAID began flashing from green to yellow. Additionally, an alert was received that stated, “RAID ARRAY DISK1 FAILURE”. Unfortunately, the company no longer has any spare 1 TB, 5400 RPM Seagate drives, so a technician replaces DISK1 with a 1 TB, 7200 RPM Western Digital drive. When the technician attempts to rebuild the array, the drive stays in degraded operation and continues to alert that “RAID ARRAY DISK1 FAILURE” is occurring. What is the most likely cause of this issue?
The new drive is not formatted as FAT32
Bad SATA cable
The HDD is incompatible
Incorrect SCSI ID set

A

The new drive is not formatted as FAT32Bad SATA cableCorrect answerThe HDD is incompatibleIncorrect SCSI ID setOverall explanationOBJ-5.3: In this scenario, likely, the replacement HDD may not be compatible with the RAID. This will cause the RAID to stay degraded and the alert to continue to display. Whenever you need to replace a disk in a RAID, it is considered a best practice to replace it with the same brand and model of the hard drive. For this reason, most professionals purchase spare hard drives when initially building out their RAID array.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

Question 12:
You just installed an SSD into a laptop to increase the storage speed of the device. Which of the following should you configure to increase the lifespan of the newly installed SSD?
Disable regularly scheduled defragmentation of the SSD
Enable the paging file within the operating system
Enable the power-saving mode of the SSD
Disable memory caching on the SSD

A

Correct answerDisable regularly scheduled defragmentation of the SSDEnable the paging file within the operating systemEnable the power-saving mode of the SSDDisable memory caching on the SSDOverall explanationOBJ-3.3: An SSD (Solid-State Drive) is limited in the total number of write functions that can occur over its lifespan. Due to the immediate ability of an SSD to locate data on the drive (since there is no spinning platter that must be moved to reach the right area to retrieve the data like a regular magnetic hard drive), there is no need to defragment an SSD. When you defrag a hard drive, especially an SSD, it will cause tons of small write accesses, reducing the hard drive’s lifespan. And since data is not being read sequentially, it doesn’t matter if the file is stored in a hundred different places; the performance will remain the same. Therefore, you should disable any regularly scheduled defragmentation tasks when using an SSD to extend its lifespan.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

Question 13:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the port cluster.)
Using the image above, which of the following correctly indicates the port labeled as D?
DVI-D
VGA
HDMI
DVI-I

A

DVI-DVGACorrect answerHDMIDVI-IOverall explanationOBJ-3.1: This port is an HDMI connection. A high-definition multimedia interface (HDMI) connection is used to provide high-specification digital content to audio-video equipment from a computer. For the exam, it is important that you can identify the different parts of a motherboard’s rear port cluster by sight.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

Question 14:
John is setting up 100 Windows 10 computers for a new corporate office. He wants to ensure that unauthorized applications are prevented from being installed during the bootup process. What feature should he ensure is enabled?
Secure Boot
BIOS password required
RAM integrity checking
Full disk encryption

A

Correct answerSecure BootBIOS password requiredRAM integrity checkingFull disk encryptionOverall explanationOBJ-3.4: The purpose of Secure Boot is to prevent malicious and unauthorized apps from loading into the operating system (OS) during the startup process. Secure Boot is enabled by default in Windows 10. When the PC starts, the firmware checks the signature of each piece of boot software, including UEFI firmware drivers (also known as Option ROMs), EFI applications, and the operating system. If the signatures are valid, the PC boots and the firmware gives control to the operating system. The OEM can use instructions from the firmware manufacturer to create Secure boot keys and to store them in the PC firmware. When you add UEFI drivers, you’ll also need to make sure these are signed and included in the Secure Boot database. Full disk encryption is used to encrypt the user and system data stored in the device’s internal storage. RAM integrity checking is conducted by default on most systems during the initial boot process but it doesn’t check the contents of the memory for malware. The BIOS password would prevent the system from booting up without the correct password being entered, but this would not prevent unauthorized applications from being installed during the bootup process.Domain3 - Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

Question 15:
What type of cloud service bills consumers based on the actual usage of the service and may charge different prices based on the time of day it was utilized?
Measured services
Metered services
Resource pooling
Rapid elasticity

A

Measured servicesCorrect answerMetered servicesResource poolingRapid elasticityOverall explanationOBJ-4.1: Metered services are pre-paid, a-la-carte, pay-per-use, or committed offerings. A metered service like a database may charge its users based on the actual usage of the service resources on an hourly or monthly basis. For example, Dion Training used the AWS Lambda serverless product in some of our automation. This service charges us $0.20 for every 1 million requests processed. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. Rapid elasticity is used to describe scalable provisioning or the capability to provide scalable cloud computing services. Rapid elasticity is very critical to meet the fluctuating demands of cloud users. The downside of rapid elasticity implementations is that they can cause significant loading of the system due to the high resource number of allocation and deallocation requests. Measured service is a term that IT professionals apply to cloud computing that references services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning.Domain4 - Virtualization and Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

Question 16:
Eduardo’s laptop is shutting down intermittently. Sometimes, the laptop will work for 20 minutes before shutting itself down, and other times it can work for 90 minutes before shutting itself down. He noticed that if he is doing more processor-intensive work such as video editing, the laptop will shut down more quickly than if he is doing simple word processing tasks. A technician examines the laptop and does not smell any unusual odors coming from it. Which of the following is MOST likely causing the laptop to intermittently shut down?
The laptop has inadequate airflow and is overheating
The laptop’s battery connection is loose
The laptop’s motherboard has a swollen capacitor
The laptop’s CMOS battery has failed

A

Correct answerThe laptop has inadequate airflow and is overheatingThe laptop’s battery connection is looseThe laptop’s motherboard has a swollen capacitorThe laptop’s CMOS battery has failedOverall explanationOBJ-5.2: If the laptop had inadequate airflow, it intermittently shuts down at random times. Since the laptop shuts down faster if more intensive processor tasks are performed, this also indicates an overheating issue when the heat from the processor cannot be dissipated fast enough. If a laptop has a swollen capacitor, then a technician will smell a foul odor coming from the motherboard. A swollen capacitor indicates a motherboard failure that can lead to strange issues occurring on the laptop. If the laptop loses power when moved, this is most likely a loose battery connection. If the CMOS battery has failed, then it would cause the laptop to lose its date/time settings.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

Question 17:
Which of the following protocols operates over port 139 by default?
NetBIOS
HTTPS
SMB
IMAP

A

Correct answerNetBIOSHTTPSSMBIMAPOverall explanationOBJ-2.1: The network basic input/output system (NetBIOS)/NetBIOS over TCP/IP (NetBT) is a session management protocol used to provide name registration and resolution services on legacy Microsoft networks and those using WINS. NetBIOS/NetBT operates on TCP/UDP ports 137 and 139. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443. The server message block (SMB)/common internet file system (CIFS) is a protocol used for requesting files from Windows servers and delivering them to clients. SMB allows machines to share files and printers, thereby making them available for other machines to use. Samba software allows UNIX and Linux servers or NAS appliances to run SMB services for Windows clients. SMB operates on port 445.Domain2 - Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

Question 18:
A customer complains that their smartphone is hot to the touch when charging and their rubber phone case no longer fits it properly. What should you do?
Let the smartphone cool down for a few hours and try to recharge it again
Turn off the phone, do not plug into the wall outlet, and replace the battery
Put the phone under a heavy textbook to reshape the battery
Open the battery meter app to see what is placing a large load on the battery

A

Let the smartphone cool down for a few hours and try to recharge it againCorrect answerTurn off the phone, do not plug into the wall outlet, and replace the batteryPut the phone under a heavy textbook to reshape the batteryOpen the battery meter app to see what is placing a large load on the batteryOverall explanationOBJ-5.5: Anytime there is excessive heat and swelling, the battery should be replaced and the phone should not be used until the battery is properly replaced by a certified technician. On 2 September 2016, Samsung suspended sales of the Galaxy Note 7 and announced an informal recall after it was found that a manufacturing defect in the phones’ batteries had caused some of them to generate excessive heat that resulted in swelling batteries, fires, and sometimes explosions.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

Question 19:
Jonni’s laptop works perfectly when sitting at his desk. Whenever Jonni moves his laptop from his desk to the conference room, though, the laptop unexpectedly powers off. A technician examines the laptop and does not smell any unusual odors coming from it. Which of the following is MOST likely causing the laptop to lose power when moved?
The laptop’s battery connection is loose
The laptop’s CMOS battery has failed
The laptop has inadequate airflow and is overheating
The laptop’s motherboard has a swollen capacitor

A

Correct answerThe laptop’s battery connection is looseThe laptop’s CMOS battery has failedThe laptop has inadequate airflow and is overheatingThe laptop’s motherboard has a swollen capacitorOverall explanationOBJ-5.2: If the laptop loses power when moved, this is most likely a loose battery connection. Since the laptop operates without any issues when on the user’s desk, it indicates that the connection comes loose during movement. If the laptop had inadequate airflow, it intermittently shuts down at random times and not only when moved. If the laptop had a swollen capacitor, the technician would smell a foul odor coming from the motherboard. If the CMOS battery has failed, then it would cause the laptop to lose its date/time settings but the laptop would not shut down intermittently.Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Question 20:
You are troubleshooting an issue on a client’s computer and need to make some computer changes to test your theory of probable cause. What should you do BEFORE you make any changes to the computer to test your theory?
Create a system restore point in the operating system
Verify that a recent backup of all of the client’s important files has been created
Order a spare power supply in case you need to replace it
Provide the customer with an invoice for the work

A

Create a system restore point in the operating systemCorrect answerVerify that a recent backup of all of the client’s important files has been createdOrder a spare power supply in case you need to replace itProvide the customer with an invoice for the workOverall explanationOBJ-5.1: You should always ensure that a recent backup of all of the client’s important and critical files has been created before making any changes to the computer. After all, it is easy to replace hardware if you break the computer, but the client’s personal files may be irreplaceable. For example, if you accidentally delete or remove the customer’s pictures of their baby, you can’t just take new baby pictures to replace them!Domain5 - Hardware and Network Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

Question 21:
Your Windows 10 machine has just crashed. Where should you look to identify the cause of the system crash and how to fix it?
MAC
POST
DDOS
BSOD

A

MACPOSTDDOSCorrect answerBSODOverall explanationOBJ-5.2: A stop error, commonly called the blue screen of death, blue screen, or BSoD, is an error screen displayed on a Windows computer system following a fatal system error. It indicates a system crash, in which the operating system has reached a condition where it can no longer operate safely. Each BSOD displays a “stop code” that can research the cause of the error and how to solve it. A Media Access Control (MAC) address is a unique physical hardware address for each Ethernet network adapter that is composed of 12 hexadecimal digits. A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. The Power On Self Test (POST) is a built-in diagnostic program that checks the hardware to ensure the components required to boot the PC are present and functioning correctly.Domain5 - Hardware and Network Troubleshooting

202
Q

Question 22:
A user called the help desk to complain about an issue with their laptop’s keyboard. Every time they type a word like “help” or “none,” it is displayed as something cryptic like “he3p” or “n6ne”. Which of the following is the MOST likely cause of this issue with the laptop keyboard?
The NumLock has been enabled for the laptop
The keyboard driver needs to be updated
The keyboard is faulty and needs to be replaced
The keyboard has some crumbs or debris that has fallen under the keys

A

Correct answerThe NumLock has been enabled for the laptopThe keyboard driver needs to be updatedThe keyboard is faulty and needs to be replacedThe keyboard has some crumbs or debris that has fallen under the keysOverall explanationOBJ-5.5: Most keyboards have a numeric side (numbers only) and an alphanumeric side (numbers and letters and symbols). However, to minimize space usage, companies create some keyboards with the alphanumeric side only. This is quite common in laptops that insist on minimizing space for the sake of portability, as seen on mini-laptops and notebooks. Usually, the alphanumeric side is split into function keys (F1 to F12), followed by numeric keys (0-9), and then alphabetic keys (A-Z). To fix this, the fastest way to do this is to turn off NumLock using your laptop keyboard. If you hit the NumLock key, it will turn off. A light beside the key or on the laptop’s top will go off to confirm that the NumLock is disabled.Domain5 - Hardware and Network Troubleshooting

203
Q

Question 23:
You have been asked to replace a cracked screen on a laptop. The replacement screen was delivered today, but it did not include any instructions for removal and replacement. You have been unable to find the repair information on the manufacturer’s website. Which of the following is the BEST course of action for you to take when replacing the cracked screen?
Return the screen and order one from a different manufacturer
Update the laptop’s device driver before replacing the screen
Carefully remove the laptop’s cracked screen while documenting and labeling all of the screw locations and cables/connectors
Wait a few weeks until the manufacturer updates their website with the repair manuals

A

Return the screen and order one from a different manufacturerUpdate the laptop’s device driver before replacing the screenCorrect answerCarefully remove the laptop’s cracked screen while documenting and labeling all of the screw locations and cables/connectorsWait a few weeks until the manufacturer updates their website with the repair manualsOverall explanationOBJ-5.5: Replacing a cracked laptop screen is a common task for a computer technician. If you are not provided with the instructions for how to do it for a particular model, you can carefully disassemble the laptop and document/label all of the screw locations and cables/connectors. This will then allow you to replace the cracked screen and reconnect all the cables properly. You do not need to update the device drivers on the laptop unless there was some software display issue before the screen was cracked. When possible, you should use OEM parts when repairing or replacing components to ensure you don’t void the laptop’s warranty or cause other issues.Domain5 - Hardware and Network Troubleshooting

204
Q

Question 24:
Which of the following types of servers should you configure to accept requests through HTTP or HTTPS and provide resources back to the requester?
Web server
Print server
File server
DHCP server

A

Correct answerWeb serverPrint serverFile serverDHCP serverOverall explanationOBJ-2.4: A web server is a server that accepts requests through HTTP or HTTPS for a webpage and delivers the webpage and other requested resources to the user. A print server is a type of server that connects printers to client computers over a computer network. Print servers act as an intermediary between the computers and printers by accepting print jobs and then sending them to the correct printer when it is ready to accept new jobs. A file server is used to host and control access to shared files and folders for the organization. A dynamic host configuration protocol (DHCP) server is a server configured with a range of addresses to lease. Hosts can be allocated an IP address dynamically or be assigned a reserved IP address based on the host’s MAC address. The server can also provide other configuration information, such as the location of DNS servers.Domain2 - Networking

205
Q

Question 25:
You are working as a technician for a college. One of the professors has submitted a trouble ticket stating that the projector connected to the workstation in his classroom is too dim. You look at the image being projected on the wall and notice it is dim, but the image appears to be displayed clearly and correctly. What is the FIRST thing you should do to make the image brighter?
Increase the contrast on the projector
Modify the workstation’s video resolution
Replace the bulb in the projector
Update the video driver on the workstation

A

Correct answerIncrease the contrast on the projectorModify the workstation’s video resolutionReplace the bulb in the projectorUpdate the video driver on the workstationOverall explanationOBJ-5.4: If the image being displayed is dim, this could be an issue with your project’s contrast. By increasing the contrast, you can increase the amount of light reflected from an all white image and an all black image. The higher the contrast ratio, the brighter the whites will appear in the image. For example, if you have a projector with a 3000:1 contrast ratio, this means that the white image is 3000 times brighter than the black image. The higher the contrast ratio, the more detail you can see on the projected image, regardless of whether it is numbers, pictures, graphs, text, or video. Contrast is what makes it possible for us to see the subtle shades of colors. If the project supports the contrast or contrast ratio adjustment, you should increase the contrast to brighten the screen’s image.Domain5 - Hardware and Network Troubleshooting

206
Q

Question 26:
You just bought a new Virtual Reality headset to use with your computer. To ensure your computer is ready to support the new VR games, which of the following should you install?
A Bluetooth adapter
A RAID 5 array
A dedicated graphics card
A larger hard drive

A

A Bluetooth adapterA RAID 5 arrayCorrect answerA dedicated graphics cardA larger hard driveOverall explanationOBJ-3.4: Virtual Reality (VR) requires a fast processor, lots of memory, and, most importantly, a dedicated graphics card. To support lag-free virtual reality and reduce headaches/eye pain, you need to ensure you have a high-end dedicated graphics card or GPU in your system. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. A hard disk drive (HDD) is a device providing persistent mass storage for a workstation or laptop by saving data even when the computer is turned off. Data is stored using platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter known as sectors.Domain3 - Hardware

207
Q

Question 27:
Which type of cloud service provides users with an end-to-end application solution for a recurring monthly or yearly fee?
DaaS
PaaS
IaaS
SaaS

A

DaaSPaaSIaaSCorrect answerSaaSOverall explanationOBJ-4.1: Software as a service (or SaaS) is a way of delivering applications over the Internet as a service. Instead of installing and maintaining software, you access it via the Internet, freeing yourself from complex software and hardware management. It allows a company to pay a monthly or yearly fee to receive access to the software without managing the software locally within their own network. For example, many small businesses use Shopify to create an online e-commerce store that is classified as a SaaS product. Other examples include G Suite, Office 365, or Adobe Creative Cloud. Platform as a Service (PaaS) is a cloud computing service that enables consumers to rent fully configured systems that are set up for specific purposes. Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center. Desktop as a Service (DaaS) provides a full virtualized desktop environment from within a cloud-based service. This is also known as VDI (Virtualized Desktop Infrastructure) and is coming in large enterprise businesses focused on increasing their security and minimizing their operational expenses.Domain4 - Virtualization and Cloud Computing

208
Q

Question 28:
You are troubleshooting a memory issue on a customer’s laptop and have determined that the memory module needs to be replaced. You walk into the storage room to select a memory module to use as a replacement. Which of the following choices would be the MOST LIKELY choice for you to select for use on the laptop?
Single Channel
SODIMM
ECC
DDR4

A

Single ChannelCorrect answerSODIMMECCDDR4Overall explanationOBJ-1.1: A small outline dual inline memory module (SODIMM) can be purchased in various types and sizes to fit any laptop, router, or other small form factor computing device. For the exam, if you are ever asked about installing memory in a small form factor device or a laptop, the answer will usually be SODIMM. Single-channel memory is any memory using one 64-bit bus between the CPU and the RAM. Error checking and correcting or error correcting code (ECC) is a type of system memory that has built-in error correction security. ECC is more expensive than normal memory and requires support from the motherboard. ECC is commonly used in production servers and not in standard desktops or laptops. Double data rate synchronous dynamic (DDR) random access memory is a standard for SDRAM where data is transferred twice per clock cycle to achieve a maximum data rate that is 64 times the bus speed in bps. There are various versions of DDR including DDR2, DDR3, DDR4, and DDR5.Domain1 - Mobile Devices

209
Q

Question 29:
Which of the following printer configuration settings controls the size of the paper used for the print job?
Tray
Duplex
Orientation
Quality

A

Correct answerTrayDuplexOrientationQualityOverall explanationOBJ-3.6: The tray setting is used to define what type of paper is being used by a printer. The tray setting is commonly set to auto, letter in the United States, or A4 in Europe. The quality setting is used to define the overall output characteristics of the print job. If the best setting is used, the printer will use more ink/toner in producing the image and printer more slowly. If the Fast, Draft, or Low settings are used, the printer will use less ink/toner and print more quickly. Page orientation is how a rectangular page is oriented for normal viewing. The two most common types of orientation are portrait and landscape. Duplex printing is a feature of some computer printers, multi-function printers (MFPs), and copy machines that allow the printing of a sheet of paper on both sides automatically. Without this capability, print devices can only print on a single side of the paper, sometimes called single-sided printing or simplex printing. With duplex printing, information is printed on the front side of a piece of paper, and then the paper is automatically fed back through the printer to print the information on the backside of the paper.Domain3 - Hardware

210
Q

Question 30:
Which option would you MOST likely use to configure PXE to set up remote imaging on a computer during a deployment?
BIOS boot option
Secure boot configuration
Power management configuration
Windows boot menu

A

Correct answerBIOS boot optionSecure boot configurationPower management configurationWindows boot menuOverall explanationOBJ-3.4: To configure a computer to utilize the PXE boot option, you need to configure it under the BIOS boot option. The Preboot Execution Environment (PXE) is an industry-standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator. Secure boot is a security system offered by UEFI that is designed to prevent a computer from being hijacked by malware. Power management allows Windows to reduce or turn off the power supplied to hardware components to save energy.Domain3 - Hardware

211
Q

Question 31:
Dion Training has created a custom corporate application for its employees to access its student information database. This application is not found in the public App Store and must be installed directly on the device by one of the Dion Training system administrators. Which of the following technologies should the administrator use to install a profile with their security credentials and this custom application on an employee’s iPhone?
GSM
NVMe
CDMA
MDM

A

GSMNVMeCDMACorrect answerMDMOverall explanationOBJ-1.4: Apple’s iOS prevents custom applications from being loaded onto the device by default. To install a customer corporate application, the system administrator must install a profile with their security credentials along with the application onto the device using a mobile device management (MDM) suite. Once installed, the system administrator must go to Settings -> General -> Profiles and mark it as Trusted. Mobile device management (MDM) software suites are designed to manage the use of smartphones and tablets within an enterprise. The global system for mobile (GSM) communication standard for cellular radio communications and data transfer uses a SIM card to identify the subscriber and network provider. The code division multiple access (CDMA) communication standard for cellular radio communications and data transfer uses a method of multiplexing a communications channel using a code to key the modulation of a particular signal. Non-volatile memory express (NVMe) is an interface for connecting flash memory devices, such as SSDs, directly to a PCI Express bus. NVMe allows much higher transfer rates than SATA/AHCI.Domain1 - Mobile Devices

212
Q

Question 32:
Which of the following technologies combines the functionality of a firewall, malware scanner, and other security appliances into one device?
IPS
UTM
IDS
Syslog

A

IPSCorrect answerUTMIDSSyslogOverall explanationOBJ-2.4: A Unified Threat Management (UTM) appliance enforces a variety of security-related measures, combining the work of a firewall, malware scanner, and intrusion detection/prevention. A UTM centralizes the threat management service, providing simpler configuration and reporting than isolated applications spread across several servers or devices. An intrusion detection system (IDS) is a device or software application that monitors a network or system for malicious activity or policy violations. Any malicious activity or violation is typically reported to an administrator or collected centrally using a security information and event management system. Unlike an IPS, which can stop malicious activity or policy violations, an IDS can only log these issues and not stop them. An intrusion prevention system (IPS) conducts the same functions as an IDS but can also block or take actions against malicious events. A Syslog server is a server that collects diagnostic and monitoring data from the hosts and network devices across a given network.Domain2 - Networking

213
Q

Question 33:
Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar’s printer icon. Which of the following actions should Peter try FIRST to solve this issue?
Check that the printer is not offline
Check the status of the print server queue
Check to ensure the printer selected is the default printer
Cancel all documents and print them again

A

Check that the printer is not offlineCorrect answerCheck the status of the print server queueCheck to ensure the printer selected is the default printerCancel all documents and print them againOverall explanationOBJ-5.6: When this issue occurs, it is often because the system properly sent the print job to the print queue, but the print queue has become stuck. If no error is shown in the taskbar’s printer icon, the user should open the print queue to determine if the print job has become stuck. If it is, then the print queue can be emptied or reset.Domain5 - Hardware and Network Troubleshooting

214
Q

Question 34:
You are troubleshooting a customer’s PC. You realize there is a problem with the RAM and decided to replace the faulty module. You turn on the PC, and after a few seconds, you hear a single beep. What does hearing a single beep indicate?
BIOS detected an error
CMOS battery needs to be replaced
Possible faulty RAM module
BIOS completed POST

A

BIOS detected an errorCMOS battery needs to be replacedPossible faulty RAM moduleCorrect answerBIOS completed POSTOverall explanationOBJ-5.2: During the bootup process, a power-on self-test (POST) is performed. A single beep is commonly used to indicate the successful completion of the POST. Based on the POST results, different series of beeps may be played to indicate the status of the system. For example, if a single beep was heard, this could indicate a successful POST after a new hardware installation has been completed. Each manufacturer uses different POST codes, so it is important to consult the manual for the motherboard or BIOS in use by the system.Domain5 - Hardware and Network Troubleshooting

215
Q

Question 35:
What type of cloud service would allow you to provide a cloud-based application to your employees using their smartphones?
IaaS
SaaS
DaaS
PaaS

A

IaaSCorrect answerSaaSDaaSPaaSOverall explanationOBJ-4.1: Software as a service (SaaS) allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools. SaaS provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider. You rent the use of an app for your organization, and your users connect to it over the Internet, usually with a web browser. All of the underlying infrastructure, middleware, app software, and app data are located in the service provider’s data center. The service provider manages the hardware and software, and with the appropriate service agreement, it will ensure the availability and the security of the app and your data. SaaS allows your organization to get quickly up and running with an app at minimal upfront cost. Platform as a Service (PaaS) is a cloud computing service that enables consumers to rent fully configured systems that are set up for specific purposes. Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center. Desktop as a Service (DaaS) provides a full virtualized desktop environment from within a cloud-based service. This is also known as VDI (Virtualized Desktop Infrastructure) and is coming in large enterprise businesses focused on increasing their security and minimizing their operational expenses.Domain4 - Virtualization and Cloud Computing

216
Q

Question 36:
What network device uses ACLs to prevent unauthorized access into company systems?
Firewall
Load balancer
Content filter
IDS

A

Correct answerFirewallLoad balancerContent filterIDSOverall explanationOBJ-2.4: A firewall is a network security device designed to prevent systems or traffic from unauthorized access. An ACL is a list that shows which traffic or devices should be allowed into or denied from accessing the network. An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. An IDS uses signatures, not ACLs. Content filtering is the use of a program to screen and/or exclude access to web pages or emails deemed objectionable. A load balancer distributes a set of tasks over a set of resources to make their overall processing more efficient.Domain2 - Networking

217
Q

Question 37:
Your cellular carrier allows you to turn on a feature on your smartphone so that you can share its internet connection with other devices close to your smartphone. If you wanted to share the internet connection with multiple devices simultaneously, which feature would you enable?
Bluetooth
NFC
Mobile hotspot
Tethering

A

BluetoothNFCCorrect answerMobile hotspotTetheringOverall explanationOBJ-1.3: A mobile hotspot can share that connection via Wi-Fi with nearby laptops, tablets, game consoles, or anything that can connect to a Wi-Fi network. This feature turns your smartphone into a Wi-Fi access point and then allows the other devices to connect to your smartphone and gain access to the internet. Tethering is another good option for this question, but tethering only supports a single device sharing the smartphone’s internet connection at once. Tethering is the use of a mobile device’s cellular data plan to provide Internet access to a laptop or PC. The PC can be tethered to the mobile by USB, Bluetooth, or Wi-Fi. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another.Domain1 - Mobile Devices

218
Q

Question 38:
Which of the following is an example of a valid IPv6 address?
::1
00:AB:FA:B1:07:34
192.168.1.254
192:168:1:55

A

Correct answer::100:AB:FA:B1:07:34192.168.1.254192:168:1:55Overall explanationOBJ-2.5: IPv6 addresses are written as a series of up to 32 hexadecimal digits, but can be summarized using a :: symbol. The ::1 is the IPv6 address for the localhost. An IPv4 address consists of 32 bits. IPv4 addresses are written in dotted octet notation, such as 192.168.1.254. MAC addresses are written as a series of 12 hexadecimal digits, such as 00:AB:FA:B1:07:34. The other option, 192:168:1:55 is not a valid address since it uses : instead of a . in between the octets.Domain2 - Networking

219
Q

Question 39:
You are working as part of the server team for an online retail store. Due to the upcoming holidays, your boss is worried that the current servers may not be able to handle the increased demand during a big sale. Which of the following cloud computing concepts can quickly allow services to scale upward during busy periods and scale down during slower periods based on the changing user demand?
Rapid elasticity
On-demand
Resource pooling
Metered services

A

Correct answerRapid elasticityOn-demandResource poolingMetered servicesOverall explanationOBJ-4.1: Rapid elasticity is used to describe scalable provisioning or the capability to provide scalable cloud computing services. Rapid elasticity is very critical to meet the fluctuating demands of cloud users. The downside of rapid elasticity implementations is that they can cause significant loading of the system due to the high resource number of allocation and deallocation requests. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. On-demand refers to the fact that a consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Metered services are pre-paid, a-la-carte, pay-per-use, or committed offerings. A metered service like a database may charge its users based on the actual usage of the service resources on an hourly or monthly basis. For example, Dion Training used the AWS Lambda serverless product in some of our automation. This service charges us $0.20 for every 1 million requests processed.Domain4 - Virtualization and Cloud Computing

220
Q

Question 40:
Which of the following is a connection-oriented protocol that utilizes TCP?
TFTP
SNMP
SSH
DHCP

A

TFTPSNMPCorrect answerSSHDHCPOverall explanationOBJ-2.1: The transmission control protocol (TCP) is a protocol in the TCP/IP suite that operates at the transport layer to provide connection-oriented, guaranteed delivery of packets. Hosts must first establish a session to exchange data and then confirm the delivery of packets using acknowledgments when using TCP. TCP is relatively slow in comparison to UDP. Secure shell (SSH) is the protocol used for remote administration and file copying using TCP port 22. SSH is considered secure since it uses authenticated and encrypted sessions for communication. The trivial file transfer protocol (TFTP) is a protocol used to get a file from a remote host or put a file onto a remote host. TFTP is commonly used with embedded devices or systems that retrieve firmware, configuration information, or a system image during the boot process. TFTP operates over UDP port 69. The simple network management protocol (SNMP) is a protocol for monitoring and managing network devices over UDP ports 161 and 162. A management system collates data sent by agents running on each device. The agents maintain a Management Information Base of configuration and usage data. An agent can also generate a trap, alerting the management system of some notable event (such as a printer that is out of paper). The dynamic host control protocol (DHCP) is a protocol used to allocate IP addresses to a host when it joins a network. DHCP utilizes UDP ports 67 and 68.Domain2 - Networking

221
Q

Question 41:
(This is a simulated PBQ. If you had this question on the real exam, there would be a picture and you would be asked to drag-and-drop the steps into their sequential order. Note: there is not picture associated with this question for this practice exam.) Which of the following sequence of events properly identifies the steps of a laser printer’s imaging process?
Charging, processing, exposing, transferring, developing, fusing, and cleaning
Cleaning, charging, developing, exposing, transferring, fusing, and processing
Developing, processing, charging, exposing, cleaning, transferring, and fusing
Processing, charging, exposing, developing, transferring, fusing, and cleaning

A

Charging, processing, exposing, transferring, developing, fusing, and cleaningCleaning, charging, developing, exposing, transferring, fusing, and processingDeveloping, processing, charging, exposing, cleaning, transferring, and fusingCorrect answerProcessing, charging, exposing, developing, transferring, fusing, and cleaningOverall explanationOBJ-3.7: The proper sequence of events when printing a document using a laser printer is processing, charging, exposing, developing, transferring, fusing, and cleaning. This is referred to as the imaging process.Domain3 - Hardware

222
Q

Question 42:
A customer’s Android smartphone is only 6 months old but is becoming excessively slow. When questioned, the customer states it was acting fine until they recently installed a new stock market tracking app. What action should you take to troubleshoot the slow performance on this phone?
Uninstall the app, reboot the phone, and reinstall the app
Perform a hard reboot of the smartphone
Factory reset the smartphone and reinstall all the apps
Replace the phone with a newer model

A

Correct answerUninstall the app, reboot the phone, and reinstall the appPerform a hard reboot of the smartphoneFactory reset the smartphone and reinstall all the appsReplace the phone with a newer modelOverall explanationOBJ-5.5: The best option in this scenario is to uninstall and reinstall the stock market app. When apps are updated automatically, they can sometimes become faulty or corrupted and slow down performance on the device. With Android phones, much like iPhones, apps can run in the background and may begin to take up excess resources. If the app is removed, the phone is rebooted, and the app is reinstalled, and the issue persists, then the app should be removed, and an alternate app selected to replace it. Remember, in the CompTIA troubleshooting method we should always question the obvious. In the question, the thing that recently changed was the installing of a new app, so it is likely the issue.Domain5 - Hardware and Network Troubleshooting

223
Q

Question 43:
Which of the following devices should be installed as an intermediary between your clients and the web servers they want to connect to make an HTTP request from the client, check it, and then forward it to its destination?
DNS server
Proxy server
File server
DHCP server

A

DNS serverCorrect answerProxy serverFile serverDHCP serverOverall explanationOBJ-2.4: A proxy server takes a whole HTTP request from a client, checks it, then forwards it to the destination computer on the Internet. When the reply comes back, it checks it and then shuttles it back to the LAN computer. A proxy can be used for other types of traffic too. A proxy server can usually operate either as a transparent service, in which case the client requires no special configuration or as a non-transparent service that requires configuration. A proxy server is a server that acts as an intermediary between a client requesting a resource and the server that provides that resource. A proxy server can be used to filter content and websites from reaching a user. A file server is used to host and control access to shared files and folders for the organization. A dynamic host configuration protocol (DHCP) server is a server configured with a range of addresses to lease. Hosts can be allocated an IP address dynamically or be assigned a reserved IP address based on the host’s MAC address. The server can also provide other configuration information, such as the location of DNS servers. A domain name system (DNS) server is a server that hosts the database of domain names and the IP addresses mapped to those names. Each DNS server is authoritative for certain domain names that their organization owns.Domain2 - Networking

224
Q

Question 44:
You are attempting to build a new gaming workstation and have just finished installing the motherboard and the processor. You are about to begin installing two memory modules, and notice 4 DIMM sockets on the motherboard labeled 0, 1, 2, and 3. Two of these are colored red, and two are colored blue. Which of the following should you do FIRST?
Install 2 DDR4 memory modules into the red slots
Install 2 DDR4 memory modules into slots 2 and 3
Install 2 DDR4 memory modules into slots 0 and 1
Consult the motherboard’s manual
Install 2 DDR4 memory modules into the blue slots

A

Install 2 DDR4 memory modules into the red slotsInstall 2 DDR4 memory modules into slots 2 and 3Install 2 DDR4 memory modules into slots 0 and 1Correct answerConsult the motherboard’s manualInstall 2 DDR4 memory modules into the blue slotsOverall explanationOBJ-3.2: You should consult the motherboard’s manual and documentation to determine the best method of installing the memory into the system. The system may support both single-channel and dual-channel memory configurations, depending on how the memory is installed. Based on your specific customer needs, you may wish to install them as single or dual-channel (which may require installing the memory in certain slots). Single-channel memory is any memory using one 64-bit bus between the CPU and the RAM. Dual-channel memory is a memory controller with two primary pathways through the bus to the CPU to transfer 128-bits of data in each transaction.Domain3 - Hardware

225
Q

Question 45:
A user wants to print a large job on both the front and back sides of the paper. Which of the following settings should the technician advise the user to change in the printer settings?
Orientation
Transparency
Duplex
Collate

A

OrientationTransparencyCorrect answerDuplexCollateOverall explanationOBJ-3.6: Duplex printing is a feature of some computer printers, multi-function printers (MFPs), and copy machines that allow the printing of a sheet of paper on both sides automatically. Without this capability, print devices can only print on a single side of the paper, sometimes called single-sided printing or simplex printing. With duplex printing, information is printed on the front side of a piece of paper, and then the paper is automatically fed back through the printer to print the information on the backside of the paper. Page orientation is how a rectangular page is oriented for normal viewing. The two most common types of orientation are portrait (taller rather than wider) and landscape (wider rather than taller). The collate setting allows the gathering and arranging of individual sheets or other printed components into a pre-determined sequence. Collating creates consistent, logical sets from multiple parts, such as printing a series of pages in a report like pages 1, 2, 3 before printing the second copy. This makes it easier to staple and distribute to people after coming out of the printer. The term transparency was made up as a distractor for this question.Domain3 - Hardware

226
Q

Question 46:
What RAID level requires at least three hard disks to operate?
RAID 10
RAID 5
RAID 1
RAID 0

A

RAID 10Correct answerRAID 5RAID 1RAID 0Overall explanationOBJ-3.3: RAID 5 requires at least three hard disks to operate. There is no maximum number of disks required. The parity data is spread across all drives to provide redundancy, which allows the array to operate even with one of the drives fails. RAID 5 is considered one of the most popular and widely used RAID configurations. A RAID 5 provides block-level striping with distributed parity to provide redundancy using a minimum of three disks. A RAID 0 provides disk striping (speed/performance) but not mirroring with a minimum of two disks. A RAID 1 provides mirroring (redundancy) but not disk striping with a minimum of two disks. A RAID 10 combines disk mirroring and disk striping to protect data stored in the array and required a minimum of four disks.Domain3 - Hardware

227
Q

Question 47:
What is the name of the printer concept that is used a page description language that produces higher quality outputs at the expense of speed?
PostScript
Internet Printing Protocol
Printer control language
Line Printer Daemon

A

Correct answerPostScriptInternet Printing ProtocolPrinter control languageLine Printer DaemonOverall explanationOBJ-3.6: Both the printer control language (PCL) and PostScript (PS) are page description languages, but PS produces higher quality outputs. The printer control language (PCL) is a page description language used to tell printers how to properly layout and print the contents of a document on a page. PCL is a common printing language that is supported by many different printer manufacturers. PostScript (PS) is the page description language used in the electronic publishing and desktop publishing business. PCL is faster to print than PS. PS is slower but produces higher quality outputs. The Internet Printing Protocol (IPP) is a specialized Internet protocol for communication between client devices and printers (or print servers) using the HTTP protocol for data transport. The Line Printer Daemon (LPD) protocol is a network printing protocol for submitting print jobs to a remote printer. LPD is an older protocol than IPP.Domain3 - Hardware

228
Q

Question 48:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the port cluster.)
Using the image above, which of the following correctly indicates the port labeled as G?
USB-C
FireWire
USB 3.0
USB 2.0

A

USB-CFireWireCorrect answerUSB 3.0USB 2.0Overall explanationOBJ-3.1: These ports are the USB 3.0 connections. The red coloring notates this. USB 3.0 ports are always shown as a different color to differentiate them from the older and slower USB 2.0 ports. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at a slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power. For the exam, it is important that you can identify the different parts of a motherboard’s rear port cluster by sight.Domain3 - Hardware

229
Q

Question 49:
A technician is building a new computer for Dion Training. The technician installs the motherboard, processor, memory, hard drives, and case fans, then they attempt to connect the cables to the appropriate connections. When the technician powers on the system, the fans spin, the motherboard’s LEDs light up, and the computer completes its POST. Unfortunately, the monitor displays a “bootable device not found” error. Which of the following did the technician likely forget to connect?
SATA 15-pin power cable
Case fan 4-pin power cable
Motherboard 24-pin power cable
CPU 8-pin power cable

A

Correct answerSATA 15-pin power cableCase fan 4-pin power cableMotherboard 24-pin power cableCPU 8-pin power cableOverall explanationOBJ-5.3: Based on the scenario, it is most likely that the technician forgot to connect the SATA 15-pin power cable causing the hard drive to remain off. The computer will still pass the POST, but it will be unable to load an operating system since there is no boot device found. If the CPU power cable was unplugged, the CPU would not receive power and the POST would not complete. If the motherboard power cable was not connected, then the motherboard’s LED would not be lit. If the case fan’s power cables were not connected, the fans would not be spinning. Therefore, the right answer must be that the SATA power cable was not properly connected by the technician.Domain5 - Hardware and Network Troubleshooting

230
Q

Question 50:
Which application would NOT allow you to sync your data between your Windows, macOS, Android, and iOS devices?
OneDrive
Google Drive
DropBox
Shadow Copy

A

OneDriveGoogle DriveDropBoxCorrect answerShadow CopyOverall explanationOBJ-4.1: Shadow Copy will not sync your data between Windows, macOS, Android, and iOS devices because it only works on Windows devices. OneDrive, Google Drive, and DropBox allow you to configure their synchronization applications on all four of these operating systems to keep them synced with the latest version in the cloud service. These applications are all a form of SaaS (software as a service). Using a synchronization app can allow the files to be stored on both the laptop and the cloud service while maintaining the latest versions in both places. This allows a user to synchronize content between all of their own devices as well as share their cloud storage content with other users. Multiple users can simultaneously access the content to work collaboratively, or they can access it at different times. Each user’s changes are typically marked with a flag or color highlighting to indicate who made changes to what content.Domain4 - Virtualization and Cloud Computing

231
Q

Question 51:
A new smartphone supports users’ ability to transfer a photograph by simply placing their phones near each other and “tapping” the two phones together. What type of technology does this most likely rely on?
BT
IR
RF
NFC

A

BTIRRFCorrect answerNFCOverall explanationOBJ-1.3: Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another. Bluetooth (BT) is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Infrared (IR) was a wireless networking standard supporting speeds up to about 4 Mbps with a direct line of sight for communications. Infrared sensors are used in mobile devices and with IR blasters to control appliances. While infrared (IR) used to be commonly used to connect wireless mice and keyboards to a laptop in the 1990s, it has fallen out of favor in the last 10-15 years since Bluetooth is more reliable and does not require a direct line of sight between the device and the laptop. Radio frequency (RF) is the propagation of radio waves at different frequencies and wavelengths. For example, Wi-Fi network products use a frequency of either 2.4 GHz or 5 GHz.Domain1 - Mobile Devices

232
Q

Question 52:
A computer technician is configuring a NAS for a company to store their corporate data. The technician has installed two 1 TB hard drives operating at 7200 RPM in a RAID 1 configuration. How much usable storage space is contained in the NAS?
0.5 TB
1.5 TB
2 TB
1 TB

A

0.5 TB1.5 TB2 TBCorrect answer1 TBOverall explanationOBJ-3.3: A RAID 1 provides mirroring (redundancy) but not disk striping with a minimum of two disks. Since the NAS is using a RAID 1 configuration, it is a mirrored array. Both 1 TB HDDs are installed, but a full copy of the data must be contained on each drive. Therefore, there is still only 1 TB of usable storage capacity in the NAS.Domain3 - Hardware

233
Q

Question 53:
Jason is teaching a CompTIA course at a large company, but they do not allow non-employees to connect to their network. Since Jason needs the Internet for an in-class demonstration, he connects his laptop to his iPhone using a USB cable. He essentially connects to the Internet using the smartphone as a modem. Which of the following terms best describes this configuration?
Tunneling
Hotspot
Tethering
Baseband update

A

TunnelingHotspotCorrect answerTetheringBaseband updateOverall explanationOBJ-1.4: Tethering is the use of a mobile device’s cellular data plan to provide Internet access to a laptop or PC. The PC can be tethered to the mobile by USB, Bluetooth, or Wi-Fi. One method of doing this is to connect the laptop to the device using a USB cable, and then it can be used as a wired network connection. A portable hotspot is a dedicated mobile device that connects to a cellular network and provides a wireless (Wi-Fi) network for a small number of users. A tunneling (or encapsulation) protocol wraps up data from one protocol for transfer over a different type of network. For example, PPP can carry TCP/IP data over a dial-up line, enabling a remote computer to communicate with the LAN. A baseband update is the modification of the firmware of a cellular modem.Domain1 - Mobile Devices

234
Q

Question 54:
A user wants to print 2 copies of a 3-page report at once. The user would like the pages to come out of the printer in the order of pages 1, 2, 3, 1, 2, 3 instead of pages 1, 1, 2, 2, 3, 3. What printer setting should the user enable for this print job to achieve this result?
Duplex
Collate
Orientation
Transparency

A

DuplexCorrect answerCollateOrientationTransparencyOverall explanationOBJ-3.6: The collate setting allows the gathering and arranging of individual sheets or other printed components into a pre-determined sequence. Collating creates consistent, logical sets from multiple parts, such as printing a series of pages in a report like pages 1, 2, 3 before printing the second copy. This makes it easier to staple and distribute to people after coming out of the printer. Duplex printing is a feature of some computer printers, multi-function printers (MFPs), and copy machines that allow the printing of a sheet of paper on both sides automatically. Without this capability, print devices can only print on a single side of the paper, sometimes called single-sided printing or simplex printing. With duplex printing, information is printed on the front side of a piece of paper, and then the paper is automatically fed back through the printer to print the information on the backside of the paper. Page orientation is how a rectangular page is oriented for normal viewing. The two most common types of orientation are portrait and landscape. The term transparency was made up as a distractor for this question.Domain3 - Hardware

235
Q

Question 55:
What type of cloud service would provide you with a complete development and deployment environment in the cloud for you to create customized cloud-based apps?
SaaS
PaaS
IaaS
DaaS

A

SaaSCorrect answerPaaSIaaSDaaSOverall explanationOBJ-4.1: Platform as a service (PaaS) is a complete development and deployment environment in the cloud, with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications. You purchase the resources you need from a cloud service provider on a pay-as-you-go basis and access them over a secure Internet connection. PaaS includes infrastructure (servers, storage, and networking) and middleware, development tools, business intelligence (BI) services, database management systems, and more. PaaS allows you to avoid the expense and complexity of buying and managing software licenses, the underlying application infrastructure and middleware, container orchestrators, or the development tools and other resources. You manage the applications and services you develop, and the cloud service provider typically manages everything else. Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center. Software as a Service (SaaS) is a cloud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions. Desktop as a Service (DaaS) provides a full virtualized desktop environment from within a cloud-based service. This is also known as VDI (Virtualized Desktop Infrastructure) and is coming in large enterprise businesses focused on increasing their security and minimizing their operational expenses.Domain4 - Virtualization and Cloud Computing

236
Q

Question 56:
Which type of internet connection allows for high-speed bi-directional data communication over a hybrid fiber-coaxial (HFC) connection?
Cable
Satellite
DSL
Fiber

A

Correct answerCableSatelliteDSLFiberOverall explanationOBJ-2.7: A cable modem is a type of network bridge that provides bi-directional data communication via radio frequency channels on a hybrid fiber-coaxial (HFC), radio frequency over glass (RFoG), and coaxial cable infrastructure. Cable modems are primarily used to deliver broadband internet access as cable internet, taking advantage of an HFC and RFoG network’s high bandwidth. “Fiber to the X” (FTTx) is commonly used to describe where the fiber connection ends between the service and the subscriber. The closer the fiber is to the user’s network, the faster the service. FTTH (fiber to the house) provides fiber directly to the user’s home network making it the fastest option. Traditionally, you will find a 1 Gbps connection or higher with FTTH. FTTN (fiber to the node) or FTTC (fiber to the curb/cabinet) provides fiber only to the local area or neighborhood but then uses copper cabling from the node/cabinet/curb to the home network, which slows down the network (generally, 100-200 Mbps). Satellite systems provide far bigger areas of coverage than can be achieved using other technologies. A Very Small Aperture Terminal (VSAT) microwave antenna is aligned to an orbital satellite that can either relay signals between sites directly or via another satellite. DSL is a technology used to transmit multimedia traffic at high-bit rates over twisted-pair copper wire (over ordinary telephone lines). This allows the telecommunications company to connect a user’s home to the local switching center using normal telephone lines, then connect that local switching center (using a DSLAM to multiplex the connections) to the central office over a single high-speed cable (such as a fiber connection).Domain2 - Networking

237
Q

Question 57:
A customer’s computer has a noisy, whining sound coming from it when in use. You opened the case and did not see any dust on the fans. What should you attempt next to eliminate the noise?
Apply a small amount of oil to the fan’s bearings
Clean the fans using a damp cloth
Replace the fans
Apply compressed air to each of the fans

A

Correct answerApply a small amount of oil to the fan’s bearingsClean the fans using a damp clothReplace the fansApply compressed air to each of the fansOverall explanationOBJ-5.2: The best step would be to apply a small amount of oil to each of the fan’s bearings, as this will eliminate the noise. If the fans had been dusty, you would instead apply compressed air or clean the fan blades using a damp cloth. Since there was no dust noticed, this cannot be the whining source, and instead, you should apply oil to the bearings. Over time, dust can get into the fan bearings, causing increased friction when spinning and creating a whining sound. If this doesn’t solve the noise, then you would replace the case fans.Domain5 - Hardware and Network Troubleshooting

238
Q

Question 58:
The large multi-function network printer has recently begun to print pages that appear to have a dust-like coating when handled by the users. Which of the following components should be replaced based on this description?
Fuser
Toner cartridge
Drum
Scanner assembly

A

Correct answerFuserToner cartridgeDrumScanner assemblyOverall explanationOBJ-5.6: The printer passes the paper through the fuser, a pair of heated rollers. As the paper passes through these rollers, the loose toner powder melts, fusing with the paper’s fibers. The fuser rolls the paper to the output tray, and you have your finished page. The fuser also heats the paper itself, of course, which is why pages are always hot when they come out of a laser printer or photocopier. If the paper feels dusty or the toner doesn’t adhere to the printer, this usually indicates a failing fuser that needs to be replaced.Domain5 - Hardware and Network Troubleshooting

239
Q

Question 59:
Which of the following networked hosts should be installed to prevent users from being overwhelmed with junk emails?
Syslog server
Web server
Spam gateway
Proxy server

A

Syslog serverWeb serverCorrect answerSpam gatewayProxy serverOverall explanationOBJ-2.4: A spam gateway is a server or network appliance used to prevent users from being overwhelmed with spam or junk email. Spam gateways use blocklists to prevent emails from being accepted or routed from known malicious email addresses and domains. A proxy server is a server that acts as an intermediary between a client requesting a resource and the server that provides that resource. A proxy server can be used to filter content and websites from reaching a user. A Syslog server is a server that collects diagnostic and monitoring data from the hosts and network devices across a given network. A web server is a server that accepts requests through HTTP or HTTPS for a webpage and delivers the webpage and other requested resources to the user.Domain2 - Networking

240
Q

Question 60:
A customer is complaining that their workstation is beginning to run slowly when many applications are opened simultaneously. Which of the following upgrades would you recommend to solve this problem?
Upgrade the system from 4 GB to 16 GB of RAM
Replace their 802.11g card with an 802.11ac card
Perform a chkdsk on their SSD
Replace their 256 GB SSD with a 1 TB HDD

A

Correct answerUpgrade the system from 4 GB to 16 GB of RAMReplace their 802.11g card with an 802.11ac cardPerform a chkdsk on their SSDReplace their 256 GB SSD with a 1 TB HDDOverall explanationOBJ-5.2: In this scenario, we want to add more RAM. RAM is the temporary storage used for running applications. By adding more RAM, you can speed up the system when running applications simultaneously and prevent reading to the slower disk drives (SSD or HDD). Replacing an SSD with an HDD would slow down the system. Replacing the 802.11g card with an 802.11ac card would help if the customer complained of slow network connectivity, but that is not the case in this scenario. There is no need to perform a chkdsk on their SSD unless there is an error stating that there are errors in the file system.Domain5 - Hardware and Network Troubleshooting

241
Q

Question 61:
Your company received a large bill for file storage from your online cloud provider this month. Upon investigation, you noticed that one of your employees has uploaded over 1 TB of data to the service. What type of plan is your company utilizing?
A metered plan
An on-demand plan
A flat-fee plan
A non-metered plan

A

Correct answerA metered planAn on-demand planA flat-fee planA non-metered planOverall explanationOBJ-4.1: This scenario describes a measured or metered service plan. For every file or amount of data uploaded, there is an associated fee. It is important to understand what plan your organization is using and match your company’s use case to avoid an end of the month billing surprise. Metered services are pre-paid, a-la-carte, pay-per-use, or committed offerings. A metered service like a database may charge its users based on the actual usage of the service resources on an hourly or monthly basis. For example, Dion Training used the AWS Lambda serverless product in some of our automation. This service charges us $0.20 for every 1 million requests processed.Domain4 - Virtualization and Cloud Computing

242
Q

Question 62:
Which of the following metrics should you consider to compare the performance of an SSD or HDD?
IOPS
Seek time
Bandwidth
Latency

A

Correct answerIOPSSeek timeBandwidthLatencyOverall explanationOBJ-5.3: The input/output operations per second (IOPS) is a measurement of performance used to compare a hard disk drive (HDD) and solid-state device (SSD). The IOPS is calculated based on the physical constraints of the media being used. For a hard disk drive, the IOPS is calculated by dividing 1000 milliseconds by the combined average seek time and average latency. The seek time only applies to a traditional hard drive since it calculates the time it takes to move the head to the proper storage location on the platter. For an SSD, there is no seek time used since it can instantly access any portion of the memory without physically moving a read head.Domain5 - Hardware and Network Troubleshooting

243
Q

Question 63:
You have been asked to replace the wireless 802.11ac card in an employee’s laptop.
Which of the following types of expansion cards is this?
PCIe
SODIMM
NVMe
miniPCIe

A

PCIeSODIMMNVMeCorrect answerminiPCIeOverall explanationOBJ-1.1: Mini PCIe (mPCIe) are smaller form factor versions of standard PCI Express expansions cards used with laptops and other small form factor computing devices. Mini PCIe expansion cards provide the ability to add wireless networking or cellular data cards to a laptop. Non-volatile memory express (NVMe) is an interface for connecting flash memory devices, such as SSDs, directly to a PCI Express bus. NVMe allows much higher transfer rates than SATA/AHCI. PCI Express (PCIe) is an expansion bus standard using serial communications. Each device on the bus can create a point-to-point link with the I/O controller or another device. The link comprises one or more lanes (x1, x2, x4, x8, x12, x16, or x32). Each lane supports a full-duplex transfer rate of 250 MBps (v1.0), 500 MBps (v2.0), or 1 GBps (v3.0). A small outline dual inline memory module (SODIMM) can be purchased in various types and sizes to fit any laptop, router, or other small form factor computing device.Domain1 - Mobile Devices

244
Q

Question 64:
Which of the following BEST describes how a DHCP reservation works?
By matching a MAC address to an IP address within the DHCP scope
By assigning options to the computers on the network by priority
By leasing a set of reserved IP addresses according to their category
By letting the network switches assign IP addresses from a reserved pool

A

Correct answerBy matching a MAC address to an IP address within the DHCP scopeBy assigning options to the computers on the network by priorityBy leasing a set of reserved IP addresses according to their categoryBy letting the network switches assign IP addresses from a reserved poolOverall explanationOBJ-2.6: When the client requests an IP address by sending a message on the network to the DHCP server, the DHCP server will assign an IP from its DHCP scope to the client and reserve it based on its MAC address. DHCP reservations allow the DHCP server to pre-set an IP address to a specific client based on its MAC address. This ensures that the client will always get the same IP address from the DHCP server when it connects to the network. DHCP reservations are usually used with servers or printers on your internal network and are rarely used with end-user or client devices.Domain2 - Networking

245
Q

Question 65:
Which of the following types of laptop displays would utilize a fluorescent backlight to illuminate the image?
LED
LCD
OLED
Plasma

A

LEDCorrect answerLCDOLEDPlasmaOverall explanationOBJ-1.2: A LCD (TFT) with fluorescent backlight has been the standard display technology for the last few years. The backlight is a fluorescent bulb that illuminates the image, making it bright and clear. An inverter supplies the correct AC voltage to the backlight from the laptop’s DC power circuits. More modern laptops use LED displays that replace the fluorescent backlight with an LED backlight. OLED and plasma displays do not use a backlight.Domain1 - Mobile Devices

246
Q

Question 66:
You have just set up a Minecraft server on a spare computer within your network and want your friends to connect to it over the internet. What do you need to configure in your SOHO router to allow your friends to connect to the new Minecraft server you created?
Configure port forwarding
Configure your Wi-Fi to use Channel 11
Update the firmware
Enable DHCP

A

Correct answerConfigure port forwardingConfigure your Wi-Fi to use Channel 11Update the firmwareEnable DHCPOverall explanationOBJ-2.5: Port forwarding occurs when a router takes requests from the Internet for a particular application, such as HTTP/port 80), and sends them to a designated host on the local area network. This question did not mention that Wi-Fi was being used in the 2.4 GHz frequency range, therefore using channels 1, 6, and 11 is not required to minimize interference. The dynamic host control protocol (DHCP) is a protocol used to allocate IP addresses to a host when it joins a network. DHCP does not need to be configured to use a server and most servers use static IP addresses instead of dynamic ones. The firmware is a set of software instructions stored semi-permanently (embedded) on a hardware device. Modern types of firmware are stored in flash memory and can be updated more easily than legacy programmable Read-Only Memory (ROM) types.Domain2 - Networking

247
Q

Question 67:
Which of the following cables was a proprietary cable used in many iPhones and iPads?
Lightning
Mini USB
Micro USB
USB-C

A

Correct answerLightningMini USBMicro USBUSB-COverall explanationOBJ-1.3: Apple’s iPhone and iPad mobile devices use a proprietary 8-pin Lightning port and connector. The Lightning connector is reversible and can be inserted in either direction. Lightning is a proprietary computer bus and power connector created by Apple. The lightning cable is used by every iPhone from the 5 to 13 series. Newer iPads have shifted to the use of USB-C for charging instead of the lightning cable, though. USB-C is the default standard used in USB 3.1 with a 24-pin connector. The connector is reversible and can be inserted in either direction. Micro USB is a miniaturized version of the Universal Serial Bus (USB) interface developed for connecting compact and mobile devices such as smartphones, Mp3 players, GPS devices, photo printers, and digital cameras. Micro USB connectors exist or have existed in three forms: micro A, micro B, and micro USB 3. Mini USB was introduced with USB 2.0 and was used with digital cameras and early tablets. Mini USB is not commonly used in modern devices.Domain1 - Mobile Devices

248
Q

Question 68:
Jason’s son has broken the RJ-45 port of his laptop by sticking clay into it, and there are no wireless networks available in his office building. The manufacturer of the laptop said the port cannot be replaced for at least a week. Which of the following would be the MOST appropriate workaround to get the laptop connected to the wired network at Dion Training’s office quickly?
Replace the motherboard since it contains an integrated RJ-45 port
Disable airplane mode and use the integrated 802.11ac adapter
Purchase and use a USB to RJ-45 adapter
Enable NIC teaming to increase your bandwidth

A

Replace the motherboard since it contains an integrated RJ-45 portDisable airplane mode and use the integrated 802.11ac adapterCorrect answerPurchase and use a USB to RJ-45 adapterEnable NIC teaming to increase your bandwidthOverall explanationOBJ-1.1: Since the RJ-45 port on the laptop is most likely an integrated port on the motherboard, you will have to wait for the manufacturer to replace the motherboard for you. To get back onto the wired network at the office the quickest, you should purchase an external (USB) wired network adapter. These usually are small devices that will allow you to plug a wired network cable with an RJ-45 connector into the external adapter and connect it to the laptop using a USB port. This works just like the integrated RJ-45 adapter but can be installed in just a few seconds. Alternatively, you could use a port replicator or docking station if there was one available at the office. NIC teaming allows the grouping of multiple physical Ethernet network adapters into one or more software-based virtual network adapters for increased performance or fault tolerance. This would require multiple physical network interface cards to be installed in your laptop already, which is not the case in this scenario. Replacing the motherboard would work if you had one available, but the process can be time-consuming. It would be quicker and easier to simply use an external (USB) wired network interface adapter, instead. Airplane mode and 802.11ac adapters are used with wireless networks, therefore it cannot solve this issue since the office building does not have a wireless network available.Domain1 - Mobile Devices

249
Q

Question 69:
A customer is complaining that their printer has begun to fade. While questioning the customer, you found out that they bought the laser printer about 11 months ago, have never performed any maintenance, and have only added more paper to it when it runs out. When checking the page counter, you identified that they had printed over 3,000 pages. Which of the following is MOST likely the cause of the fading?
Adjust paper print tray height
Replace the drum
Verify the charge of the corona wire
Replace the toner cartridge

A

Adjust paper print tray heightReplace the drumVerify the charge of the corona wireCorrect answerReplace the toner cartridgeOverall explanationOBJ-5.6: In general, fading occurs when the ink or toner is running low. Based on the customer’s questioning, it appears they have not done any maintenance, including replacing the toner cartridge. It would be best if you first replaced the toner and then attempt to print a test page. In general, drums and corona wires do not need maintenance until closer to 7,500 to 10,000 printed pages with most laser printers.Domain5 - Hardware and Network Troubleshooting

250
Q

Question 70:
The accounting department has been relocated to a new area of the building, which is more than 70 meters away from the closest IDF. To comply with an SLA that requires that 10Gb speeds be provided, what type of media should be installed?
CAT 6a
CAT 5e
802.11ac
802.11n

A

Correct answerCAT 6aCAT 5e802.11ac802.11nOverall explanationOBJ-3.1: Cat6a is the only one listed that can meet 10 Gbps. CAT5e and 802.11 ac support speeds up to 1 Gbps. 802.11n supports speeds of up to 600 Mbps.Domain3 - Hardware

251
Q

Question 71:
Which of the following form factors of storage devices are NOT used in laptops?
2.5”
1.8”
3.5”
M.2

A

2.5”1.8”Correct answer3.5”M.2Overall explanationOBJ-1.1: A 3.5” drive is only used in desktops and some networked file servers. The larger 3.5” magnetic drives are the standard size used by desktop computers and do not fit into a laptop’s smaller form factor. Laptops most commonly use 2.5” and 1.8” magnetic drives. In modern laptops, you will often find an M.2 form factor SSD installed.Domain1 - Mobile Devices

252
Q

Question 72:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard below, which of the following correctly indicates the circled area?
Memory slot
PCIe x16
PCI
CPU slot

A

Correct answerMemory slotPCIe x16PCICPU slotOverall explanationOBJ-3.2: The area circled indicates the memory slots that contain the RAM. These are also considered DDR3 memory slots based on the key/notch location. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

253
Q

Question 73:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard above, which of the following correctly indicates the circled area?
PATA connection
Port cluster
USB connection
SATA connection

A

PATA connectionPort clusterUSB connectionCorrect answerSATA connectionOverall explanationOBJ-3.1: The area circled indicates the SATA connectors on the motherboard. Serial ATA (SATA) is the most widely used interface for hard disks on modern desktop and laptop computers. SATA uses a 7-pin L-shaped data connector with one device per port. SATA operates at bandwidths of 1.5 Gbps, 3 Gbps, or 6 Gbps. SATA drives can also use a 15-pin power connector. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

254
Q

Question 74:
A network engineer is designing an 802.11g wireless network that uses three wireless access points for complete coverage. Which of the following channel selections would result in the LEAST amount of interference between each access point?
Adjacent access points should be assigned channels 2, 6, and 10 with a 20MHz channel width
Adjacent access points should be assigned channels 1, 6, and 11 with a 20MHz channel width
Adjacent access points should be assigned channels 4, 8, and 12 with a 40MHz channel width
Adjacent access points should be assigned channels 7, 9, and 11 with a 40MHz channel width

A

Adjacent access points should be assigned channels 2, 6, and 10 with a 20MHz channel widthCorrect answerAdjacent access points should be assigned channels 1, 6, and 11 with a 20MHz channel widthAdjacent access points should be assigned channels 4, 8, and 12 with a 40MHz channel widthAdjacent access points should be assigned channels 7, 9, and 11 with a 40MHz channel widthOverall explanationOBJ-2.5: Because the overlapping signals are from access points from unrelated non-overlapping channels, the access points are least likely to interfere with each other. For Wireless B and G networks, you should always use channels 1, 6, and 11 to ensure you are using non-overlapping frequencies.Domain2 - Networking

255
Q

Question 75:
You want to boot from a removable USB device to troubleshoot your Windows 10 laptop. During your rebooting of the machine, which key should you press to enter the boot order menu?
F12
F8
Command + R
F11

A

Correct answerF12F8Command + RF11Overall explanationOBJ-3.4: F12 is the most commonly used key used to enter the BIOS / UEFI boot order menu. The boot order is a menu that allows you to select which device you wish to boot from, such as the hard drive, DVD, or a removable USB device. F11 during the boot up process will cause the system to boot into recovery mode on a Windows workstation. F8 is used to invoke the Advanced Boot Options menu to allow the selection of different startup modes for troubleshooting. This is done as part of Windows and not the BIOS / UEFI. The command + R is used on the OS X system to boot into recovery mode. Domain3 - Hardware

256
Q

Question 76:
An employee at Dion Consulting is configuring their Android smartphone to synchronize their email with their corporate Office 365 account. What type of credentials will the employee need?
Authentication code
Email and Password
Mail Protocols
Domain Name

A

Authentication codeCorrect answerEmail and PasswordMail ProtocolsDomain NameOverall explanationOBJ-1.4: To configure the email client on an Android device with an Office 365 account, the employee will need their email and password. Since Office 365 is a mainstream service, it is well supported on both Android and iPhone smartphones. If your company is running its own email servers, though, then you would be required to enter the domain name, appropriate mail protocols, and authentication codes.Domain1 - Mobile Devices

257
Q

Question 77:
Dion Training has asked you to verify that a server rack has been properly installed and grounded. Which tool should you utilize to verify that the server rack is properly grounded?
Loopback plug
Toner probe
Voltmeter
Multimeter

A

Loopback plugToner probeVoltmeterCorrect answerMultimeterOverall explanationOBJ-2.8: A multimeter can measure the voltage, amperage, and resistance of a circuit. If you use the lowest ohms (resistance) setting, you can touch the multimeter’s black lead to a grounded metal surface and touch the red lead to each circuit wire. If you get a meter reading of zero ohms (low resistance), this indicates that the circuit is properly grounded. If you get a meter reading of infinity, O.L., Open Loop, or a needle that pegs high on the meter, this indicates an open circuit with no path to ground. A voltmeter can only measure the voltage, not the amperage or resistance of the circuit. A loopback plug is used to test a port. When you connect a loopback plug to a port, you should see a solid connection LED. You can also use the loopback plug in conjunction with diagnostic software. A tone generator is connected to a wall jack and sends a repeating signal over the cable. The probe can then be used to detect which cable is attached to the wall jack by detecting the signal being sent by the tone generator. The probe needs to be near or touch the cable with the tone generator attached to identify it positively.Domain2 - Networking

258
Q

Question 78:
You need to determine the best way to test operating system patches in a lab environment before deploying them to your automated patch management system. Unfortunately, your network has several different operating systems in use, but you only have one machine available to test the patches on. What is the best environment to utilize to perform the testing of the patches before deployment?
Sandboxing
Purchase additional workstations
Virtualization
Bypass testing and deploy patches directly into the production environment

A

SandboxingPurchase additional workstationsCorrect answerVirtualizationBypass testing and deploy patches directly into the production environmentOverall explanationOBJ-4.2: When you have a limited amount of hardware resources to utilize but have a requirement to test multiple operating systems, you should set up a virtualized environment to test the patch across each operating system before deployment. You should never deploy patches directly into production without testing them first in the lab. Virtualization will allow the organization to create a lab environment without significant costs. Purchasing additional workstations would be costly and more time-consuming to configure.Domain4 - Virtualization and Cloud Computing

259
Q

Question 79:
Dion Training utilizes a strong authentication model for all of its internal services. If an employee needs to access one of the company’s internal applications, they use their username, a password, and a one-time code texted to their smartphone to log in. Which of the following types of authentication is this known as?
FaceID
MFA
SSO
TouchID

A

FaceIDCorrect answerMFASSOTouchIDOverall explanationOBJ-1.3: Multifactor authentication is an authentication scheme that relies on at least two of the five factors: something you know, something you have, something you are, something you do, and somewhere you are. Since the user must enter their username and password, this is something they know. Since the user must enter a one-time code texted to their smartphone, this is something they have. Using this combination is considered two-factor (2FA) or multifactor authentication (MFA). Single Sign-on (SSO) is an authentication technology that allows users to authenticate once and receive authorizations for multiple services. The advantage of single sign-on is that each user does not have to manage multiple user accounts and passwords. The disadvantage is that compromising the account also compromises multiple services. Face ID is an Apple device feature that uses a face lock to grant access to the device. Face ID is considered a form of biometric authentication. Touch ID is an Apple device feature that uses fingerprint biometric information to grant access to the device.Domain1 - Mobile Devices

260
Q

Question 80:
Which of the following types of data should you transmit over TCP?
An order for a $50,000 stock purchase
Streaming music while you work
Streaming video from YouTube
A Skype phone call with your friend

A

Correct answerAn order for a $50,000 stock purchaseStreaming music while you workStreaming video from YouTubeA Skype phone call with your friendOverall explanationOBJ-2.1: TCP (Transmission Control Protocol) is a slower but more reliable data delivery protocol. TCP is responsible for ensuring that packets arrive error-free and without loss. If you are doing something that must get to the destination without errors or data loss, such as a banking transaction or stock trade, it should be sent over TCP. The transmission control protocol (TCP) is a protocol in the TCP/IP suite that operates at the transport layer to provide connection-oriented, guaranteed delivery of packets. Hosts must first establish a session to exchange data and then confirm the delivery of packets using acknowledgments when using TCP. TCP is relatively slow in comparison to UDP.Domain2 - Networking

261
Q

Question 81:
William would like to use full-disk encryption on his laptop. He is worried about slow performance, though, so he has requested that the laptop have an onboard hardware-based cryptographic processor. Based on this requirement, what should William ensure the laptop contains?
PAM
AES
TPM
FDE

A

PAMAESCorrect answerTPMFDEOverall explanationOBJ-3.4: This question is asking if you know what each acronym means. Trusted Platform Module (TPM) is a hardware-based cryptographic processing component that is a part of the motherboard. A Pluggable Authentication Module (PAM) is a device that looks like a USB thumb drive and is used as a software key in cryptography. Full Disk Encryption (FDE) can be hardware or software-based. Therefore, it isn’t the right answer. The Advanced Encryption System (AES) is a cryptographic algorithm. Therefore, it isn’t a hardware solution.Domain3 - Hardware

262
Q

Question 82:
You have been asked to install a network cable inside a conduit placed underground and connected to two buildings located about 1 KM apart. Which of the following cable types should you choose?
Plenum
Coaxial
Fiber
Shielded

A

PlenumCoaxialCorrect answerFiberShieldedOverall explanationOBJ-3.1: A fiber optic cable is a network cable that contains strands of glass fibers inside an insulated casing. They’re designed for long-distance, high-performance data networking, and telecommunications. If you are dealing with connecting two networks over a long distance (over a few hundred meters), you should use a fiber optic cable. Shielded and plenum copper cables can only cover a distance of approximately 100 meters in length. Coaxial cables can cover a maximum distance of 200 to 500 meters in length.Domain3 - Hardware

263
Q

Question 83:
You are working as a laptop repair technician. You just received a laptop that was reported to have a glass of water spilled on it. You want to examine the components in the laptop to begin troubleshooting it. What are the first steps you should take as part of your troubleshooting process?
Submerge the laptop in a large bowl of rice to fully dry out the inner components
Remove the external casing of the laptop and document the screw locations
Consult your coworkers for suggestions and advice
Watch a YouTube video for tutorials on how to fix this model of laptop

A

Submerge the laptop in a large bowl of rice to fully dry out the inner componentsCorrect answerRemove the external casing of the laptop and document the screw locationsConsult your coworkers for suggestions and adviceWatch a YouTube video for tutorials on how to fix this model of laptopOverall explanationOBJ-5.5: When you are taking apart a laptop, it is important to keep track of each of the screws and the location that they were removed from. Many of the screws may appear to be the same height or width, but they may be different. One easy way to keep track of these parts is to create a grid on a sheet of printer paper and place the screws on this makeshift diagram. While the other options may be useful, the question asks you what you should do first to examine the laptop components. To perform that examination, you must remove the external casing and its screws.Domain5 - Hardware and Network Troubleshooting

264
Q

Question 84:
A client contacts the service desk because their laptop will not charge when plugged in. The client states that the laptop runs properly while connected to the wall outlet, but if they unplug it, then the laptop immediately powers off. Which of the following do you recommend to solve this issue?
Replace the power adapter
Replace the DC jack
Replace the battery
Connect the laptop to a 220v outlet

A

Replace the power adapterReplace the DC jackCorrect answerReplace the batteryConnect the laptop to a 220v outletOverall explanationOBJ-5.5: This scenario indicates a defective or failed battery. Since the battery will not charge, but the laptop can stay on while connected to the wall outlet, this indicates it is not an issue with the DC jack, the power adapter, or the wall outlet.Domain5 - Hardware and Network Troubleshooting

265
Q

Question 85:
Which type of internet connection is terminated at a local switching center and requires a different media type between the switching center and the end customer?
Satellite
Cable
Fiber
DSL

A

SatelliteCableFiberCorrect answerDSLOverall explanationOBJ-2.7: DSL is a technology used to transmit multimedia traffic at high-bit rates over twisted-pair copper wire (over ordinary telephone lines). This allows the telecommunications company to connect a user’s home to the local switching center using normal telephone lines, then connect that local switching center (using a DSLAM to multiplex the connections) to the central office over a single high-speed cable (such as a fiber connection). “Fiber to the X” (FTTx) is commonly used to describe where the fiber connection ends between the service and the subscriber. The closer the fiber is to the user’s network, the faster the service. FTTH (fiber to the house) provides fiber directly to the user’s home network making it the fastest option. Traditionally, you will find a 1 Gbps connection or higher with FTTH. FTTN (fiber to the node) or FTTC (fiber to the curb/cabinet) provides fiber only to the local area or neighborhood but then uses copper cabling from the node/cabinet/curb to the home network, which slows down the network (generally, 100-200 Mbps). HFC (Hybrid Fiber Coax) is similar to FTTN/FTTC, except that coaxial cable is used from the cabinet to the home to increase the speed (generally 300-500 Mbps). A cable modem is a type of network bridge that provides bi-directional data communication via radio frequency channels on a hybrid fiber-coaxial (HFC), radio frequency over glass (RFoG), and coaxial cable infrastructure. Cable modems are primarily used to deliver broadband internet access as cable internet, taking advantage of an HFC and RFoG network’s high bandwidth. Satellite systems provide far bigger areas of coverage than can be achieved using other technologies. A Very Small Aperture Terminal (VSAT) microwave antenna is aligned to an orbital satellite that can either relay signals between sites directly or via another satellite.Domain2 - Networking

266
Q

Question 86:
Which of the following parts is responsible for converting the analog signals created by your tapping or swiping the surface of a display to a binary signal that is understood by the underlying software?
Capacitor
Digitizer
Backlight
Inverter

A

CapacitorCorrect answerDigitizerBacklightInverterOverall explanationOBJ-1.2: The digitizer is a touch-sensitive glass panel covering the LCD in a touchscreen assembly. The digitizer is used to convert touch events to digital signals that can be interpreted as different types of input. The digitizer can be touched and inspected without taking apart the device. Analog signals are created when you tap or swipe the surface of the display. The digitizer is connected to the laptop with a flexible digitizer cable. A grid of sensors is activated when you tap or swipe the screen. The sensors’ information is sent through the digitizer cable to a circuit that converts the analog signal to a digital signal using binary. A backlight is a fluorescent lamp used to illuminate the image on a flat panel (LCD) screen. If the backlight or inverter fails, the screen image will go very, very dark. The inverter (also known as inverter board, screen inverter, or LCD inverter) is a part of the laptop’s display assembly. The inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight. A capacitor is an electrical component that stores electrical energy and is often used to regulate voltages. It can hold a charge after the power is removed.Domain1 - Mobile Devices

267
Q

Question 87:
Whenever you reboot your domain controller, you notice it takes a very long time to boot up. As the server is booting, you hear noises that sound like a steady series of clicks coming from the hard drive. Which of the following is the BEST action to help speed up the boot time of the server?
Defragment the hard drive
Terminate processes in the Task Manager
Perform a Disk Cleanup
Remove unnecessary applications from startup

A

Correct answerDefragment the hard driveTerminate processes in the Task ManagerPerform a Disk CleanupRemove unnecessary applications from startupOverall explanationOBJ-5.3: Defragging is a simple process when file fragments are put together to speed up file access. File fragments are put together, and quality defragmentation utilities also assemble the free space into a single block to prevent future fragmentation. By defragmenting the hard drive, the server doesn’t have to spend as much time accessing the information, and it can boot up faster. Based on the clicking noises, it sounds like the system has to access many parts of the drive to load the files.Domain5 - Hardware and Network Troubleshooting

268
Q

Question 88:
Jason, a computer technician, is troubleshooting a motherboard. He has determined that the motherboard needs to be replaced in the laptop. Which of the following next step should be performed next? (Choose TWO)
Documentation of all screws and locations
Use portable power driver to remove screws
Disconnect laptop keyboard before disconnecting the battery
Read owners’ manual for procedures and steps to avoid breaking the warranty

A

Correct selectionDocumentation of all screws and locationsUse portable power driver to remove screwsDisconnect laptop keyboard before disconnecting the batteryCorrect selectionRead owners’ manual for procedures and steps to avoid breaking the warrantyOverall explanationOBJ-5.2: It is essential to read the owner’s manual before starting anything. The next step is to document all screws and locations because lots of these tiny screws are not equal and have different depths. If you don’t document which screws go into which holes, you could insert them into the wrong place and waste a lot of time or cause damage to the laptop. You should avoid using a portable power drive to remove screws as they can generate electromagnetic interference due to their electrical motors. The laptop’s keyboard would be disconnected after disconnecting the battery, not before.Domain5 - Hardware and Network Troubleshooting

269
Q

Question 89:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard above, which of the following correctly indicates the circled area?
Front connectors
SATA connector
Audio connector
PATA connector

A

Correct answerFront connectorsSATA connectorAudio connectorPATA connectorOverall explanationOBJ-3.4: The area circled indicates the front connector on the motherboard. This area connectors the various wires to the front panel to include the LED activity lights for the hard disk drive and the power/reset buttons. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

270
Q

Question 90:
You are working as a network technician and need to create several Cat 5e network cables to run between different computers and the network jacks on the wall. The connections between the switch, the patch panel, and the wall jacks have already been installed and tested. Which of the following tools would NOT be necessary to complete this task?
Punchdown tool
Cable tester
Cable crimper
Wire stripper

A

Correct answerPunchdown toolCable testerCable crimperWire stripperOverall explanationOBJ-2.8: A punchdown tool is used to connect a network cable (such as Cat 5e) to a patch panel, 110-block, or the inside portion of a wall jack, therefore it is not needed for this task. A wire stripper is used to remove the outer plastic shielding from the Cat 5e cable so that you can reach the inner wiring pairs. The cable tester is used to verify the electrical connections in a twisted pair or coaxial cable. A cable crimper is used to join the internal wires of a twisted pair cable with metallic pins houses inside a plastic connector, such as an RJ-45 connector.Domain2 - Networking

271
Q

Question 1:
You have just finished building a Windows server, installing its operating system, updating its security patches, formatting a dedicated data partition, and creating accounts for all of the company’s employees. What is the next thing that must be configured to provide users with the ability to access the data contained on the server’s data partition?
Audit logging
Print server
File sharing
RAID storage

A

Audit loggingPrint serverCorrect answerFile sharingRAID storageOverall explanationOBJ-2.4: Most of the options provided are reasonable next steps, but the question specifically states that you want to allow the users to access the server’s data. Therefore, file sharing is the next step to providing access to the data and folders for employees on the network. After configuring file sharing, it would be good to configure audit logging and possibly a print server. RAID storage should have been configured before installing the operating system or creating the data partition. A file server is used to host and control access to shared files and folders for the organization.Domain2 - Networking

272
Q

Question 2:
A customer is upset that their laptop is too slow during the bootup process and when loading programs. The laptop is configured with an Intel i7 processor, 16 GB of RAM, a 500 GB HDD operating at 5400 RPM, and a dedicated GPU with 8 GB of RAM. Which of the following upgrades should you install to best increase the system’s performance?
512 GB SSD
Integrated GPU
32 GB of RAM
2 TB HDD

A

Correct answer512 GB SSDIntegrated GPU32 GB of RAM2 TB HDDOverall explanationOBJ-1.1: Based on the system specifications, the system’s slowest part appears to be the 5400 RPM hard disk drive (HDD). Therefore, replacing the HDD with a solid-state device (SSD) would dramatically increase the loading speeds as the operating system and other programs are read from the storage device during bootup and when loading programs. Another viable option would be to purchase a faster HDD, such as operating at 7200 RPM or 10,000 RPM. Still, though, an SSD would be faster than a higher RPM HDD, so it remains the best answer. If the laptop had 4GB or less of memory then it would be appropriate to increase the memory to 8GB or 16GB to increase the speed. An integrated GPU cannot be upgraded on a laptop since the integrated GPU is built into the CPU of the laptop, nor could a dedicated GPU be added to most modern laptops.Domain1 - Mobile Devices

273
Q

Question 3:
You are building a virtualization environment to host public-facing servers that must connect to the internet. This will require that you install several secured Linux distributions as VMs. The VMs need to have access to a virtualized network and communicate with the host operating system and the internet. Which of the following types of network connections should you configure for each VM?
Localhost
Internal
External
Private

A

LocalhostInternalCorrect answerExternalPrivateOverall explanationOBJ-4.2: If you select external, the VMs would have internet access. If you select internal, each VM can communicate between the host and the other VMs. The private network connection type will create a switch that is usable only by the VMs. The VMs cannot use the switch to communicate with the host. If you select localhost, each VM could only communicate with itself.Domain4 - Virtualization and Cloud Computing

274
Q

Question 4:
Which of the following tools is used by a technician to remove the jacket or sheathing from a wire when building a cable?
Punchdown tool
Cable stripper
Crimper
Cable tester

A

Punchdown toolCorrect answerCable stripperCrimperCable testerOverall explanationOBJ-2.8: A cable stripper is used to remove the plastic jacket from an ethernet cable to access its internal wires (twisted pairs). A cable tester is used to ensure a cable is properly created as a patch cable (straight through) or a crossover cable. Cable testers provide detailed information on the physical and electrical properties of the cable. For example, they test and report cable conditions, crosstalk, attenuation, noise, resistance, and other cable run characteristics. Punchdown tools are used to connect an ethernet cable to the back of a patch panel, a punchdown block, or the back of a network wall jack. A crimper is a tool used to attach an RJ-45 plastic connector to an unshielded twisted pair (UTP) or shielded twisted pair (STP) cable. It pushes a portion of the plastic into the jacket of the cable to hold it in place.Domain2 - Networking

275
Q

Question 5:
What is the sixth step of the CompTIA troubleshooting methodology?
Verify full system functionality and, if applicable, implement preventative measures
Document findings, actions, and outcomes
Test the theory to determine the cause
Establish a plan of action to resolve the problem and implement the solution

A

Verify full system functionality and, if applicable, implement preventative measuresCorrect answerDocument findings, actions, and outcomesTest the theory to determine the causeEstablish a plan of action to resolve the problem and implement the solutionOverall explanationOBJ-5.1: For the exam, it is important that you can list and identify the 6 steps of the CompTIA troubleshooting methodology in order. (1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and then implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.Domain5 - Hardware and Network Troubleshooting

276
Q

Question 6:
Which of the following is a public IP address?
68.24.91.15
192.168.1.45
172.18.2.68
10.0.1.45

A

Correct answer68.24.91.15192.168.1.45172.18.2.6810.0.1.45Overall explanationOBJ-2.5: IP addresses are either public, private, localhost, or APIPA addresses. Any address from 169.254.1.0 to 169.254.254.255 is considered an APIPA address. A private IP address is in the range of 10.x.x.x, 172.16-31.x.x, or 192.168.x.x. A localhost IP is 127.0.0.1. All others are considered public IP addresses.Domain2 - Networking

277
Q

Question 7:
You are at the grocery store. At the checkout, you slide your credit card through the payment terminal and then sign your name to authorize the charge. Which of the following did you MOST likely use to make this purchase?
Signature pad
NFC device
Touchpad
Bluetooth reader

A

Correct answerSignature padNFC deviceTouchpadBluetooth readerOverall explanationOBJ-1.3: Many stores use a signature pad to digitally capture your handwritten signature when using a credit card to pay for your purchase. A signature capture pad is a device that electronically captures a person’s handwritten signature on an LCD touchpad using a pen-type stylus. Once captured, digital signatures can be imported into and used with most ID software and security programs. Signatures can also be digitally stored for future use. Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. A touchpad is an input device used on most laptops to replace a mouse. The touchpad allows the user to control the cursor by moving a finger over the pad’s surface.Domain1 - Mobile Devices

278
Q

Question 8:
You see some fading across your papers when printing things using a laser printer. The black color appears to be more faded than the other colors on your documents. What is the BEST solution to this problem?
Increase the temperature of the fuser element
Change the feed rate of the paper
Replace the toner cartridge in the printer
Clean the printer’s transfer roller

A

Increase the temperature of the fuser elementChange the feed rate of the paperCorrect answerReplace the toner cartridge in the printerClean the printer’s transfer rollerOverall explanationOBJ-5.6: A symptom of low toner is faded or faint colors in your printed papers. Most modern printers will also indicate the amount of toner left using their on-screen display and present a warning message for low toner and an error message when the printer is completely out of toner. With color laser printers, there are four different toner colors used during printing: black, cyan, magenta, and yellow. If only the black appears to be faded, it is possible that it is running low on toner. This is a common problem since most employees print more black and white documents than color documents which leads to the black toner normally running out before the other colors.Domain5 - Hardware and Network Troubleshooting

279
Q

Question 8:
You see some fading across your papers when printing things using a laser printer. The black color appears to be more faded than the other colors on your documents. What is the BEST solution to this problem?
Increase the temperature of the fuser element
Change the feed rate of the paper
Replace the toner cartridge in the printer
Clean the printer’s transfer roller

A

802.11b802.11nCorrect answer802.11ac802.11gOverall explanationOBJ-2.3: Wireless networks are configured to use either 2.4 GHz or 5.0 GHz frequencies, depending on the network type. 802.11a and 802.11ac both utilize a 5.0 GHz frequency for their communications. 802.11b and 802.11g both utilize a 2.4 GHz frequency for their communications. 802.11n and 802.11ax utilize either 2.4 GHz, 5.0 GHz, or both, depending on the Wi-Fi device’s manufacturer. The 802.11b (Wireless B) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 11 Mbps. The 802.11g (Wireless G) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 54 Mbps. The 802.11n (Wireless N) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 108 Mbps or a 5.0 GHz frequency to provide wireless networking at speeds up to 600 Mbps. Wireless N supports the use of multiple-input-multiple-output (MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless N supports channel bonding by combining two 20 MHz channels into a single 40 MHz channel to provide additional bandwidth. The 802.11ac (Wireless AC or Wi-Fi 5) standard utilizes a 5 GHz frequency to provide wireless networking at theoretical speeds up to 5.5 Gbps. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds.Domain2 - Networking

280
Q

Question 9:
Your company is currently using a 5 GHz wireless security system, so your boss has asked you to install a 2.4 GHz wireless network to use for the company’s computer network to prevent interference. Which of the following can NOT be installed to provide a 2.4 GHz wireless network?
802.11b
802.11n
802.11ac
802.11g

A

Resource poolingMetered servicesMeasured servicesCorrect answerRapid elasticityOverall explanationOBJ-4.1: Rapid elasticity allows users to automatically request additional space in the cloud or other types of services. Because of the setup of cloud computing services, provisioning can be seamless for the client or user. Providers still need to allocate and de-allocate resources that are often irrelevant on the client or user’s side. This feature allows a service to be scaled up without purchasing, installing, and configuring new hardware, unlike if you had to install more physical storage into a server or datacenter. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. Metered services are pre-paid, a-la-carte, pay-per-use, or committed offerings. A metered service like a database may charge its users based on the actual usage of the service resources on an hourly or monthly basis. For example, Dion Training used the AWS Lambda serverless product in some of our automation. This service charges us $0.20 for every 1 million requests processed. Measured service is a term that IT professionals apply to cloud computing that references services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning.Domain4 - Virtualization and Cloud Computing

281
Q

Question 10:
What type of services can allow you to get more storage and more resources added to the cloud as fast as possible?
Resource pooling
Metered services
Measured services
Rapid elasticity

A

USB 2.0USB 3.1USB 3.0Correct answerUSB 1.1Overall explanationOBJ-3.1: USB 1.1 can support data rates up to 12 Mbps. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at a slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power.Domain3 - Hardware

282
Q

Question 11:
Which of the following types of USB connections can support data rates of up to 12 Mbps?
USB 2.0
USB 3.1
USB 3.0
USB 1.1

A

Power adapterCorrect answerDC jackBatteryHard driveOverall explanationOBJ-5.5: One of the most important parts of any good laptop is the DC power jack. This item allows you to charge your battery and provides you with a steady source of electricity. If it fails, your laptop will lose power and eventually be unable to turn it on. If your battery won’t charge or will only charge if the connection is made at a certain angle, this is usually an indication that the DC power jack has failed. To rule out the battery or power adapter as the source of the problem, you can use a multimeter to ensure they are providing the right amount of power.Domain5 - Hardware and Network Troubleshooting

283
Q

Question 12:
Your son accidentally knocked his laptop off his desk while it was charging. Your son picks up the laptop and notices that the laptop’s battery will no longer charge. You begin to troubleshoot the problem to identify the cause. You ensure the laptop is connected to the power adapter and that the power adapter is plugged into a power outlet, but the laptop’s battery will still not charge. Which of the following components was MOST likely damaged when the laptop was knocked off of the desk?
Power adapter
DC jack
Battery
Hard drive

A

DNSCorrect answerVirtual internal networkVirtual external networkNetwork address translationOverall explanationOBJ-4.2: Most virtual machines running on a workstation will have their own virtual internal network to communicate within the virtual environment while preventing them from communicating with the outside world. You may also configure a shared network address for the virtual machine to have the same IP address as the physical host that it is running on. This usually relies on network address translation to communicate from the virtual environment (inside) to the physical world (outside/internet). If you are communicating internally in the virtual network, there is no need for DNS or an external network.Domain4 - Virtualization and Cloud Computing

284
Q

Question 13:
Which of the following resources is used by virtual machines to communicate with other virtual machines on the same network but prevents them from communicating with resources on the internet?
DNS
Virtual internal network
Virtual external network
Network address translation

A

Correct answerInstall the print drivers for OS X on the print serverInstall and enable the OS X printing option on the network printerEnable Bonjour on John’s MacBookRestart the print spooler on the print serverOverall explanationOBJ-3.6: You should install the print drivers for OS X (macOS) on the print server to ensure compatibility with MacBooks and iMac devices. Since the Windows users can print to the network printer without any issues, the printer and the network are working properly. Instead, the most likely explanation is that the print server does not have the print drivers for OS X (macOS) installed on it.Domain3 - Hardware

285
Q

Question 14:
John connected his MacBook to the corporate network and is trying to print to the office’s large network printer. John notices that the print job is failing to print. The other employees in the office are having no issues printing from their Windows workstations. Which of the following should be done to resolve John’s issue?
Install the print drivers for OS X on the print server
Install and enable the OS X printing option on the network printer
Enable Bonjour on John’s MacBook
Restart the print spooler on the print server

A

Correct answerNFCZigbeeKVMSmart cardOverall explanationOBJ-1.3: NFC (near-field communication) is a set of communication protocols that enable two electronic devices to establish communication by bringing them within an inch or two (3-4 cm) of each other. Most modern smartphones use NFC to provide payment information between a smartphone and an NFC reader at the store. Apple Pay and Google Pay are examples of NFC payment solutions. Zigbee is a low-power wireless communications open-source protocol used primarily for home automation. Zigbee uses radio frequencies in the 2.4 GHz band and a mesh topology. A smart card is a card with a chip containing data on it. Smart cards are typically used for authentication, with the chip storing authentication data such as a digital certificate. A keyboard video mouse (KVM) switch is used to support a single set of input and output devices controlling several PCs. A KVM is more typically used with servers but 2- port versions allow a single keyboard, mouse, and display to be used with two PCs.Domain1 - Mobile Devices

286
Q

Question 15:
You are at the grocery store. At the checkout, you place your smartphone near the payment terminal to authorize the charge. Which of the following technologies did you use to make this purchase?
NFC
Zigbee
KVM
Smart card

A

KeyboardCorrect answerKVMMouseTouchpadOverall explanationOBJ-3.1: A keyboard video mouse (KVM) switch is used to support a single set of input and output devices controlling several PCs. A KVM is typically used with servers but 2- port versions allow a single keyboard, mouse, and display to be used with two PCs. Generally, a single KVM installed in each server rack allows the administrator to quickly switch between physical servers within the rack using the same keyboard, mouse, and monitor. A touchpad is an input device used on most laptops to replace a mouse. The touchpad allows the user to control the cursor by moving a finger over the pad’s surface. A mouse is an input device that is used to control the movements of a cursor and to select objects on the screen. A keyboard is an input device that is used to enter data into a computer using different key layouts based on the geographical region in which it is used.Domain3 - Hardware

287
Q

Question 16:
Which of the following devices would allow you to control and provide input commands to multiple servers within the same server rack using a single set of input devices?
Keyboard
KVM
Mouse
Touchpad

A

DB-9Correct answerF typeRJ-45RJ-11Overall explanationOBJ-3.1: The F type connector is used with coaxial cables. Both RG-6 and RG-59 are cable types used for coaxial cable connections. RG-6 cabling is recommended for your Cable TV, satellite, TV antennas, or broadband internet. RG-59 cabling is generally better for most CCTV systems and other analog video signals. An RJ-45 connector is used to terminate a copper twisted-pair Ethernet cable. A DB-9 connector is used to terminate an RS-232 serial cable. An RJ-11 connector is used to terminate cables used for phone lines.Domain3 - Hardware

288
Q

Question 17:
What type of connector is used to terminate a coaxial cable?
DB-9
F type
RJ-45
RJ-11

A

Correct answerStaticDynamicLink-localAPIPAOverall explanationOBJ-2.5: A static IP address should be used for servers to ensure they are easy to find, access, and manage on the network. When configuring a static IP address, you need to include the IP address, subnet mask, gateway, and DNS server’s IP address. A static IP address is used when the DHCP server is disabled and clients are configured manually to join the network properly. A dynamic IP address is configured automatically by a DHCP server when a new host joins the network. Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function. When a host uses an APIPA address, it can communicate with other hosts on the same network using APIPA. Still, it cannot reach other networks or communicate with hosts who have managed to obtain a valid DHCP lease. An APIPA address is also known as a link-local address.Domain2 - Networking

289
Q

Question 18:
You are configuring a print server on the network. Which type of IP address should you configure it with?
Static
Dynamic
Link-local
APIPA

A

Distended capacitorsBurning smellCorrect answerContinuous rebootIncorrect date/time on the workstationOverall explanationOBJ-5.2: Hardware failure or system instability can cause the computer to reboot continuously. The problem could be the RAM, hard drive, power supply, graphics card, or external devices. Based on the symptoms of a continuous reboot, the supervisor likely suspected the RAM as the cause of the issue. A burning smell is indicative of a bad power supply. A foul odor is indicative of a distended capacitor. The incorrect date/time on the workstation is indicative of a dead CMOS battery.Domain5 - Hardware and Network Troubleshooting

290
Q

Question 19:
You are troubleshooting a computer, and your supervisor believes that the issue is with the workstation’s RAM. Which of the following symptoms did your supervisor likely observe?
Distended capacitors
Burning smell
Continuous reboot
Incorrect date/time on the workstation

A

RAID 1RAID 0Correct answerRAID 10RAID 5Overall explanationOBJ-3.3: RAID 10 provides for redundancy and double fault tolerance. RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data. It requires a minimum of four disks and stripes data across mirrored pairs. As long as one disk in each mirrored pair is functional, data can be retrieved. RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity, but it only provides single fault tolerance. A RAID 0 provides disk striping (speed/performance) but not mirroring with a minimum of two disks. A RAID 1 provides mirroring (redundancy) but not disk striping with a minimum of two disks.Domain3 - Hardware

291
Q

Question 20:
You are configuring a new server for a client. The client has purchased five 1 TB hard drives and would like the server’s storage system to provide redundancy and double fault tolerance. Which of the following configurations would BEST meet the client’s requirements?
RAID 1
RAID 0
RAID 10
RAID 5

A

AP1AP3Correct answerAP2SW1Overall explanationOBJ-5.7: Since everything was working properly on the network before AP2 was replaced after the recent hardware failure, AP2 likely has some configuration error that has led to the recent connectivity and performance problems. Therefore, you should begin your troubleshooting efforts with AP2. According to the CompTIA troubleshooting method, you should always determine if anything has changed and question the obvious. If AP2 was recently replaced, it is most likely the device with an incorrect configuration setting or the one causing the issues.Domain5 - Hardware and Network Troubleshooting

292
Q

Question 21:
(This is a simulated Performance-Based Question. On the real certification exam, you will be asked to click on the appropriate device in a network diagram to see and modify its configuration.)
Wireless network users recently began experiencing speed and performance issues on your network after Access Point 2 (AP2) was replaced due to a recent hardware failure. The original wireless network was installed according to a wireless consultant’s specifications and has always worked properly without any past issues.
You have been asked to evaluate the situation and resolve any issues you find to improve the network’s performance and connectivity. The client has instructed you to adjust the least amount of settings/configurations possible while attempting to fix the issue. Before arriving on-site, you receive the below office’s floor plan with an elementary network diagram drawn on top.
Based on the information provided to you so far, which network device would you log into first to begin your troubleshooting efforts?
AP1
AP3
AP2
SW1

A

SaaSPaaSIaaSCorrect answerVDIOverall explanationOBJ-4.1: Virtual Desktop Infrastructure (VDI) refers to using a VM as a means of provisioning corporate desktops. In a typical VDI, desktop computers are replaced by low-spec, low-power thin client computers. When the thin client starts, it boots a minimal OS, allowing the user to log on to a VM stored on the company server or cloud infrastructure. The user connects to the VM using some remote desktop protocol (Microsoft Remote Desktop or Citrix ICA, for instance). The thin client has to find the correct image and use an appropriate authentication mechanism. Software as a Service (SaaS) is a cloud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions. Platform as a Service (PaaS) is a cloud computing service that enables consumers to rent fully configured systems that are set up for specific purposes. Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center.Domain4 - Virtualization and Cloud Computing

293
Q

Question 22:
Which of the following refers to using virtual machines as a method of provisioning workstations for corporate users?
SaaS
PaaS
IaaS
VDI

A

Inkjet cartridgeCorrect answerRibbonFilamentTonerOverall explanationOBJ-3.7: An impact printer operates the same way as an old-fashioned typewriter. It uses a film-like ribbon that sits inside between the paper and print head. The ribbon is impacted by a series of mechanical dots in the print head, and this transfers the ink from the ribbon to the paper to form the desired image or text. An inkjet cartridge is used with an inkjet printer. Toner is used with a laser printer. Filament is used with a 3-D printer.Domain3 - Hardware

294
Q

Question 23:
When using an impact printer, what is used to transfer the ink to a piece of paper?
Inkjet cartridge
Ribbon
Filament
Toner

A

HTTPSRDPCorrect answerIMAPPOP3Overall explanationOBJ-2.1: The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443. The remote desktop protocol (RDP) is a protocol used for the remote administration of a host using a graphical user interface. RDP operates over TCP port 3389.Domain2 - Networking

295
Q

Question 24:
Which of the following protocols operates over port 143 by default?
HTTPS
RDP
IMAP
POP3

A

The brightness needs to be increasedCorrect selectionThe cooling fan needs to be cleaned or replacedIncorrect video resolution settingCorrect selectionThe bulb’s life counter needs to be resetA higher lumen bulb must be installedThe video driver on the media player needs to be updatedOverall explanationOBJ-5.4: Most projectors keep track of the life of a bulb/lamp using a life counter. If you forget to reset the life counter after replacing the bulb/lamp, the projector can often turn itself off since it believes the bulb/lamp still needs to be replaced. Another cause of a project turning itself off is when it overheats. This can be caused by an overly dirty cooling fan or a failed cooling fan. To solve this issue, simply clean or replace the cooling fan to prevent the projector from overheating.Domain5 - Hardware and Network Troubleshooting

296
Q

Question 25:
You have been asked to troubleshoot a digital projector in the home theater in your neighbor’s basement. Your neighbor attempted to replace the projector’s bulb, but after running for a few minutes, a message appears on the screen, and the projector turns itself off again. Based on these symptoms, what are the MOST likely causes of the projector continually turning off after just a few minutes of usage with a new bulb? (Select TWO)
The brightness needs to be increased
The cooling fan needs to be cleaned or replaced
Incorrect video resolution setting
The bulb’s life counter needs to be reset
A higher lumen bulb must be installed
The video driver on the media player needs to be updated

A

Natalie should perform a backup of her iPhone using iTunes on her PC and then import the contacts and appointments from her PC to her new Android deviceNatalie should create a wireless Bluetooth connection between the iPhone and the Android devices and use it to copy her contacts and appointments to the new deviceNatalie should create an NFC connection to transfer all compatible data between the iPhone and the Android devicesCorrect answerNatalie should log into her corporate email account on the new Android phone and restore her contacts and appointments to the new deviceOverall explanationOBJ-1.4: Since Natalie has a corporate account used to synchronize data from her device to the cloud, the easier and quickest method would be to fully synchronize her contacts and appointments to her corporate cloud-based account from her old device first. Then, she can configure her new Android device to access her corporate account. It will automatically download and synchronize the data from the cloud-based servers onto her new Android device. Moving data over Bluetooth from an iPhone to an Android can be complicated, so using the cloud synchronization option would be easier and faster. You cannot use iTunes to move data from an iPhone to an Android device since iTunes only supports iPhone and iPad devices. While NFC can transfer data between two phones that are placed close together, it is not the optimal way to transmit large amounts of data such as all of the contacts or appointments from a previous phone.Domain1 - Mobile Devices

297
Q

Question 26:
Natalie just bought a new mobile Android phone, but her current phone is an iPhone. She needs to move all of her phone’s existing contacts and appointments from her calendar from her current phone to her new phone. Natalie’s iPhone was configured to use her Dion Training corporate account to save all her contacts and appointments to their cloud-based service, as well. Which of the following is the BEST way for Natalie to migrate her data from her old iPhone to her new Android device?
Natalie should perform a backup of her iPhone using iTunes on her PC and then import the contacts and appointments from her PC to her new Android device
Natalie should create a wireless Bluetooth connection between the iPhone and the Android devices and use it to copy her contacts and appointments to the new device
Natalie should create an NFC connection to transfer all compatible data between the iPhone and the Android devices
Natalie should log into her corporate email account on the new Android phone and restore her contacts and appointments to the new device

A

DVI-IDVI-DHDMICorrect answerVGAOverall explanationOBJ-3.1: This port is the VGA connection. A video graphics array (VGA) connector is a 15-pin HD connector that has been used to connect the graphics adapter to a monitor since 1987. The use of digital flat-panel displays rather than CRTs has made this analog connector increasingly obsolete. For the exam, it is important that you can identify the different parts of a motherboard’s rear port cluster by sight.Domain3 - Hardware

298
Q

Question 27:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the port cluster.)
Using the image above, which of the following correctly indicates the port labeled as E?
DVI-I
DVI-D
HDMI
VGA

A

Correct answerBluetooth is not enabledThe phone is in airplane modeWiFi is not enabledCellular is not enabledOverall explanationOBJ-5.5: Since Sally can connect to the internet, either her cellular or WiFi is enabled, and the phone would not be in airplane mode. Since AirPods work over Bluetooth, it is most likely that the Bluetooth is not enabled on the new phone and should be turned on. Once Bluetooth is enabled, the Airpods will need to be paired to the device to begin using them.Domain5 - Hardware and Network Troubleshooting

299
Q

Question 28:
Sally just purchased a new iPhone and AirPods to listen to her music. After setting up the new iPhone, she can get online and watch YouTube, but her wireless headphones aren’t working. Which of the following is MOST likely the problem?
Bluetooth is not enabled
The phone is in airplane mode
WiFi is not enabled
Cellular is not enabled

A

PaaSDaaSIaaSCorrect answerSaaSOverall explanationOBJ-4.1: Software as a Service (SaaS) is ca loud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions. Platform as a Service (PaaS) is a cloud computing service that enables consumers to rent fully configured systems that are set up for specific purposes. Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center. Data as a Service (DaaS) is an information provision and distribution model in which data files (including text, images, sounds, and videos) are made available to customers over a network, typically the Internet.Domain4 - Virtualization and Cloud Computing

300
Q

Question 29:
You have signed up for a web-based appointment scheduling application to help you manage your new IT technical support business. What type of solution would this be categorized as?
PaaS
DaaS
IaaS
SaaS

A

The battery is depletedThe smartphone has no connectivityCorrect answerThe smartphone is overheatedThe digitizer is brokenOverall explanationOBJ-5.5: Smartphones are designed to operate between 32 and 95 degrees Fahrenheit (0 to 35 degrees Celsius). If a smartphone is left in a car on a sunny day, it is likely to become overheated and shut down until it returns to a normal temperature range. If this occurs, the smartphone should remain off until it cools down to the normal range.Domain5 - Hardware and Network Troubleshooting

301
Q

Question 30:
Jason left his smartphone in his car while running into a convenience store to grab a cold drink on a sunny day. When he got back to the car, his smartphone would not turn on. Which of the following issues most likely occurred?
The battery is depleted
The smartphone has no connectivity
The smartphone is overheated
The digitizer is broken

A

Update the display driversCorrect answerChange the orientation of the screenReplace the LCD panelReplace the integrated GPUOverall explanationOBJ-1.3: Windows offers a beneficial function for viewing documents or playing pranks on your friends. With a simple key combination, you can rotate your screen in any direction - flip it upside-down, or lay it on the side. To change your laptop screen orientation, hold down the Ctrl and Alt keys on your keyboard, then press the up/down/left/right arrow key. You can also change your screen orientation in the Windows display settings. An integrated GPU is part of the laptop’s CPU and cannot be easily replaced. The display drivers and the LCD panel are not the cause of the issue since you can see the screen image properly (although it is being displayed upside down).Domain1 - Mobile Devices

302
Q

Question 31:
You have been asked to fix a laptop with a screen image that is being displayed upside down. What is the BEST method to fix this issue?
Update the display drivers
Change the orientation of the screen
Replace the LCD panel
Replace the integrated GPU

A

LANCorrect answerPerimeter networkWANMANOverall explanationOBJ-2.5: A perimeter network (formerly called a Demilitarized Zone or DMZ) is a portion of a private network connected to the Internet and protected against intrusion. Certain services may need to be made publicly accessible from the Internet (such as a web, email, or Minecraft server) and they should be installed in the perimeter network instead of in your intranet. If communication is required between hosts on either side of a perimeter network, then a host within the perimeter network will act as a proxy to take the request. If the request is valid, it re-transmits it to the destination. External hosts have no idea about what is behind the perimeter network so that the intranet remains secure. A perimeter network can be implemented using either two firewalls (screened subnet) or a single three-legged firewall (one with three network ports). In this SOHO network, it would use a single three-legged firewall approach to separate the perimeter network from the LAN and WAN. A local area network (LAN) is a network where all the nodes or hosts participating in the network are directly connected with cables or short-range wireless media. A wide area network (WAN) is a network that spans multiple geographic locations such as the internet. A metropolitan area network (MAN) is a network that covers a geographical area equivalent to a city or municipality.Domain2 - Networking

303
Q

Question 32:
You have been asked to configure your neighbor’s SOHO network. Your neighbor wants to build a Minecraft server so that all their friends can play together over the internet. When configuring their firewall, where should you place the server?
LAN
Perimeter network
WAN
MAN

A

Correct answerPhabletsFitness monitorsSmartwatchesVR headsetsOverall explanationOBJ-1.3: Phablets are essentially large smartphones. Their size is smaller than a tablet but larger than a smartphone. Generally, smartphones that have screen sizes between 5.5” and 7” are considered phablets by manufacturers. Many phablets also come with a stylus for note-taking on the larger screen size instead of using your finger. Smartwatches, fitness monitors, and VR headsets are all considered wearable technology or wearables. Fitness monitors are wearable mobile devices that focus on tracking the health and exercise habits of their users. A high-end smartwatch (for example, an Apple Watch) will allow the user to see their notifications, chat activity, and even make phone calls. A mid-range or low-end smartwatch can still have the ability to read your chat and notifications, but you may be unable to make phone calls from it. A virtual reality headset (VR) is a headset worn like goggles to interact with images displayed in the headset. Virtual reality is a computer-generated, simulated environment experienced via a headset connected to a PC or powered by a smartphone.Domain1 - Mobile Devices

304
Q

Question 33:
Which of the following is NOT categorized as wearable technology?
Phablets
Fitness monitors
Smartwatches
VR headsets

A

Correct answerInstall virtualization software and install each OS as a virtual machinePurchase a new high-end gaming laptop with Windows 10 pre-installedPurchase a Chromebook and utilize cloud-based virtual machinesBuy an inexpensive Windows 10 laptopOverall explanationOBJ-4.2: The best solution would be to install virtualization software like VirtualBox, VM Ware, or Hyper-V. This will allow the student to run additional operating systems for practice. While they could buy additional laptops to practice on, there is no need to spend money on additional hardware since their laptop has multiple cores and plenty of memory to create the two virtual machines. Based on the information provided, Tom’s computer is sufficient to run at least one Linux virtual machine on his Windows system so he doesn’t need to buy a new laptop. Chromebooks do not support virtual machines. If Tom was going to use cloud-based virtual machines, he could use his current Windows machine to access them instead of buying a new Chromebook.Domain4 - Virtualization and Cloud Computing

305
Q

Question 34:
Tom, a student, wants to install Windows and Linux to practice configuring these operating systems as part of his CompTIA+ studies. His current Windows 10 laptop has a multi-core processor, and 16 GB of RAM installed. Which of the following should Tom do?
Install virtualization software and install each OS as a virtual machine
Purchase a new high-end gaming laptop with Windows 10 pre-installed
Purchase a Chromebook and utilize cloud-based virtual machines
Buy an inexpensive Windows 10 laptop

A

SOACorrect answerTXTPTRSRVOverall explanationOBJ-2.6: The DNS text (TXT) record lets a domain administrator enter text into the Domain Name Systems. The TXT record was originally intended as a place for human-readable notes. However, now it is also possible to put some machine-readable data into TXT records. TXT records are a key component of several different email authentication methods (SPF, DKIM, and DMARC) that help an email server determine if a message is from a trusted source. A DNS service (SRV) record specifies a host and port for specific services such as voice over IP (VoIP), instant messaging, and others. A Start of Authority (SOA) resource record indicates which Domain Name Server (DNS) is the best source of information for the specified domain. PTR records are used for the Reverse DNS (Domain Name System) lookup. Using the IP address, you can get the associated domain/hostname. An A record should exist for every PTR record.Domain2 - Networking

306
Q

Question 35:
Dion Training wants to create a DNS record to enter DKIM or SPF information into the domain name system to help prevent from spam coming from their domain. Which type of DNS record should be created?
SOA
TXT
PTR
SRV

A

RouterSwitchCorrect answerRepeaterFirewallOverall explanationOBJ-2.2: A repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction. Repeaters may be wired or wireless, and they rebroadcast whatever signal is received through their transmitter. A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and an untrusted external network, such as the internet. A switch is a network device that receives incoming data into a buffer, then the destination MAC address is compared with an address table so that data is only sent out to the port with the corresponding MAC address. In a switched network, each port is in a separate collision domain. A router is a network device that links dissimilar networks and can support multiple alternate paths between locations based upon the parameters of speed, traffic loads, and cost. Routers are used to logically divide networks into subnets.Domain2 - Networking

307
Q

Question 36:
Which of the following devices could be used to extend transmissions of a signal over longer distances by receiving and retransmitting a given signal at the lowest cost?
Router
Switch
Repeater
Firewall

A

Correct answerVerify full system functionalityDocument findings, actions, and outcomesTest the theory to determine the causeIdentify the problemOverall explanationOBJ-5.1: For the exam, it is important that you can list and identify the 6 steps of the CompTIA troubleshooting methodology in order. (1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and then implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.Domain5 - Hardware and Network Troubleshooting

308
Q

Question 37:
A client’s laptop appears to have been infected with malware. You have begun troubleshooting, established a plan of action, and have already implemented your proposed solution. According to the best practice troubleshooting methodology, what is the NEXT step you should take?
Verify full system functionality
Document findings, actions, and outcomes
Test the theory to determine the cause
Identify the problem

A

CDMANVMeGSMCorrect answerMDMOverall explanationOBJ-1.4: Mobile application management (MAM) is software that secures and enables IT administrators to have control over enterprise applications on end users’ corporate and personal smartphones and tablets. MAM software allows IT administrators to apply and enforce corporate policies on mobile apps and limit the sharing of corporate data among apps. Since the employees will be using their laptops and smartphones, the company should implement and install MDM across the employee’s devices to better secure their devices if they give the company permission. The global system for mobile (GSM) communication standard for cellular radio communications and data transfer uses a SIM card to identify the subscriber and network provider. The code division multiple access (CDMA) communication standard for cellular radio communications and data transfer uses a method of multiplexing a communications channel using a code to key the modulation of a particular signal. Non-volatile memory express (NVMe) is an interface for connecting flash memory devices, such as SSDs, directly to a PCI Express bus. NVMe allows much higher transfer rates than SATA/AHCI.Domain1 - Mobile Devices

309
Q

Question 38:
Due to a global pandemic, your company decides to implement a telework policy for its employees. Unfortunately, the company doesn’t have enough time to issue laptops and smartphones to each employee. The Chief Information Officer (CIO) has decided to allow employees to use their laptops and smartphones when conducting their work from home. Which of the following technologies should be implemented to allow the company the ability to manage the employees’ mobile devices, provide security updates, and perform remote administration?
CDMA
NVMe
GSM
MDM

A

RAID 5RAID 0Correct answerRAID 10RAID 1Overall explanationOBJ-3.3: RAID 10 offers the fastest speed, best reliability, and highest redundancy but is more costly as the overall disk storage will be greatly reduced. A RAID 10 combines disk mirroring and disk striping to protect data stored in the array and required a minimum of four disks. A RAID 0 provides disk striping (speed/performance) but not mirroring with a minimum of two disks. A RAID 1 provides mirroring (redundancy) but not disk striping with a minimum of two disks. A RAID 5 provides block-level striping with distributed parity to provide redundancy using a minimum of three disks.Domain3 - Hardware

310
Q

Question 39:
Which type of RAID should be used for a virtualization server that must have the fastest speed and highest redundancy level?
RAID 5
RAID 0
RAID 10
RAID 1

A

IaaSType 1Correct answerType 2Bare metalOverall explanationOBJ-4.2: A Type 2 hypervisor runs on top of an existing operating system. In this case, the scenario states that the virtualization server is already running Windows 2016, so you must install your hypervisor on Windows 2016. A Type 1 hypervisor, also known as bare metal, uses a specialized hypervisor OS to run the virtual machines (such as VM Ware’s ESXi). Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center.Domain4 - Virtualization and Cloud Computing

311
Q

Question 40:
You are building a virtualization server that runs on Windows Server 2016. The server will host multiple virtual machines, each with a different operating system. Which type of hypervisor should you select for this environment?
IaaS
Type 1
Type 2
Bare metal

A

Front connectionCorrect answerPort clusterPATA connectorAGPOverall explanationOBJ-3.4: The area circled indicates the port cluster on the rear of the motherboard. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

312
Q

Question 41:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard above, which of the following correctly indicates the circled area?
Front connection
Port cluster
PATA connector
AGP

A

BandwidthLatencyThroughputCorrect answerJitterOverall explanationOBJ-5.7: Jitter is a network condition that occurs when a time delay in the sending of data packets over a network connection occurs. Jitter is a big problem for any real-time applications you may be supporting on your networks, like video conferences, voice-over IP, and virtual desktop infrastructure clients. A jitter is simply a variation in the delay of the packets, and this can cause some strange side effects, especially for voice and video calls. If you have ever been in a video conference where someone was speaking and then their voice started speeding up for 5 or 10 seconds, then returned to normal speed, you have been on the receiving end of their network’s jitter. Latency is the measure of time that it takes for data to reach its destination across a network. Usually, we measure network latency as the round-trip time from a workstation to the distant end and back. Throughput is an actual measure of how much data is successfully transferred from the source to a destination. Bandwidth is the maximum rate of data transfer across a given network. Now, bandwidth is more of a theoretical concept that measures how much data could be transferred from a source to a destination under ideal conditions. Therefore, we often measure throughput, instead of bandwidth, to monitor our network performance.Domain5 - Hardware and Network Troubleshooting

313
Q

Question 42:
Dion Training uses a VoIP conferencing solution to conduct its weekly staff meetings. When Jason is talking, some of the employees say it sounds like he is speeding up and slowing down randomly. Tamera is sitting in the office with Jason, and she says Jason is speaking at the same rate the entire time. Which of the following network performance metrics would be most useful in determining why the VoIP service is not presenting a consistent pace when delivering Jason’s voice over the network?
Bandwidth
Latency
Throughput
Jitter

A

SODIMMNon-ParityVRAMCorrect answerECCOverall explanationOBJ-3.2: Error checking and correcting or error correcting code (ECC) is a type of system memory that has built-in error correction security. ECC is more expensive than normal memory and requires support from the motherboard. ECC is commonly used in production servers and not in standard desktops or laptops. Non-parity memory is a type of system memory that does not perform error checking except when conducting the initial startup memory count. VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display. A small outline dual inline memory module (SODIMM) can be purchased in various types and sizes to fit any laptop, router, or other small form factor computing device.Domain3 - Hardware

314
Q

Question 43:
A technician needs to upgrade the RAM in a database server. The server’s memory must support maintaining the highest levels of integrity. Which of the following type of RAM should the technician install?
SODIMM
Non-Parity
VRAM
ECC

A

Correct answerTNVAIPSPlasmaOverall explanationOBJ-1.2: A twisted nematic (TN) LCD panel uses technology where the panel is black when no electric current is running through the liquid crystal cells because the cells align themselves in a twisted state. When an electric current is applied, the liquid crystal cells untwist, allowing light to pass through, resulting in a white display screen. TN displays can be made with high refresh rates of 120 Hz or 144 Hz which makes them popular with gamers. An in-plane switching (IPS) LCD panel uses technology designed to resolve the quality issues inherent in TN panel technology, including strong viewing angle dependence and low-quality color reproduction. IPS displays have great color accuracy, but they do not support higher refresh rates sought after by gamers. A vertical alignment (VA) LCD panel uses technology designed to have liquid crystals lay perpendicular to the glass substrate when power is removed and in a vertical position when voltage is applied. This allows light to move through the liquid pixels when voltage is applied and the image is then produced. VA displays are a good middle-ground between IPS and TN panel displays. A plasma display is a type of flat panel display that uses small cells containing plasma with ionized gas that responds to electric fields. Plasma displays create excessive heat and are not as energy efficient as an LCD, LED, or OLED display.Domain1 - Mobile Devices

315
Q

Question 44:
Jason wants to order a new gaming laptop for his son for his birthday. The laptop display must support a high refresh rate of 120 Hz or 144 Hz. Which of the following types of laptop displays should Jason purchase to meet this requirement?
TN
VA
IPS
Plasma

A

CPU with integrated GPUCorrect selection512 GB SSDCorrect selectionDedicated video card with GPUCorrect selection7.1 Dolby Sound audio card1 TB HDDCorrect selectionLiquid coolingOverall explanationOBJ-3.4: According to CompTIA, the four main things you need to include for a gaming PC are (1) an SSD, (2) a high-end video/specialized GPU, (3) a high-definition sound card, and (4) high-end cooling. Based on the options provided, you should pick the 512 GB SSD (instead of the 1 TB HDD), the dedicated video card with GPU (instead of the CPU with integrated GPU), the 7.1 Dolby Sound audio card (instead of integrated sound from the motherboard), and the high-end cooling (liquid cooling over fans) for this workstation’s configuration.Domain3 - Hardware

316
Q

Question 45:
You have been asked by Dion Training to build a specialized computer that will be used exclusively as a gaming machine for beta testing some new video games they are developing. Which of the following should you install to BEST meet the company’s needs? (Select FOUR)
CPU with integrated GPU
512 GB SSD
Dedicated video card with GPU
7.1 Dolby Sound audio card
1 TB HDD
Liquid cooling

A

DB-9Correct answerF-typeRJ-45RJ-11Overall explanationOBJ-3.1: F type is the connector used with coaxial cables. Both RG-6 and RG-59 are cable types used for coaxial cable connections. RG-6 cabling is recommended for your Cable TV, satellite, TV antennas, or broadband internet. RG-59 cabling is generally better for most CCTV systems and other analog video signals. A copper twisted-pair Ethernet cable is usually terminated with an RJ-45 connector. An RS-232 serial cable is normally terminated with a DB-9 connector. A fiber optic cable normally uses an ST, SC, LC, or MTRJ connector.Domain3 - Hardware

317
Q

Question 46:
Which of the following types of connectors are used to terminate a coaxial cable for your cable modem?
DB-9
F-type
RJ-45
RJ-11

A

Correct answerVPNIDSNATVLANOverall explanationOBJ-2.6: A remote-access VPN connection allows an individual user to connect to a private network from a remote location using a laptop or desktop computer connected to the internet. A remote-access VPN allows individual users to establish secure connections with a remote computer network. Once established, the remote user can access the corporate network and its capabilities as if they were accessing the network from their own office spaces. Network address translation (NAT) is a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses. NAT can use static mappings but is commonly implemented as network port address translation (PAT) or NAT overloading, where a few public IP addresses are mapped to multiple LAN hosts using port allocations. A Virtual LAN (VLAN) is a logically separate network that is created using switching technology. Even though hosts on two VLANs may be physically connected to the same cabling, local traffic is isolated to each VLAN so they must use a router to communicate. An intrusion detection system (IDS) is a device or software application that monitors a network or system for malicious activity or policy violations. Any malicious activity or violation is typically reported to an administrator or collected centrally using a security information and event management system. Unlike an IPS, which can stop malicious activity or policy violations, an IDS can only log these issues and not stop them.Domain2 - Networking

318
Q

Question 47:
Your company has an office in Boston and is worried that its employees may not reach the office during periods of heavy snowfall. You have been asked to select a technology that would allow employees to work remotely from their homes during poor weather conditions. Which of the following should you select?
VPN
IDS
NAT
VLAN

A

PCIAGPPCIe x4Correct answerPCIe x16Overall explanationOBJ-3.4: The area circled indicates the PCIe x16 (PCI Express x16) slots. PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has some PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. Graphics cards almost exclusively rely on PCIe x16 expansion slots for their connectivity. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

319
Q

Question 48:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard above, which of the following correctly indicates the circled area?
PCI
AGP
PCIe x4
PCIe x16

A

Correct answerUSB 4-port hubDocking StationThunderboltPort replicatorOverall explanationOBJ-1.3: Since your son has a limited budget of just $20, the best option to meet his needs would be a USB 4-port hub. This would allow him to connect his USB mouse, keyboard, and a webcam to the USB 4-port hub and then connect the USB 4-port hub using a single USB connector to the laptop. A USB hub is a device that connects to a USB port to allow additional USB devices to be connected to the PC, essentially increasing the number of USB ports available. Thunderbolt is a connector type that can be used either as a display interface (like DisplayPort) or as a general peripheral interface (like USB 3). Thunderbolt 3 uses USB-C connectors. A docking station is a sophisticated type of port replicator designed to provide additional ports (such as network or USB) and functionality (such as expansion slots and drives) to a portable computer when used at a desk. A port replicator is a simple device to extend the range of ports (for example, USB, DVI, HDMI, Thunderbolt, network, and so on) available for a laptop computer when it is used at a desk. The difference between a docking station and a port replicator is that a docking station can add additional capabilities beyond what is already integrated into the laptop whereas a port replicator can only reproduce the same ports that already exist on the laptop.Domain1 - Mobile Devices

320
Q

Question 49:
Your son has a gaming laptop in his bedroom. He loves his laptop since it allows him to take it over to his friend’s houses when desired, but his laptop only has 1 USB port. When he gets home, though, he prefers to use a USB mouse, keyboard, and webcam when playing games on his laptop. He only has $20 saved up but wants to buy a device that would allow him to connect all 3 of these peripherals with one USB connector. Which of the following do you recommend he purchase?
USB 4-port hub
Docking Station
Thunderbolt
Port replicator

A

Correct selectionIntel i9 with 8-cores1 TB HDD1 TB SSDIntel i3 with 2-coresCorrect selection64 GB of DDR48 GB of DDR3Overall explanationOBJ-4.2: According to CompTIA, the two main things you need to include for a dedicated virtualization workstation are (1) maximum RAM and (2) multiple CPU cores. Based on the options provided, you should pick the 64 GB of DDR4 (maximum RAM) and the Intel i9 with 8-cores (multiple processor cores) for this workstation’s configuration. The CPU should support virtualization and be a multicore processor. The memory should be fast and contain at least 16 GB of RAM to host numerous VMs effectively.Domain4 - Virtualization and Cloud Computing

321
Q

Question 50:
You have been asked by Dion Training to build a specialized computer that will be used exclusively for running numerous virtual machines simultaneously for their lab environment. Which of the following should you install to BEST meet the company’s needs? (Select TWO)
Intel i9 with 8-cores
1 TB HDD
1 TB SSD
Intel i3 with 2-cores
64 GB of DDR4
8 GB of DDR3

A

PS/2RJ-11Correct answerRJ-45DB-9Overall explanationOBJ-3.1: This port is the RJ-45 connection or network interface card (NIC) port that is used to connect a computer to a wired network. An RJ-45 connector is used to terminate a copper twisted-pair Ethernet cable. For the exam, it is important that you can identify the different parts of a motherboard’s rear port cluster by sight.Domain3 - Hardware

322
Q

Question 51:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the port cluster.)
Using the image above, which of the following correctly indicates the port labeled as I?
PS/2
RJ-11
RJ-45
DB-9

A

Format the new hard drive as FAT-32Format the new hard drive as NTFSConfigure a RAID in the BIOS/UEFICorrect answerUpdate the firmware of the motherboardOverall explanationOBJ-5.3: This type of error (drive not recognized) is usually the result of the motherboard’s firmware not supporting a newer hard drive model or the cables not being properly connected. Since we already established that the cables were properly connected, we have to consider the firmware as the issue. To troubleshoot this issue, you should restart the computer and enter the BIOS/UEFI configuration. If the BIOS/UEFI does not recognize the hard drive, then the motherboard’s firmware will need to be updated. If the BIOS/UEFI cannot detect the hard drive, then the operating system cannot detect the drive either (since it relies on the underlying BIOS/UEFI to make the connection). This means that you cannot format the hard drive or configure a RAID.Domain5 - Hardware and Network Troubleshooting

323
Q

Question 52:
You have just installed a new hard disk drive into your computer, but the motherboard does not recognize it within the BIOS/UEFI. You have verified the drive is properly connected to the motherboard and the power supply with the correct cables, but it still is not recognized. Which of the following actions would BEST solve this problem?
Format the new hard drive as FAT-32
Format the new hard drive as NTFS
Configure a RAID in the BIOS/UEFI
Update the firmware of the motherboard

A

PS2FireWireUSBCorrect answerSPDIFOverall explanationOBJ-3.1: This port is the SPDIF (Sony-Philips Digital Interface Format) connection. This is a fiber optic port used to transmit digital audio. For the exam, it is important that you can identify the different parts of a motherboard’s rear port cluster by sight.Domain3 - Hardware

324
Q

Question 53:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the port cluster.)
Using the image above, which of the following correctly indicates the port labeled as C?
PS2
FireWire
USB
SPDIF

A

iCloudMicrosoft 365Correct answerGoogle WorkspaceiTunesOverall explanationOBJ-1.4: Google Workspace is a collection of cloud computing, productivity and collaboration tools, software, and products developed and marketed by Google. Microsoft 365, formerly Office 365, is a line of subscription services offered by Microsoft which adds to and includes the Microsoft Office product line. Apple’s online cloud storage and file synchronization service for macOS and iOS devices is called iCloud. The service provides a centralized location for mail, contacts, calendar, photos, notes, reminders, and files online. Apple’s iTunes is a media player, media library, Internet radio broadcaster, mobile device management utility, and the client app for the iTunes Store. It is not a cloud-based solution for synchronization.Domain1 - Mobile Devices

325
Q

Question 54:
Which of the following cloud services provides access to Docs, Sheets, Drive, and other productivity tools using a subscription-based pricing model?
iCloud
Microsoft 365
Google Workspace
iTunes

A

Case fan 4-pin power cableMotherboard 24-pin power cableCorrect answerCPU 8-pin power cableSATA 15-pin power cableOverall explanationOBJ-5.2: Based on the scenario, it is most likely that the technician forgot to connect the 8-pin CPU power cable. Without the CPU receiving power, the POST test cannot be run and the system will not boot up. If the motherboard power cable was not connected, then the motherboard’s LED would not be lit. If the SATA 15-pin power cable was not connected, the system could still complete the POST and a “bootable device not found” error would be displayed on the monitor. If the case fan’s power cables were not connected, the fans would not be spinning. Therefore, the right answer must be that the CPU power cable was not properly connected by the technician.Domain5 - Hardware and Network Troubleshooting

326
Q

Question 55:
A technician is building a new computer for Dion Training. The technician installs the motherboard, processor, memory, hard drives, and case fans, then they attempt to connect the cables to the appropriate connections. When the technician powers on the system, the fans spin, and the motherboard’s LEDs light up. Unfortunately, the computer does not successfully complete the POST and the monitor remains blank. Which of the following did the technician likely forget to connect to the motherboard?
Case fan 4-pin power cable
Motherboard 24-pin power cable
CPU 8-pin power cable
SATA 15-pin power cable

A

Their workstation cannot reach the DNS serverTheir workstation cannot reach the web serverCorrect answerTheir workstation cannot reach the DHCP serverTheir workstation cannot reach the default gatewayOverall explanationOBJ-5.7: Since the customer’s IP address is 169.254.12.45, it is an APIPA address. Since the workstation has an APIPA address, it means the DHCP server was unreachable. Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function. APIPA serves as a DHCP server failover mechanism and makes it easier to configure and support small local area networks (LANs). If no DHCP server is currently available, either because the server is temporarily down or because none exists on the network, the computer selects an IP address from a range of addresses (from 169.254.0.0 - 169.254.255.255) reserved for that purpose.Domain5 - Hardware and Network Troubleshooting

327
Q

Question 56:
A customer called the service desk and complained that they could not reach the internet on their computer. You ask the customer to open their command prompt, type in ipconfig, and read you the IP address. The customer reads the IP as 169.254.12.45. What is the root cause of the customer’s issue based on what you know so far?
Their workstation cannot reach the DNS server
Their workstation cannot reach the web server
Their workstation cannot reach the DHCP server
Their workstation cannot reach the default gateway

A

Replace the power supply with a more efficient modelHigh RPM fansCorrect answerLiquid cooling systemPassive heat sinkOverall explanationOBJ-3.4: Since the system described in the question will have multiple graphics cards (GPUs), lots of memory, and an 8-core CPU, it is expected to generate a lot of heat during its crypto mining operation. For any extremely high-powered processing environment that generates a lot of heat (for example, gaming workstations), liquid cooling becomes the MOST efficient way to dissipate the system’s heat. A heat sink is a block of copper or aluminum with fins. A cooling effect occurs when convection is achieved using passive cooling as the fins expose a larger surface area to the air around the component. Fans are used to dissipate the heat generated by the processors by increasing the airflow across the components. Replacing the power supply with a more efficient model can reduce some of the heat generated by the power supply, but it will not reduce the heat generated by the CPU or the graphics cards.Domain3 - Hardware

328
Q

Question 57:
You are building a bitcoin mining workstation that will have multiple graphics cards, lots of memory, and an octa-core processor. This computer is expected to generate a lot of heat during its operations. Which of the following solutions would MOST efficiently dissipate all of the heat produced?
Replace the power supply with a more efficient model
High RPM fans
Liquid cooling system
Passive heat sink

A

e-ReaderCorrect answerSmartwatchFitness monitorPortable hotspotOverall explanationOBJ-1.4: A high-end smartwatch (for example, an Apple Watch) will allow the user to see their notifications, chat activity, and even make phone calls. A mid-range or low-end smartwatch can still have the ability to read your chat and notifications, but you may be unable to make phone calls from it. A fitness monitor is a wearable mobile device that focuses on tracking the health and exercise habits of its users. A high-end smartwatch usually includes fitness tracking functionality, as well. An e-Reader is a tablet-sized device designed for reading rather than general-purpose computing. For example, the Amazon Paperwhite is an example of a traditional e-Reader. A portable hotspot is a dedicated mobile device that connects to a cellular network and provides a wireless (Wi-Fi) network for a small number of users.Domain1 - Mobile Devices

329
Q

Question 58:
John is a small business owner who is always running between meetings. He wants to buy a device that will let him quickly and easily see his email notifications, view his instant messages and chats, and keep in touch with his executive assistant who is back at the office. Which device would BEST meet John’s needs?
e-Reader
Smartwatch
Fitness monitor
Portable hotspot

A

Link-localPublicPrivateCorrect answerAPIPAOverall explanationOBJ-2.5: Automatic Private IP Addressing (APIPA) is a feature in operating systems (such as Windows) that enables computers to automatically self-configure an IP address and subnet mask when their DHCP server isn’t reachable. A private IP address is an IP address reserved for internal use behind a router or other Network Address Translation (NAT) devices, apart from the public. Private IP addresses provide an entirely separate set of addresses that still allow access to a network without taking up a public IP address space. A public IP address is an IP address that is used to access the Internet and can be routed on the Internet, unlike private addresses. A link-local IP is an IPv6 address that is valid only for communications within the network segment or the broadcast domain that the host is connected to.Domain2 - Networking

330
Q

Question 59:
You have connected a new Smart TV to your home network and powered it on. When you try to access Netflix, you receive an error. You check the Network Status menu and see an IP address of 169.254.0.24. Which of the following types of IP addresses has your new Smart TV been assigned?
Link-local
Public
Private
APIPA

A

Laptop is overheatingFailed CMOS batteryLaptop is unpluggedCorrect answerBattery connection is looseOverall explanationOBJ-5.5: Based on the symptoms provided (laptop shutting down whenever it is moved), it is most likely a loose battery connection causing the issue. If the battery connection wasn’t loos and the laptop was unplugged, the laptop would continue to run on battery power. Overheating can cause a laptop to shut down, but it wouldn’t necessarily happen each time the laptop is moved. If the CMOS battery fails, it will not cause the laptop to shut down, but instead will cause the laptop to lose the correct date/time.Domain5 - Hardware and Network Troubleshooting

331
Q

Question 60:
A user submits a trouble ticket for their laptop. The user states that every time they move the laptop from one place to another, the system loses power and shuts down You have examined the laptop fully and then removed and reinstalled the hard drive, RAM, ribbon cable to the LCD, and the battery, but the laptop is still shutting down whenever it is moved. Which of the following is MOST likely causing the issue with this laptop shutting down?
Laptop is overheating
Failed CMOS battery
Laptop is unplugged
Battery connection is loose

A

MDMCDMACorrect answerMAMGSMOverall explanationOBJ-1.4: Mobile application management (MAM) is software that secures and enables IT administrators to have control over enterprise applications on end users’ corporate and personal smartphones and tablets. MAM software allows IT administrators to apply and enforce corporate policies on mobile apps and limit the sharing of corporate data among apps. Mobile device management (MDM) software suites are designed to manage the use of smartphones and tablets within an enterprise. MAMs focus on the application while MDMs focus on the device. The global system for mobile (GSM) communication standard for cellular radio communications and data transfer uses a SIM card to identify the subscriber and network provider. The code division multiple access (CDMA) communication standard for cellular radio communications and data transfer uses a method of multiplexing a communications channel using a code to key the modulation of a particular signal.Domain1 - Mobile Devices

332
Q

Question 61:
Which of the following technologies would allow an organization to secure and manage their customer enterprise applications that are installed on a user’s smartphone or tablet?
MDM
CDMA
MAM
GSM

A

SSDCorrect answerHDDRAMM.2 PCIeOverall explanationOBJ-5.3: A hard disk drive (HDD) is a mechanical storage device that relies on a storage platter and a read arm. When a hard drive begins to fail, the drive will begin to make a loud clicking noise. This noise is usually rhythmic since the failed spot makes the noise every time the drive rotates during the read/write process. The other options (M.2 PCIe, SSD, and RAM) have no moving parts; therefore, no rhythmic noise would be created during their failure.Domain5 - Hardware and Network Troubleshooting

333
Q

Question 62:
You are troubleshooting a storage issue on a customer’s computer. During the computer’s operation, you hear a loud, rhythmic sound. Which of the following storage components is likely failing?
SSD
HDD
RAM
M.2 PCIe

A

Correct answermacOSKali LinuxRed Hat LinuxWindows 8Overall explanationOBJ-4.2: The macOS software can only be installed in a Virtual Box virtual machine running on a macOS system. If you are running Virtual Box on Windows, it can only install other versions of Windows, Linux, and Unix. This is because Apple’s operating system is a free product but can only be installed on official Apple hardware as part of the licensing agreement. A Windows or Linux virtual machine can be installed on any host operating system.Domain4 - Virtualization and Cloud Computing

334
Q

Question 63:
Which of the following operating systems cannot be installed as a guest inside of a virtual machine on a Windows 10 laptop running Virtual Box?
macOS
Kali Linux
Red Hat Linux
Windows 8

A

Correct answerDeploy the system image within a virtual machine, ensure it is in an isolated sandbox environment, then scan it for vulnerabilitiesUtilize a server with multiple virtual machine snapshots installed o it, restore from a known compromised image, then scan it for vulnerabilitiesDeploy the vulnerable image to a virtual machine on a physical server, create an ACL to restrict all incoming connections to the system, then scan it for vulnerabilitiesDeploy the image to a brand new physical server, connect it to the corporate network, then conduct a vulnerability scan to demonstrate how many vulnerabilities are now on the networkOverall explanationOBJ-4.2: To ensure your corporate network’s safety, any vulnerable image you deploy should be done within a sandboxed environment. This will ensure that an outside attacker cannot exploit the vulnerabilities but will still allow you to show the vulnerabilities found during a scan to demonstrate how important patching is to the security of the server.Domain4 - Virtualization and Cloud Computing

335
Q

Question 64:
You have been asked to provide some training to Dion Training’s system administrators about the importance of proper patching of a system before deployment. To demonstrate the effects of deploying a new system without patching it first, you ask the system administrators to provide you with an image of a brand-new server they plan to deploy. How should you deploy the image to demonstrate the vulnerabilities exposed while maintaining the security of the corporate network?
Deploy the system image within a virtual machine, ensure it is in an isolated sandbox environment, then scan it for vulnerabilities
Utilize a server with multiple virtual machine snapshots installed o it, restore from a known compromised image, then scan it for vulnerabilities
Deploy the vulnerable image to a virtual machine on a physical server, create an ACL to restrict all incoming connections to the system, then scan it for vulnerabilities
Deploy the image to a brand new physical server, connect it to the corporate network, then conduct a vulnerability scan to demonstrate how many vulnerabilities are now on the network

A

Correct answerSchedule an authorized downtime period, replace physical disk 3, rebuild the array, and confirm that the RAID is no longer reporting itself as degradedReconfigure the RAID 5 to a RAID 0 to avoid any downtime, then rebuild the array during the next authorized maintenance period, and confirm that the RAID is no longer reporting itself as degradedFormat logical disk 0, manually configure a new RAID using the remaining good drives from the RAID 5 and confirm that the RAID is no longer reporting itself as degradedReplace physical disk 3 immediately, rebuild the array, and confirm that the RAID is no longer reporting itself as degradedOverall explanationOBJ-5.3: Since a RAID 5 has some built-in redundancy, it will continue to operate while in this degraded state without any additional redundancy since one of the drives has failed. It is best to schedule an authorized downtime period, replace the failed drive, rebuild the array, and confirm that the RAID is no longer reporting itself as degraded. During the rebuilding of the array, the system may perform extremely slowly, and users may experience a loss of service, which is why scheduling some downtime is necessary. Formatting the logical drive or changing a RAID 5 to a RAID 0 will cause data loss, and therefore they are not the correct answers.Domain5 - Hardware and Network Troubleshooting

336
Q

Question 65:
Your company’s file server is using a RAID 5 configuration. You just received an alert from the server that states that “RAID is degraded” and that the “Local Disk 0, Physical Disk 3 has failed”. Which of the following is the BEST way to fix this error?
Schedule an authorized downtime period, replace physical disk 3, rebuild the array, and confirm that the RAID is no longer reporting itself as degraded
Reconfigure the RAID 5 to a RAID 0 to avoid any downtime, then rebuild the array during the next authorized maintenance period, and confirm that the RAID is no longer reporting itself as degraded
Format logical disk 0, manually configure a new RAID using the remaining good drives from the RAID 5 and confirm that the RAID is no longer reporting itself as degraded
Replace physical disk 3 immediately, rebuild the array, and confirm that the RAID is no longer reporting itself as degraded

A

USB connectorCorrect answerAudio connectorPATA connectorFront panel connectorOverall explanationOBJ-3.4: The area circled indicates the audio connector on this motherboard. This is used to connect the CD/DVD audio cable from the drive to the motherboard for digital audio. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

337
Q

Question 66:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard above, which of the following correctly indicates the circled area?
USB connector
Audio connector
PATA connector
Front panel connector

A

ResolutionColor depthCorrect answerExtended modeRefresh rateOverall explanationOBJ-5.4: The extended mode allows the Windows output to be stretched across two or more monitors as if they were a single monitor. This can be configured under the Display settings in Windows 10. Refresh rate is the measure of how fast an image can be updated on a monitor or display. If a monitor has a lower refresh rate, then blurring and ghosting can occur. Color depth defines how many unique colors can be displayed by the projected image at once. Most monitors have a default or native resolution. When you first connect a monitor to a Windows workstation, this native resolution is detected, and Windows attempts to configure itself automatically. If this creates an imbalance between the two monitors, a technician can adjust the screen’s resolution by changing it in the Display settings area of Windows 10.Domain5 - Hardware and Network Troubleshooting

338
Q

Question 67:
You have just installed a second monitor for a bookkeeper’s workstation so they can stretch their spreadsheets across both monitors. This would essentially let them use the two monitors as one combined larger monitor. Which of the following settings should you configure?
Resolution
Color depth
Extended mode
Refresh rate

A

POST cardCable testerCorrect answerMultimeterLoopback plugOverall explanationOBJ-5.2: A multimeter can measure the voltage, amperage, and resistance of a circuit. A multimeter can be a hand-held device useful for basic fault finding and field service work or a bench instrument that can measure electricity with a high degree of accuracy. Using a multimeter, you can determine the exact voltage being supplied to the motherboard from the workstation’s power supply. A POST card is a plug-in diagnostic interface card that displays progress and error codes generated during the power-on self-test of a computer. A loopback plug is used to test a port. When you connect a loopback plug to a port, you should see a solid connection LED. You can also use the loopback plug in conjunction with diagnostic software. A cable tester is used to ensure a cable is properly created as a patch cable (straight through) or a crossover cable. Cable testers provide detailed information on the physical and electrical properties of the cable. For example, they test and report cable conditions, crosstalk, attenuation, noise, resistance, and other cable run characteristics.Domain5 - Hardware and Network Troubleshooting

339
Q

Question 68:
A workstation is having intermittent issues and continues to receive system errors or freeze. You believe that the problem is being caused by the workstation’s motherboard, not getting the proper amount of power to it, and you want to perform a test to confirm your theory. Which of the following tools should you use to determine if the proper amount of power is being supplied to the motherboard?
POST card
Cable tester
Multimeter
Loopback plug

A

Press F12 to boot into boot mode and select the correct deviceReboot PC to determine if it will boot from the HDDBoot into recovery mode to fix the boot orderCorrect answerBoot to BIOS and select the HDD from the boot orderOverall explanationOBJ-5.3: PXE (Preboot Execution Environment) is a network boot execution process allowing you to retrieve an image from a PXE server. It is often used for reimaging computers in corporate deployments. To boot from the hard drive instead, the BIOS’s boot order should be changed from PXE to HDD. Rebooting the workstation will just reload the PXE-based OS again. Since the system is booting to the PXE environment, it is bypassing the internal hard drive’s OS making recovery mode an invalid choice.Domain5 - Hardware and Network Troubleshooting

340
Q

Question 69:
An employee is complaining that their workstation is not booting into Windows when they reboot their machine. You noticed that during the reboot, the system is loading into a PXE-based OS. What should you do next?
Press F12 to boot into boot mode and select the correct device
Reboot PC to determine if it will boot from the HDD
Boot into recovery mode to fix the boot order
Boot to BIOS and select the HDD from the boot order

A

Separate public/private networkingHoneynet implementationCompliance enforcementCorrect answerPerformance optimizationOverall explanationOBJ-5.7: Voice over Internet Protocol (VoIP) performance optimization can help a business improve the quality of its video and audio communications over the Internet by decreasing the size of the broadcast domain through the creation of VLANs. Each VLAN can contain the VoIP devices for a single department or business unit, and traffic is routed between the VLANs using layer 3 multilayer switches to increase the performance of the voice communication systems. Performance optimization helps companies bolster the availability, accessibility, security, and overall performance of their networks. Compliance enforcement involves dividing up one network into smaller sections to better control the flow of traffic across the network and to restrict confidential data to a specific network segment based on a specific regulation or contractual requirement, such as PCI DSS segmentation requirements. A honeynet is an intentionally vulnerable network segment that is used to observe and investigate the attack techniques of a hacker or adversary. Separate public/private networking involves segmenting the network into two portions: public and private. This is often used in cloud architectures to protect private data.Domain5 - Hardware and Network Troubleshooting

341
Q

Question 70:
A company has just installed a VoIP system on its network. Before the installation, all of the switches were replaced with layer 3 multilayer switches to allow for the VoIP devices to be placed on separate VLANs and have the packets routed accurately between them. What type of network segmentation technique is this an example of?
Separate public/private networking
Honeynet implementation
Compliance enforcement
Performance optimization

A

Correct answerUpgrade the WLAN card driverRollback the firmware on the WLAN cardUpgrade the OS version to 64-bitInstall a vulnerability patchOverall explanationOBJ-5.7: Wireless N networks can support up to 600Mbps with the network cards’ proper software drivers. Without them, they can only achieve 108Mbps since they cannot communicate with the increased data compression rates. Wireless network interface card drivers are software programs installed on your hard disk that allow your operating system to communicate with your wireless and network adapters. Wireless and network driver problems usually occur due to missing, outdated, or corrupt drivers.Domain5 - Hardware and Network Troubleshooting

342
Q

Question 71:
A technician has installed an 802.11n network, and most users can see speeds of up to 300Mbps. A few of the users have an 802.11n network card but cannot get speeds higher than 108Mbps. What should the technician do to fix the issue?
Upgrade the WLAN card driver
Rollback the firmware on the WLAN card
Upgrade the OS version to 64-bit
Install a vulnerability patch

A

Correct answerAAAASOAMXAOverall explanationOBJ-2.6: An AAAA record associates your domain name with an IPv6 address. An A record associates your domain name with an IPv4 address. An MX record is used for outgoing (SMTP) and incoming (POP3/IMAP) traffic. A Start of Authority (SOA) resource record indicates which Domain Name Server (DNS) is the best source of information for the specified domain.Domain2 - Networking

343
Q

Question 72:
Dion Training has just installed a web server for a new domain name. Which of the following DNS records would need to be created to allow users to reach the website using its domain name and then redirect clients to the proper IPv6 address for the server?
AAAA
SOA
MX
A

A

7200 rpmCorrect answer15,000 rpm10,000 rpm5400 rpmOverall explanationOBJ-3.3: Hard drive performance is limited based on the number of revolutions per minute (RPM) the disk can spin. If a disk can spin faster, it can retrieve or store data on the disk quicker. For a high-performance gaming computer, a 15,000 rpm hard disk drive or an SSD should be used. For low-end office desktops, using a 5,400 rpm hard disk drive to save money is acceptable.Domain3 - Hardware

344
Q

Question 73:
Which of the following type of hard disk drives would provide the best performance in a gaming workstation?
7200 rpm
15,000 rpm
10,000 rpm
5400 rpm

A

Enabling Wi-FiEnabling NFCInstalling the device driversCorrect answerPairing the deviceOverall explanationOBJ-1.4: By pairing the device, you will establish the Bluetooth connection between your smartphone and the car stereo. Bluetooth is commonly used to create a wireless connection between a smartphone and a car stereo for making/receiving phone calls, streaming music from the smartphone to the stereo, and other functions supported by the stereo. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another. Wi-Fi is the IEEE 802.11 standard for wireless networking based on spread spectrum radio transmission in the 2.4 GHz and 5 GHz bands. The standard has six main iterations (a, b, g, n, ac, and ax), describing different modulation techniques, supported distances, and data rates. A device driver is a small piece of code that is loaded during the boot sequence of an operating system. This code, usually provided by the hardware vendor, provides access to a device, or hardware, from the OS kernel. Under Windows, a signing system is in place for drivers to ensure that they do not make the OS unstable.Domain1 - Mobile Devices

345
Q

Question 74:
You just bought a new car and want to use the built-in stereo to make and receive calls on your smartphone. Which of the following should you perform to connect your smartphone to the car stereo?
Enabling Wi-Fi
Enabling NFC
Installing the device drivers
Pairing the device

A

Replace the pickup rollersCorrect answerVerify the paper path and its sensors are not blockedUpdate the drivers on the print serverReplace the toner cartridgeOverall explanationOBJ-5.6: Often, employees will pull the jammed paper out of a printer to clear a paper jam. This can lead to small bits of paper being left in the path or in front of a blockage sensor. As a technician, you should always check the entire path is clear and the sensors are not blocked first if the printer claims there is a paper jam as this is the most likely cause of a continued paper jam error.Domain5 - Hardware and Network Troubleshooting

346
Q

Question 75:
Dion Training’s multifunction laser printer recently had a paper jam. An employee pulled the paper out of the rollers to clear the jam. Unfortunately, the device still has a paper jam error displayed on the screen and will not print. You have been called to fix this issue. Which of the following should you attempt FIRST?
Replace the pickup rollers
Verify the paper path and its sensors are not blocked
Update the drivers on the print server
Replace the toner cartridge

A

Verify full system functionality and, if applicable, implement preventative measuresCorrect answerTest the theory to determine the causeDocument findings, actions, and outcomesEstablish a plan of action to resolve the problem and implement the solutionOverall explanationOBJ-5.1: For the exam, it is important that you can list and identify the 6 steps of the CompTIA troubleshooting methodology in order. (1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and then implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.Domain5 - Hardware and Network Troubleshooting

347
Q

Question 76:
What is the third step of the CompTIA troubleshooting methodology?
Verify full system functionality and, if applicable, implement preventative measures
Test the theory to determine the cause
Document findings, actions, and outcomes
Establish a plan of action to resolve the problem and implement the solution

A

Correct answerFull storage encryptionRemove backupsEnable SSOEnable OS updatesOverall explanationOBJ-1.4: Mobile device management (MDM) software suites are designed to manage the use of smartphones and tablets within an enterprise. Full storage encryption is used to encrypt the user and system data stored in the device’s internal storage. The encryption key is stored in a protected portion of the device and can be used to remotely wipe the device if it is lost or stolen. Single sign-on (SSO) is an authentication technology that allows a user to authenticate once and receive authorizations for multiple services. Operating system updates are made freely available by the software manufacturer to fix problems in a particular software version, including any security vulnerabilities. Updates can be classified as hotfixes (available only to selected customers and for a limited problem), patches (generally available), and service packs (installable collections of patches and software improvements). A backup is a copy of user and system data that can enable the recovery of data after data loss or a disaster.Domain1 - Mobile Devices

348
Q

Question 77:
A company wants to ensure that its mobile devices are configured to protect any data stored on them if they are lost or stolen. Which of the following should you enable and enforce through their MDM?
Full storage encryption
Remove backups
Enable SSO
Enable OS updates

A

NFCMicrowaveWi-FiCorrect answerBluetoothOverall explanationOBJ-2.3: A personal area network (PAN) is a close-range network that is usually based on Bluetooth or NFC for communications between personal devices, such as smartphones, laptops, printers, and other peripheral devices. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another. Wi-Fi is the IEEE 802.11 standard for wireless networking based on spread spectrum radio transmission in the 2.4 GHz and 5 GHz bands. The standard has six main iterations (a, b, g, n, ac, and ax), describing different modulation techniques, supported distances, and data rates. Microwave transmissions occur when using a frequency between 4 GHz and 10 GHz depending on the implementation. Microwave links are used for long-range fixed wireless services.Domain2 - Networking

349
Q

Question 78:
Which of the following wireless networking technologies is commonly used to connect a mouse to a laptop to create a PAN?
NFC
Microwave
Wi-Fi
Bluetooth

A

Type AMini-USBMicro-USBCorrect answerType BOverall explanationOBJ-3.1: The most common USB connector used to connect to a printer is USB Type B. This connector has a large square-shaped male connector that is connected to the rear of the printer. A USB Type A connector is often used to connect to the workstation or computer itself. This question specifically asked which connector is being attached to the printer. Micro USB is a miniaturized version of the Universal Serial Bus (USB) interface developed for connecting compact and mobile devices such as smartphones, MP3 players, GPS devices, and digital cameras. Mini USB was introduced with USB 2.0 and was used with digital cameras and early tablets.Domain3 - Hardware

350
Q

Question 79:
What is the MOST common connector type used when connecting a USB cable to the back of a printer?
Type A
Mini-USB
Micro-USB
Type B

A

Replace the RAM with ECC modulesReset the BIOSRemove and reseat the RAMCorrect answerVerify the case fans are clean and properly connectedOverall explanationOBJ-5.2: If a workstation overheats, it will shut down or reboot itself to protect the processor. This can occur if the case fans are clogged with dust or become unplugged. By checking and reconnecting the case fans, the technician can rule out an overheating issue causing this problem. Since the memory was already tested successfully, it does not need to be removed and reseated, or replaced with ECC modules. The BIOS is not the issue since the computer booted up into Windows successfully before rebooting.Domain5 - Hardware and Network Troubleshooting

351
Q

Question 80:
You just replaced a failed motherboard in a corporate workstation and returned it to service. About an hour later, the customer complained that the workstation is randomly shutting down and rebooting itself. You suspect the memory module may be corrupt, and you perform a memory test, but the memory passes all of your tests. Which of the following should you attempt NEXT in troubleshooting this problem?
Replace the RAM with ECC modules
Reset the BIOS
Remove and reseat the RAM
Verify the case fans are clean and properly connected

A

BluetoothNFCCorrect answerCellularWi-FiOverall explanationOBJ-2.3: Long-range fixed wireless can be licensed or unlicensed depending on the frequencies and power levels being utilized. For example, an 802.11 wireless network could be established using a directional antenna to connect two buildings over several miles using unlicensed frequencies and minimal power levels (under 200 mW) which are under the FCC limits. Alternatively, a microwave link can be established in the 4.91 GHz to 5.97 GHz unlicensed frequency range using a point-to-multipoint microwave antenna and transceiver system. Conversely, a user could purchase a licensed cellular fixed wireless system that requires a license from the FCC to operate to ensure they are not interfering with other users and services in the same frequency band.Domain2 - Networking

352
Q

Question 81:
Which of the following technologies could be used in a licensed long-range fixed wireless system?
Bluetooth
NFC
Cellular
Wi-Fi

A

You forgot to close the ZIF socketYou forgot to reattach the power cables to the case fansCorrect answerYou forgot to apply thermal paste to the processor during the installationYou forgot to replace the RAM with parity memoryOverall explanationOBJ-3.4: When you install a processor, you need to ensure you install it in the processor socket on the motherboard, apply thermal paste to the backside of the processor, attach the heat sink, attach the processor fan to the heat sink, and then connect the power cable to the processor fan. If you neglect to apply the thermal paste between the processor and the heat sink, the heat sink cannot effectively dissipate all the heat from the processor, and the computer will shut itself down to protect the processor from becoming overheated. Thermal paste is a paste used to connect a heat sink to a CPU that provides a liquid thermally conductive compound gel to fill any gaps between the CPU and the heat sink to transfer heat more efficiently to the heat sink from the CPU.Domain3 - Hardware

353
Q

Question 82:
You have been asked to replace the processor in a workstation. You remove the old processor, install the new processor into the motherboard slot, attach the heat sink, and attempt to power on the workstation. The workstation boots up but after a minute the computer shuts itself down. Which of the following steps did you MOST likely forget to perform?
You forgot to close the ZIF socket
You forgot to reattach the power cables to the case fans
You forgot to apply thermal paste to the processor during the installation
You forgot to replace the RAM with parity memory

A

802.11axCorrect answer802.11a802.11g802.11n802.11b802.11acOverall explanationOBJ-2.3: The 802.11a (Wireless A) standard utilizes a 5 GHz frequency to provide wireless networking at speeds up to 54 Mbps. Unfortunately, when this was first released, the radios to operate with this standard were fairly expensive, so it did not sell well or become widespread. The 802.11b (Wireless B) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 11 Mbps. The 802.11g (Wireless G) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 54 Mbps. The 802.11n (Wireless N) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 108 Mbps or a 5.0 GHz frequency to provide wireless networking at speeds up to 600 Mbps. Wireless N supports the use of multiple-input-multiple-output (MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless N supports channel bonding by combining two 20 MHz channels into a single 40 MHz channel to provide additional bandwidth. The 802.11ac (Wireless AC or Wi-Fi 5) standard utilizes a 5 GHz frequency to provide wireless networking at theoretical speeds up to 3.5 Gbps. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. The 802.11ax (Wireless AX or Wi-Fi 6) standard utilizes 2.4 GHz and 5.0 GHz frequencies to provide wireless networking at theoretical speeds up to 9.6 Gbps. Wireless AC uses orthogonal frequency-division multiple access (OFDMA) to conduct multiplexing of the frequencies transmitted and received to each client to provide additional bandwidth. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless AC also has a version called Wi-Fi 6E that supports the 6GHz frequency instead of the 2.4 GHz and 5.0 GHz frequencies used in Wi-Fi 6.Domain2 - Networking

354
Q

Question 83:
Which type of wireless network utilizes the 5 GHz frequency band and reaches speeds of up to 54 Mbps?
802.11ax
802.11a
802.11g
802.11n
802.11b
802.11ac

A

TXTSRVNSCorrect answerMXOverall explanationOBJ-2.6: Mail Exchange (MX) records are used to provide the mail server that accepts email messages for a particular domain. Nameserver (NS) records are used to list the authoritative DNS server for a particular domain. Text (TXT) records are used to provide information about a resource such as a server, network, or service in human-readable form. They often contain domain verification and domain authentications for third-party tools that can send information on behalf of a domain name. Service (SRV) records are used to provide host and port information on services such as voice over IP (VoIP) and instant messaging (IM) applications.Domain2 - Networking

355
Q

Question 84:
You are currently conducting passive reconnaissance in preparation for an upcoming penetration test against Dion Training. You are reviewing the DNS records for the company and are trying to identify which of their servers accept email messages for their domain name. Which of the following DNS records should you analyze?
TXT
SRV
NS
MX

A

Correct answerNetBIOSRDPLDAPIMAPOverall explanationOBJ-2.1: The network basic input/output system (NetBIOS)/NetBIOS over TCP/IP (NetBT) is a session management protocol used to provide name registration and resolution services on legacy Microsoft networks and those using WINS. NetBIOS/NetBT operates on TCP/UDP ports 137 and 139. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The lightweight directory access protocol (LDAP) is a protocol used to access and update information in an X.500-style network resource directory. LDAP uses port 389. The remote desktop protocol (RDP) is a protocol used for the remote administration of a host using a graphical user interface. RDP operates over TCP port 3389.Domain2 - Networking

356
Q

Question 85:
Which of the following protocols operates over port 137 by default?
NetBIOS
RDP
LDAP
IMAP

A

Accessing shared folders on a serverIncreased video speedCorrect answerIncreased performance and overall processingIncreased video editing speedOverall explanationOBJ-3.4: A multicore CPU offers essential performance, and overall processing increases to the system. When attempting to access shared folders on a server, a high-performance network interface card (NIC) would be a better choice. When trying to increase the video playback or video editing speed, installing a dedicated GPU would be a more appropriate choice.Domain3 - Hardware

357
Q

Question 86:
Which of the following would installing a multicore CPU achieve?
Accessing shared folders on a server
Increased video speed
Increased performance and overall processing
Increased video editing speed

A

802.11n802.11b802.11acCorrect answer802.11ax802.11g802.11aOverall explanationOBJ-2.3: The 802.11ax (Wireless AX or Wi-Fi 6) standard utilizes 2.4 GHz and 5.0 GHz frequencies to provide wireless networking at theoretical speeds up to 9.6 Gbps. Wireless AC uses orthogonal frequency-division multiple access (OFDMA) to conduct multiplexing of the frequencies transmitted and received to each client to provide additional bandwidth. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless AC also has a version called Wi-Fi 6E that supports the 6GHz frequency instead of the 2.4 GHz and 5.0 GHz frequencies used in Wi-Fi 6. The 802.11ac (Wireless AC or Wi-Fi 5) standard utilizes a 5 GHz frequency to provide wireless networking at theoretical speeds up to 3.5 Gbps. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. The 802.11n (Wireless N) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 108 Mbps or a 5.0 GHz frequency to provide wireless networking at speeds up to 600 Mbps. Wireless N supports the use of multiple-input-multiple-output (MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless N supports channel bonding by combining two 20 MHz channels into a single 40 MHz channel to provide additional bandwidth. The 802.11g (Wireless G) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 54 Mbps. The 802.11b (Wireless B) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 11 Mbps. The 802.11a (Wireless A) standard utilizes a 5 GHz frequency to provide wireless networking at speeds up to 54 Mbps.Domain2 - Networking

358
Q

Question 87:
Which type of wireless network utilizes the 5 GHz frequency band and reaches speeds of up to 9.6 Gbps?
802.11n
802.11b
802.11ac
802.11ax
802.11g
802.11a

A

Test the theory to determine the causeEstablish a plan of action to resolve the problem and implement the solutionCorrect answerVerify full system functionality and, if applicable, implement preventative measuresDocument findings, actions, and outcomesOverall explanationOBJ-5.1: For the exam, it is important that you can list and identify the 6 steps of the CompTIA troubleshooting methodology in order. (1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and then implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.Domain5 - Hardware and Network Troubleshooting

359
Q

Question 88:
What is the fifth step of the CompTIA troubleshooting methodology?
Test the theory to determine the cause
Establish a plan of action to resolve the problem and implement the solution
Verify full system functionality and, if applicable, implement preventative measures
Document findings, actions, and outcomes

A

Correct answerTest the theory to determine the causeEstablish a plan of action to resolve the problemVerify full system functionalityIdentify the problemOverall explanationOBJ-5.1: The next step would be to “test the theory to determine the cause” since you just finished the “establish a theory of probable cause” step. The troubleshooting steps are to (1)Identify the problem, (2) Establish a theory of probable cause, (3)Test the theory to determine the cause, (4) Establish a plan of action to resolve the problem and identify potential effects, and Implement the solution or escalate as necessary (5)Verify full system functionality and if applicable implement preventative measures, and, (6)Document findings, actions, outcomes, and lessons learned. Domain5 - Hardware and Network Troubleshooting

360
Q

Question 89:
You are working as a network technician and have been asked to troubleshoot an issue with a workstation. You have just established a theory of probable cause. Which of the following steps of the CompTIA troubleshooting methodology should you perform NEXT?
Test the theory to determine the cause
Establish a plan of action to resolve the problem
Verify full system functionality
Identify the problem

A

Auto-brightness is enabledCorrect answerFaulty ambient light sensorLow batteryDefective displayOverall explanationOBJ-5.5: The ambient light sensor appears to be broken or malfunctioning. The ambient light sensor may be too sensitive as it is taking in more light than usual. This can occur if the sensor is faulty or if the screen was replaced incorrectly, and the technician forgot to install the black gasket around the ambient light sensor. The auto-brightness setting being enabled would increase the brightness in a lit room and decrease the brightness in a dark room. If the device has a low battery, it may dim the display to save battery life but it would still be readable. If the display was defective, it would be difficult to read in all light conditions and not just in the bright room.Domain5 - Hardware and Network Troubleshooting

361
Q

Question 1:
Jason is printing out a copy of Dion Training’s new logo on his color laser printer. When the logo is printed, the blue color does not appear to be the same as the one on the screen. Jason just bought this printer recently and has only printed about 50 pages since installing it. Which of the following problems is most likely being observed by Jason in the printout?
Faded print on the document
Misaligned printing on the document
Incorrect chroma display on the printed document
Double/echo images on the printed document

A

Faded print on the documentMisaligned printing on the documentCorrect answerIncorrect chroma display on the printed documentDouble/echo images on the printed documentOverall explanationOBJ-5.6: Incorrect chroma display occurs when the printer and the monitor are using different color profiles. To fix this issue, it is important to calibrate both the printer and the monitor to the same standard so that the colors will match. Since only 50 pages have been printed so far, it is unlikely that the toner is running low and causing faded documents to be printed. Double/echo images on a printed document are caused by a defective or broken drum unit and would not affect the color of the image created. Misaligned printing would affect how straight or rotated the image is on the page, not the color of the image itself.Domain5 - Hardware and Network Troubleshooting

362
Q

Question 2:
You have been asked to develop a solution for one of your customers. The customer is a software development company, and they need to be able to test a wide variety of operating systems to test the software applications their company is developing internally. The company doesn’t want to buy a bunch of computers to install all of these operating systems for testing. Which of the following solutions would BEST meet the company’s requirements?
Purchase multiple inexpensive workstations and install one operating system that will be used to test the applications being developed on each workstation
Purchase multiple workstations, install a VM on each one, then install one operating system that will be used to test the applications being developed in each VM
Purchase one computer, install an operating system on it, create an image of the system, then reformat it, install the next operating system, create another image, and reimage the machine each time you need to test a different application
Purchase a high-end computer that has a lot of CPU cores and RAM, install a hypervisor, and configure a virtual machine for each operating system that will be used to test the applications being developed

A

Purchase multiple inexpensive workstations and install one operating system that will be used to test the applications being developed on each workstationPurchase multiple workstations, install a VM on each one, then install one operating system that will be used to test the applications being developed in each VMPurchase one computer, install an operating system on it, create an image of the system, then reformat it, install the next operating system, create another image, and reimage the machine each time you need to test a different applicationCorrect answerPurchase a high-end computer that has a lot of CPU cores and RAM, install a hypervisor, and configure a virtual machine for each operating system that will be used to test the applications being developedOverall explanationOBJ-4.2: Since the company’s main goal was to minimize the amount of hardware required, the BEST solution is to purchase a high-end computer that has a lot of CPU cores and RAM, install a hypervisor, and configure a virtual machine for each operating system that will be used to test the applications being developed. This allows a single machine to run multiple operating systems for testing with the least amount of hardware.Domain4 - Virtualization and Cloud Computing

363
Q

Question 3:
Which cellular technology is comprised of LTE and LTE-A to provide higher data speeds than previous cellular data protocols?
4G
5G
3G
WMN

A

Correct answer4G5G3GWMNOverall explanationOBJ-1.4: 4G cellular technology is made up of LTE and LTA-A. Long Term Evolution (LTE) is a packet data communications specification providing an upgrade path for both GSM and CDMA2000 cellular networks. LTE has a theoretical speed of 150 Mbps and a real-world speed of around 20 Mbps. LTE Advanced (LTE-A) has a theoretical speed of 300 Mbps and a real-world speed of around 40 Mbps. 5G cellular technology is made up of three different types: low-band, mid-band, and high-band mmWave technology. Low-band 5G reaches an average speed of 55 Mbps with a theoretical speed of 150 Mbps. Mid-band 5G reaches an average speed of 150 Mbps with a theoretical speed of 1.5 Gbps. High-band 5G reaches an average speed of 3 Gbps with a theoretical speed of up to 70 Gbps. 3G cellular technology is made up of two different technologies: HSPA+ and EV-DO. HSPA+ (Evolved High-Speed Packet Access) is a 3G standard used for GSM cellular networks and can support up to a theoretical download speed of 168 Mbps and a theoretical upload speed of 34 Mbps. In the real world, though, HSPA+ normally reaches speeds around 20 Mbps. EV-DO (Evolution-Data Optimized) is a 3G standard used for CDMA cellular networks and can support up to 3.1 Mbps downloads. A wireless mesh network (WMN) is a wireless network topology where all nodes, including client stations, can provide forwarding and path discovery to improve coverage and throughput compared to using just fixed access points and extenders.Domain1 - Mobile Devices

364
Q

Question 4:
You are troubleshooting a workstation with four identical memory sticks installed, one in each of the slots labeled 1, 2, 3, and 4. The motherboard has a marking near the memory slots that says, “quad-channel support.” Based on what you observe, how many channels are being used by the motherboard’s memory?
Two channels
One channel
Four channels
Three channels

A

Two channelsOne channelCorrect answerFour channelsThree channelsOverall explanationOBJ-3.2: Since the motherboard says it supports quad-channel, and four sticks of memory are installed, it would be using four channels. By using a motherboard that supports a quad-channel memory controller, the motherboard is able to transfer up to 256-bits of memory per transactions (4 x 64-bits) to increase the bandwidth available for data transfer.Domain3 - Hardware

365
Q

Question 5:
Which of the following technologies is commonly used to inventory the organization’s equipment by attaching a tag to the device containing a chip programmed with the assets data, allowing one-way communication to occur from the tag to the reader?
NFC
Zigbee
Z-Wave
RFID

A

NFCZigbeeZ-WaveCorrect answerRFIDOverall explanationOBJ-2.3: An RFID tag contains an RFID chip programmed with the asset data. This is read wirelessly by an RFID (radio frequency identification) reader. RFID is a one-way communication mechanism, whereas NFC is two-way communication. Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another. Zigbee is a low-power wireless communications open-source protocol used primarily for home automation. Zigbee uses radio frequencies in the 2.4 GHz band and a mesh topology. Z-wave is a low-power wireless communications protocol used primarily for home automation. Z-wave uses radio frequencies in the 800 MHz and 900 MHz frequency ranges.Domain2 - Networking

366
Q

Question 6:
You are working as part of a PC refresh team installing 150 desktop computers in Dion Training’s new offices. When you boot up the 72nd desktop you installed, you smell a foul-smelling chemical odor. You sniff the air again and confirm the smell isn’t a burning smell. Upon opening the case, which component should you inspect for damage and expect to replace?
Power supply
Motherboard
System fan
GPU

A

Power supplyCorrect answerMotherboardSystem fanGPUOverall explanationOBJ-5.2: A foul smell is usually indicative of a distended capacitor. Capacitors are small electrical components on the motherboard. Therefore you should inspect the motherboard for replacement. If there was a burning smell, then the power supply should be the first component inspected.Domain5 - Hardware and Network Troubleshooting

367
Q

Question 7:
As a PC Technician, you are on the road most of the day and use a laptop. When you get back to your office at the end of the day, you would like to be able to quickly connect a larger external monitor, keyboard, and mouse to your laptop through a single USB port to perform additional work on the larger screen. Which type of device should you choose to provide all the functionality above?
USB 4-port hub
Docking station
Port replicator
Thunderbolt

A

USB 4-port hubDocking stationCorrect answerPort replicatorThunderboltOverall explanationOBJ-1.3: A port replicator is a simple device to extend the range of ports (for example, USB, DVI, HDMI, Thunderbolt, network, and so on) available for a laptop computer when it is used at a desk. A docking station is a sophisticated type of port replicator designed to provide additional ports (such as network or USB) and functionality (such as expansion slots and drives) to a portable computer when used at a desk. The difference between a docking station and a port replicator is that a docking station can add additional capabilities beyond what is already integrated into the laptop whereas a port replicator can only reproduce the same ports that already exist on the laptop. Thunderbolt is a connector type that can be used either as a display interface (like DisplayPort) or as a general peripheral interface (like USB 3). Thunderbolt 3 uses USB-C connectors. A USB hub is a device that connects to a USB port to allow additional USB devices to be connected to the PC, essentially increasing the number of USB ports available.Domain1 - Mobile Devices

368
Q

Question 8:
Your company is experiencing slow network speeds of about 54Mbps on their wireless network. You have been asked to perform an assessment of the existing wireless network and recommend a solution. You have recommended that the company upgrade to an 802.11n or 802.11ac wireless infrastructure to obtain higher network speeds. Which of the following technologies allows an 802.11n or 802.11ac network to achieve a speed greater than 54 Mbps?
PoE
WPA2
MIMO
LWAPP

A

PoEWPA2Correct answerMIMOLWAPPOverall explanationOBJ-2.3: One way 802.11n and 802.11ac networks achieve superior throughput and speeds by using multiple-input multiple-output (MIMO) and multi-user MIMO (MU-MIMO), respectively. MIMO uses multiple antennas for transmission and reception, which results in higher speeds than 802.11a and 802.11g networks, which can only support up to 54 Mbps of throughput. Wireless N and Wireless AC networks also utilize the 5 GHz frequency band, allowing them to achieve speeds greater than 54 Mbps. WPA2 is a wireless encryption standard and can be used with Wireless G, N, AC, or AX. Using WPA2 does not increase the speed of the wireless network. Power over Ethernet (POE) is a technology that lets network cables carry electrical power. POE is defined in the IEEE 802.3af. PoE does not affect the speed of a wireless network. Lightweight Access Point Protocol (LWAPP) is the name of a protocol that can control multiple Wi-Fi wireless access points at once. This can reduce the amount of time spent on configuring, monitoring, or troubleshooting a large network. LWAPP does not affect the speed of a wireless network.Domain2 - Networking

369
Q

Question 9:
Which cellular technology utilizes new frequency bands to reach proposed speeds of up to 70 Gbps?
3G
4G
5G
LTE

A

3G4GCorrect answer5GLTEOverall explanationOBJ-1.4: 5G cellular technology is made up of three different types: low-band, mid-band, and high-band mmWave technology. Low-band 5G reaches an average speed of 55 Mbps with a theoretical speed of 150 Mbps. Mid-band 5G reaches an average speed of 150 Mbps with a theoretical speed of 1.5 Gbps. High-band 5G reaches an average speed of 3 Gbps with a theoretical speed of up to 70 Gbps. 5G cellular technology is made up of three different types: low-band, mid-band, and high-band mmWave technology. Low-band 5G reaches an average speed of 55 Mbps with a theoretical speed of 150 Mbps. Mid-band 5G reaches an average speed of 150 Mbps with a theoretical speed of 1.5 Gbps. High-band 5G reaches an average speed of 3 Gbps with a theoretical speed of up to 70 Gbps. 4G cellular technology is made up of LTE and LTA-A. Long Term Evolution (LTE) is a packet data communications specification providing an upgrade path for both GSM and CDMA2000 cellular networks. LTE has a theoretical speed of 150 Mbps and a real-world speed of around 20 Mbps. LTE Advanced (LTE-A) has a theoretical speed of 300 Mbps and a real-world speed of around 40 Mbps.Domain1 - Mobile Devices

370
Q

Question 10:
Jason is configuring a virtual machine to run a Minecraft server for his son. The network utilizes a DHCP server for all connected devices. Jason decided to configure the virtual machine with the static IP of 192.168.1.10 to make it easier to identify on the network. Ever since this static IP was issued, both the virtual machine and a printer on the network have had intermittent connectivity issues. What is MOST likely the cause of these issues?
The DNS server IP is misconfigured
The virtual machine was placed in the wrong subnet
The DHCP IP address is expired
There is an IP conflict

A

The DNS server IP is misconfiguredThe virtual machine was placed in the wrong subnetThe DHCP IP address is expiredCorrect answerThere is an IP conflictOverall explanationOBJ-5.7: An IP conflict often causes this type of intermittent connectivity. An IP conflict can occur when a static IP is also part of a DHCP scope. In this example, it appears the printer received a DHCP IP address of 192.168.1.10, the same IP that Jason statically assigned to the virtual machine. Whenever you assign a static IP, you need to ensure those IP addresses are excluded from the available DHCP scope for other assignments.Domain5 - Hardware and Network Troubleshooting

371
Q

Question 11:
A user is complaining that there are several black dots located on the screen. Whenever they open a new web browser or blank word processing document, they can clearly see these black dots on the laptop’s display. Which of the following is MOST likely causing the black dots on the display?
Distorted geometry
Burn in
Dead Pixel
Keystone effect

A

Distorted geometryBurn inCorrect answerDead PixelKeystone effectOverall explanationOBJ-5.4: A dead pixel occurs when an entire pixel or a group of subpixels remain dark even when they are supposed to be on. Since this implies that the pixel or group of subpixels are no longer powering on, they are harder to fix than stuck pixels. In most cases, dead pixels are lost forever and the entire display needs to be replaced.Domain5 - Hardware and Network Troubleshooting

372
Q

Question 12:
There is a crinkling sound coming from the laser printer in the Dion Training offices. During their investigation, a technician observes that the images are printing at an angle on the pages. Which of the following should the technician do to fix this problem?
Replace the rollers
Replace the toner
Clear the page counter
Clean the transfer drum

A

Correct answerReplace the rollersReplace the tonerClear the page counterClean the transfer drumOverall explanationOBJ-5.6: If the rollers become unevenly worn, they will feed the pages in at an angle causing the misalignment in the printed output. To fix this issue, the rollers should be replaced. The page country, toner, and transfer drum will not affect the angle of the printed images on the paper.Domain5 - Hardware and Network Troubleshooting

373
Q

Question 13:
Which type of technology imitates hardware without relying on the CPU being able to run the software code directly?
Virtual machine
Emulator
Simulator
Hypervisor

A

Virtual machineCorrect answerEmulatorSimulatorHypervisorOverall explanationOBJ-4.2: Emulators emulate hardware without relying on the CPU being able to run code directly. Virtual machines use CPU self-virtualization, to whatever extent it exists, to provide a virtualized interface to the real hardware. A simulator is a limited scope that is usually used in training to mimic a real system’s functionality. Emulators were created before virtualization and operate much slower than a true virtualization environment with a hypervisor.Domain4 - Virtualization and Cloud Computing

374
Q

Question 14:
A customer’s hard drive has crashed and needs to be replaced. When replacing the internal 5400 RPM HDD, which cable should you use?
USB-C
Lightning
SATA
FireWire

A

USB-CLightningCorrect answerSATAFireWireOverall explanationOBJ-3.1: Serial ATA (SATA) is the most widely used interface for hard disks on modern desktop and laptop computers. SATA uses a 7-pin L-shaped data connector with one device per port. SATA operates at bandwidths of 1.5 Gbps, 3 Gbps, or 6 Gbps. SATA drives can also use a 15-pin power connector. FireWire is an external connection type that uses a serial SCSI connection with a D-shaped connector to support up to 800 Mbps of bandwidth. Lightning is a proprietary computer bus and power connector created by Apple. The lightning cable is used by every iPhone from the 5 to 13 series. Newer iPads have shifted to the use of USB-C for charging instead of the lightning cable, though.Domain3 - Hardware

375
Q

Question 15:
Which of the following is NOT a common voltage produced by the power supply of a computer?
5 VDC
12 VDC
6 VDC
3.3 VDC

A

5 VDC12 VDCCorrect answer6 VDC3.3 VDCOverall explanationOBJ-3.5: Power supplies in a computer convert high voltage alternating current (115 VAC or 220 VAC) to three lower direct current voltages: 3.3 VDC, 5 VDC, and 12 VDC. The 12 VDC is used by hard drives, CD/DVD drives, cooling fans, and other high-power devices. The 3.3 VDC and 5 VDC are used by digital circuits like the motherboard and the system’s expansion cards.Domain3 - Hardware

376
Q

Question 16:
Which of the following ports should a client use to automatically request an IP address from the server?
123
69
25
67

A

1236925Correct answer67Overall explanationOBJ-2.1: The Dynamic Host Configuration Protocol (DHCP) uses port 67 and is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client-server architecture. Network Time Protocol (NTP) uses port 123 and is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. Trivial File Transfer Protocol (TFTP) uses port 69 and is a simple lockstep File Transfer Protocol that allows a client to get a file from or put a file onto a remote host. The Simple Mail Transfer Protocol (SMTP) uses port 25 and is an internet standard communication protocol for electronic mail transmission.Domain2 - Networking

377
Q

Question 17:
A client has a new 2-in-1 laptop/tablet. Whenever they use the touchscreen, the cursor appears to jump to the wrong location and select the wrong icons. If the client connects a USB mouse, there are no issues with using the device. Which of the following should you attempt to perform FIRST to fix this issue?
Update the touchscreen’s driver
Recalibrate the touchscreen
Disable the touchscreen
Reinstall Windows 10

A

Update the touchscreen’s driverCorrect answerRecalibrate the touchscreenDisable the touchscreenReinstall Windows 10Overall explanationOBJ-5.5: Tablet/laptops with touchscreen capability can be recalibrated from within the Windows Control Panel. This will ensure that the right parts of the screen are responding when touched. If this is not effective, then you should attempt to update the touchscreen’s drivers. Cursor drift can occur over time, but it is easily fixed by conducting a new touch calibration sequence.Domain5 - Hardware and Network Troubleshooting

378
Q

Question 18:
You are building a Gaming PC to support a high-end virtual reality headset. The computer needs a high-end processor, lots of RAM, and a dedicated high-end graphics card. This graphics card will be installed in one of your expansion slots on your motherboard. Which of the following motherboard connections will most likely be used to connect the graphics card?
PCI
PCIe
USB
AGP

A

PCICorrect answerPCIeUSBAGPOverall explanationOBJ-3.4: PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has some PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. Graphics cards almost exclusively rely on PCIe x16 expansion slots for their connectivity. The peripheral component interconnect (PCI) bus is used to provide low-speed connectivity to expansion cards but has been mostly replaced by the faster PCIe bus. The accelerated graphics port (AGP) is a parallel expansion card standard that was originally designed for attaching a video card to a computer system to assist in the acceleration of 3D computer graphics. AGP has been replaced with PCIe due to its faster speeds. USB is an external connection and not used to connect high-end graphics cards using an expansion slot.Domain3 - Hardware

379
Q

Question 19:
Which of the following components of a laser printer is used to apply an electric charge to the paper so that the paper attracts toner to it during the imaging process?
Separation pad
Fuser assembly
Pickup roller
Transfer roller

A

Separation padFuser assemblyPickup rollerCorrect answerTransfer rollerOverall explanationOBJ-3.7: The transfer roller is the component in a laser printer that applies an electric charge to the paper to attract toner from the photoconductor during the imaging process. The pickup roller is the component in a laser printer that turns above a stack of paper to feed a sheet into the feed roller. The separation pad is the component in a laser printer that acts as a stationary pad in the paper tray to push the stack of paper backward to allow only a single sheet to be fed into the printer. The fuser assembly is the component in a laser printer that fixes toner to media. This is typically a combination of a heat and pressure roller, though non-contact flash fusing using xenon lamps is found on some high-end printers.Domain3 - Hardware

380
Q

Question 20:
A user is complaining that the touchscreen on their smartphone is not responding to their touch. What is the FIRST step you recommend to solve this issue?
Enable and disable airplane mode
Reinstall the OS
Have the user restart the device
Replace the defective touchscreen

A

Enable and disable airplane modeReinstall the OSCorrect answerHave the user restart the deviceReplace the defective touchscreenOverall explanationOBJ-5.5: If a smartphone’s touchscreen is unresponsive, the first step is to restart (or reboot) the device. This will cause the operating system and its device drivers to be reloaded and normally restore the touchscreen’s functionality if it is a software issue. If this doesn’t work, the technician may need to reinstall the OS if it is a software issue. If it is a hardware issue, then the touchscreen would need to be replaced. Airplane mode should not affect the touchscreen’s operation.Domain5 - Hardware and Network Troubleshooting

381
Q

Question 21:
You are attempting to install a full-sized PCIe network interface card into a 1U server, but it is too tall to fit into the machine. Which of the following do you need to install first to install the full-sized PCIe network interface card into the server?
AGP card
PCIe x16 card
Riser card
SCSI card

A

AGP cardPCIe x16 cardCorrect answerRiser cardSCSI cardOverall explanationOBJ-3.4: A riser card is a right-angle expansion card used to extend a slot for a card in a computer to make room to plug it in. They are most commonly used in low-profile, 1U and 2U rackmount chassis or embedded systems. Riser cards plug into their respective bus (they are available for PCI, PCI-X, AGP, AGP Pro, PCI Express, ISA, or other busses) and rotate the peripheral cards plugged into the riser card so that they are parallel with the motherboard. Riser cards are available in 1-slot passive risers up to 3-slot passive riser cards for 2U rackmounts. An AGP, SCSI, or PCIe x16 expansion card is a fixed size and shape that cannot be reduced to fit in a 1U server.Domain3 - Hardware

382
Q

Question 22:
Which of the following hard drive form factors would be connected to your laptop internally using a Micro SATA connection?
3.5”
2.5”
1.8”
M.2

A

3.5”2.5”Correct answer1.8”M.2Overall explanationOBJ-1.1: A laptop hard drive usually comes in either the 2.5” form factor or the 1.8” form factor. When a 1.8” form factor is used, the drive is connected to the laptop using a Micro SATA connector since a regular SATA connector will not fit due to the connector’s larger size. An M.2 is a new set of form factors for an SSD that uses a mini card interface that is faster than a SATA connection. A 3.5” drive is only used in desktops and some networked file servers.Domain1 - Mobile Devices

383
Q

Question 23:
You are working on a customer’s laptop. The image on the display suddenly becomes very dark and hard to see. You attempt to adjust the brightness and contrast of the laptop’s display using the special function keys, but this doesn’t brighten the display much. You pull out a bright flashlight and can see the image displayed a little better when using it. Which of the following components is MOST likely faulty and needs to be replaced?
Digitizer
GPU
LCD panel
Inverter

A

DigitizerGPULCD panelCorrect answerInverterOverall explanationOBJ-1.2: The inverter (also known as inverter board, screen inverter, or LCD inverter) is a part of the laptop’s display assembly. The inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight. The digitizer is a touch-sensitive glass panel covering the LCD in a touchscreen assembly. The digitizer is used to convert touch events to digital signals that can be interpreted as different types of input. A liquid crystal display (LCD) panel is a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. LCD panels are used on laptops and have replaced CRT monitors as the main type of computer display screen for desktops, as well. A graphics processing unit (GPU) is a microprocessor used on dedicated video adapter cards or within a CPU with integrated graphics capability to handle the mathematical calculations required to create immersive and 3D graphics.Domain1 - Mobile Devices

384
Q

Question 24:
You are working at the service desk on your first day as a computer repair technician. You answer the phone and begin to ask the customer about the issue they are experiencing. Which of the following steps of the best practice troubleshooting methodology are you performing?
Test the theory to determine the cause
Document findings, actions, and outcomes
Identify the problem
Establish a plan of action to resolve the problem and implement the solution

A

Test the theory to determine the causeDocument findings, actions, and outcomesCorrect answerIdentify the problemEstablish a plan of action to resolve the problem and implement the solutionOverall explanationOBJ-5.1: For the exam, it is important that you can list and identify the 6 steps of the CompTIA troubleshooting methodology in order. (1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and then implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.Domain5 - Hardware and Network Troubleshooting

385
Q

Question 25:
A salesman has been traveling to different businesses all day to give a sales presentation. Each time, he starts up his laptop and logs into Windows to show his PowerPoint presentation to the customer. During his second appointment, his laptop lost power and shut itself off abruptly. He arrives at his third appointment and plugs in his laptop to recharge it. When he powers on his laptop, he sees a very low-resolution version of his normal desktop. He attempts to change the resolution from 800 x 600 to 1920 x 1080 (his normal resolution) but cannot find it in the Display Settings options inside of Windows. Which of the following could be the cause of this error?
Corrupted or missing display driver
Corrupted memory module
Graphics card failure
Corrupted motherboard firmware

A

Correct answerCorrupted or missing display driverCorrupted memory moduleGraphics card failureCorrupted motherboard firmwareOverall explanationOBJ-5.4: If your display is shown in low resolution (640 x 480 or 800 x 600), but the computer isn’t in Safe Mode, it is usually a driver issue. For some reason, the laptop’s display driver has become corrupted between the salesman’s last appointment and this appointment. Without a valid display driver, Windows will revert to the “Generic VGA” driver, limiting the system’s highest resolution to 1024 x 768. To solve this issue, you should reinstall a new display driver for the laptop’s appropriate graphics card.Domain5 - Hardware and Network Troubleshooting

386
Q

Question 26:
Christian is planning on taking a business trip to Mexico in his SUV. He gets into the car, enters the address, and the device plots a route south from Oregon to Mexico. As he begins driving, he notices the GPS states that he is driving south, but his car’s compass in his rearview mirror states he is driving north. Which of the following should be done to fix this issue?
Replace the GPS antenna
Update the maps to the latest version
Replace the GPS battery
Perform the GPS calibration

A

Replace the GPS antennaUpdate the maps to the latest versionReplace the GPS batteryCorrect answerPerform the GPS calibrationOverall explanationOBJ-5.5: A GPS may need to be calibrated to determine the true north. In an integrated GPS of an SUV, this usually involves driving in a circle in a parking lot as part of the calibration. This might involve moving your hand in a figure-eight motion to re-calibrate the internal gyros and/or compass on a smartphone.Domain5 - Hardware and Network Troubleshooting

387
Q

Question 27:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name on top of the appropriate cable’s connector.)
Using the image above, which of the following correctly identifies the fiber optic connector shown as Connector A?
LC
SC
F
ST

A

LCCorrect answerSCFSTOverall explanationOBJ-3.1: This is an SC connector. A ST, SC, LC, or MTRJ connector is used to terminate a fiber optic cable. An SC, or subscriber connector, is a general-purpose push/pull style connector that has a square, snap-in connector that latches with a simple push-pull motion. SC connectors are widely used in single-mode fiber optic systems. An ST, or straight tip, connector is a quick-release bayonet-style connector that has a long cylindrical connector. An LC, or Lucent connector, is a small form factor connector that combines the transmit and receive cables into a single square, snap-in connector. The F-type connector is used with coaxial cables, not fiber optic cables.Domain3 - Hardware

388
Q

Question 28:
Brenda’s workstation continually fails to keep accurate time. She manually sets the date and time within Windows, but the next day the time is inaccurate again. When she leaves work at the end of the day, Brenda shuts down her workstation per company policy. The next morning when she boots up the computer, she must reset the time again. Which of the following is MOST likely causing the inaccurate time on the workstation?
The desktop has inadequate airflow and is overheating
The desktop’s power cable is loose
The desktop’s motherboard has a swollen capacitor
The desktop’s CMOS battery has failed

A

The desktop has inadequate airflow and is overheatingThe desktop’s power cable is looseThe desktop’s motherboard has a swollen capacitorCorrect answerThe desktop’s CMOS battery has failedOverall explanationOBJ-5.2: If the CMOS battery has failed, then it would cause the workstation to lose its date/time settings. When a system is powered down, the internal CMOS battery on the motherboard is used to maintain the date/time. If the desktop had inadequate airflow, it intermittently shut down at random times. If a desktop has a swollen capacitor, then a technician will smell a foul odor coming from the motherboard. A swollen capacitor indicates a motherboard failure that can lead to strange issues occurring on the desktop. If the desktop loses power when moved, this is most likely a loose power cable.Domain5 - Hardware and Network Troubleshooting

389
Q

Question 29:
Which of the following network performance metrics is used to represent variable delay experienced by a client when receiving packets from a sender?
Latency
Jitter
Throughput
Bandwidth

A

LatencyCorrect answerJitterThroughputBandwidthOverall explanationOBJ-5.7: Jitter is a network condition that occurs when a time delay in the sending of data packets over a network connection occurs. Jitter is a big problem for any real-time applications you may be supporting on your networks, like video conferences, voice-over IP, and virtual desktop infrastructure clients. Latency is the measure of time that it takes for data to reach its destination across a network. Usually, we measure network latency as the round-trip time from a workstation to the distant end and back. Throughput is an actual measure of how much data is successfully transferred from the source to a destination. Bandwidth is the maximum rate of data transfer across a given network. Now, bandwidth is more of a theoretical concept that measures how much data could be transferred from a source to a destination under ideal conditions. Therefore, we often measure throughput, instead of bandwidth, to monitor our network performance.Domain5 - Hardware and Network Troubleshooting

390
Q

Question 30:
Which of the following cable types can support speeds of up to 10 Gbps for up to 100 meters?
Cat 6
Cat 5
Cat 6a
Cat 5e

A

Cat 6Cat 5Correct answerCat 6aCat 5eOverall explanationOBJ-3.1: Only Cat 6a can support 10 Gbps for up to 100 meters in length. While Cat 6 can support 10 Gbps, it can only support it up to 55 meters before the signal attenuation becomes too great to use reliably.Domain3 - Hardware

391
Q

Question 31:
Which of the following is a public IP address?
10.3.2.1
8.4.2.1
192.168.2.1
169.254.2.1

A

10.3.2.1Correct answer8.4.2.1192.168.2.1169.254.2.1Overall explanationOBJ-2.5: The IP address of 8.4.2.1 is public and is therefore routable. The IP address of 10.3.2.1 is a private Class A IP address, and therefore non-routable. The IP address of 192.168.2.1 is a private Class C IP address, and therefore non-routable. The IP address of 169.254.2.1 is an APIPA (Automatic Private IP Address), and therefore non-routable.Domain2 - Networking

392
Q

Question 32:
Dion Training’s RAID 5 array consists of three 10,000 RPM 3.5” hard disk drives. The RAID is reporting that its health has become degraded. A technician replaces a faulty hard drive in the RAID with a new hard drive that is the same size and model as the previously failed drive. Users are now reporting that access to the share drive hosted by this RAID is slower than normal. Which of the following is MOST likely causing the slower performance on the RAID?
The technician should have installed an SSD
The RAID array is rebuilding itself
The technician replaced the incorrect drive
I/O caching has been disabled on the RAID

A

The technician should have installed an SSDCorrect answerThe RAID array is rebuilding itselfThe technician replaced the incorrect driveI/O caching has been disabled on the RAIDOverall explanationOBJ-5.3: The RAID 5 array is rebuilding itself and causing slower performance. A RAID 5 provides block-level striping with distributed parity to provide redundancy using a minimum of three disks. When a disk fails in the RAID 5 array, the drive can continue to operate without data loss using the remaining two hard drives. When a failed drive is replaced, the RAID array must be rebuilt by calculating the missing data that was previously stored on the failed drive and copying it to the new drive. This process will slow down the overall performance of the RAID until the array is fully rebuilt and performance returns to normal. The technician cannot replace an HDD with an SSD without replacing the entire RAID. RAID arrays should use the same size and model of hard drives for best performance. The technician could not have replaced the wrong drive otherwise the entire RAID would fail since only a portion of the data on the RAID would remain (one of three drives). The technician did not change any settings in the question so it is unlikely that I/O caching was changed or disabled.Domain5 - Hardware and Network Troubleshooting

393
Q

Question 33:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard above, which of the following correctly indicates the circled area?
PCIe x16
AGP
PCI
PCIe x8

A

PCIe x16Correct answerAGPPCIPCIe x8Overall explanationOBJ-3.4: The area circled indicates the AGP slot on this motherboard. The accelerated graphics port (AGP) is a parallel expansion card standard that was originally designed for attaching a video card to a computer system to assist in the acceleration of 3D computer graphics. AGP has been replaced with PCIe due to its faster speeds. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

394
Q

Question 34:
Which of the following cloud computing resources are MOST important when determining a cloud file-storage synchronization application’s performance?
Disk speed
I/O bandwidth
RAM utilization
CPU utilization

A

Disk speedCorrect answerI/O bandwidthRAM utilizationCPU utilizationOverall explanationOBJ-4.1: I/O bandwidth is the measurement of the amount of input and output operations that can be performed within a given time. The higher the I/O bandwidth, the faster and more efficient a cloud file-storage synchronization application will become. Applications that rely on large amounts of reading and writing of data require a high amount of I/O bandwidth. Disk speed is not nearly as important since most cloud file-storage systems use a virtualized file system for storage and do not rely on a single disk. Instead, they rely on a storage area network or a virtualized storage solution. The CPU and RAM utilization on the system would not have as large of an impact on the performance as the I/O bandwidth.Domain4 - Virtualization and Cloud Computing

395
Q

Question 35:
Thor is working as a contractor for the Department of Defense (DoD). To better secure their systems, each laptop is equipped with a device that requires all employees to insert their employee identification badges into the computer to log in. Each identification badge has an electronic chip embedded into the badge. The employee must enter a PIN to unlock the digital certificate stored in this badge to authenticate to the login server. Which of the following technologies is used to read the employee’s badge?
Smart card reader
Barcode scanner
ADF
Magnetic reader

A

Correct answerSmart card readerBarcode scannerADFMagnetic readerOverall explanationOBJ-1.1: A smart card reader is a device, either built-in or attached as a peripheral, that uses a slot or NFC to interact with a smart card. A smart card, chip card, or integrated circuit card is a physical, electronic authorization device used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit chip. In high-security environments, employee badges may contain a smart card embedded chip that must be inserted into a smart card reader to log in or access information on the system. A barcode scanner or barcode reader is a handheld or pen-shaped device designed to scan barcodes. A barcode is a pattern of different sized parallel bars, typically representing a product number, such as an ISBN, EAN, or UPC. The reader uses a sensor mechanism (typically either a photodiode, laser, or CCD) to read the intensity of light reflected by the barcode. The reader then reports the number back to application software, which links it to a product database. A magnetic stripe reader also called a magstripe reader, is a hardware device that reads the information encoded in the magnetic stripe located on the back of a plastic badge. The magnetic stripe on the back of a badge is composed of iron-based magnetic particles encased in plastic-like tape. An automatic document feeder (ADF) is a device that feeds media automatically into a scanner or printer.Domain1 - Mobile Devices

396
Q

Question 36:
What type of connector is used to connect to a serial port or external modem?
RJ-45
F Type
LC
DB-9

A

RJ-45F TypeLCCorrect answerDB-9Overall explanationOBJ-3.1: DB-9 is a standard type of serial connector used to connect to a serial port or external modem. A DB-9 connector is used to terminate an RS-232 serial cable. An RJ-45 connector is used to terminate a copper twisted-pair Ethernet cable. The F-type connector is used with coaxial cables. A ST, SC, LC, or MTRJ connector is used to terminate a fiber optic cable.Domain3 - Hardware

397
Q

Question 37:
What is the name of a computer system that is designed to perform a specific and dedicated function?
UTM system
Embedded system
Patch system
Legacy system

A

UTM systemCorrect answerEmbedded systemPatch systemLegacy systemOverall explanationOBJ-2.4: An embedded system is a computer system designed to perform a specific, dedicated function. These systems can be as small and simple as a microcontroller in an intravenous drip-rate meter or as large and complex as an industrial control system managing a water treatment plant. Embedded systems might typically have been designed to operate within a closed network. The network elements are all known to the system vendor, and there is no connectivity to wider computer data networks. A legacy system is no longer directly supported by its vendor. Networks often need to retain hosts running DOS or legacy versions of Windows (8.1 and earlier) or old-style mainframe computers to run services that are too complex or expensive to migrate to a more modern platform. Legacy systems usually work well for what they do (which is why they don’t get prioritized for replacement), but they represent very severe risks in terms of security vulnerabilities. Unified threat management (UTM) devices are network appliances that provide all the security functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, data loss prevention, content filtering, and other security devices into a single device or appliance. Patch systems are used to conduct patch management across your organization’s networkDomain2 - Networking

398
Q

Question 38:
What printer concept is a page description language that produces faster outputs at the expense of quality?
PostScript
Line Printer Daemon
Printer control language
Internet Printing Protocol

A

PostScriptLine Printer DaemonCorrect answerPrinter control languageInternet Printing ProtocolOverall explanationOBJ-3.6: Both the printer control language (PCL) and PostScript (PS) are page description languages, but PCL produces faster outputs that are of lower quality. The printer control language (PCL) is a page description language used to tell printers how to properly layout and print the contents of a document on a page. PCL is a common printing language that is supported by many different printer manufacturers. PostScript (PS) is a page description language used in the electronic publishing and desktop publishing business. PCL is faster to print than PS. PS is slower but produces higher quality outputs. The Internet Printing Protocol (IPP) is a specialized Internet protocol for communication between client devices and printers (or print servers) using the HTTP protocol for data transport. The Line Printer Daemon (LPD) protocol is a network printing protocol for submitting print jobs to a remote printer. LPD is an older protocol than IPP.Domain3 - Hardware

399
Q

Question 39:
What are the dimensions of a MicroATX motherboard?
6.7” x 6.7”
11” x 9.6”
3.6” x 2.9”
9.6” x 9.6”

A

6.7” x 6.7”11” x 9.6”3.6” x 2.9”Correct answer9.6” x 9.6”Overall explanationOBJ-3.4: The mATX (microATX) motherboard’s form factor is 9.6” x 9.6” in size (24 cm x 24 cm). The mATX form factor is commonly used in smaller computer systems with a small form factor (SFF) case. An mATX motherboard is backward-compatible with the larger ATX motherboard since it contains the same mounting point locations as the full-size board. An ATX motherboard’s form factor is 12” x 9.6” in size (305mm x 244mm). ITX is a series of form factors that began with the mini-ITX, but there is no specific size called ITX. The mITX (Mini-ITX) form factor is 6.7” x 6.7” in size (17 cm x 17cm). The mITX is commonly used in smaller computer systems with a small form factor (SFF) case. These motherboards are usually used in computers designed for passive cooling and a low power consumption architecture, such as a home theater PC system.Domain3 - Hardware

400
Q

Question 40:
You are troubleshooting a Windows 10 workstation for a customer. You have identified the problem and performed a quick backup of the system. What is the NEXT step in the troubleshooting methodology?
Document findings, actions, and outcomes
Establish a plan of action to resolve the problem and implement the solution
Establish a theory of probable cause
Test the theory to determine the cause

A

Document findings, actions, and outcomesEstablish a plan of action to resolve the problem and implement the solutionCorrect answerEstablish a theory of probable causeTest the theory to determine the causeOverall explanationOBJ-5.1: For the exam, it is important that you can list and identify the 6 steps of the CompTIA troubleshooting methodology in order. (1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and then implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.Domain5 - Hardware and Network Troubleshooting

401
Q

Question 41:
Several users from the Sales & Marketing department have called the service desk complaining that they cannot access the internet from their workstations. You arrive at the salesperson’s workstation, open the command prompt, and enter the command IPCONFIG. The command returns an IPv4 address of 10.1.2.3, a subnet mask of 255.255.255.0, and a default gateway of 10.1.2.1. You attempt to run the command “ping 8.8.8.8” but get the message “Request timed out” displayed four times on the screen. You attempt to ping the IP of the salesperson’s workstation sitting next to this workstation and receive four successful replies from the command. You then try to ping the gateway (10.1.2.1) but again receive the message of “Request timed out” on your screen. Which of the following is MOST likely the problem with the salespeople’s internet connectivity?
The wireless access point in the Sales & Marketing department is not working properly
The router that connects the Sales & Marketing department to the rest of the company is not functioning properly
This is a DNS issue since you cannot access the internet
The salespeople are getting APIPA addresses from the DHCP server

A

The wireless access point in the Sales & Marketing department is not working properlyCorrect answerThe router that connects the Sales & Marketing department to the rest of the company is not functioning properlyThis is a DNS issue since you cannot access the internetThe salespeople are getting APIPA addresses from the DHCP serverOverall explanationOBJ-5.7: Since you can ping other workstations within the Sales & Marketing department, but you cannot successfully ping the gateway device (the router), this indicates that the router is non-functioning at this time. If the router is not functioning, the workstations will be unable to access any devices or servers outside of the Sales & Marketing department since the router is necessary to connect them to those devices.Domain5 - Hardware and Network Troubleshooting

402
Q

Question 42:
Tim’s iPhone was starting to flicker randomly during use. He attempted to turn the phone off and on again to fix the flickering, but it keeps flickering randomly. Which of the following components MOST likely causing the issues in the iPhone?
Inverter
Display
Converter
Backlight

A

InverterDisplayConverterCorrect answerBacklightOverall explanationOBJ-5.5: For mobile phones, flickering is often caused by a failing backlight that needs to be replaced by a certified technician. In a laptop or mobile device, the LCD screen relies on a backlight source to uniformly light up the screen.Domain5 - Hardware and Network Troubleshooting

403
Q

Question 43:
Jason’s laptop is having some issues when he is typing. He opened a Word document and attempted to type “The quick brown fox jumped over the lazy dog,” but the screen displayed “Theqickbrwnfxjmpedverthelazydg” instead. It appears the O, U, and space bar are not functioning. What is most likely the issue?
Defective backlight
Stuck keys on the laptop
Sticky keys are enabled
Incorrect keyboard drivers

A

Defective backlightCorrect answerStuck keys on the laptopSticky keys are enabledIncorrect keyboard driversOverall explanationOBJ-5.5: Based on the keyboard only acting incorrectly with a few keys, it is likely the keyboard has some stuck keys caused by dirt or debris. If crumbs get under a key, it will cause it not to work properly. Due to the large size of the space bar key, it is often the first key to get stuck. To fix this, you should hold the laptop at a 90-degree angle to the desk and spray compressed air under the keys while rapidly clicking the stuck key to dislodge any dirt or debris. Stuck keys are different than sticky keys, though. Sticky keys are a Windows function that ignores a certain key is pressed and held for too long, such as the shift key being held down for 10 seconds. Whether working or defective, the backlight would not affect the keyboard typing and displaying the right keys to the screen. A keyboard’s drivers would usually affect special keys (like volume or brightness), not standard keys like letters or the space bar.Domain5 - Hardware and Network Troubleshooting

404
Q

Question 44:
The large multi-function printer in your office is shared between 12 people. Unfortunately, it has stopped working, and the technicians have determined it must be replaced. A new printer has been ordered, but it will be 2 weeks until it arrives. The only other printer available in your office is the manager’s printer, but it is connected via USB to their workstation. One of the technicians would like to share the manager’s printer with the other 12 employees for the next 2 weeks as a temporary workaround. Unfortunately, there are no spare wired network jacks available in the office to connect the printer to the network directly, but there is a wireless access point nearby. Which of the following is the BEST way for the technician to allow the 12 employees to access the manager’s printer?
Configure a new printer on each user’s workstation and point it to the manager’s IP address
Share the printer directly from the manager’s computer by creating a share and giving the other employee’s access rights to the share
Provide a USB thumb drive to each employee so that they can transfer their files to the manager’s computer for direct printing
Purchase a portable wireless print server and connect the printer to it using USB

A

Configure a new printer on each user’s workstation and point it to the manager’s IP addressShare the printer directly from the manager’s computer by creating a share and giving the other employee’s access rights to the shareProvide a USB thumb drive to each employee so that they can transfer their files to the manager’s computer for direct printingCorrect answerPurchase a portable wireless print server and connect the printer to it using USBOverall explanationOBJ-3.6: The BEST solution would be to use a wireless print server to connect the printer to it using USB. This wireless print server can then receive the print jobs directly from all of the network users. It is not recommended that the technician create a share on the manager’s computer or set the printer configuration to the manager’s IP address since all print jobs would fail anytime the manager shut down or restarted their computer. Using a USB drive to transfer the files to the manager’s computer each time someone wanted to print is also not a good solution since this is difficult for the users and will be disrupting the manager’s work every time someone needed to print something.Domain3 - Hardware

405
Q

Question 45:
When using a laser printer, what is used to transfer the image to a piece of paper?
Filament
Toner
Ink
Ribbon

A

FilamentCorrect answerTonerInkRibbonOverall explanationOBJ-3.7: Toner is used by a laser printer to transfer the image to a piece of paper. Ink is used by an inkjet printer. Filament is used by a 3-D printer to create its final design. Ribbon is used by an impact printer.Domain3 - Hardware

406
Q

Question 46:
Rick has just received a new Google Pixel smartphone and installed all of his favorite apps, including a different style virtual keyboard. After about 6 months of use, he noticed that the smartphone has become slow, and the virtual keyboard is not responding properly when keys are pressed or becomes completely unresponsive. What is the FIRST solution to try to fix this issue?
Soft reset the phone
Clear system cache from recovery mode
Close the app in the background and restart the app
Factory reset the phone

A

Soft reset the phoneClear system cache from recovery modeCorrect answerClose the app in the background and restart the appFactory reset the phoneOverall explanationOBJ-5.5: The simplest and most efficient way to fix unresponsive apps is to close the app running in the background and restart the app again. A custom virtual keyboard app can often cause performance decline and unresponsiveness, and the virtual keyboard will lock up. It is always a good practice to always close apps running in the background to reduce resource consumptions. If this doesn’t solve the issue, then a soft reset or factory reset may be needed.Domain5 - Hardware and Network Troubleshooting

407
Q

Question 47:
A workstation in Dion Training’s conference room is experiencing an issue when trying to boot up. When the workstation is powered on, the workstation displays an error stating that a bootable device cannot be found. The technician enters the UEFI environment and sees that the hard disk drive is no longer being recognized by the system. The technician shut down the workstation, opened the case, and verified that the memory modules and cables are properly connected to the internal hard disk drive. Which of the following is the MOST likely reason for the workstation’s failure to recognize the internal hard disk drive?
The workstation’s hard drive is failing
The workstation is overheating
There is a mix of DDR3 and DDR4 modules installed
The boot order of the devices is incorrect

A

Correct answerThe workstation’s hard drive is failingThe workstation is overheatingThere is a mix of DDR3 and DDR4 modules installedThe boot order of the devices is incorrectOverall explanationOBJ-5.3: If the hard drive fails, the workstation will experience data loss or fail to boot up. Since the BIOS/UEFI does not recognize the internal hard disk drive, it has either failed or is disconnected. Since the technician verified the hard drive was properly cabled, the drive itself must have failed. If the boot order of the devices is incorrect, the system would still try to boot from each connected drive before issuing the no bootable device error message. If the system was overheating, it would cause intermittent reboots instead of failing to find a bootable device. Each motherboard will only support certain types of memory modules, so it is not possible to use both DDR3 and DDR4 in the same workstation. DDR3 and DDR4 are two different form factors that use different notches, therefore, they will physically not fit into a different type of slot.Domain5 - Hardware and Network Troubleshooting

408
Q

Question 48:
You are building a virtualization environment to practice your penetration testing skills. This will require that you install several vulnerable Linux distributions as VMs. The VMs need to have access to a virtualized network but should not communicate with the host operating system or the internet. Which of the following types of network connections should you configure for each VM?
Localhost
Internal
External
Private

A

LocalhostInternalExternalCorrect answerPrivateOverall explanationOBJ-4.2: The private network connection type will create a switch that is usable only by the VMs. The VMs cannot use the switch to communicate with the host. If you select internal, it can communicate between the host and the VMs. If you select external, the VMs would have internet access. If you select localhost, each VM could only communicate with itself.Domain4 - Virtualization and Cloud Computing

409
Q

Question 49:
Which of the following storage types utilize a NAND chipset mounted directly onto the motherboard instead of a mechanical spinning drive to store data?
SATA
SSD
NVMe
HDD

A

SATASSDCorrect answerNVMeHDDOverall explanationOBJ-3.3: NVMe (Non-Volatile Memory Express) is a storage controller mounted on the motherboard. It utilizes a NAND chipset and connects via the motherboard’s PCIe bus for increased speed. NVMe allows much higher transfer rates than SATA/AHCI. A solid-state drive (SSD) is a personal computer storage device that stores data in non-volatile special memory instead of on disks or tape. While SSDs also avoid spinning drives, they cannot be mounted directly onto the motherboard. A hard disk drive (HDD) is a device providing persistent mass storage for a workstation or laptop by saving data even when the computer is turned off. Data is stored using platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter known as sectors. Serial ATA (SATA) is the most widely used interface for hard disks on modern desktop and laptop computers. SATA uses a 7-pin L-shaped data connector with one device per port. SATA operates at bandwidths of 1.5 Gbps, 3 Gbps, or 6 Gbps. SATA drives can also use a 15-pin power connector.Domain3 - Hardware

410
Q

Question 50:
You want to play computer-based video games from anywhere in the world using your laptop or tablet. You heard about a new product called a Shadow PC that is a virtualized Windows 10 Home gaming PC in the cloud. Which of the following best describes this type of service?
IaaS
SaaS
PaaS
DaaS

A

IaaSSaaSPaaSCorrect answerDaaSOverall explanationOBJ-4.1: Desktop as a Service (DaaS) provides a full virtualized desktop environment from within a cloud-based service. This is also known as VDI (Virtualized Desktop Infrastructure) and is coming in large enterprise businesses focused on increasing their security and minimizing their operational expenses. Shadow PC (shadow.tech) provides a version of DaaS for home users who want to have a gaming PC without all the upfront costs. Software as a Service (SaaS) is ca loud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Officer 365 are both word processing SaaS solutions. Software as a Service (SaaS) is ca loud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions. Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center.Domain4 - Virtualization and Cloud Computing

411
Q

Question 51:
Which of the following modes of operation will allow a motherboard to create two independent 64-bit pathways to achieve 128-bits of data transfer per transaction from the memory to the CPU?
Triple-channel
Single-channel
Dual-channel
Quad-channel

A

Triple-channelSingle-channelCorrect answerDual-channelQuad-channelOverall explanationOBJ-3.2: Dual-channel memory is a memory controller with two primary pathways through the bus to the CPU to transfer 128-bits of data in each transaction. Single-channel memory is any memory using one 64-bit bus between the CPU and the RAM. Triple-channel memory is any memory using three 64-bit buses between the CPU and the RAM. Quad-channel memory is any memory using four 64-bit buses between the CPU and the RAM.Domain3 - Hardware

412
Q

Question 52:
Which of the following should you do before removing and replacing a laptop’s Lithium-ion (Li-ion) battery pack? (Select TWO)
Shut down the laptop
Plug the laptop into the power adapter
Place the laptop into sleep mode
Unplug the laptop from the power adapter

A

Correct selectionShut down the laptopPlug the laptop into the power adapterPlace the laptop into sleep modeCorrect selectionUnplug the laptop from the power adapterOverall explanationOBJ-1.1: Many laptop computers use removable, rechargeable Lithium-ion (Li-ion) battery packs. Before inserting or removing the battery pack, you must always shut down the laptop and unplug it from the AC wall outlet or power adapter. The battery is then removed using release catches if an external battery is supported by the laptop. If you do not shut down the laptop, data corruption can occur. If you do not unplug the laptop from the power adapter or wall outlet, you can get shocked or electrocuted.Domain1 - Mobile Devices

413
Q

Question 53:
Which of the following printer configuration settings controls the overall output characteristics of the print job such as the density of the ink/toner on the paper and the speed of the print process?
Duplex
Orientation
Tray
Quality

A

DuplexOrientationTrayCorrect answerQualityOverall explanationOBJ-3.6: The quality setting is used to define the overall output characteristics of the print job. If the best setting is used, the printer will use more ink/toner in producing the image and printer more slowly. If the Fast, Draft, or Low settings are used, the printer will use less ink/toner and print more quickly. Page orientation is the way in which a rectangular page is oriented for normal viewing. The two most common types of orientation are portrait and landscape. Duplex printing is a feature of some computer printers, multi-function printers (MFPs), and copy machines that allow the printing of a sheet of paper on both sides automatically. Without this capability, print devices can only print on a single side of the paper, sometimes called single-sided printing or simplex printing. With duplex printing, information is printed on the front side of a piece of paper, and then the paper is automatically fed back through the printer to print the information on the backside of the paper. The tray setting is used to define what type of paper is being used by a printer. The tray setting is commonly set to auto, letter in the United States, or A4 in Europe.Domain3 - Hardware

414
Q

Question 54:
Dion Training has just installed a brand new email server. Which of the following DNS records would need to be created to allow the new server to receive email on behalf of diontraining.com?
A
MX
CNAME
PTR

A

ACorrect answerMXCNAMEPTROverall explanationOBJ-2.6: An MX record is used for outgoing (SMTP) and incoming (POP3/IMAP) traffic. An A record associates your domain name with an IPv4 address. An AAAA record associates your domain name with an IPv6 address. A CNAME record is a canonical name or alias name, which associates one domain name as an alias of another (like beta.diontraining.com and www.diontraining.com could refer to the same website using a CNAME).Domain2 - Networking

415
Q

Question 55:
Which type of wireless network utilizes the 2.4 GHz or 5 GHz frequency bands and reaches speeds of 108 Mbps to 600 Mbps?
802.11a
802.11ax
802.11g
802.11ac
802.11b
802.11n

A

802.11a802.11ax802.11g802.11ac802.11bCorrect answer802.11nOverall explanationOBJ-2.3: The 802.11n (Wireless N) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 108 Mbps or a 5.0 GHz frequency to provide wireless networking at speeds up to 600 Mbps. Wireless N supports the use of multiple-input-multiple-output (MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless N supports channel bonding by combining two 20 MHz channels into a single 40 MHz channel to provide additional bandwidth. The 802.11a (Wireless A) standard utilizes a 5 GHz frequency to provide wireless networking at speeds up to 54 Mbps. The 802.11b (Wireless B) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 11 Mbps. The 802.11g (Wireless G) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 54 Mbps. The 802.11ac (Wireless AC or Wi-Fi 5) standard utilizes a 5 GHz frequency to provide wireless networking at theoretical speeds up to 3.5 Gbps. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. The 802.11ax (Wireless AX or Wi-Fi 6) standard utilizes 2.4 GHz and 5.0 GHz frequencies to provide wireless networking at theoretical speeds up to 9.6 Gbps. Wireless AC uses orthogonal frequency-division multiple access (OFDMA) to conduct multiplexing of the frequencies transmitted and received to each client to provide additional bandwidth. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless AC also has a version called Wi-Fi 6E that supports the 6GHz frequency instead of the 2.4 GHz and 5.0 GHz frequencies used in Wi-Fi 6.Domain2 - Networking

416
Q

Question 56:
Josie in Human Resources was just issued a new laptop by Dion Training. When she plugs the laptop into the network’s wall jack and turns it on, she receives an error message. She calls the service desk to report that the error message being displayed states, “There is an IP address conflict with another system on the network.” You are working as a field service technician and have been asked to resolve this error. What should you do?
Disable the wired network adapter and require the laptop to use the wireless network adapter instead
Replace the wired network adapter on the laptop since it is faulty
Choose a new IP address and statically assign it to the laptop
Configure the laptop’s network connection to use DHCP instead of a static IP

A

Disable the wired network adapter and require the laptop to use the wireless network adapter insteadReplace the wired network adapter on the laptop since it is faultyChoose a new IP address and statically assign it to the laptopCorrect answerConfigure the laptop’s network connection to use DHCP instead of a static IPOverall explanationOBJ-5.7: This is a common error when two network devices are assigned the same IP address on a network. This occurs most commonly when static IP addresses are used, so the easiest way to avoid this issue is to use DHCP to assign the IP addresses on the network. Forcing the user to use wireless over wired may solve the issue temporarily, but this is more of a workaround than a true solution to the error. It would be best if you didn’t randomly choose a new IP and statically assign it to the laptop since this will lead to more future conflicts. You shouldn’t remove the desktop computer’s static IP configuration if the error you received is on the laptop.Domain5 - Hardware and Network Troubleshooting

417
Q

Question 57:
Which of the following is categorized as a public IP address?
169.254.12.64
172.30.15.12
192.168.0.2
11.120.32.41

A

169.254.12.64172.30.15.12192.168.0.2Correct answer11.120.32.41Overall explanationOBJ-2.5: To communicate on the Internet, a host must obtain a unique public IP address. Typically this is allocated by an Internet Service Provider. If an address is not an APIPA address (169.254.x.x), a private IP address (10.x.x.x, 172.16-31.x.x, or 192.168.x.x), or a localhost IP (127.0.0.1), then it is considered a public IP address.Domain2 - Networking

418
Q

Question 58:
You are setting up a cable television in a customer’s home. Which connector type should be used to connect the TV tuner to the wall jack when using a coaxial cable?
F type
RJ-45
DB-9
ST

A

Correct answerF typeRJ-45DB-9STOverall explanationOBJ-3.1: The F type connector is used with coaxial cables. Both RG-6 and RG-59 are cable types used for coaxial cable connections. RG-6 cabling is recommended for your Cable TV, satellite, TV antennas, or broadband internet. RG-59 cabling is generally better for most CCTV systems and other analog video signals. An RJ-45 connector is used to terminate a copper twisted-pair Ethernet cable. A DB-9 connector is used to terminate an RS-232 serial cable. A ST, SC, LC, or MTRJ connector is used to terminate a fiber optic cable.Domain3 - Hardware

419
Q

Question 59:
You just configured your iPhone to connect to your car’s stereo over Bluetooth to play your favorite podcasts while driving to work. What type of network did you create between your iPhone and your car?
WAN
LAN
PAN
SAN

A

WANLANCorrect answerPANSANOverall explanationOBJ-2.7: A personal area network (PAN) is a close-range network that is usually based on Bluetooth or NFC for communications between personal devices, such as smartphones, laptops, printers, and other peripheral devices. A local area network (LAN) is a network where all the nodes or hosts participating in the network are directly connected with cables or short-range wireless media. A wide area network (WAN) is a network that spans multiple geographic locations such as the internet. Wide area networks are often established with leased telecommunication circuits. A storage area network (SAN) is a dedicated, independent high-speed network that interconnects and delivers shared pools of storage devices to multiple servers. A storage area network often uses Fibre Channel over Ethernet (FCoE), Fibre Channel, or Internet Small Computer Systems Interface (iSCSI) connections to achieve the speeds necessary to support SAN operations.Domain2 - Networking

420
Q

Question 60:
Your home network has a wireless access point (WAP) that allows your smartphone and tablet to connect to your internal network. The WAP is connected to a router and a cable modem to provide internet access. A coaxial cable carries the network traffic from the cable modem to the cable company’s central office for transmission to and from the internet. Which of the following types of networks would best describe this network configuration between your home network and the internet through your cable modem connection?
PAN
LAN
MAN
WAN

A

PANLANMANCorrect answerWANOverall explanationOBJ-2.7: A wide area network (WAN) is a network that spans multiple geographic locations such as the internet. Wide area networks are often established with leased telecommunication circuits. This is usually a DSL, cable connection, fiber connection, or satellite connection in a home network. A local area network (LAN) is a network where all the nodes or hosts participating in the network are directly connected with cables or short-range wireless media. A personal area network (PAN) is a close-range network that is usually based on Bluetooth or NFC for communications between personal devices, such as smartphones, laptops, printers, and other peripheral devices. A metropolitan area network (MAN) is a computer network that interconnects users with computer resources in a geographic region of the size of a metropolitan or city area.Domain2 - Networking

421
Q

Question 61:
Which of the following hard drive form factors would support a 15,000 RPM hard drive for us in a desktop computer with a SATA connector?
3.5”
1.8”
M.2
2.5”

A

Correct answer3.5”1.8”M.22.5”Overall explanationOBJ-3.3: A 3.5” drive is only used in desktops and some networked file servers using a SATA Connector. While some desktops may use a 2.5” drive, the highest speed hard drives require the larger 3.5” form factor. A laptop hard drive comes in either the 2.5” form factor or the 1.8” form factor. When a 1.8” form factor is used, the drive is connected to the laptop using a Micro SATA connector since a regular SATA connector will not fit due to the connector’s larger size. An M.2 is a new set of form factors for an SSD that uses a mini card interface that is faster than a SATA connection.Domain3 - Hardware

422
Q

Question 62:
Your child’s school issues an Office 365 account to each student to use for their school projects. Your child needs to install the proper software on their Windows 10 laptop for their school work folder to remain synced between the laptop and the cloud service. Which software should you install?
AWS S3
DropBox
Google Drive
OneDrive

A

AWS S3DropBoxGoogle DriveCorrect answerOneDriveOverall explanationOBJ-4.1: OneDrive is a part of the Office 365 suite of tools and services. OneDrive is an online data storage service that can be used through a web browser or a downloadable client. If you have the downloadable client installed, it will ensure the files always remain synced between the cloud service and the local laptop. Software as a Service (SaaS) is a cloud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions.Domain4 - Virtualization and Cloud Computing

423
Q

Question 63:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard above, which of the following correctly indicates the circled area?
Front panel connector
Audio connector
USB connector
PATA connector

A

Front panel connectorAudio connectorCorrect answerUSB connectorPATA connectorOverall explanationOBJ-3.4: The area circled indicates the USB connectors on this motherboard. These connectors are used to connect the front panel USB ports to the motherboard. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at the slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

424
Q

Question 64:
You have been dispatched to a customer’s office to help them fix their printer. You have asked the customer what the issue is, and the customer states, “The printer will not work.” You ask a few follow-up questions to understand the situation better and ask if any error messages were displayed. Which of the following steps of the CompTIA troubleshooting methodology best describes the actions you are currently taking?
Establish a plan of action to resolve the problem and then implement the solution
Test the theory to determine the cause
Verify full system functionality and, if applicable, implement preventative measures
Identify the problem

A

Establish a plan of action to resolve the problem and then implement the solutionTest the theory to determine the causeVerify full system functionality and, if applicable, implement preventative measuresCorrect answerIdentify the problemOverall explanationOBJ-5.1: Based on the description in the question, it appears you are trying to gather more information about the problem and its symptoms for you to identify the problem. For the exam, you must be able to list and identify the 6 steps of the CompTIA troubleshooting methodology in order. (1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and then implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.Domain5 - Hardware and Network Troubleshooting

425
Q

Question 65:
Which of the following is the third step of the CompTIA troubleshooting methodology?
Document findings, actions, and outcomes
Establish a plan of action to resolve the problem and then implement the solution
Test the theory to determine the cause
Identify the problem

A

Document findings, actions, and outcomesEstablish a plan of action to resolve the problem and then implement the solutionCorrect answerTest the theory to determine the causeIdentify the problemOverall explanationOBJ-5.1: For the exam, it is important that you are able to list and identify the 6 steps of the CompTIA troubleshooting methodology in order. (1) Identify the problem. (2) Establish a theory of probable cause (question the obvious). (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and then implement the solution. (5) Verify full system functionality and, if applicable, implement preventative measures. (6) Document findings, actions, and outcomes.Domain5 - Hardware and Network Troubleshooting

426
Q

Question 66:
Which network technology is used to prioritize certain types of network traffic over others?
QoS
Allow list
ACL
MAC filtering

A

Correct answerQoSAllow listACLMAC filteringOverall explanationOBJ-2.5: Quality of Service (QoS) means using a network protocol to prioritize certain traffic types over others. Enterprise networks can use QoS protocols to make sure traffic such as Voice over IP calling or video conferencing is given higher priority than traffic where packets’ timing is less important, such as ordinary file downloads. MAC filtering, allow lists, and ACLs are used to block traffic, not prioritize it.Domain2 - Networking

427
Q

Question 67:
Which cloud computing concept is BEST described as focusing on replacing the hardware and software required when creating and testing new applications and programs from a customer’s environment with cloud-based resources?
IaaS
PaaS
SaaS
SECaaS

A

IaaSCorrect answerPaaSSaaSSECaaSOverall explanationOBJ-4.1: Platform as a Service (PaaS) is a cloud computing service that enables consumers to rent fully configured systems that are set up for specific purposes. Platform as a Service (PaaS) provides the end-user with a development environment without all the hassle of configuring and installing it themselves. If you want to develop a customized or specialized program, PaaS helps reduce the development time and overall costs by providing a ready to use platform. Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center. Software as a Service (SaaS) is a cloud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions. Security as a service is a business model in which a service provider integrates their security services into a corporate infrastructure on a subscription basis more cost-effectively than most individuals or corporations can provide on their own when the total cost of ownership is considered.Domain4 - Virtualization and Cloud Computing

428
Q

Question 68:
Which of the following ports should you unblock at the firewall if your workstation cannot access https://www.diontraining.com but can access http://www.diontraining.com?
445
443
53
80

A

445Correct answer4435380Overall explanationOBJ-2.1: HyperText Transfer Protocol Secure (HTTPS) is the basis for secure communication and eCommerce on the World Wide Web. HTTPS uses an SSL or TLS encryption tunnel over the standard HTTP protocol. This operates over port 443. In this question, it states that the user can access HTTP but not HTTPS, indicating that port 443 is blocked. The server message block (SMB)/common internet file system (CIFS) is a protocol used for requesting files from Windows servers and delivering them to clients. SMB allows machines to share files and printers, thereby making them available for other machines to use. Samba software allows UNIX and Linux servers or NAS appliances to run SMB services for Windows clients. SMB operates on port 445. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53.Domain2 - Networking

429
Q

Question 69:
Which of the following devices combine an accurate geolocation system that communicates with a constellation of 24 satellites continuously during its operation?
GPS
VR headsets
Fitness monitor
E-readers

A

Correct answerGPSVR headsetsFitness monitorE-readersOverall explanationOBJ-1.4: A GPS (global positioning system) device is used to determine a receiver’s position on the Earth based on information received from 24 GPS satellites, which operate in a constellation in Medium Earth Orbit (MEO). The receiver must have a line-of-sight to four of the GPS satellites continuously to accurately determine its position on the earth (latitude, longitude, and altitude). A virtual reality headset (VR) is a headset worn like goggles to interact with images displayed in the headset. Virtual reality is a computer-generated, simulated environment experienced via a headset connected to a PC or powered by a smartphone. An e-Reader is a tablet-sized device designed for reading rather than general-purpose computing. For example, the Amazon Paperwhite is an example of a traditional e-Reader. Fitness monitors are wearable mobile devices that focus on tracking the health and exercise habits of their users.Domain1 - Mobile Devices

430
Q

Question 70:
Which of the following Wi-Fi channels in the 2.4 GHz frequency band are only supported in Japan due to government regulations?
14
1
6
11

A

Correct answer141611Overall explanationOBJ-2.3: The Wi-Fi frequency band for 2.4 GHz is split into 14 channels of 5 MHz each. In the United States and Canada, only channels 1 through 11 may be used. In Europe, channels 1 through 13 may be used. In Japan, channels 1 through 14 may be used. Since each Wi-Fi communication requires approximately 20 MHz to operate effectively, users should set their wireless access points to channels 1, 6, and 11 to minimize interference and avoid overlapping channels.Domain2 - Networking

431
Q

Question 71:
Which of the following types of data should you transmit over UDP?
Streaming videos on Netflix
Updating your Facebook status
Attaching photos to an email
Paying your credit card bill

A

Correct answerStreaming videos on NetflixUpdating your Facebook statusAttaching photos to an emailPaying your credit card billOverall explanationOBJ-2.1: UDP (User Datagram Protocol) is a connectionless, non-guaranteed method of data communication. It does not provide any sequencing or flow control. Data sent over UDP could be lost and never resent. For this reason, UDP is not used for general web browsing or activity over HTTP/HTTPS (Ports 80 and 443). UDP is very good at delivering streaming media, though, since UDP is faster than TCP. Streaming videos or making Voice over IP (VoIP) calls are examples of use cases that rely upon UDP for their transmission.Domain2 - Networking

432
Q

Question 72:
Dion Training wants to replace any remaining old CRT displays used in the company with a type of screen that produces less voltage and is more energy-efficient. Additionally, the new screen type selected should not contain a backlight. What type of display technology should they select?
LED
Plasma
LCD
OLED

A

LEDPlasmaLCDCorrect answerOLEDOverall explanationOBJ-1.2: An organic light-emitting diode (OLED) display is a type of LED flat panel display device that uses organic compounds that emit light when subjected to an electric current. An OLED display works without a backlight because it emits visible light. Thus, it can display deep black levels and be thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions (such as a darker room), an OLED screen can achieve a higher contrast ratio than an LCD, regardless of whether the LCD uses cold cathode fluorescent lamps or an LED backlight. An OLED will consume around 40% of an LCD’s power, displaying a primarily black image. For most images, it will consume 60–80% of the power of an LCD. A liquid crystal display (LCD) panel is a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. The LCD panel is backlight by a cold cathode fluorescent (CCFL) bulb. LCD panels are used on laptops and have replaced CRT monitors as the main type of computer display screen for desktops, as well. A light-emitting diode (LED) display is an LCD panel that uses a LED backlight instead of a CCFL backlight to provide its light source. A plasma display is a type of flat panel display that uses small cells containing plasma with ionized gas that responds to electric fields. Plasma displays create excessive heat and are not as energy efficient as an LCD, LED, or OLED display.Domain1 - Mobile Devices

433
Q

Question 73:
You have been asked to install a network cable in the crawl space between the ceiling in your office and the roof. You need to choose the right type of cable to ensure you do not violate the local fire codes. Which of the following cable types should you choose?
Shielded
Plenum
Fiber
Coaxial

A

ShieldedCorrect answerPlenumFiberCoaxialOverall explanationOBJ-3.1: Plenum-rated cable has a special insulation that has low smoke and low flame characteristics. Plenum cable is mandated to be installed in any air handling space. For example, most large office buildings use the space between the ceiling and the roof to return air to the AC unit. This qualifies this area as a plenum ceiling, and all the cables that go through that ceiling must be plenum rated. It is important to check your local building codes to see if you need to use plenum cable. These plenum cables cost more because the insulation material must meet the standards for plenum cables while also meeting the standards for their ethernet category such as 5e, 6a, or 7. Shielded cables contain a braided foil shield around the inner cabling to protect the data from the effects of electromagnetic interference (EMI). Coaxial cables are a specialized type of copper cabling that uses a copper core to carry the electrical signal while being enclosed by plastic insulation and shielding to protect the data transmission from the effects of electromagnetic interference (EMI). An optical fiber consists of an ultra-fine core of glass to carry the light signals surrounded by glass or plastic cladding that guides the light pulses along the core and a protective coating.Domain3 - Hardware

434
Q

Question 74:
A technician is troubleshooting an issue with a workstation. The workstation can ping 8.8.8.8 successfully, but it is unable to access Facebook.com. Which internal network server is MOST likely causing these issues?
DNS server
FTP server
DHCP server
SMTP server

A

Correct answerDNS serverFTP serverDHCP serverSMTP serverOverall explanationOBJ-2.4: A DNS server is used to perform name lookups and convert them to valid IP addresses. If a workstation can ping an IP, that indicates the network connection is working. If the workstation cannot access a website using its domain name (like diontraining.com or facebook.com), it indicates a problem might exist with the DNS server. A domain name system (DNS) server is a server that hosts the database of domain names and the IP addresses mapped to those names. Each DNS server is authoritative for certain domain names that their organization owns. A mail server is a server that sends or received emails on behalf of its users. POP3 and IMAP servers are used to receive email and SMTP is used to send an email. A dynamic host configuration protocol (DHCP) server is a server configured with a range of addresses to lease. Hosts can be allocated an IP address dynamically or be assigned a reserved IP address based on the host’s MAC address. The server can also provide other configuration information, such as the location of DNS servers. A file server is used to host and control access to shared files and folders for the organization. A file transfer protocol (FTP) server is a type of file server that is used to host files for users outside your organization.Domain2 - Networking

435
Q

Question 75:
You have been asked to connect three 802.11a devices to an 802.11g access point configured with WEP. The devices are within 20 feet of the access point, but they still cannot associate with the access point. Which of the following is the MOST likely cause of the devices not associating with the WAP?
Mismatched encryption
Signal loss
Interference
Frequency mismatch

A

Mismatched encryptionSignal lossInterferenceCorrect answerFrequency mismatchOverall explanationOBJ-2.7: 802.11a operates in the 5 GHz band, while 802.11g operates in the 2.4 GHz band. Therefore, 802.11a devices will be unable to communicate with 802.11b or 802.11g access points. Wireless networks utilize three different frequency bands: 2.4 GHz, 5 GHz, and 6 GHz. The 2.4 GHz frequency band is used by 802.11b, 802.11g, and 802.11n. The 5 GHz frequency band is used by 802.11a, 802.11n, 802.11ac, and 802.11ax. The 6 GHz frequency band is used by Wi-Fi 6E under the 802.11ax standard.Domain2 - Networking

436
Q

Question 76:
A car dealer recently set up an impact printer in their automotive repair shop. Unfortunately, the printer’s output is now starting to crease the paper as it is printed which can lead to a paper jam during feeding. Which of the following might be causing these issues? (Choose TWO)
Incorrect tension setting
The print head needs to be replaced
Excess paper in the feed path
Incorrect paper size

A

Incorrect tension settingThe print head needs to be replacedCorrect selectionExcess paper in the feed pathCorrect selectionIncorrect paper sizeOverall explanationOBJ-5.6: An impact printer is widely used in situations where multi-part documents, invoices, or contracts need to be produced on carbon paper. These printers use specialized paper fed through the printer by holes on the edges of the paper on what is called a tractor. The paper can crease if the wrong size paper is used or excess paper in the feed path causes bunching up of the paper being fed. The print head does not affect the feeding of the paper in an impact printer. The tension setting being incorrect will lead to the paper pooling or bubbling up during feeding, but it wouldn’t necessarily cause creasing.Domain5 - Hardware and Network Troubleshooting

437
Q

Question 77:
A user is complaining that they are hearing a grinding noise coming from their workstation. You begin to troubleshoot the issue and determine that it is not an issue with the hard drive but is instead caused by the power supply’s fan. Which of the following actions would BEST solve this issue?
Replace the power supply’s fan
Replace the power supply
Spray the fan with compressed air to remove any dirt, debris, or dust
Spray a little bit of WD-40 into the fan to lubricate it

A

Replace the power supply’s fanCorrect answerReplace the power supplySpray the fan with compressed air to remove any dirt, debris, or dustSpray a little bit of WD-40 into the fan to lubricate itOverall explanationOBJ-5.2: If the fan in the power supply is faulty, replace the entire power supply. You should never attempt to repair or fix a broken power supply or broken power supply cooling fan due to the power supply’s high voltage electrical components. When a fan creates a grinding sounds, this is evidence of an impending failure and the device needs to be replaced. Techicians should never open a power supply or replace any of its internal components, therefore the entire power supply should be replaced in this scenario.Domain5 - Hardware and Network Troubleshooting

438
Q

Question 78:
Dion Training’s Chief Financial Officer (CFO) needs your help. His laptop has stopped working, and it will not power on. During your troubleshooting efforts, you have determined the motherboard has failed and needs to be replaced. Unfortunately, it will be a few days before a new motherboard arrives from your supplier. In the meantime, the CFO needs to get some spreadsheets containing the proposed budgets for a new project from the laptop to his desktop in his office. Which of the following actions should you perform to give the CFO access to the files he needs?
Remove the hard drive from the laptop and then install it as the primary hard drive in the CFO’s desktop computer
Remove the hard drive from the laptop and replace it with a new SSD
Remove the hard drive from the laptop, place it in an external USB enclosure, and connect it as a secondary drive to the CFOs desktop computer to copy the spreadsheets
Attempt to run the Windows System Recovery on the laptop to restore functionality

A

Remove the hard drive from the laptop and then install it as the primary hard drive in the CFO’s desktop computerRemove the hard drive from the laptop and replace it with a new SSDCorrect answerRemove the hard drive from the laptop, place it in an external USB enclosure, and connect it as a secondary drive to the CFOs desktop computer to copy the spreadsheetsAttempt to run the Windows System Recovery on the laptop to restore functionalityOverall explanationOBJ-1.1: By removing the hard drive from the laptop and placing it into an external USB enclosure, you have effectively turned the drive into an external USB hard drive that can be connected to any computer as a secondary device. This will allow the technician to connect the drive to the CFO’s desktop workstation and then copy any files or folders that the CFO needs from the old laptop’s hard drive (in the external enclosure) to the primary hard drive (in the desktop computer) so that the CFO can get back to work again. If you removed the hard drive from the laptop and installed it as the primary hard drive in the CFO’s desktop computer, it would likely not work due to missing drivers for the desktop’s hardware. Removing and replacing the drive with an SSD would not solve the issue with the laptop since the laptop’s motherboard has already failed. You cannot run Windows System Recovery on the laptop since the motherboard has failed.Domain1 - Mobile Devices

439
Q

Question 79:
You have been asked by Dion Training to build a specialized computer that will be used exclusively for video editing. Which of the following should you install to BEST meet the company’s needs? (Select THREE)
Docking Station
4 TB HDD (10,000 RPM)
Wi-Fi Adapter
1 TB HDD (5400 RPM)
Specialized video card
Dual monitors

A

Docking StationCorrect selection4 TB HDD (10,000 RPM)Wi-Fi Adapter1 TB HDD (5400 RPM)Correct selectionSpecialized video cardCorrect selectionDual monitorsOverall explanationOBJ-3.4: According to CompTIA, the three main things you need to include for an audio/video editing workstation are (1) specialized audio and video card, (2) a large, fast hard drive, and (3) dual monitors. Based on the options provided, you should pick the video card, the 4 TB hard disk drive running at 10,000 RPMs, and the dual monitors for this workstation’s configuration.Domain3 - Hardware

440
Q

Question 80:
You want to create a new mobile application and develop it in the cloud. You just signed up for a cloud-based service provider’s offering to allow you to develop it using their programming environment. Which of the following best describes which type of service you have just purchased?
DaaS
PaaS
SaaS
IaaS

A

DaaSCorrect answerPaaSSaaSIaaSOverall explanationOBJ-4.1: Platform as a Service (PaaS) provides the end-user with a development environment without all the hassle of configuring and installing it themselves. If you want to develop a customized or specialized program, PaaS helps reduce the development time and overall costs by providing a ready to use platform. Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center. Software as a Service (SaaS) is ca loud computing service that enables a service provider to make applications available over the Internet to end-users. This can be a calendar, scheduling, invoicing, word processor, database, or other programs. For example, Google Docs and Office 365 are both word processing SaaS solutions. Desktop as a Service (DaaS) provides a full virtualized desktop environment from within a cloud-based service. This is also known as VDI (Virtualized Desktop Infrastructure) and is coming in large enterprise businesses focused on increasing their security and minimizing their operational expenses.Domain4 - Virtualization and Cloud Computing

441
Q

Question 81:
Dion Training wants to order some new laptops for their video editors. The video editors want to ensure the display has the best color accuracy when using a 60 Hz refresh rate. Which of the following types of displays should the company purchase to meet this requirement?
TN
IPS
VA
Plasma

A

TNCorrect answerIPSVAPlasmaOverall explanationOBJ-1.2: An in-plane switching (IPS) LCD panel uses technology designed to resolve the quality issues inherent in TN panel technology, including strong viewing angle dependence and low-quality color reproduction. IPS displays have great color accuracy, but they do not support higher refresh rates sought after by gamers. A twisted nematic (TN) LCD panel uses technology where the panel is black when no electric current is running through the liquid crystal cells because the cells align themselves in a twisted state. When an electric current is applied, the liquid crystal cells untwist, allowing light to pass through, resulting in a white display screen. TN displays can be made with high refresh rates of 120 Hz or 144 Hz which makes them popular with gamers. A vertical alignment (VA) LCD panel uses technology designed to have liquid crystals lay perpendicular to the glass substrate when power is removed and in a vertical position when voltage is applied. This allows light to move through the liquid pixels when voltage is applied and the image is then produced. VA displays are a good middle-ground between IPS and TN panel displays. A plasma display is a type of flat panel display that uses small cells containing plasma with ionized gas that responds to electric fields. Plasma displays create excessive heat and are not as energy efficient as an LCD, LED, or OLED display.Domain1 - Mobile Devices

442
Q

Question 82:
A network technician responds to a customer reporting that a workstation continually loses the connection to the network. The user explains that it occurs randomly, and it happens several times throughout the day. Which step of the troubleshooting method should the technician perform NEXT?
Test the theory to determine the cause
Establish a theory of probable cause
Establish a plan of action to resolve the problem
Verify full system functionality

A

Test the theory to determine the causeCorrect answerEstablish a theory of probable causeEstablish a plan of action to resolve the problemVerify full system functionalityOverall explanationOBJ-5.1: The scenario described in the question is best classified as “identify the problem”, so the next step would be to “establish a theory of probable cause”. The troubleshooting steps are to (1)Identify the problem, (2) Establish a theory of probable cause, (3)Test the theory to determine the cause, (4) Establish a plan of action to resolve the problem and identify potential effects, (5)Implement the solution or escalate as necessary, (6) Verify full system functionality and if applicable implement preventative measures, and (7) Document findings, actions, outcomes, and lessons learned.Domain5 - Hardware and Network Troubleshooting

443
Q

Question 83:
What type of Virtual Desktop should be chosen to reduce capital expenditures and have the hardware maintained by the cloud service provider?
Remote virtual appliances
Remote hosted virtual desktops
Local virtual appliances
Local hosted virtual desktops

A

Remote virtual appliancesCorrect answerRemote hosted virtual desktopsLocal virtual appliancesLocal hosted virtual desktopsOverall explanationOBJ-4.1: A remote hosted virtual desktop (HVD) is a full, thick-client user environment run as a virtual machine (VM) on a server and accessed remotely. Using a hosted virtual desktop allows a company to utilize the cloud for its desktop infrastructure, reduce its maintenance cost, and shift capital expenses (such as new desktops) to operational expenses (monthly fees to pay for virtual desktop services). Desktop as a Service (DaaS) provides a full virtualized desktop environment from within a cloud-based service. This is also known as VDI (Virtualized Desktop Infrastructure) and is coming in large enterprise businesses focused on increasing their security and minimizing their operational expenses.Domain4 - Virtualization and Cloud Computing

444
Q

Question 84:
Which port is used to connect to a POP3 server?
25
143
443
110

A

25143443Correct answer110Overall explanationOBJ-2.1: The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them. The internet message access protocol (IMAP) is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. The simple mail transfer protocol (SMTP) is the protocol used to send mail between hosts on the Internet using TCP port 25. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443.Domain2 - Networking

445
Q

Question 85:
Dion Training’s video editing laptop has a defective keyboard. You have been asked to replace the keyboard. What type of cable should be connected to the internal laptop keyboard during your replacement?
Ribbon cable
ZIF
USB
SATA

A

Correct answerRibbon cableZIFUSBSATAOverall explanationOBJ-1.1: A ribbon cable is any cable with wires that run parallel on a flat plane down the length of the cable. Ribbon cables are typically used to connect internal components in laptops to save space. These laptop ribbon cables are usually hardwired into one component and connect to the motherboard or other components with a small connector clip. A zero insertion force (ZIF) socket is a processor socket type that allows the chip to be placed in the socket with as little risk of damaging the pins on the processor chip. Serial ATA (SATA) is the most widely used interface for hard disks on modern desktop and laptop computers. SATA uses a 7-pin L-shaped data connector with one device per port. SATA operates at bandwidths of 1.5 Gbps, 3 Gbps, or 6 Gbps. SATA drives can also use a 15-pin power connector. Universal serial bus (USB) is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at a slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power.Domain1 - Mobile Devices

446
Q

Question 86:
A user wants to print a spreadsheet horizontally on a piece of paper instead of vertically to fit more columns on a single page. What setting should the user enable on the printer for this print job to achieve this result?
Orientation
Collate
Transparency
Duplex

A

Correct answerOrientationCollateTransparencyDuplexOverall explanationOBJ-3.6: By default, Microsoft Excel prints worksheets in portrait orientation (taller than wide). You can change the page orientation to landscape on a worksheet-by-worksheet basis. Page orientation is how a rectangular page is oriented for normal viewing. The two most common types of orientation are portrait (taller rather than wider) and landscape (wider rather than taller). The collate setting allows the gathering and arranging of individual sheets or other printed components into a pre-determined sequence. Collating creates consistent, logical sets from multiple parts, such as printing a series of pages in a report like pages 1, 2, 3 before printing the second copy. This makes it easier to staple and distribute to people after coming out of the printer. Duplex printing is a feature of some computer printers, multi-function printers (MFPs), and copy machines that allow the printing of a sheet of paper on both sides automatically. Without this capability, print devices can only print on a single side of the paper, sometimes called single-sided printing or simplex printing. With duplex printing, information is printed on the front side of a piece of paper, and then the paper is automatically fed back through the printer to print the information on the backside of the paper. The term transparency was made up as a distractor for this question.Domain3 - Hardware

447
Q

Question 87:
You are troubleshooting a workstation for a customer. The workstation will not boot. When it is powered on, an error message of “OS not found” is displayed on the screen. What is the MOST likely solution to fix this error?
Repartition the hard disk
Repair the MBR
Perform a chkdsk
Replace the HDD with an SSD

A

Repartition the hard diskCorrect answerRepair the MBRPerform a chkdskReplace the HDD with an SSDOverall explanationOBJ-5.3: The “OS not found” error at boot time is an indication that the MBR (Master Boot Record) or GPT (Globally Unique ID Partition Table) is corrupted or faulty. If this occurs, you should reboot into the Windows recovery mode and use the ‘bootrec /fixmbr’ command to fix the MBR.Domain5 - Hardware and Network Troubleshooting

448
Q

Question 88:
Samantha recently purchased a touchscreen laptop to use for her child to do their schoolwork. Her child just came home from school and said that they accidentally dropped their laptop earlier today. Samantha has asked you to troubleshoot the issue. You open up the laptop and turn on the screen. You look over the laptop, and the screen appears to have some spider web cracks in the panel, but you can still fully see the images on the display. You attempt to operate the laptop using the touchscreen and it appears to be fully responsive to your touch. Which of the following components MOST likely needs to be replaced?
GPU
LCD panel
Inverter
Digitizer

A

GPUCorrect answerLCD panelInverterDigitizerOverall explanationOBJ-1.2: A liquid crystal display (LCD) panel is a type of display technology where the image is made up of liquid crystal cells controlled using electrical charges. LCD panels are used on laptops and have replaced CRT monitors as the main type of computer display screen for desktops, as well. The digitizer is a touch-sensitive glass panel covering the LCD in a touchscreen assembly. The digitizer is used to convert touch events to digital signals that can be interpreted as different types of input. The digitizer is the part that you can touch without disassembling the device. The LCD screen is the panel that is inside the device, which displays the image. You cannot get to the LCD without taking the device apart first. When only the touch screen is broken, you should still see what is happening on the screen, and the screen should still function as normal. When only the LCD is broken, you can still use the touchscreen, but the panel will have dark blobs or spider web cracks (or both). When both LCD and touchscreen are damaged, you may still be able to use portions of the touchscreen, and some parts of the LCD may display the image, but you will incur obvious difficulties in using the device as normal. A graphics processing unit (GPU) is a microprocessor used on dedicated video adapter cards or within a CPU with integrated graphics capability to handle the mathematical calculations required to create immersive and 3D graphics. The inverter (also known as inverter board, screen inverter, or LCD inverter) is a part of the laptop’s display assembly. The inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight.Domain1 - Mobile Devices

449
Q

Question 89:
Which of the following statements about the 5.0 GHz wireless frequency used by Wi-Fi is correct?
The 5.0 GHz frequency is more effective at penetrating solid surfaces than 2.4 GHz
The 5.0 GHz frequency has a longer wavelength that allows the signal to travel further than 2.4 GHz using the same power levels
The 5.0 GHz frequency has fewer channels available than 2.4 GHz
The 5.0 GHz frequency supports higher data rates than 2.4 GHz

A

The 5.0 GHz frequency is more effective at penetrating solid surfaces than 2.4 GHzThe 5.0 GHz frequency has a longer wavelength that allows the signal to travel further than 2.4 GHz using the same power levelsThe 5.0 GHz frequency has fewer channels available than 2.4 GHzCorrect answerThe 5.0 GHz frequency supports higher data rates than 2.4 GHzOverall explanationOBJ-2.3: The 5.0 GHz frequency supports higher data rates than the 2.4 GHz frequency due to lower levels of congestion and interference. The 5.0 GHz frequency has more individual channels giving it less congestion and interference than the 2.4 GHz frequency. The 2.4 GHz frequency has a longer wavelength than the 5.0 GHz frequency. The longer wavelength gives it the ability to cover a longer range using the same power output levels. The longer wavelength of 2.4 GHz makes it better at propagating through solid surfaces than the 5.0 GHz frequency.Domain2 - Networking

450
Q

Question 90:
You work for a bank interested in moving some of its operations to the cloud, but it is worried about security. You recently discovered an organization called CloudBank that was formed by 15 local banks as a way for them to build a secure cloud-based environment that can be accessed by the 15 member banks. Which cloud model BEST describes the cloud created by CloudBank?
Hybrid cloud
Private cloud
Public cloud
Community cloud

A

Hybrid cloudPrivate cloudPublic cloudCorrect answerCommunity cloudOverall explanationOBJ-4.1: Community Cloud is another type of cloud computing in which the cloud setup is shared manually among different organizations that belong to the same community or area. A multi-tenant setup is developed using the cloud among different organizations belonging to a particular community or group with similar computing concerns. For joint business organizations, ventures, research organizations, and tenders, a community cloud is an appropriate solution. Based on the description of 15 member banks coming together to create the CloudBank organization and its cloud computing environment, a community cloud model is most likely described. A public cloud contains services offered by third-party providers over the public Internet and is available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume. A private cloud contains services offered either over the Internet or a private internal network and only to select users instead of the general public. A hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud, and third-party public cloud services with orchestration between these platforms. This typically involves a connection from an on-premises data center to a public cloud.Domain4 - Virtualization and Cloud Computing

451
Q

Question 1:
An employee at Dion Training complains that every time airplane mode is enabled on their laptop, their external mouse and headphones stop working. Which of the following technologies is being disabled by airplane mode and likely causing the issues experienced by this user?
Wireless
GPS
Cellular
Bluetooth

A

WirelessGPSCellularCorrect answerBluetoothOverall explanationOBJ-1.4: Bluetooth is a wireless connectivity method that is usually used by external mice and wireless headphones. When airplane mode is enabled, the GPS, cellular, wireless, and Bluetooth radios are usually disabled in smartphones, tablets, or laptops. If the Bluetooth radio is turned off/disabled, it will cause issues with Bluetooth-connected devices like mice and headphones. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. A GPS (global positioning system) device is used to determine a receiver’s position on the Earth based on information received from 24 GPS satellites, which operate in a constellation in Medium Earth Orbit (MEO). The receiver must have a line-of-sight to four of the GPS satellites continuously to accurately determine its position on the earth (latitude, longitude, and altitude). A cellular radio is a component in a mobile device capable of switching frequencies automatically when moving between network cells without losing the connection. Wi-Fi is the IEEE 802.11 standard for wireless networking based on spread spectrum radio transmission in the 2.4 GHz and 5 GHz bands. The standard has six main iterations (a, b, g, n, ac, and ax), describing different modulation techniques, supported distances, and data rates.Domain1 - Mobile Devices

452
Q

Question 2:
You have connected your laptop to the network using a CAT 5e cable but received an IP address of 169.254.13.52 and cannot connect to www.DionTraining.com. What is most likely the cause of this issue?
Duplicate IP address
DHCP failure
Failed DNS resolution
Poisoned ARP cache

A

Duplicate IP addressCorrect answerDHCP failureFailed DNS resolutionPoisoned ARP cacheOverall explanationOBJ-5.7: A DHCP Server is a network server that automatically provides and assigns IP addresses, default gateways, and other network parameters to client devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to clients’ broadcast queries. Since you have received an APIPA address (169.254.13.52), this signifies a DHCP failure. If a user is unable to access a website by using its domain name but can by its IP address, then this indicates a DNS resolution issue instead. ARP caches rely on layer 2 addresses known as MAC addresses, not IP addresses. Duplicate IP addresses will create an error on the screen instead of issuing an APIPA address as shown in this example.Domain5 - Hardware and Network Troubleshooting

453
Q

Question 3:
Samantha works in the human resource department in an open floorplan office. She is concerned about the possibility of someone conducting shoulder surfing to read sensitive information from employee files while accessing them on her computer. Which of the following physical security measures should she implement to protect against this threat?
Hardware token
Biometric lock
Badge reader
Privacy screen

A

Hardware tokenBiometric lockBadge readerCorrect answerPrivacy screenOverall explanationOBJ-1.1: A privacy screen is a filter placed on a monitor to decrease the viewing angle of a monitor. This prevents the monitor from being viewed from the side and can help prevent shoulder surfing. The standard type of anti-glare filter consists of a coating that reduces the reflection from a glass or plastic surface. A biometric lock is any lock that can be activated by biometric features, such as a fingerprint, voiceprint, or retina scan. Biometric locks make it more difficult for someone to counterfeit the key used to open the lock or a user’s account. A smart card is a form of hardware token. A smart card, chip card, or integrated circuit card is a physical, electronic authorization device used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit chip. In high-security environments, employee badges may contain a smart card embedded chip that must be inserted into a smart card reader to log in or access information on the system. A badge reader is used to read an employee’s identification badge using a magnetic stripe, barcode, or embedded RFID chip.Domain1 - Mobile Devices

454
Q

Question 4:
Which of the following cables is NOT used by Android smartphones and tablets?
USB-C
Mini USB
Lightning
Micro USB

A

USB-CMini USBCorrect answerLightningMicro USBOverall explanationOBJ-1.3: Android devices do NOT use the lightning cable because it is a proprietary 8-pin port and connector used solely by Apple devices. The Lightning connector is reversible and can be inserted in either direction. Lightning is a proprietary computer bus and power connector created by Apple. The lightning cable is used by every iPhone from the 5 to 13 series. Newer iPads have shifted to the use of USB-C for charging instead of the lightning cable, though. USB-C is the default standard used in USB 3.1 with a 24-pin connector. The connector is reversible and can be inserted in either direction. Micro USB is a miniaturized version of the Universal Serial Bus (USB) interface developed for connecting compact and mobile devices such as smartphones, Mp3 players, GPS devices, photo printers, and digital cameras. Micro USB connectors exist or have existed in three forms: micro A, micro B, and micro USB 3. Mini USB was introduced with USB 2.0 and was used with digital cameras and early tablets. Mini USB is not commonly used in modern devices.Domain1 - Mobile Devices

455
Q

Question 5:
Susan, an executive at Dion Training, will be traveling to Italy for a conference next week. She is worried about remaining connected to the internet while overseas and plans to use the WiFi in her hotel room and the local coffee shop with her laptop. Which of the following should she purchase and configure before leaving for Italy to ensure her communications remain secure regardless of where she is connecting from?
Local mobile hotspot
VPN
International data roaming plan on her cellphone
Local SIM card for her smartphone

A

Local mobile hotspotCorrect answerVPNInternational data roaming plan on her cellphoneLocal SIM card for her smartphoneOverall explanationOBJ-2.6: While WiFi is available almost everywhere these days, it is not safe to use it without first configuring and using a VPN. A Virtual Private Network (VPN) connects the components and resources of two (private) networks over another (public) network. This utilizes an encryption tunnel to protect data being transferred to and from her laptop to the Dion Training servers and other websites. The other options are all focused on connecting her cellphone but would still not be considered safe without a VPN being utilized. A local mobile hotspot should be used to provide internet connectivity to the laptop (if she uses this instead of the hotel and coffee shop WiFi). Still, for best security, it should also use a VPN when using this connection.Domain2 - Networking

456
Q

Question 6:
Which of the following network devices is used to put each connected network host to its own collision domain?
Access point
Repeater
Unmanaged switch
Hub

A

Access pointRepeaterCorrect answerUnmanaged switchHubOverall explanationOBJ-2.2: A switch is a network device that receives incoming data into a buffer, then the destination MAC address is compared with an address table so that data is only sent out to the port with the corresponding MAC address. In a switched network, each port is in a separate collision domain. A managed switch is a switch with advanced networking functions and security settings that can be enabled and configured by an administrator. A hub provides no intelligence in its interconnection functions so that whatever is received on one port is repeated out every other port. This leads to many collisions occurring on the hub and increases the number of rebroadcasts which slows down the entire network. A repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction. Repeaters may be wired or wireless, and they rebroadcast whatever signal is received through their transmitter. A wireless access point (WAP), or access point, connects directly to a wired local area network and the AP then provides wireless connections using Wi-Fi for other devices to use that wired connection. An AP supports the connection of multiple wireless devices through their one wired connection.Domain2 - Networking

457
Q

Question 7:
Linda wants to reduce the number of monitors, keyboards, and mice required to control the multiple servers she manages in the data center. Which of the following devices should she install to allow a single keyboard or mouse to control multiple systems?
USB splitter
KVM
Video mirroring device
PS/2 splitter

A

USB splitterCorrect answerKVMVideo mirroring devicePS/2 splitterOverall explanationOBJ-3.1: A KVM (or Keyboard, Video, and Mouse) is a simple and easy to use hardware switching device that allows for multitasking on a single device. A KVM gives you the ability to connect 2 to 64 physical computers to a single set of hardware devices, such as a keyboard, monitor, and mouse. KVMs can be directly connected to the systems being controlled over USB, known as local remote. Modern KVMs can also operate over the network using KVM over IP, common in large datacenter implementations. A PS/2 connector is an older serial communication connector used for mice and keyboards. A PS/2 splitter allows both a mouse and keyboard to be connected to a single PS/2 port on a single system. A video mirroring device is used to send a duplicate copy of the video display signal to two or more monitors simultaneously. A USB splitter or USB hub is a device that connects to a USB port to allow additional USB devices to be connected to the PC, essentially increasing the number of USB ports available.Domain3 - Hardware

458
Q

Question 8:
Dion Training just installed a new webserver within a screened subnet. You have been asked to open up the port for secure web browsing on the firewall. Which port should you set as open to allow users to access this new server?
443
21
143
80

A

Correct answer4432114380Overall explanationOBJ-2.1: The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443. The hypertext transfer protocol (HTTP) is a protocol used to provide web content to browsers using port 80. The hypertext transfer protocol (HTTP) is a protocol used to provide web content to browsers using port 80. The file transfer protocol (FTP) is the protocol used to transfer files across the internet over ports 20 and 21.Domain2 - Networking

459
Q

Question 9:
A technician receives a report that a VoIP phone is experiencing a “no network connectivity” error. The technician notices the Cat6a patch cable running from the back of the phone is routed behind the user’s rolling chair. The cable appears to have been rolled over numerous times by the user, and it looks flattened from the abuse. Which of the following is the most likely cause of the connectivity issues being experienced on the VoIP phone?
Cross-talk
Excessive collisions
Improperly crimped cable
Transmit and receive reversed

A

Correct answerCross-talkExcessive collisionsImproperly crimped cableTransmit and receive reversedOverall explanationOBJ-5.7: Crosstalk is defined as an effect caused by the unintentional and undesired transmission (leakage) of a signal from one cable to another. Due to the abuse of the cable being run over repeatedly by the user’s chair, the cable’s shielding could have been damaged and the cable may no longer be made up of the same consistency. This can lead to crosstalk amongst the cable pairs, or even opens/shorts of the wires in those cable pairs.Domain5 - Hardware and Network Troubleshooting

460
Q

Question 10:
What type of connector is most commonly used to terminate a copper twisted-pair Ethernet cable?
F type
ST
RJ-45
DB-9

A

F typeSTCorrect answerRJ-45DB-9Overall explanationOBJ-3.1: A copper twisted-pair Ethernet cable is usually terminated with an RJ-45 connector. Coaxial cables are normally terminated using an F type connector. An RS-232 serial cable is normally terminated with a DB-9 connector. A fiber optic cable normally uses an ST, SC, LC, or MTRJ connector.Domain3 - Hardware

461
Q

Question 11:
A network technician needs to connect two switches. The technician needs a link between them that is capable of handling 10 Gbps of throughput. Which of the following media would BEST meet this requirement?
Fiber optic cable
Cat 3 cable
Cat 5e cable
Coax cable

A

Correct answerFiber optic cableCat 3 cableCat 5e cableCoax cableOverall explanationOBJ-3.1: To achieve 10 Gbps, you should use Cat 6a, Cat 7, Cat 8, or a fiber optic cable. Since fiber optic was the only option listed here, it is the best answer. A Cat 5e can only operate up to 100 meters at 1 Gbps. A Cat 3 cable can only operate at 100 meters at 10 Mbps. A traditional ethernet coaxial cable network can only operate at 10 Mbps, but newer MoCA coaxial ethernet connections can reach speeds of up to 2.5 Gbps.Domain3 - Hardware

462
Q

Question 12:
A client has asked you to build a computer to use as part of their home theater (HTPC) system. The HTPC will be used primarily to stream videos in their living room and must have a small form factor to fit into their entertainment center next to their surround sound system. Which of the following motherboards would be the BEST choice for an HTPC system?
Micro-ATX
ITX
ATX
Mini-ITX

A

Micro-ATXITXATXCorrect answerMini-ITXOverall explanationOBJ-3.4: A form factor means the physical dimensions of a system, and the motherboard form factor defines the size of the case you can use. There is no performance difference between different motherboard form factors, except for the size and number of expansion slots. Mini-ITX is the most commonly used form factor with HTPC systems because they require the smallest fans or passive cooling, which minimizes the noise produced by the system. A micro-ATX motherboard produces more heat and is larger than a mini-ITX motherboard. Micro-ATX motherboards also require a larger (and louder) fan to keep the system cooled, so it is a poor choice for an HTPC. An ATX or ITX motherboard is a bad choice since they are larger and would not fit into a traditional HTPC case.Domain3 - Hardware

463
Q

Question 13:
Dion Training has decided to use a PaaS solution to host their training courses. The service charges are based on the number of students enrolled in the courses each month. Which type of cloud computing concept is being demonstrated by this pricing strategy?
Metered service
Synchronization apps
Resource pooling
Rapid elasticity

A

Correct answerMetered serviceSynchronization appsResource poolingRapid elasticityOverall explanationOBJ-4.1: Resources are measured through metering on a per-use basis. The metering measurement is based on the type of resources such as storage, processing, bandwidth, or active users. The metering mechanism should be accessible to the customer via a reporting dashboard, providing complete transparency in usage and billing. Metered services are pre-paid, a-la-carte, pay-per-use, or committed offerings. A metered service like a database may charge its users based on the actual usage of the service resources on an hourly or monthly basis. For example, Dion Training used the AWS Lambda serverless product in some of our automation. This service charges us $0.20 for every 1 million requests processed. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. Rapid elasticity is used to describe scalable provisioning or the capability to provide scalable cloud computing services. Rapid elasticity is very critical to meet the fluctuating demands of cloud users. The downside of rapid elasticity implementations is that they can cause significant loading of the system due to the high resource number of allocation and deallocation requests. Using a synchronization app can allow the files to be stored on both the laptop and the cloud service while maintaining the latest versions in both places. This allows a user to synchronize content between all of their own devices, as well as share the cloud storage content with other users. Multiple users can simultaneously access the content to work collaboratively, or they can access it at different times. Each user’s changes are typically marked with a flag or color highlighting to indicate who made changes to what content.Domain4 - Virtualization and Cloud Computing

464
Q

Question 14:
Dion Training’s file server is using a RAID 5 with four disk drives as its data store. One of the drives in the array has just failed. The RAID 5 is still operating and no data loss has been experienced, but the array is no longer providing any resiliency or redundancy. Which of the following actions should you take to restore this drive to normal operations?
Remove the failed disk and perform a system restore
Remove the failed disk and rebuild the array
Replace the failed disk and perform a system restore
Replace failed disk and rebuild the array

A

Remove the failed disk and perform a system restoreRemove the failed disk and rebuild the arrayReplace the failed disk and perform a system restoreCorrect answerReplace failed disk and rebuild the arrayOverall explanationOBJ-5.3: In a RAID 5 storage array, you should replace the failed disk and then rebuild the array. If you remove the failed drive, the array can continue functioning at sub-optimal performance until a new drive is installed. The options to perform a system restore would result in downtime and possible data loss. Therefore they should not be selected. While you could run a RAID 5 with only 3 drives, this RAID 5 was already using 4 drives, and the loss of one of those drives by rebuilding it as a 3 drive RAID 5 would result in a 33% reduction in the amount of storage space.Domain5 - Hardware and Network Troubleshooting

465
Q

Question 15:
Which of the following technologies could be used in an unlicensed long-range fixed wireless system?
NFC
Microwave
Cellular
Bluetooth

A

NFCCorrect answerMicrowaveCellularBluetoothOverall explanationOBJ-2.3: Long-range fixed wireless can be licensed or unlicensed depending on the frequencies and power levels being utilized. For example, an 802.11 wireless network could be established using a directional antenna to connect two buildings over several miles using unlicensed frequencies and minimal power levels (under 200 mW) which are under the FCC limits. Alternatively, a microwave link can be established in the 4.91 GHz to 5.97 GHz unlicensed frequency range using a point-to-multipoint microwave antenna and transceiver system. Conversely, a user could purchase a licensed cellular fixed wireless system that requires a license from the FCC to operate to ensure they are not interfering with other users and services in the same frequency band.Domain2 - Networking

466
Q

Question 16:
A student wants to use their workstation to run several virtual machines. The workstation currently has an i7 quad-core processor, 4 GB of DDR3 memory, a 512 GB SSD, and a gigabit network interface card. Which of the following components should the student upgrade to support multiple virtual machines running simultaneously on the Windows workstation?
NIC
RAM
SSD
CPU

A

NICCorrect answerRAMSSDCPUOverall explanationOBJ-5.2: This workstation is sufficient to run multiple virtual machines as long as the RAM is upgraded. Windows 10 requires at least 2 GB of memory, so only having 4 GB of memory for the entire system is too little to run multiple VMs. It is recommended to upgrade to at least 16 GB of RAM to allow this workstation to support multiple VMs. A virtualization machine needs a lot of memory, multiple processor cores (this already has 4 cores), adequate storage (512 GB of SSD is adequate), and a high-speed network card (1 Gbps is sufficient).Domain5 - Hardware and Network Troubleshooting

467
Q

Question 17:
Dion Training’s graphic designer is having an issue printing full-page color images using an older color laser printer on the network. The graphic designer can print smaller images such as full-page vector graphic logos, but if they attempt to print a full-page bitmap photo the printer will print only 60% to 70% of the page and then fail. The vector images are less than 100 MB in size, but the larger bitmap photos can be 400 MB to 800 MB in size. Which of the following is the MOST likely reason for the print failure of the photos?
The printer is low on black toner
The graphic designer is not printing using PCL
The connection to the print server is timing out
The printer is running out of memory

A

The printer is low on black tonerThe graphic designer is not printing using PCLThe connection to the print server is timing outCorrect answerThe printer is running out of memoryOverall explanationOBJ-5.6: The most likely reason for this failure is a lack of memory in the printer. A laser printer must load the entire image into memory before it can process it and print the image to the page. If the laser printer runs out of memory, it will print the part of the image it has processed in memory to the page and then fails. For example, if this printer only has 256 MB of RAM, then it will be able to print the vector graphics without any issues and will fail when trying to print full-size high-resolution photos that are 400 MB to 800 MB in size. There is no indication that there is fading in the printed images to indicate the toner is low. Whether using PCL or PostScript, the lack of memory will still cause the print job to fail. The print server is not timing out since the printer can load most of the image to its memory before failing.Domain5 - Hardware and Network Troubleshooting

468
Q

Question 18:
A client’s PC was not able to be powered on. You are troubleshooting the issue by ensuring that the power cable is connected firmly to both the PC and the wall outlet. You took the PC to your workbench to diagnose it. You tried powering on the PC at the workbench, but it did not work. You decided to test the power supply unit and ensure it was selected for 110 volts. You connected it to a power supply tester and verified the power supply is working properly. What is the NEXT step in troubleshooting you should perform?
Pull the CMOS battery out and wait 5 min and try again
Replace the power supply
Replace the memory
Check the power connection to the motherboard

A

Pull the CMOS battery out and wait 5 min and try againReplace the power supplyReplace the memoryCorrect answerCheck the power connection to the motherboardOverall explanationOBJ-5.2: You should verify the power connections are securely connected to the motherboard. Always check the motherboard’s 24-pin ATX connection and other connectors for the processor and disk drives to ensure they are seated securely. Since the power supply has been verified as working properly, it does not need to be replaced. There is no indication in this scenario that the memory is faulty and needs to be replaced. Removing the CMOS battery would reset the BIOS/UEFI, but that would not solve an issue with the motherboard not receiving the power it requires.Domain5 - Hardware and Network Troubleshooting

469
Q

Question 19:
Which of the following types of display connectors uses a thunderbolt cable and was designed as a competitor to HDMI?
DVI
DisplayPort
VGA
eSATA

A

DVICorrect answerDisplayPortVGAeSATAOverall explanationOBJ-3.1: DisplayPort uses a thunderbolt cable to connect a monitor to the computer. DisplayPort supports both copper and fiber-optic cabling. DisplayPort was created as a royalty-free standard to compete with HDMI. The digital video interface (DVI) was designed to replace the VGA port used by CRT monitors. The DVI interface supports digital-only or digital and analog signaling. The video graphics array (VGA) was developed as a 15-pin connector to provide analog video signaling to an external display. External SATA (eSATA) is a widely used interface for hard disks on modern desktop and laptop computers. eSATA uses a 7-pin L-shaped data connector with one device per port. eSATA operates at bandwidths of 1.5 Gbps, 3 Gbps, or 6 Gbps.Domain3 - Hardware

470
Q

Question 20:
Which motherboard form factor measures 6.7” x 6.7” (17 cm x 17cm) in size?
mITX
ATX
ITX
mATX

A

Correct answermITXATXITXmATXOverall explanationOBJ-3.4: The mITX (Mini-ITX) form factor is 6.7” x 6.7” in size (17 cm x 17cm). The mITX is commonly used in smaller computer systems with a small form factor (SFF) case. These motherboards are usually used in computers designed for passive cooling and a low power consumption architecture, such as a home theater PC system. The mATX (microATX) motherboard’s form factor is 9.6” x 9.6” in size (24 cm x 24 cm). The mATX form factor is commonly used in smaller computer systems with a small form factor (SFF) case. An mATX motherboard is backward-compatible with the larger ATX motherboard since it contains the same mounting point locations as the full-size board. An ATX motherboard’s form factor is 12” x 9.6” in size (305mm x 244mm). ITX is a series of form factors that began with the mini-ITX, but there is no specific size called ITX.Domain3 - Hardware

471
Q

Question 21:
You want to buy a new computer that will allow you to run at least 3 virtual machines (VMs) at the same time to practice for your CompTIA exams. You also know in the future that you would like to set up a virtual ethical hacking lab with numerous VMs to study for the CompTIA PenTest+ exam. Which TWO of the following components is the MOST important to upgrade if you want to simultaneously run numerous VMs?
SDD
RAM
GPU
CPU
NIC
HDD

A

SDDCorrect selectionRAMGPUCorrect selectionCPUNICHDDOverall explanationOBJ-4.2: If you want good performance for a computer used for extensive virtualization (such as multiple virtual machines running at once), you should maximize the CPU and the RAM. The CPU should support virtualization and be a multicore processor. The memory should be fast and contain at least 16 GB of RAM to host numerous VMs effectively. These are the most important components when building a virtualization machine to support numerous VMs.Domain4 - Virtualization and Cloud Computing

472
Q

Question 22:
Which of the following is used to connect Cat 5e or above networks in an MDF or IDF?
F type
66 punchdown block
110 punchdown block
RJ-11

A

F type66 punchdown blockCorrect answer110 punchdown blockRJ-11Overall explanationOBJ-3.1: A 110 punchdown block is a type of punch block used to terminate runs of on-premises wiring in a structured cabling system. The designation 110 is also used to describe a type of insulation displacement contact (IDC) connector used to terminate twisted pair cables when using a punch-down tool similar to the older 66 punchdown block. A 110 punchdown block provides more spacing between the terminals and is designed for Cat 5 networks to eliminate crosstalk between the cables. F type connectors are used for coaxial cables, not Cat 5e network cables. RJ-11 is used to terminate telephone lines, not Cat 5e network cables.Domain3 - Hardware

473
Q

Question 23:
You just printed a new sign for your office using thick cardstock paper with your network printer. Unfortunately, when you pick up the cardstock from the laser printer’s output tray, the printed image smears across the paper. Attempting to troubleshoot this problem, you decide to print another sign using regular printer paper and determine that the image does not smear when touched on the regular printer paper. Which of the following would be the NEXT step to perform in your troubleshooting efforts?
Replace the toner cartridge in the printer
Change the feed rate of the paper
Increase the temperature of the fuser element
Clean the printer’s transfer roller

A

Replace the toner cartridge in the printerChange the feed rate of the paperCorrect answerIncrease the temperature of the fuser elementClean the printer’s transfer rollerOverall explanationOBJ-5.6: When printing with a laser printer, the paper passes through rollers in the fuser assembly, where temperatures up to 801 F (427 C) and pressure are used to bond the toner to the paper permanently. If you often print with specialty paper (i.e., envelopes, cardstock, & labels), you may want to turn up the fuser temperature on your printer. With thicker paper types, heat does not transfer as easily as it does with standard paper so the toner may not bond as well and the image could smear when it is touched.Domain5 - Hardware and Network Troubleshooting

474
Q

Question 24:
Which of the following services does Apple use for syncing their data across multiple macOS and iOS devices?
DropBox
Google Drive
iCloud
OneDrive

A

DropBoxGoogle DriveCorrect answeriCloudOneDriveOverall explanationOBJ-4.1: iCloud is an Apple proprietary application that works across multiple devices running macOS and iOS. Apple has since released iCloud synchronization tools for Windows. Unfortunately, they have not released an Android version, so Android users must use the web-based version instead of a dedicated synchronization app.Domain4 - Virtualization and Cloud Computing

475
Q

Question 25:
You are troubleshooting an issue with an impact printer in an automotive service department. The printer has begun to print unevenly. As the print head goes from left to right across the page, the printout goes from darker to lighter. What is the MOST likely cause of this issue?
Defective ribbon advance mechanism
Worn out printer ribbon
Broken feed assembly
Clogged print head

A

Correct answerDefective ribbon advance mechanismWorn out printer ribbonBroken feed assemblyClogged print headOverall explanationOBJ-5.6: An impact printer has teeth along the paper’s edges that pull the paper along a tractor as it prints. This moves the paper up one line at a time. The print head moves from left to right across the page, impacting the print head through the ribbon to mark the paper. If the ribbon advance mechanism is defective, the ribbon will not advance as the print head goes across the page, leading to a lightening of the ink being marked on the paper. If the printer ribbon itself were worn out, it would be lighter in color as you went down the page (not from left to right).Domain5 - Hardware and Network Troubleshooting

476
Q

Question 26:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard above, which of the following correctly indicates the circled area?
CPU power
NVMe connector
Mainboard power
Fan power

A

Correct answerCPU powerNVMe connectorMainboard powerFan powerOverall explanationOBJ-3.4: The area circled indicates the CPU power connector. This is an 8-pin power connector that connects the power supply to the CPU slot. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

477
Q

Question 27:
A customer tried to install a PCIe x8 expansion card into a PCIe x16 slot on the motherboard. While the expansion card fits into the slot without any issues, it does not perform as the customer expected. How fast will a PCIe x8 expansion card run if installed in a PCIe x16 slot?
The card will run at x4 speed
The card will run at x8 speed
The card will run at x16 speed
The card will run at x1 speed

A

The card will run at x4 speedCorrect answerThe card will run at x8 speedThe card will run at x16 speedThe card will run at x1 speedOverall explanationOBJ-3.4: A PCIe x8 expansion card will run at its maximum speed when installed in a PCIe x16 slot. This is because PCIe slots are backward compatible and can adjust to the lower bandwidth of the x8 card. However, the card will only utilize 8 lanes of the available 16 lanes in the x16 slot, effectively running at its x8 speed.Domain3 - Hardware

478
Q

Question 28:
A technician at Dion Training is troubleshooting an issue with a workstation. The technician believes that the CMOS battery needs to be replaced based on the symptoms they observed. Which of the following symptoms did the technician likely observe to lead them to this conclusion?
Incorrect date/time on the workstation
Burning smell
Distended capacitors
Continuous reboot

A

Correct answerIncorrect date/time on the workstationBurning smellDistended capacitorsContinuous rebootOverall explanationOBJ-5.2: The incorrect date/time on the workstation is indicative of a dead CMOS battery. A foul odor is indicative of a distended capacitor. A burning smell is indicative of a bad power supply. Hardware failure or system instability can cause the computer to reboot continuously. The problem could be the RAM, hard drive, power supply, graphics card, or external devices. Based on the symptoms of a continuous reboot, the supervisor likely suspected the RAM as the cause of the issue.Domain5 - Hardware and Network Troubleshooting

479
Q

Question 29:
Dion Training wants to install a new accounting system and is considering moving to a cloud-based solution to reduce cost, reduce the information technology overhead costs, improve reliability, and improve availability. Your Chief Information Officer is supportive of this move since it will be more fiscally responsible. Still, the Chief Risk Officer is concerned with housing all of the company’s confidential financial data in a cloud provider’s network that might be shared with other companies. Since the Chief Information Officer is determined to move to the cloud, what type of cloud-based solution would you recommend to account for the Chief Risk Officer’s concerns?
SaaS in a private cloud
SaaS in a public cloud
PaaS in a hybrid cloud
PaaS in a community cloud

A

Correct answerSaaS in a private cloudSaaS in a public cloudPaaS in a hybrid cloudPaaS in a community cloudOverall explanationOBJ-4.1: A SaaS (Software as a Service) solution best describes an accounting system or software used as part of a cloud service. This meets the CIO’s requirements. To mitigate the concerns of the Chief Risk Officer, you should use a private cloud solution. This type of solution ensures that the cloud provider does not comingle your data with other customers’ data and providers dedicated servers and resources for your company’s use only.Domain4 - Virtualization and Cloud Computing

480
Q

Question 30:
Which of the following requires the use of a physical printer to print a document?
Print to PDF
Print to Network
Print to Image
Print to XPS

A

Print to PDFCorrect answerPrint to NetworkPrint to ImagePrint to XPSOverall explanationOBJ-3.6: Printing to a network printer still requires access to a physical device connected to the network. The other options (Print to Image, Print to PDF, Print to XPS, and similarly Print to File) are all virtual printing methods. These methods will create a file of a specific type with the contents of the printed information. These methods allow a user the ability to print to a file, a PDF (Portable Document Format), XPS (XML Paper Specification - a Microsoft alternative to PDF), or an image (photo).Domain3 - Hardware

481
Q

Question 31:
You are troubleshooting an older wireless network that is running Wireless G (802.11g). This network appears to have a lot of collisions and interference. You look up the configuration on two of the three access points in the areas and see they are using Channel 1 and Channel 11. To prevent interference and ensure non-overlapping of the channels, what channel should the third access point utilize?
Channel 6
Channel 5
Channel 7
Channel 8

A

Correct answerChannel 6Channel 5Channel 7Channel 8Overall explanationOBJ-2.3: With wireless access points that run 2.4 GHz frequencies, you can only select channels between 1 and 11 in the United States. This includes 802.11b, 802.11g, 802.11n, and 802.11ax networks. To prevent overlapping of the channels, you should select channels 1, 6, and 11. By doing so, you can increase the reliability and throughput of your wireless network.Domain2 - Networking

482
Q

Question 32:
Which of the following settings must be enabled on a mobile device to embed the GPS position into a photograph when using your device’s camera?
Location services
MDM
FDE
Security profile

A

Correct answerLocation servicesMDMFDESecurity profileOverall explanationOBJ-1.4: Location services enable the device to know its position using its internal GPS receiver or its approximate location using its cellular radio. To embed the GPS position into a photograph, location services must be enabled. Mobile device management (MDM) software suites are designed to manage the use of smartphones and tablets within an enterprise. Full device encryption (FDE) is used to encrypt the user and system data stored in the device’s internal storage. The encryption key is stored in a protected portion of the device and can be used to remotely wipe the device if it is lost or stolen. A security profile is used to apply different permissions and functionality to an employee’s mobile device and is usually configured by an MDM.Domain1 - Mobile Devices

483
Q

Question 33:
A cybersecurity analyst wants to install a network appliance to conduct packet capturing of the network traffic between the router and the firewall on the network. The device should not be installed in line with the network, so it must receive a copy of all traffic flowing to or from the firewall. Which of the following tools is required to meet these requirements?
WiFi analyzer
Toner probe
Network tap
Loopback plug

A

WiFi analyzerToner probeCorrect answerNetwork tapLoopback plugOverall explanationOBJ-2.8: A network tap is used to create a physical connection to the network that sends a copy of every packet received to a monitoring device for capture and analysis. A WiFi analyzer can determine the wireless network’s signal strength, the frequencies in use, and any possible radio frequency interference. A tone generator is connected to a wall jack and sends a repeating signal over the cable. The probe can then be used to detect which cable is attached to the wall jack by detecting the signal being sent by the tone generator. The probe needs to be near or touch the cable with the tone generator attached to identify it positively. A cable tester is used to ensure a cable is properly created as a patch cable (straight through) or a crossover cable. Cable testers provide detailed information on the physical and electrical properties of the cable. For example, they test and report cable conditions, crosstalk, attenuation, noise, resistance, and other cable run characteristics.Domain2 - Networking

484
Q

Question 34:
Which of the following ports should you unblock at the firewall if your workstation cannot access diontraining.com but can access the website by its IP address?
443
80
67
53

A

4438067Correct answer53Overall explanationOBJ-2.1: The Domain Name System (DNS) servers provide resolution of host and domain names to their IP addresses and are essential for locating resources on the Internet. Most local networks also use DNS for name resolution. Typically, the DNS server would be the gateway address, though this may not be the case on all networks. Often two DNS server addresses (preferred and alternate) are specified for redundancy. DNS operates over TCP/UDP port 53, and if that is blocked, the client will be unable to convert the domain name (diontraining.com) to its IP address. The hypertext transfer protocol (HTTP) is a protocol used to provide web content to browsers using port 80. The hypertext transfer protocol secure (HTTPS) is a secure protocol used to provide web content to browsers using SSL/TLS encryption over port 443. The dynamic host control protocol (DHCP) is a protocol used to allocate IP addresses to a host when it joins a network. DHCP utilizes UDP ports 67 and 68.Domain2 - Networking

485
Q

Question 35:
You are working as a customer service technician at a smartphone repair center. A customer calls your help desk and states that the device feels warm to the touch even when not used. You ask them to conduct a visual inspection of the smartphone and describe what they are seeing. The customer says, “The battery appears to be swollen’ and bulging outward beyond its normally rectangular shape.” Which of the following is the BEST statement for you to provide to the customer?
“Please do not use the smartphone and bring it to our service center immediately so that we can replace the battery for you.”
“Since the device is still working, you can continue to use your phone until the new model is released in 2 months.”
“Please place 5 heavy books on top of your smartphone since the weight will help reform the battery into its proper and normal rectangular shape.”
“Please conduct a factory reset of your phone since this will eliminate the overheating issue.”

A

Correct answer”Please do not use the smartphone and bring it to our service center immediately so that we can replace the battery for you.”“Since the device is still working, you can continue to use your phone until the new model is released in 2 months.”“Please place 5 heavy books on top of your smartphone since the weight will help reform the battery into its proper and normal rectangular shape.”“Please conduct a factory reset of your phone since this will eliminate the overheating issue.”Overall explanationOBJ-5.5: A mobile device battery (such as a smartphone or tablet) will become swollen or distended as it begins to fail. If this occurs and the battery or device appears to be physically abnormal, the customer should NOT use the smartphone. The device should be serviced immediately, the battery should be replaced, and the phone inspected to ensure the defective battery has not damaged it.Domain5 - Hardware and Network Troubleshooting

486
Q

Question 36:
Rick, a computer technician, was contacted by a customer who wants to reduce his office computer’s footprint to save space. Which of the following cases is the smallest form factor?
mATX
ATX
mITX
ITX

A

mATXATXCorrect answermITXITXOverall explanationOBJ-3.4: Since the customer wants to save space and reduce the computer’s overall size, Rick should use an mITX (Mini-ITX). The mITX contains a smaller footprint than the other options presented and measures only 6.7” x 6.7” in size. The mATX (microATX) motherboard’s form factor is 9.6” x 9.6” in size (24 cm x 24 cm). The mATX form factor is commonly used in smaller computer systems with a small form factor (SFF) case. An mATX motherboard is backward-compatible with the larger ATX motherboard since it contains the same mounting point locations as the full-size board. An ATX motherboard’s form factor is 12” x 9.6” in size (305mm x 244mm). ITX is a series of form factors which began with the mini-ITX, but there is no specific size called ITX.Domain3 - Hardware

487
Q

Question 37:
The video editor at Dion Training has submitted a trouble ticket stating her editing workstation makes a loud clicking noise whenever she is editing videos for an upcoming course. You initially thought the system fans were causing the noise. You have replaced the fans, but the noise continues to be heard when applications are loaded or the videos are being edited. Which of the following actions should you perform NEXT?
Replace the hard disk
Perform a full backup of the hard disk
Perform a System Restore
Scan the system for viruses

A

Replace the hard diskCorrect answerPerform a full backup of the hard diskPerform a System RestoreScan the system for virusesOverall explanationOBJ-5.3: The next thing you should do is to perform a full backup of the hard drive. A clicking noise is commonly associated with a hard drive that is about to fail. Therefore, you should first conduct a full backup of the hard drive and then replace the faulty drive with a new hard drive to prevent any data loss from occurring.Domain5 - Hardware and Network Troubleshooting

488
Q

Question 38:
What type of wiring standard is used with POTS?
RJ-45
RJ-11
ST
F type

A

RJ-45Correct answerRJ-11STF typeOverall explanationOBJ-3.1: POTS (Plain Old Telephone System) is an older standard used for telephone systems. An RJ-11 wiring standard is used to terminate both ends of a standard phone line. This is also used for DSL lines and VoIP ATA (Analog Telephony Adapter) devices. An RJ-45 connector is used to terminate a copper twisted-pair Ethernet cable. The F-type connector is used with coaxial cables. A ST, SC, LC, or MTRJ connector is used to terminate a fiber optic cable.Domain3 - Hardware

489
Q

Question 39:
Which of the following types of network switches allows an administrator to configure advanced networking and security features?
Unmanaged switch
Hub
PoE switch
Managed switch

A

Unmanaged switchHubPoE switchCorrect answerManaged switchOverall explanationOBJ-2.2: A switch is a network device that receives incoming data into a buffer, then the destination MAC address is compared with an address table so that data is only sent out to the port with the corresponding MAC address. In a switched network, each port is in a separate collision domain. A managed switch is a switch with advanced networking functions and security settings that can be enabled and configured by an administrator. An unmanaged switch operates out-of-the-box without any setup or configuration by switching network traffic based on MAC addresses and putting each switch port into its own collision domain. Power over Ethernet (POE) switches provide power over ordinary data cabling to devices such as VoIP handsets and wireless access points. PoE can support up to 15.4W and PoE+ can support up to 25W. A hub provides no intelligence in its interconnection functions so that whatever is received on one port is repeated out every other port. This leads to many collisions occurring on the hub and increases the number of rebroadcasts which slows down the entire network.Domain2 - Networking

490
Q

Question 40:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the motherboard.)
Using the image of the motherboard above, which of the following correctly indicates the circled area?
PCIe x16
PCIe x1
PCIe x4
PCIe x8

A

PCIe x16PCIe x1PCIe x4Correct answerPCIe x8Overall explanationOBJ-3.4: The area circled indicates the PCIe x8 slot on this motherboard.PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Every desktop PC motherboard has some PCIe slots you can use to add GPUs (video cards or graphics cards), RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards. The types of PCIe slots available in your PC will depend on your motherboard and are designated as PCIe x1, x4, x8, and x16. For the exam, it is important that you can identify the different parts of the motherboard by sight.Domain3 - Hardware

491
Q

Question 41:
Jay is complaining that the speed at which the cursor moves across his laptop’s screen when using his trackpad makes it difficult to properly control. Which setting could he use to slow down the cursor in Windows 10?
Settings > Devices > Touchpad > Speed
Settings > Devices > Touchpad > Touchpad sensitivity
Settings > Devices > Mouse > Speed
Settings > Devices > Mouse > Touchpad sensitivity

A

Correct answerSettings > Devices > Touchpad > SpeedSettings > Devices > Touchpad > Touchpad sensitivitySettings > Devices > Mouse > SpeedSettings > Devices > Mouse > Touchpad sensitivityOverall explanationOBJ-5.5: If the speed of the pointer or cursor moving across the screen is difficult to control, a technician can reduce the touchpad’s speed in Windows 10 under Settings. To open settings, press the Windows key and the “i” key. Next, open Settings and click/tap on the Devices icon. Then, click/tap on Touchpad in the left-hand column. On the right-hand of the screen, adjust the slider labeled “Change the cursor speed” to a speed that is more comfortable to use. The touchpad sensitivity setting is used to control the amount of pressure needed before the touchpad registers a click as input from the user.Domain5 - Hardware and Network Troubleshooting

492
Q

Question 42:
A client is attempting to power on their computer, but it keeps booting to the incorrect hard drive. Which of the following actions should you perform to attempt to fix this problem?
Unplug any external hard disks
Reconfigure the boot order within Windows
Reconfigure the boot order within the BIOS/UEFI
Press F8 repeatedly during the boot process to enter the boot menu

A

Unplug any external hard disksReconfigure the boot order within WindowsCorrect answerReconfigure the boot order within the BIOS/UEFIPress F8 repeatedly during the boot process to enter the boot menuOverall explanationOBJ-5.3: If the system still fails to boot up from the correct drive, then go into the BIOS/UEFI setup program and check the existing boot order settings. If they are in the wrong order, reconfigure them to ensure the usual boot device is listed first in the list and then restart the computer. There is no need to unplug the exteranl hard disks since you can simply change the boot order in the BIOS. The F8 key will allow the user to choose to boot into Windows in regular or safe mode. This worked by default in Windows 7, 8, and 8.1, but need to be enabled before it will work in Windows 10. The technician cannot configure the boot order in Windows without first booting into Windows from the hard drive, so the technician would still need to reconfigure the boot order in the BIOS/UEFI first.Domain5 - Hardware and Network Troubleshooting

493
Q

Question 43:
Which of the following cloud services should an organization choose to develop a new iPhone app without having to configure and set up its own development environment?
DaaS
SaaS
PaaS
IaaS

A

DaaSSaaSCorrect answerPaaSIaaSOverall explanationOBJ-4.1: Platform as a Service (PaaS) is a complete development and deployment environment in the cloud, with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications. Infrastructure as a Service (IaaS) is a type of cloud computing service that offers essential compute, storage, and networking resources on-demand, on a pay-as-you-go basis. Software as a Service (SaaS) allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools (such as Microsoft Office 365). SaaS provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider. Desktop as a Service (DaaS) is a cloud computing offering where a service provider delivers virtual desktops to end-users over the Internet, licensed with a per-user subscription. DaaS is often called Virtual Desktop Infrastructure (VDI).Domain4 - Virtualization and Cloud Computing

494
Q

Question 44:
Your company has two office buildings which are connected via a copper network cable that is buried underground. There is some construction being performed near the buildings. Now, the second building discovers they have suffered a network outage that doesn’t appear to be temporary. What is the MOST likely cause of the outage?
Electromagnetic interference on the cable
An open circuit has been created
Signal attenuation on the cable
Cross-talk on the cable

A

Electromagnetic interference on the cableCorrect answerAn open circuit has been createdSignal attenuation on the cableCross-talk on the cableOverall explanationOBJ-5.7: Since the issue started after construction began, it is most likely that the construction crew broke the cable during digging operations. This can cause an open circuit or short circuit, depending on how the cable was cut or broken by the construction workers. This can be verified using a Time-Domain Reflectometer to determine exactly where in the cable the break has occurred. Once the location is identified, the cable can be repaired or spliced to return it to normal operations.Domain5 - Hardware and Network Troubleshooting

495
Q

Question 45:
What type of cable should be used to connect a laptop directly to another laptop to form an Ethernet network?
Serial cable
Patch cable
Straight-through cable
Crossover cable

A

Serial cablePatch cableStraight-through cableCorrect answerCrossover cableOverall explanationOBJ-3.1: A crossover cable should be used to connect two similar devices (PC to PC, Router to Router, Switch to Switch, etc.) to create a network. For an ethernet cable, this should be a network cable with a T568A wiring standard on one end and a T568B wiring standard on the other end of the cable to create a crossover cable. A straight-through or patch cable is a network cable that uses the same wiring standard on both ends such as T568A to 5T568A or T568B to T568B. A serial cable is a data cable that transmits data a single bit at a time. A DB-9 connector is used to terminate an RS-232 serial cable.Domain3 - Hardware

496
Q

Question 46:
Which of the following network performance metrics is used to represent the round-trip time it takes for a packet to be sent by a device to a server and then a response received from that destination server?
Jitter
Bandwidth
Latency
Throughput

A

JitterBandwidthCorrect answerLatencyThroughputOverall explanationOBJ-5.7: Latency is the measure of time that it takes for data to reach its destination across a network. Usually, we measure network latency as the round-trip time from a workstation to the distant end and back. Bandwidth is the maximum rate of data transfer across a given network. Now, bandwidth is more of a theoretical concept that measures how much data could be transferred from a source to a destination under ideal conditions. Throughput is an actual measure of how much data is successfully transferred from the source to a destination. Therefore, we often measure throughput, instead of bandwidth, to monitor our network performance. Jitter is a network condition that occurs when a time delay in the sending of data packets over a network connection occurs. Jitter is a big problem for any real-time applications you may be supporting on your networks, like video conferences, voice-over IP, and virtual desktop infrastructure clients.Domain5 - Hardware and Network Troubleshooting

497
Q

Question 47:
What type of cable is most commonly used to terminate a serial connection to a modem?
RJ-45
RJ-11
LC
DB-9

A

RJ-45RJ-11LCCorrect answerDB-9Overall explanationOBJ-3.1: A DB-9 connector is used to terminate an RS-232 serial cable. A ST, SC, LC, or MTRJ connector is used to terminate a fiber optic cable. An RJ-11 connector is used to terminate cables used for phone lines. An RJ-45 connector is used to terminate a copper twisted-pair Ethernet cable.Domain3 - Hardware

498
Q

Question 48:
A computer technician is trying to set up a shared printer on the corporate network. The users must send print jobs directly to the printer, and the printer will be used by multiple operating systems, including Windows, macOS, and Linux. Which of the following should the technician configure to meet these requirements best?
TCP/IP print server
Virtual printer
Bonjour
AirPrint

A

Correct answerTCP/IP print serverVirtual printerBonjourAirPrintOverall explanationOBJ-3.6: The technician should set up a TCP/IP print server since it will eliminate any compatibility issues associated with using different operating systems and allow the users to send jobs directly to the printer. TCP/IP printing is considered a high-speed and reliable method for sending a print job directly to a printer. AirPrint is a feature in the macOS and iOS operating systems, it does not support Windows or Linux. Bonjour is Apple’s implementation of zero-configuration networking and does not support Windows or Linux systems. Virtual printers can print a document to a PDF or XPS file, therefore this will not let user’s send documents to the printer for physical printing.Domain3 - Hardware

499
Q

Question 49:
(This is a simulated PBQ. If you had this question on the real exam, you would be asked to drag-and-drop a label with the component’s name onto the proper location on the port cluster.)
Using the image above, which of the following correctly indicates the port labeled as A?
SPDIF
USB
PS/2
FireWire

A

SPDIFUSBCorrect answerPS/2FireWireOverall explanationOBJ-3.1: This port is the PS/2 connection. It is used for legacy keyboards and mice before the widespread use of USB ports. For the exam, it is important that you can identify the different parts of a motherboard’s rear port cluster by sight.Domain3 - Hardware

500
Q

Question 50:
You have just finished installing a virtual machine on a workstation. Your boss asks you to install a second virtual machine with the same settings. To save time, which of the following functions should you use?
Shadow Copy
Secure Copy
Cloning
Migration

A

Shadow CopySecure CopyCorrect answerCloningMigrationOverall explanationOBJ-4.2: Cloning is a function that allows you to fully copy an existing virtual machine and its current configuration. This allows you to quickly deploy an exact copy without having to reconfigure everything again manually. Virtual machine migration is the task of moving a virtual machine from one physical hardware environment to another. Secure copy protocol is a means of securely transferring computer files between a local host and a remote host or between two remote hosts over port 22. Shadow Copy is a technology included in Microsoft Windows that can create backup copies or snapshots of computer files or volumes, even when they are in use.Domain4 - Virtualization and Cloud Computing