B.4_CompTIA_A__Core_1__220_1101__.pdf.pdf

Full Transcript

B.4 CompTIA A+ Core 1 (220-1101) Certification Practice Exam Candidate: Micah Galvan (WashingtonRams) Date: 4/20/2023 6:57:36 pm Time Spent: 01:07:14 Score: 98% Passing S...

B.4 CompTIA A+ Core 1 (220-1101) Certification Practice Exam Candidate: Micah Galvan (WashingtonRams) Date: 4/20/2023 6:57:36 pm Time Spent: 01:07:14 Score: 98% Passing Score: 95%  Question 1:  Correct Vera has brought her laptop computer to you for repair. After listening to her describe its symptoms, you decide that the laptop may have a malfunctioning keyboard. Which of the following steps can you take to BEST determine whether the keyboard needs to be replaced? (Select two.) Check for cracks in the power bundles that go from the keyboard to the motherboard. Check for special keyboard features that could be enabled that may cause some keys to perform alternate tasks. Use Device Manager to make sure that the correct keyboard driver is installed and up to date. Recalibrate the keyboard's pressure sensors. Connect an external keyboard. Explanation Check to see if the user has inadvertently set a special notebook keyboard feature that alters the way certain keys work. For example, setting the NumLock feature may cause part of the keyboard to emulate 10-key functionality. If no special features have been set, you can connect an external keyboard to see if the malfunctioning keyboard symptoms go away. If they do, the laptop keyboard needs to be replaced. None of the other troubleshooting options could be used to determine what is wrong with a laptop keyboard. References  12.7.4 Laptop Troubleshooting Facts q_p_trb_keyboard_replace_test_steps_pp7.question.fex  Question 2:  Correct You've just purchased an Ethernet adapter for your Android tablet. Which of the following USB connector types would you MOST likely use to plug in to the adapter? USB-C connector Serial connector USB-A connector USB-B connector Explanation A USB-C connector is normally used for connecting external devices, including displays and Ethernet adapters. A USB-A connector is generally used to plug in to the mobile device itself (such as the Android tablet). A USB-B connector is used to plug in to external devices, such as hard drives and printers. A serial connector is an older type of connection often used for computers, routers, and switches. It is not a USB connector type. References  12.1.2 External Laptop Ports and Functions  12.4.3 Mobile Device Connection Methods  12.4.4 Mobile Connection Facts  12.5.2 Wireless and Cellular Data Connections Facts q_mob_com_c_connector_ethernet_pp7.question.fex  Question 3:  Correct An administrator configures a server to run the TCP/IP suite protocol that allows users to download files contained in specific directories on the server and also protects access to those files by requiring user authentication. Which of the following TCP/IP port numbers allow this protocol to work properly? (Select two.) 20 21 53 80 110 Explanation The TCP/IP suite protocol that allows users to download files from a server and protects access to the files by requiring user authentication to access specific directories on the server is FTP. FTP uses ports 20 and 21. DNS uses port 53. HTTP uses port 80. POP3 email clients use port 110. References  11.2.3 Ports and Protocols  11.2.4 Ports and Protocols Facts q_ports_protocols_tcp_ip_port_20_sol_pp7.question.fex  Question 4:  Correct Which of the following accurately describe a Type 2 hypervisor? (Select two.) Can run on any OS. Dramatically improves performance of a Windows virtual machine. Manages access to software programs on the host. Acts as a software application. Acts as an OS on a physical host machine. Explanation A Type 2 hypervisor acts as a software application. It is run on any OS and can run several operating systems on virtual machines. A Type 1 hypervisor acts as an OS on a physical host machine. A Type 2 hypervisor does not manage access to software programs on the host. Integration services (IS) dramatically improves the performance of a Windows virtual machine. References  6.4.5 Hyper-V Facts q_win_virt_type2_hyper_def_pp7.question.fex  Question 5:  Incorrect Match each type of mobile device on the left with the description on the right. (You can use a mobile device type more than once.) This type of mobile device provides a high-contrast display, making it ideal for reading electronic newspapers in direct sunlight. E-reader This type of mobile device includes virtual reality headsets. Wearable device This type of mobile device often includes a stylus for precise drawing and control. Tablet This type of mobile device most likely uses a 4G, 5G, or LTE connection. Smartphone This type of mobile devices uses E Ink technology. Tablet E-reader Explanation Below are the mobile device types with their correct associated descriptions. Tablet - This type of mobile device often includes a stylus for precise drawing and control. Smartphone - This type of mobile device most likely uses a 4G, 5G, or LTE connection. Wearable device - This type of mobile device includes virtual reality headsets. E-Reader - This type of mobile device provides a high-contrast display using E Ink technology. References  12.4.2 Mobile Device Facts q_mob_dev_mobile_device_match_pp7.question.fex  Question 6:  Correct Which key advantages do containers have over virtual machines? (Select two.) Hardware optimization Faster start times for containerized applications Smaller size and may only require a few megabytes Portability between hypervisor environments The ability to run legacy software on an updated operating system Explanation The key advantages of virtualized containers include: A container might only occupy a few megabytes, while a virtual machine might take up several gigabytes. A virtual machine may take several minutes to boot, while a containerized application only takes a few seconds to initialize. Virtual machines are portable between different hypervisors, while containers are only portable between different families of operating systems. Containerized applications depend on the operating system running on the host machine. They do not include their own operating system. This means that updating the operating system on the host machine could prevent a containerized legacy application from running properly. Virtualization is a great way to use your physical hardware efficiently. Instead of sitting idly by, waiting for something to do, your processor can perform several tasks at a time. However, this applies to both containerized applications and virtual machines and is not an advantage of one over the other. References  6.4.2 Virtualization Facts q_virt_container_advantages_pp7.question.fex  Question 7:  Correct You have just installed a wireless network, but the network is experiencing slow speeds, especially when accessing the internet from your workstation. Which action should you try FIRST to resolve the issue? Add a network extender. Reset your wireless router to the factory defaults. Move the wireless access point. Move your workstation closer to the wireless access point. Explanation Slow wireless speeds can be caused by weak signal strength. If weak spots are found, the easiest and least expensive first step would be to move the wireless access point. You could also try adding a network extender, but this solution would mean an additional cost. Moving your workstation closer to the wireless access point could involve a lot of work (if it is even an option). Resetting your wireless router to the factory defaults could cause other issues and probably won't resolve the issue with slow speeds. References  11.9.1 Network Troubleshooting  11.9.3 Network Troubleshooting Facts q_trb_net_move_wifi_access_point_pp7.question.fex  Question 8:  Correct Which of the following terms describes a PC card that you can insert and remove without rebooting the computer? Plug-and-play AT attachment Hot swappable Hot play Explanation Inserting and removing PC cards without rebooting the computer is called hot swapping. This feature is also called dynamic reconfiguration. Plug-and-play devices are automatically detected by the system, and the driver is automatically loaded. Unless the bus and device is hot swappable, plug-and-play devices should be added or removed with the system shut down. AT attachment (ATA) is the standard interface for transferring data from storage devices such as hard disk drives and optical drives. Hot play is an in-game advertising platform. References  10.4.5 Hardware Device Facts q_dev_inst_hot_swappable_card_pp7.question.fex  Question 9:  Correct Which of the following are technologies that Bluetooth utilizes? (Select two.) 5.75 GHz radio wireless Red spectrum light waves Line-of-sight transmission 2.4 GHz radio wireless Personal area network (PAN) Explanation Bluetooth is a wireless networking standard that uses 2.4 GHz radio waves. These are the same type of radio waves used with 802.11 wireless networking, so the radio transmission can go through walls (it is not limited to line-of-sight connections). Bluetooth devices communicate using what is called a personal area network (PAN), which is similar to an ad hoc wireless network. Infrared uses red spectrum light waves and is limited to line-of-sight transmissions. References  11.5.13 Infrared, Bluetooth, and NFC  11.5.14 Configure Bluetooth Connections  11.5.15 Infrared, Bluetooth, and NFC Facts q_irbtnfc_bluetooth_technologies_pp7.question.fex  Question 10:  Correct Which component in a laser printer charges the paper to attract toner? Drum Fuser Transfer roller Primary corona Explanation The transfer roller charges the paper to attract the toner. The primary corona prepares the photosensitive drum for writing by causing the drum to receive a negative electrostatic charge. Depending on the printer, the primary corona is either wires or rollers. A laser beam changes the charge on the surface of the drum in a pattern of the page's image. The toner sticks to the charged areas on the drum. Fusing rollers attach the toner to the paper by pressing and melting the paper. References  13.3.1 Laser Printers  13.3.2 Laser Printing Facts q_printer_laser_comp_charge_paper_pp7.question.fex  Question 11:  Correct You have a notebook computer with a built-in wireless network card. One day, the network card stops working. Because the network card is integrated onto the motherboard, you do not want to replace the entire motherboard. What can you use to connect to the wireless network? (Select two.) Insert an ExpressCard wireless network card. Install a PCI wireless network card. Enable the infrared port on the notebook. Insert a wireless USB network card. Enable the Bluetooth adapter on the notebook. Explanation You can add devices (such as a wireless card) to a notebook computer using USB or ExpressCard interfaces. You cannot add a PCI card to a notebook. The infrared port is not able to connect to the wireless network, as it uses a different signal type to communicate between devices. Bluetooth is used to connect to personal area networks (PANs), not LANs. References  12.1.1 Laptops  12.1.3 Laptop Facts  12.1.9 Laptop Upgrade and Repair Facts q_nb_repair_wireless_alternatives_purpose_pp7.question.fex  Question 12:  Correct Which of the following MOST accurately describes a touch pen? Works well for high-quality digital drawings. Includes features such as tilt and pressure sensitivity. Does not contain electronics. Includes a soft rubber tip at the end. Explanation A touch pen, or digital pen, is a specific type of pen that usually includes finer abilities, such as tilt and pressure sensitivity. A touch pen allows users to become more creative with their drawings and writing. Unlike a touch pen, a stylus usually does not contain electronics. Most styluses have a soft rubber tip on the end. Although you can use a touch pen to create basic digital drawings, most professionals use a drawing pad to achieve high-quality digital drawings. References  12.4.5 Mobile Device Accessories  12.4.6 Mobile Device Accessory Facts q_mob_acc_touch_pen_def_pp7.question.fex  Question 13:  Correct You have just finished replacing the motherboard in your friend Ethan's computer with the same type of motherboard that the computer had originally. You tested the motherboard by powering it on and by verifying that the operating system started and that the applications work. Now Ethan is complaining that his computer no longer recognizes his external hard drive, which he had connected to the previous motherboard. Which of the following is MOST likely causing the external hard drive not to function? The computer's power supply was not connected properly. The USB front panel connector was not properly connected. The hard drive has failed. The replacement motherboard does not support external hard drives. Explanation The most likely cause is that the USB cable is not connected or is not connected properly. If the motherboard is a replacement, and Ethan had the external hard drive connected previously, the new motherboard should also support the external hard drive. It is unlikely that the hard drive suddenly failed in such a short time. Since the operating system and applications are functioning properly, the power supply is functioning correctly as well. References  3.3.6 Motherboard Installation Facts q_mb_inst_trblsht_ext_hard_drive_pp7.question.fex  Question 14:  Correct Which of the following load balancer algorithms takes each server's active connections and processing power into consideration? Least connections Weighted round robin Weighted least connections Round robin Explanation The weighted least connections algorithm distributes traffic based on each server's active connections and processing power. Round robin is the most basic algorithm. Using this algorithm, the servers handle network requests in sequential order. The weighted round robin algorithm works the same as the round robin algorithm, but takes the server's power into consideration. A more powerful server will be sent more traffic than less powerful servers. The least connections algorithm looks at the active connections that each server is handling and sends the network traffic to the server that currently has the lowest connections. This algorithm treats each network request equally and does not take into account that some requests require more time. This algorithm does not take into account each server's power, either. References  11.4.6 Internet Appliances  11.4.7 Internet Appliances Facts q_internet_appliances_weighted_least_def_pp7.question.fex  Question 15:  Correct A SOHO's connection to the internet is through an antenna that sends and receives a microwave signal to the ISP's antenna. There can be no obstacles on the direct path between the two antennae. Which of the following internet connection types is this? Satellite WISP Fiber DSL Explanation A wireless internet service provider (WISP) uses microwave or radio frequency signals between two antennae. The direct patch between the antennae cannot be blocked. A fiber internet connection uses fiber cabling. Transmitted light pulses are carried by the fiber. Digital subscriber line (DSL) uses a modem that connects to copper telephone lines, allows the use of the internet and phone calls at the same time, and has average download speeds of 3 to 7 Mbps. Satellite internet connections are made through satellites orbiting the earth in a geosynchronous orbit. Typically, a roof-mounted satellite dish is aimed at the target satellite, and a transceiver sends and receives data. References  11.7.4 Internet Connection Types  11.7.5 Internet Connection Type Facts q_internet_wisp_connection_pp7.question.fex  Question 16:  Correct You have purchased a refurbished Windows laptop and have just plugged the power adapter into the wall socket to begin charging the battery. However, after several hours of charging, the laptop does not turn on. What is the MOST likely cause of the power issue? The hard drive needs to be replaced. You have been given the incorrect adapter. The Windows operating system is faulty and needs to be re-installed. One of the memory modules needs to be replaced. Explanation The most likely cause of your power issue is that you were given the wrong adapter for the laptop. Most adapters are not interchangeable between laptops, as they require varying amounts of voltage and amperage. Even if the plug for the laptop is the correct size, the adapter may not be generating sufficient power to charge the laptop battery. A faulty operating system, memory, or hard drive could be the issue. However, because the laptop has been refurbished, it has probably gone through a series of tests to make sure that all three were operating correctly before shipping the laptop to you. References  12.7.4 Laptop Troubleshooting Facts  12.7.5 Mobile Device Troubleshooting q_mob_pwr_incorrect_adapter_issue_pp7.question.fex  Question 17:  Correct Your projector is displaying the colors on the screen incorrectly. What is the MOST likely reason for this problem? A VGA cable was used to connect the computer to the projector. The projector driver needs to be updated. The source computer's resolution settings do not match the projector's resolution settings. The projector's filter sensor was triggered. Explanation When the source computer's resolution settings do not match the projector's resolution settings, it can cause incorrect colors to display. Outdated drivers often result in a projector failing to display anything at all. A triggered filter sensor would likely result in a shutdown. A VGA cable would not cause the wrong colors to be displayed. References  10.3.1 Video Troubleshooting  10.3.2 Video Troubleshooting Facts  10.3.3 Projector Troubleshooting  10.3.4 Projector Troubleshooting Facts q_trb_projector_resolution_settings_match_pp7.question.fex  Question 18:  Correct After installing two memory modules, you power on the system to check for errors. You find that the BIOS program recognizes only one of the memory modules. Which of the following is BEST to try first when troubleshooting this issue? Change the memory timings in the BIOS to a slower (higher) setting. Make sure that both modules are seated properly in their slots. Return both modules for a replacement. Reboot the computer and run memory diagnostic tests. Scan for new devices in Device Manager and enable any disabled memory modules. Explanation In this scenario, you should first check to make sure that you installed the memory correctly, such as making sure that the modules are seated properly in their slots. Most BIOS programs include a memory count that displays the total amount of system memory. After the memory is installed correctly, if it is still not recognized, try removing one module to identify which module has the problem. Move the modules to different motherboard slots to see if you can get the system to detect the memory. In most cases, you will not need to change the memory timings. When you do, it is typically because the system is unstable or crashes. Device Manager will not find new memory that the BIOS does not recognize. Returning both modules for a replacement is one of the last steps you should take to resolve the issue. Testing memory helps you identify when specific memory storage locations are going bad. References  3.4.1 Motherboard Troubleshooting  3.4.2 Motherboard Troubleshooting Facts  3.7.3 Memory Troubleshooting Facts  3.10.1 Processor Troubleshooting  3.10.2 Processor Troubleshooting Facts q_trbl_mem_trblsht_mem_mods_pp7.question.fex  Question 19:  Correct You are troubleshooting a malfunctioning LED display on a notebook computer system. As part of your troubleshooting, you attach an external monitor and find that it displays the output from the notebook. Which of the following is MOST likely causing your LED display to malfunction? Failed backlight Failed video adapter Failed inverter Failed CCFL Explanation In this case, the LED backlight has failed. The backlight provides illumination to the display. Because the output displays on the external monitor, you know the problem is not related to the video card. LED backlights use DC power, eliminating the need for an inverter. A CCFL is one of the backlight methods (LED being the other) and uses an inverter to provide AC power to the backlight. A failed inverter may cause flickering or dimming, but the most likely cause in this scenario is a failed backlight. If the display is working on an external monitor, the video adapter is working as well. References  12.7.2 Laptop Maintenance Facts  12.7.4 Laptop Troubleshooting Facts  12.7.5 Mobile Device Troubleshooting  12.7.7 Mobile Device Troubleshooting Facts q_p_trb_failed_led_display_pp7.question.fex  Question 20:  Correct You need to replace the video card in a laptop. Which of the following is the first step? Remove the access panel at the bottom of the laptop. Find a service manual with correct disassembly procedures. Remove the bezel. Remove the keyboard. Remove the display wires if the video card is integrated into the motherboard. Explanation Before replacing the video card, find the documentation to determine the location of screws and to identify installation sequences for accessing the system components. On most notebooks, you access the video card by removing the keyboard. Some video cards are integrated on the motherboard and cannot be replaced. If the video card can be replaced, you will need to disconnect the display wires. You can typically view or add memory to a laptop by removing the access panel on the bottom of the notebook. The bezel is the case that the LCD screen is set in and typically houses the antennae for wireless network cards. References  12.1.9 Laptop Upgrade and Repair Facts q_nb_repair_laptop_replace_vid_card_1st_step_pp7.question.fex  Question 21:  Correct You have recently been hired by a course development company to develop online simulations, and you have been given permission to work at home. The company has given you a laptop computer, two external displays, and a wireless mouse and keyboard. However, you also want to connect several of your own personal devices to the laptop, including a printer, headset, webcam, a third external display, and a drawing pad. You also want to be able to boot your laptop with all these devices without opening up the laptop. Which of the following items should you request from your company to help connect all these devices in the EASIEST and most EFFECTIVE way possible? Bluetooth accessibility CGM device Docking station Port replicator Explanation At home or in the office, you may want a desktop experience with a full-sized keyboard, mouse, and multiple displays. You may also want to connect multiple wired devices. A docking station maintains these permanent connections and provides a dock for the laptop, making it the easiest and most effective way to provide the work experience you need. While a port replicator can provide similar connectivity, it is a much simpler device that normally plugs into an available USB port. Also, a docking station does not provide a way to turn on all these devices without opening up the laptop to boot the system. Bluetooth is a wireless technology that is widely used to connect mobile phone or laptop accessories (such as headsets and earbuds) to a phone. Bluetooth is not designed to connect wired accessories to a laptop. A CGM (continuous glucose monitoring) device is used by medical professionals to monitor the glucose levels in diabetic patients. References  12.1.3 Laptop Facts  12.4.5 Mobile Device Accessories  12.4.6 Mobile Device Accessory Facts q_mob_acc_docking_station_sol_pp7.question.fex  Question 22:  Correct A user is configuring an email client application and decides to use a TCP/IP suite protocol that stores all messages on the email server so that they can be synchronized across a laptop, a smartphone, and a web email client. In addition, this protocol stores the email messages on the email server until the user explicitly deletes them. Which of the following TCP/IP port numbers will the client application typically access while using this protocol to contact the email server? 21 80 110 143 Explanation The TCP/IP suite protocol that stores email messages on a server so that they can be synchronized across multiple devices is Internet Message Access Protocol (IMAP). IMAP typically uses port 143. FTP uses port 21. HTTP uses port 80. POP3 uses port 110. References  11.2.3 Ports and Protocols  11.2.4 Ports and Protocols Facts q_ports_protocols_tcp_ip_port_143_sol_pp7.question.fex  Question 23:  Correct You work at a computer repair store. You have just upgraded the processor (CPU) in a customer's Windows-based computer. The customer purchased the latest AMD Ryzen processor, and you installed it in the computer. But when you power the computer on, you only see a blank screen. Which of the following is MOST likely causing the computer to display the blank screen? (Select two.) The CPU is bad. The CPU is not supported by the BIOS. Someone unplugged the computer without performing a proper shutdown first. The heat sink and fan were not installed correctly. The power connector for the fan was not connected to the motherboard. Explanation A bad CPU or a CPU that is not supported by the BIOS can cause the computer to display a blank screen during power-on. If the processor is not supported by the BIOS, you might be able to perform a BIOS update to make it recognize the new processor. However, you would need to install a supported processor first, flash the BIOS, and then re-install the new processor. An improperly installed fan or heat sink can cause issues shortly after power-on, but this will not cause the computer to boot to a blank screen. Although you should always shut down your computer using the proper steps, it is unlikely that this would cause the computer to boot to a blank screen. References  3.4.2 Motherboard Troubleshooting Facts  3.7.3 Memory Troubleshooting Facts  3.10.2 Processor Troubleshooting Facts  12.7.1 Common Laptop Issues q_trb_proc_cpu_not_supported_bios_pp7.question.fex  Question 24:  Correct You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard works BEST in this situation? 802.11a 802.11b 802.11n 802.11g Explanation 802.11n is the best choice for this client, as 802.11n supports both 5 GHz and 2.4 GHZ with a maximum transmission rate of 600 Mbps. 802.11b and 802.11g both operate in the 2.4 GHz to 2.4835 GHz range, which causes interference with the client's wireless phone system. 802.11a operates in the 5.725 GHz to 5.850 GHz frequency range, which doesn't interfere with the phone system. However, the maximum speed is limited to 54 Mbps. References  11.5.1 Wireless Networking  11.5.3 Wireless Networking Facts q_wire_lan_802.11n_sol_pp7.question.fex  Question 25:  Correct You've just purchased 10 new notebook computers for your users. You are concerned that users will leave the notebooks on for long periods of time, which could result in display burn- in. What should you do to prevent this from happening? Configure a screen saver on each computer. Install a software utility on each computer that is designed to fix stuck pixels. Increase the hardware acceleration setting on each computer. Configure each computer to automatically power off after five minutes of inactivity. Explanation Burn-in can happen when the same image is displayed on the screen for an extended period of time. The best way to prevent this from happening is to configure a screen saver on each computer. Configuring the computers to automatically power off after five minutes of inactivity can prevent burn-in, but this will also make the notebooks very inconvenient to use. Increasing hardware acceleration settings will not prevent burn-in from occurring. Installing a software utility on each system that is designed to fix stuck pixels is a solution for repairing a burnt-in display, but this will not prevent burn-in from happening in the first place. References  10.3.1 Video Troubleshooting  10.3.2 Video Troubleshooting Facts  10.3.3 Projector Troubleshooting q_trb_vid_burn_in_screen_saver_pp7.question.fex  Question 26:  Correct You want to use a wireless keyboard and mouse with your laptop computer. Which method could you utilize for the wireless connection? USB Bluetooth IEEE 1394 PS/2 802.11g wireless Explanation Bluetooth is the best choice because Bluetooth has a high transfer rate and because it automatically detects other Bluetooth devices in the area and creates an encrypted PAN between them. PS/2, IEEE 1394 (FireWire), and USB are all wired connection standards. 802.11g is a wireless networking standard for communication between computers, not for connecting wireless devices to a computer. References  11.5.13 Infrared, Bluetooth, and NFC  11.5.14 Configure Bluetooth Connections  11.5.15 Infrared, Bluetooth, and NFC Facts q_irbtnfc_bluetooth_wireless_keyboard_mouse_pp7.question.fex  Question 27:  Correct Hannah has been working for your company for several years. Recently, she moved to a new department, which is located on a different floor. After the move, Hannah informs you that when she tries to print a Microsoft Word document (the same program she has always used), the printer on her new floor prints page after page of seemingly random characters. Which of the following is the MOST likely cause of Hannah's print problems? The wrong printer driver has been selected. The cable connecting the printer to the network is failing. The hard drive on the print server is corrupt. The program used to create the document has a bug. Explanation In most cases, the issue described in this question is the result of a bad or incorrect printer driver. When Hannah moved and created a connection to her new printer, she selected the wrong printer driver. A failing hard drive has been known to corrupt a printer driver, but since others are not having the same issue, the most likely cause of the problem is the driver on Hannah's computer. If the cable was bad or failing, the print job would not make it to the printer, and others in the company would experience the same problem. Since Hannah used the same word process in her old department, it is unlikely that it would suddenly stop working because of a bug in the software. References  13.4.1 Printer Troubleshooting  13.4.3 Printer Troubleshooting Facts q_printer_tbr_garbled_text_issue_pp7.question.fex  Question 28:  Correct Which data transmission rate is defined by the IEEE 802.11b wireless standard? 54 Mbps 150 Mbps 10 Mbps 2 Mbps 11 Mbps Explanation The IEEE 802.11b standard defines wireless transmission rates up to 11 Mbps. 802.11b wireless network interface cards and wireless access points (also called wireless hubs or wireless routers)automatically negotiate the best transmission speed. The speed is up to 11 Mbps, based on current network traffic load and the quality of the wireless connection between the client and access point. The wireless communications are affected by distance, dense physical obstructions, and electromagnetic interference. IEEE 802.11a and 802.11g defines wireless transmission rates up to 54 Mbps. The IEEE 802.3 standard defines Ethernet 10baseT cable-based transmissions of 10 Mbps. IEEE 802.11n defines wireless transmission rates of up to 600 Mbps. References  11.5.1 Wireless Networking  11.5.3 Wireless Networking Facts q_wire_lan_802.11b_trans_rate_pp7.question.fex  Question 29:  Correct Which of the following BEST describes the Platform as a Service (PaaS) cloud computing service model? PaaS delivers everything a developer needs to build an application on the existing cloud infrastructure. PaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. PaaS delivers software applications to the client either over the internet or on a local area network. PaaS stores and provides data from a centralized location without the need for local collection and storage. Explanation Platform as a Service (PaaS) delivers everything a developer needs to build an application on the existing cloud infrastructure. The deployment comes without the cost and complexity of buying and managing the underlying hardware and software layers. Software as a Service (SaaS) delivers software applications to the client either over the internet or on a local area network. Infrastructure as a Service (IaaS) delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. The client deploys and runs software without purchasing servers, data center space, or network equipment. Data as a Service (DaaS) stores and provides data from a centralized location without the need for local collection and storage. References  6.3.1 Cloud Computing Overview  6.3.2 Cloud Computing Facts q_cloud_paas_def_pp7.question.fex  Question 30:  Correct You are troubleshooting a malfunctioning laptop computer. Nothing appears on the LED display when the system is powered on. Which of the following is the BEST step to try first? Calibrate the battery. Replace the video card. Replace the motherboard. Plug in an external monitor. Explanation If the built-in monitor isn't working, connect an external monitor to the laptop. If the display appears on an external monitor but not the built-in display, the problem could be a malfunctioning LED assembly, or it could be due to the display output being redirected to the external monitor port with the fn key. If you don't get a display on the internal or external monitor, you can assume that there is a problem with the video card. Repairing the video card typically means replacing the motherboard. You should calibrate the battery if your battery seems to be losing the ability to hold a charge or if the power drops shortly after you begin use. References  12.7.4 Laptop Troubleshooting Facts q_p_trb_blank_led_display_issue_first_step_pp7.question.fex  Question 31:  Correct A user reports that her monitor has stopped working. While troubleshooting the issue, you discover a bad video card in the system. You replace the card and connect the monitor cable to the card. Which of the following actions should you perform NEXT in your troubleshooting strategy? Test the solution. Explain what you did to fix the problem. Document the solution. Implement preventative measures. Explanation After you implement a solution, you should always test it to verify full system functionality. Sometimes, more than one problem exists, or your solution may not have solved the problem. For example, in this case, an incorrect driver for the video card could potentially continue to cause display issues. By verifying system functionality, you can ensure the problem is completely resolved. Explaining what you did, implementing preventative measures, and documenting the solution occur after you've tested the solution to make sure the problem is completely fixed. References  2.7.1 Troubleshooting Process  2.7.2 Troubleshooting Process Facts q_trbl_sht_test_solution_pp7.question.fex  Question 32:  Correct Which of the following are optical storage devices? (Select three.) SDHC USB flash drive DVD HDD CD BD SSD Explanation Optical storage devices use lasers for both reading and writing information. The following are all optical storage devices: CD (Compact Disc) DVD (Digital Video Disc or Digital Versatile Disc) BD (Blu-ray Disc) HDDs (hard disk drives) are magnetic storage devices. A flash device stores information using programmable non-volatile flash memory. USB flash drives, SSDs (solid-state drives), and SDHC (secure digital high capacity) memory cards are flash devices. References  1.1.2 Computing Basics  1.1.3 Computing Facts  5.1.2 Storage Device Facts  5.3.1 CD Drives  5.3.2 DVD Drives  5.3.3 Blu-ray  5.3.4 Optical Media Facts q_opdrive_optical_storage_types_pp7.question.fex  Question 33:  Correct After starting your Apple iMAC computer, you immediately experience the Spinning Pinwheel of Death (SPoD) crash screen. Which of the following should you do FIRST to try to resolve the problem? Try to reboot the computer. Scan the computer for viruses. Revert the system to a previous state. Clear the dyld cache. Explanation When you experience an SPoD crash screen on your iMAC, you should first try to reboot the system. Often, rebooting the computer solves this problem. If that does not work, try to revert the system to a previous state. Then scan the computer for viruses. Because this is an iMAC computer, you could also try clearing the dyld cache. References  5.9.2 Storage and RAID Troubleshooting Facts q_trb_storage_spod_reboot_computer_pp7.question.fex  Question 34:  Correct Which of the following identifies the interface ID component of an IPv6 address? (Select two.) The first four quartets of an IPv6 address. The last quartet of an IPv6 address. The last four quartets of an IPv6 address. The last 64 bits of an IPv6 address. The first quartet of an IPv6 address. The fourth quartet of an IPv6 address. Explanation An IPv6 address is a 128-bit binary number that uses the first 64 bits as the address prefix and the last 64 bits of the address as the interface ID. The 128-bit binary number is organized into 32 hexadecimal numbers that are organized further into eight quartets. The last four quartets correspond with the last 64 bits of the IPv6 address. References  11.3.3 IPv4 Address Facts  11.3.4 IP Version 6  11.3.5 IPv6 Facts q_ipv6add_format_def_pp7.question.fex  Question 35:  Correct While traveling in a car, a user who has an unlimited data plan on a smartphone opens a wireless connection to share the internet with other passengers. Which of the following connection types is the user MOST likely using? Hotspot Lightning MicroUSB NFC Explanation A mobile device, such as a smartphone, can work as a wireless hotspot to allow others access to the internet. A Near Field Communication (NFC) connection works by bringing two devices within 10 cm (3.9 in) of each other. NFC is impractical for connecting multiple devices. A microUSB connection can connect two devices with a physical cable. A lightning connection requires a physical cable. References  12.5.1 Wireless and Cellular Data Connections  12.5.2 Wireless and Cellular Data Connections Facts q_mob_devcon_share_wireless_connect_hotspot_pp7.question.fex  Question 36:  Correct You are a system administrator for a financial institution. Most of your employees work at home and have various work environments. One of your account managers is complaining that customer data is disappearing from her account management application. She insists that she saves data regularly and has not had a problem until recently. Her workstation has both a solid-state drive (SSD) and a traditional hard drive. She runs the application from the SSD drive, but stores the customer data on the hard drive. She has recently moved her desk to a room in her house that is used for entertainment. The room has a sound system with several installed speakers for surround sound. Which of the following types of interference might be causing the issue with disappearing customer data? Magnetic fields Radio frequency interference (RFI) Negative pressure HVAC system Electromagnetic interference (EMI) Explanation Hard drives use magnetic charges to store data. While hard disks are shielded and protected from all but the strongest magnets, getting a magnet too close to these components (such as speakers) could erase data. In this case, the employee keeps her customer data on her hard drive and has moved her computer to a room full of speakers that could cause data loss. Electromagnetic interference (EMI) is interference that affects wired network signals. It does not cause data loss on a hard drive. Radio frequency interference (RFI) is interference on a radio channel used by wireless networking devices. RFI does not cause data loss on a hard drive. Negative pressure HVAC systems can cause dust accumulation in a computer, which can lead to overheating, but this is not normally associated with hard drive data loss. References  2.5.1 PC Maintenance Best Practices  2.5.2 PC Maintenance Facts  11.9.1 Network Troubleshooting  11.9.3 Network Troubleshooting Facts q_maintclean_magnetic_fields_trb_pp7.question.fex  Question 37:  Correct You work in the computer repair department of a large retail outlet. A customer comes in with a workstation that randomly shuts down. You suspect that the power supply is failing. What should you do first to troubleshoot the issue? Use a multimeter to test the power supply's electrical properties. Use a cable tester to check the power supply's connections. Use a power supply tester on the power supply. Use a known good spare to swap with the existing power supply. Explanation Known good spares are sets of components that you know are in proper functioning order. If you suspect a problem with a component, first try to swap it with a known good component. If the problem is not resolved, you can then continue troubleshooting other possible issues. A power supply tester is a custom multimeter used to test output from a PC power supply. The power supply tester has multiple connectors to test the output for each connector type. However, in this case, intermittent shutdowns are a common symptom of a failing power supply. While using a multimeter can test various electrical properties of the power supply, the first step should be to simply swap the current power supply with a known good spare to verify that the existing power supply is the cause of intermittent shutdowns. A cable tester verifies that a network can carry a signal from one end to the other and that all wires within the connector are in the correct positions. This tool is not used to test power supply connections. References  2.6.2 PC and Networking Tools Facts  3.4.1 Motherboard Troubleshooting  3.4.2 Motherboard Troubleshooting Facts  3.10.2 Processor Troubleshooting Facts  3.14.2 Power Supply Facts q_tool_fct_known_good_spare_pp7.question.fex  Question 38:  Correct Your computer has a single core processor installed. The motherboard supports processors with up to four cores. You want to upgrade your computer to a quad-core system. Which of the following is part of the configuration steps? Replace the existing processor with one that has four cores. Add a second processor that matches the speed of the first processor. Configure the system to use dual-channel memory. Remove the terminating resistor from slots where the new processor is located. Explanation A multi-core system supports processors that have multiple processors on a single processor die. Multi-core systems have a single processor slot. To upgrade this system, you need to remove the existing processor and replace it with a processor that has four cores. Multi-processor systems have multiple processor slots on the motherboard. All processors in the system should be of the same speed. Fill unused slots with a terminating resistor. Dual-channel memory does not affect dual processors or dual-core processors. References  3.9.2 CPU Facts  3.9.3 CPU Performance Facts  3.9.6 CPU Installation Facts q_cpu_inst_replace_proc_pp7.question.fex  Question 39:  Correct One of your customers is still using an old dot matrix printer. While printing, the customer notices that the text is light or faint. You installed a new printhead, but the document printing is still faint. Which of the following should you do to troubleshoot the cause? Install a maintenance kit. Initialize the ribbon. Check the toner levels. Check the gap between the printhead and paper. Explanation In this case, you should check the gap between the printhead and paper. If the gap between the platen and printhead is too large, the print could be faint because the pins are not firmly striking the ribbon and paper. Ribbons should be replaced, not initialized, if the printer images become faint. Dot matrix printers do not use toner; they use a ribbon instead. Maintenance kits are replacement components, such as fuser wires, rollers, and toner drums, needed after about 20,000 pages of printing. References  13.3.4 Inkjet Printer Facts  13.4.1 Printer Troubleshooting  13.4.3 Printer Troubleshooting Facts q_printer_tbr_gap_between_prt_head_paper_pp7.question.fex  Question 40:  Correct What does the term cloud mean when referring to cloud computing? It is a metaphor for the internet based on the basic cloud drawing used to represent a telephone network. It is a metaphor for a data storage service with an ever-growing capacity, like storm clouds. It is the name of an operating system that anyone can use to design, build, and provide cloud services. It refers to the virtual hardware that cloud computing is built on. Explanation The term cloud is a metaphor for the internet based on the basic cloud drawing used to represent a telephone network. It is now used to describe the internet infrastructure in computer network diagrams. Virtual environments are part of the Infrastructure as a Server (IaaS) cloud model. Data storage is provided as part of some cloud service models (such as SaaS or PaaS), but it is not a metaphor for cloud computing. Cloud is not the name of an operating system used to provide cloud services. References  6.3.2 Cloud Computing Facts q_cloud_purpose_pp7.question.fex  Question 41:  Correct You are walking through a shopping mall. Your smartphone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of this message? Unintended Wi-Fi connections Leaked personal files Weak or dropped cellular signal Unauthorized location tracking Explanation Many mobile devices, by default, are configured to access any wireless connection based on signal strength. Secure Wi-Fi connections request additional information to log in. For better security, disable automatic Wi-Fi connectivity on mobile devices. Cellular services do not require login information. A weak or dropped cell signal is not a cause of this message. Leaked personal files can be the results of poor security. This is not a cause of this message. Unauthorized location tracking may present messages, but they are not likely to ask for additional login information. References  12.6.2 Mobile Device Security Facts q_mob_dev_sec_unintended_wifi_connect_pp7.question.fex  Question 42:  Correct What are the standards called that define how data is formatted and transmitted over a network? Network interface Network ID Networking protocols Transmission medium Explanation Networking protocols define how the data is formatted and transmitted. If devices are not using the same protocol then they will be unable to communicate. The transmission medium refers to how devices are connected together. Examples include twisted pair cabling, fiber optics, or wireless radio signals. The network interface (NIC) converts the digital data into a signal that can be transmitted along the transmission medium. The network ID is the portion of the IPv4 address that defines the network address. Every host on the network will have the same network ID. References  11.1.3 Networking Facts q_net_fact_network_protocol_def_pp7.question.fex  Question 43:  Correct What are the disadvantages of plasma display technology? (Select two.) They consume less power than LCDs. They have low contrast and cannot produce true black. The gasses inside the cells are sensitive to air pressure fluctuations. They generate much more heat than other display types. They usually display colors less accurately than LCD displays. Explanation Plasma displays generate much more heat than other display types, and the gasses inside the cells are sensitive to air pressure fluctuations. Plasma displays do have several advantages, including the fact that: Plasma displays usually show colors more accurately than LCD displays. Because no backlighting is used, plasma displays have high contrast and can produce true black (displays that use backlighting can only display very dark grey). Plasma displays have almost no motion blur due to the speed of the gas reaction and the way they draw frames. Because of this, most plasma displays do not specify response times. Plasma displays have several other disadvantages, including the fact that: Plasma displays consume two to three times as much power as LCDs. Plasma displays suffer from a problem known as image retention (IR). Static images that are displayed for a long time cause the phosphors to overheat, which creates a temporary shadow of the image that is visible even when the display is turned off. If the static image is displayed for too long, screen burn-in can occur, and the shadow image will be permanent. References  10.2.6 Display Device Facts  12.2.1 Display Components  12.2.2 Replace LCD Components  12.2.3 Mobile Device Displays and Components Facts  12.4.1 Mobile Device Overview  12.4.2 Mobile Device Facts q_disp_dev_plasma_disadvantages_pp7.question.fex  Question 44:  Correct Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select two.) 128 numbers, grouped using colons Decimal numbers Binary numbers 32 numbers, grouped using colons Hexadecimal numbers Explanation IP version 6 addresses are made up of 32 hexadecimal numbers organized into eight quartets. The quartets are separated by colons. An IPv6 address is a 128-bit number (128 binary digits). IP version 4 addresses use decimal numbers organized into four octets and separated by periods. References  11.3.3 IPv4 Address Facts  11.3.4 IP Version 6  11.3.5 IPv6 Facts q_ipv6add_valid_addr_single_pp7.question.fex  Question 45:  Correct Susan works in the research and development department. She recently purchased a large high-speed external drive and has attached the drive to her computer using a USB cable. Her drive requires a minimum data transfer speed of 5 Gbps and needs to have access to 600 mA/15 volts of USB power to function properly. Although the correct drivers are installed, when she plugs her drive into her workstation, the drive is not working. To troubleshoot the problem, she has connected her drive to her coworker's computer, where the drive functions properly. No additional cables are required for this drive. Which of the following is the MOST likely reason that Susan's external hard drive is not working? Susan has connected her drive using a Type-C cable, which does not have enough power for her drive. Susan has connected her drive to a USB 3.2 port, which does not support the minimum data transfer speed required. Susan has connected her drive to a USB 2.0 port, which does not have the required data transfer speed. Susan has connected her drive to a USB 3.2 port, but the drive is only made to work with a 2.0 port. Explanation Susan has connected her drive to a USB 2.0 port on her computer, which only supports up to 480 Mbps data transfer speeds. However, her external hard drive requires a minimum of 5 Gbps, which is provided by a 3.2 USB port. Because the external hard drive requires 5 Gbps and 600 mA of USB power, the drive is most likely designed to be used with a 3.2 USB port. A USB Type-C cable provides up to 20 volts of power, which meets the external hard drive requirements. References  3.2.1 External Connectors  3.2.2 Universal Serial Bus  3.2.3 USB Facts  3.2.6 Peripheral and Video Cables Facts q_usb_trbl_shoot_usb_2_port_pp7.question.fex  Question 46:  Correct You are configuring an ADSL connection. Which of the following will be part of the configuration? An RG6 cable F-type connectors Analog modem Filters or splitters Explanation To connect to the internet through an ADSL connection, you need to install an internal DSL card in a single computer or connect a DSL router to the phone line. You then use filters (splitters) on the line everywhere that an analog phone is used. Analog modems are used for dial-up internet access. F-type connectors and RG-6 cable are used for cable internet access. References  11.7.4 Internet Connection Types  11.7.5 Internet Connection Type Facts q_internet_adsl_cfg_tasks_pp7.question.fex  Question 47:  Correct Which type of interface is typically used for internal wireless networking cards in laptops? FireWire PCI ExpressCard USB Mini-PCI Explanation Most internal wireless network cards in laptops connect using a mini-PCI interface. PCI is typically used in desktop computers. USB, FireWire, and ExpressCard are external buses for external devices. References  12.1.1 Laptops  12.1.3 Laptop Facts  12.1.9 Laptop Upgrade and Repair Facts q_nb_repair_laptop_int_wireless_card_type_pp7.question.fex  Question 48:  Correct When you turn on your workstation, you immediately hear a grinding noise coming from inside the computer case. Which of the following are the MOST likely causes of this noise? A video card that is failing. A connector that is not seated properly. An uneven case surface that causes fan blade and motor noise. A POST test error message. Dust buildup that needs to be cleaned. Explanation When you hear a buzzing or grinding noise, the most likely cause is your PC's fan. There are many things that can cause your fan to make a grinding noise, including dust buildup that needs to be cleaned and an uneven case surface. A failing video card may result in a noise from the video card fan, but it will not be a grinding noise. A POST test error message can result in a series of beeps or a text message on the screen, but this error does not cause an audible grinding noise. A connector that is not seated properly can cause an electrical arch, resulting in smoke or a burning smell. However, the connector will not produce a grinding noise. References  3.4.2 Motherboard Troubleshooting Facts q_mb_trb_grinding_noise_causes_pp7.question.fex  Question 49:  Correct Which of the following components is necessary to keep the real-time clock running? CMOS battery CMOS chips EEPROM chips BIOS password Explanation The CMOS battery supplies power to the CMOS to keep the real-time clock running. Formerly, the CMOS battery was needed to save system settings when the computer was powered off. Now that EEPROM chips (which are ROM chips) have replaced CMOS chips, the battery isn't needed to save system settings. The BIOS password is a security setting that allows you to require a password before the system boots. References  3.8.3 BIOS/UEFI Facts  3.8.10 BIOS/UEFI Security Facts q_bios_real-time_clock_batt_pp7.question.fex  Question 50:  Correct You have just finished upgrading the 250-watt power supply in your desktop computer to a 450-watt power supply. Now the BIOS does not recognize one of the hard disk drives in the system during POST. Which of the following troubleshooting steps is the BEST to try first? Use the voltage switch on the power supply to go from 110 volts to 220 volts. Replace the power supply. Reconfigure the hard disk to utilize the higher- wattage power supply with drive jumpers. Make sure that the hard disk is connected to the power supply. Manually enter the hard disk geometry parameters in the BIOS. Explanation Because you have just made a system change, you should check items related to the change you have made. In this case, check to make sure that the power connectors are plugged in. Jumpers are switches on older hard drives that help you enable specific hard drive settings. If the settings worked before upgrading the power supply, they should continue to work. Replacing the power supply is one of the last troubleshooting steps you should perform. Switching to a higher voltage on the power supply is unlikely to resolve the issue. In older systems, you had to manually enter the hard disk geometry, and it was very common for a wrong value to be entered. In this scenario, even if you had to enter the hard disk geometry parameters initially, the hard drive was working prior to upgrading the power supply, and the parameters should still be correct. References  5.3.4 Optical Media Facts  5.9.1 Storage and RAID Troubleshooting  5.9.2 Storage and RAID Troubleshooting Facts q_trb_storage_unreg_hdd_during_post_pp7.question.fex  Question 51:  Correct Your server runs in quadruple-channel memory mode. How many memory controllers are being used? Four Eight One Two Explanation Dual-channel systems use two memory controllers, while triple-channel systems use three memory controllers. Quadruple-channel (quad-channel) systems use four memory controllers. Each memory controller can communicate with one or more memory modules at the same time. References  3.5.1 DRAM Types  3.5.3 Multi-Channel Memory Architecture Facts  3.6.5 Install Memory  3.6.6 Memory Installation Facts q_multi_channel_ram_quad_memory_controllers_pp7.question.fex  Question 52:  Correct Which term refers to a software implementation of a computer system that executes programs like a physical machine? Physical host Workload management Virtual machine Hypervisor Explanation A virtual machine is a software implementation of a computer system that executes programs like a physical machine. A virtual machine functions as a self-contained and autonomous system. A hypervisor is a thin layer of software that resides between the virtual operating system(s) and the hardware. The physical host is the actual hardware that the hypervisor software runs on. Workload management relates to virtual machine portability. References  6.4.2 Virtualization Facts q_virt_virtual_machine_def_pp7.question.fex  Question 53:  Correct Which generation of SATA storage devices supports up to 6-Gbps data transfer rates and addresses solid-state drives? eSATAp eSATA SATA3 SATA1 SATA2 Explanation SATA3 supports up to 6 Gbps (600 MBps). It mainly addresses solid-state drives with SATA (hard disk drives are not capable of sending data at this rate). SATA1 is the original SATA standard. It provided 1.5 Gbps (150 MBps) of data transfer. SATA2 supports up to 3 Gbps (300 MBps). eSATA is a subset of other standards that is specifically for externally connected devices. eSATAp (also known as Power over eSATA or Power eSATA) is meant to replace eSATA. It combines the functionality of an eSATA and a USB port with a source of power in a single connector. References  5.2.3 SATA Installation Facts q_ser_ata_sata3_pp7.question.fex  Question 54:  Correct As the network engineer for a large financial institution, you have been given the responsibility to provide a new financial desktop to the financial advisors in all company branch offices. The requirements for the software desktop include: It must be a virtualization solution. It must be hosted in the cloud by a third party. It must run on a tablet. Which of the following virtualization types BEST meets your desktop software requirements? VDI Type 1 hypervisor Container virtualization Type 2 hypervisor Explanation A VDI (virtualization desktop infrastructure) is designed to be the end user's main computer system, which can be accessed from something like a tablet or thin client. In addition, a VDI can be hosted by a cloud service provider. A hypervisor is a virtualization component that allows virtual machines to interact with hardware on the host machine. Type 1 runs directly on the host machine's hardware to manage the guest VM(s). Type 2 runs on an operating system to manage the guest VM(s). These virtualization types do not determine whether a virtualized software desktop must run on a desktop or be hosted in the cloud. Container virtualization is focused on providing a virtual environment for a single application. In this scenario, you need to have multiple application tools running on a single desktop. References  6.4.1 Virtualization Overview q_virt_vdi_sol_pp7.question.fex  Question 55:  Correct While creating a virtual machine, you decide to set it up to use an external network. What else do you need to do to enable the eternal network configuration? Make sure that you are using a Type 1 hypervisor. Set the RAM on the virtual machine to match the host. Configure the virtual machine to use Remote Desktop Protocol (RDP). Select a NIC using the virtual switch manager. Explanation If you choose an external network configuration, you need to use the virtual switch manager to select a NIC. Matching the RAM on the host and configuring the virtual machine to use RDP are not requirements for enabling an external network configuration. A Type 1 hypervisor acts as an OS on a physical host machine. The type of hypervisor (Type 1 or Type 2) does not impact the external virtual network configuration. References  6.4.5 Hyper-V Facts q_win_virt_external_select_nic_pp7.question.fex  Question 56:  Correct You are using a patch panel to connect the computers in your building to the appropriate switches, and you need to connect the Ethernet wires from the building network port cables to the patch panel. Where do you connect the wires on a patch panel? You connect the outgoing wires to the front and the incoming wires to the back. You connect the wires to the frontside of the panel. You connect the incoming wires to the front and the outgoing wires to the back. Yon connect the wires to the backside of the panel. Explanation All network ports in a building terminate at a patch panel. The Ethernet cables are punched down and terminate on the backside of the patch panel. The front of the patch panel consists of RJ-45 ports. An Ethernet cable runs from the patch panel to the network switch to provide the connection between a device that is connected to the network port and the switch. There are no specified incoming or outgoing wires on an Ethernet cable. References  1.1.11 Networking Rack Facts  11.7.1 Network Infrastructure  11.7.3 Network Infrastructure and Device Facts q_net_devs_patch_panel_backside_pp7.question.fex  Question 57:  Correct Several of your employees are experiencing limited connectivity issues when trying to access some websites on the internet from their workstations. However, they can access the local company network without any problems. You have already tried using the ip and ipconfig commands to determine that the websites can be reached and that the IP information on the workstations is configured properly. You know that the connection to your internet service provider is working properly as well. What should you do next? Make sure that the DNS server is functioning properly. Verify that the workstations' DNS server information is correct. Check for port flapping on the network switch. Replace the workstations' network cables. Explanation You have already verified that the DNS server information is correct on the workstations by using the ip and ipconfig commands. The next step you should take is to make sure that the DNS server is functioning properly. Because the issue is related to internet access and the employees can access the local company network, you already know that the workstations' network cables are functioning properly. Port flapping occurs when a port on the network switch continuously turns off and on three or more times per second for at least 10 seconds. While port flapping can cause latency on a network, it would not be the cause of inability to access websites. References  11.9.1 Network Troubleshooting  11.9.3 Network Troubleshooting Facts  13.2.1 Printer Connectivity Methods q_trb_net_check_dns_server_pp7.question.fex  Question 58:  Correct You have purchased an LED monitor and connected it to the HDMI port on your computer using an HDMI cable. You configure the screen resolution to 1280 x 1024 with 32-bit color. The geometry of the images displayed on the screen appear to be distorted. What should you do to correct the problem? Update the video driver to the latest version. Use a DVI cable to connect the monitor instead of an HDMI cable. Set the display resolution to the native resolution of the monitor. Change the screen resolution to 1400 X 1050. Increase the hardware acceleration setting on the video driver. Explanation LED and LCD monitors have a native display resolution. You should set the resolution of the video board to the native resolution of the monitor (whatever it might be). While it is possible to set a resolution other than the native resolution, the images on the display will be distorted or pixilated. Changing connection types will not correct an incorrectly set display resolution, nor will increasing the hardware acceleration or installing an updated driver. References  10.3.1 Video Troubleshooting  10.3.2 Video Troubleshooting Facts  10.3.3 Projector Troubleshooting  10.3.4 Projector Troubleshooting Facts q_trb_vid_distorted_display_sol_pp7.question.fex  Question 59:  Correct You decided to upgrade your PC with a faster processor. To do this, you ordered a new motherboard over the internet that supports the processor that you want to use. When the motherboard arrives, you discover that the motherboard uses the Micro-ATX form factor. Your current case is an ATX mid-tower with a standard ATX motherboard inside. Which steps must you take for the Micro-ATX motherboard to work in the ATX case? Drill new holes in the Micro-ATX motherboard to match the mounting hole pattern in the ATX case. Return the motherboard and replace it with an ATX form factor motherboard, as the Micro-ATX motherboard does not fit without modifying the case. Drill new holes in the ATX case to match the mounting hole pattern in the Micro-ATX motherboard. No additional steps are necessary. You can install the Micro-ATX motherboard in the ATX case. Explanation ATX mid-tower cases support all ATX form factors, including Micro-ATX. The main difference between ATX and Micro-ATX is the number of bus and memory slots on the motherboard. You do not need to return the motherboard, and drilling holes in the motherboard or case can compromise or damage the integrity of both. References  3.3.2 Cases and Form Factor Facts q_cases_micro_atx_in_atx_pp7.question.fex  Question 60:  Correct A technician is running a network above a dropped ceiling that is also used for ventilation. The cable must be twisted pair and must be capable of Gigabit Ethernet speeds. Which of the following cables should the technician use? Plenum-rated multimode fiber Riser-rated Cat 5e Plenum-rated Cat 6a Riser-rated RG-58 Explanation Plenum-rated Cat 6a cables can transfer data at 10 Gbps and can be placed in plenum spaces used for ventilation. Riser-rated RG-58 cables are coaxial and can transfer data at 10 Mbps. Plenum-rated cables can be used in riser applications, but riser-rated cables cannot be used in plenum applications. Riser-rated Cat 5e cables can transfer data at 1 Gbps, but they cannot be used in plenum applications. Plenum-rated multimode fiber can transfer data at 10 Gbps, but it is not twisted pair. References  3.1.1 Network Cables  3.1.3 Twisted Pair Cable Facts q_cbl_twst_compare_cabling_pp7.question.fex  Question 61:  Correct A Windows workstation is configured to receive its IP configuration information from a DHCP server on the company network. The user at the workstation reports that she cannot use email and is unable to reach the internet. Using the ipconfig command, you see that the workstation has been assigned the following special IP configuration: IP address: 169.254.0.1 Subnet mask: 255.255.0.0 What is this special IP configuration called? Automatic Private IP Addressing (API…  Why did the workstation receive this type of configuration? The workstation was unable to cont…  Explanation If a Windows client is configured to receive an IP address from a DHCP server, but cannot contact a DHCP server, it will automatically assign itself an IP address within the range of 169.254.0.1 to 169.254.255.254 with the subnet mask 255.255.0.0. You can use APIPA instead of a DHCP server, but it should only be used on a small network that does not need default gateway or DNS server settings to be configured. References  11.3.2 IPv4 Addressing  11.3.3 IPv4 Address Facts q_addressing_apipa_no_dhcp_server_contact_pp7.question.fex  Question 62:  Correct You are building a new computer and want to purchase a motherboard that has integrated sound with digital audio output. Which of the following ports would you MOST likely find on a motherboard faceplate that indicates digital audio support? S/PDIF Mini-DIN F-type Mini-TRS DB-15 Explanation S/PDIF audio is a digital audio output. S/PDIF audio is supplied through either a TOSLINK optical port or an RCA port. A DB-15 connector on a sound card is used to connect MIDI devices. Mini-TRS ports on the sound card indicate analog audio input and output. An F-type connector is used for TV input from cable or an antenna. A mini-DIN connector is used on video cards for S-video input and output. References  3.12.1 Digital Audio  3.12.2 Sound Cards  3.12.3 Sound Card Facts  3.12.4 Manage Audio Devices  3.12.5 Sound Card Installation Facts  3.12.6 Sound Card Connectors q_snd_fact_mthbrd_port_s-pdif_pp7.question.fex  Question 63:  Correct You have installed a new computer with a quad-core 64-bit processor, 6 GB of memory, and a PCIe video card with 512 MB of memory. After installing the operating system, you see less than 4 GB of memory showing as available in Windows. Which of the following actions would MOST likely correct this issue? Update the memory controller driver in Device Manager. Disable the AGP aperture in the BIOS. Flash the BIOS. Install a 64-bit version of the operating system. Explanation In this scenario, the most likely cause is that the operating system is a 32-bit operating system. You must use a 64-bit operating system to use memory above 4 GB. The AGP aperture is a method for sharing system memory with an AGP video card instead of PCIe. With shared memory, some of the memory is used by the video card and is not available for the system. Flashing the BIOS does not have an impact on the amount of memory available in Windows. You do not update memory controller drivers. References  3.4.1 Motherboard Troubleshooting  3.7.1 Memory Troubleshooting  3.7.3 Memory Troubleshooting Facts q_trbl_mem_install_64-bit_os_pp7.question.fex  Question 64:  Correct Which of the following types of Blue-ray Discs can hold up to 100 GB of data? Dual-layer Single-layer Triple-layer Quadruple-layer Explanation Triple-layer Blue-ray Discs can hold up to 100 GB of information. A single-layer Blu-ray Disc can hold up to 25 GB of information. A dual-layer Blu-ray Disc can hold up to 50 GB of information. A quadruple-layer Blue-ray Disc can hold up to 128 GB of information. References  1.1.2 Computing Basics  1.1.3 Computing Facts  5.1.2 Storage Device Facts  5.3.1 CD Drives  5.3.2 DVD Drives  5.3.3 Blu-ray  5.3.4 Optical Media Facts q_opdrive_triple_layer_storage_pp7.question.fex  Question 65:  Incorrect Which of the following BEST describes print spooling? The location on the hard disk that holds print jobs that are waiting to be processed. The service that captures print jobs from an application, holds them in a queue, and then sends each job to the print device. The process that manages the flow of print requests for how and when documents are sent to the printer. The software that allows the printer to communicate with the print device. Explanation The print spooling service captures print jobs from an application, holds them in a queue, and then sends each job to the print device. The print queue is the location on the hard disk that holds print jobs that are waiting to be processed. A print server is the process that manages the flow of print requests for how and when documents are sent to the printer. The print driver is the software that allows the printer to communicate with the print device. References  13.1.7 Printing Management Facts q_ptr_mgmt_print_spool_def_pp7.question.fex  Question 66:  Correct Which of the following BEST describes a community cloud implementation? Designed to be a combination of public and private cloud resources. Designed to be accessed by the general public. Designed to be shared by several organizations. Designed to be used by a single organization. Explanation A community cloud is designed to be shared by several organizations. Access is granted only to the users within the organizations who are sharing the community cloud infrastructure. A public cloud can be accessed by anyone. Cloud-based computing resources such as platforms, applications, and storage are made available to the general public through a cloud service provider. A private cloud provides resources to a single organization. Access is granted to only the users within the organization. A hybrid cloud is a combination of public, private, and community cloud resources from different service providers. References  6.3.2 Cloud Computing Facts  13.2.5 Network Scanning Methods q_cloud_community_cloud_def_pp7.question.fex  Question 67:  Correct You have just installed a new CPU in your workstation along with a CPU heat sink and fan. Which of the following should you do next as a best practice? Ensure that the CPU and motherboard socket type match. Update the BIOS after installing the processor. Connect the fan's power supply. Verify that the motherboard supports the processor speed. Explanation As a best practice, you should update the BIOS shortly after installing a processor (you must have a processor and memory installed to update the BIOS). Ensuring that the CPU and motherboard socket type matches is a step that you should complete before you install the CPU. Verifying that the motherboard supports the processor speed is another step that you should complete before you install the CPU. Connecting the fan's power supply is a step that you should complete as part of the fan installation. References  3.9.2 CPU Facts  3.9.3 CPU Performance Facts  3.9.6 CPU Installation Facts q_cpu_inst_update_bios_pp7.question.fex  Question 68:  Correct You are currently learning about networking devices and have just learned about MAC addresses. You look up your device's MAC address, and it comes back as 00-B0-D0-06-BC-AC. Which portion of this MAC address can tell you who the manufacturer is? BC-AC 00-B0 00-B0-D0 06-BC-AC Explanation The first half (first six digits) of a MAC address is assigned to each manufacturer by the Institute of Electrical and Electronic Engineers (IEEE). The rest of the MAC address consists of a unique, randomly generated value. References  11.1.1 Networking Introduction  11.1.3 Networking Facts  11.3.1 Device Addressing  11.3.2 IPv4 Addressing  11.3.3 IPv4 Address Facts  11.3.6 Configure TCP/IP Properties  11.3.7 Configure TCP/IP Settings on Windows 10  11.3.8 Configure TCP/IP Settings on Windows 11  11.9.4 Fix a Network Connection 1 q_addressing_mac_manufacturer_pp7.question.fex  Question 69:  Correct A customer who uses a Windows computer purchased an Inkjet printer from your store. He recently called to complain that the colors in the photos he prints on his new printer do not match the colors in the original photos. Which of the following actions will MOST likely resolve the issue? (Select two.) Download and install the latest printer drivers. Use the Color Management tab of the printer driver to calibrate the driver's color settings. Run the Windows FIXCOLR utility to automatically calibrate the driver's color settings. Use Driver Rollback to restore an earlier version of the printer driver. Educate the customer on the limitations of Inkjet printers. Instruct the customer to upgrade to a color laser printer. Explanation You should download and install the latest printer driver and then use the Color Management tab to adjust the driver's color settings. Many times, installing the latest driver alone will fix color issues. If not, you can manually adjust the color settings until they match the original settings. Educating the customer on the limitations of Inkjet printers or instructing him to purchase a color laser printer will not solve the current issue. The FIXCOLOR utility does not exist in Windows. Using Driver Rollback is not likely a solution, as the printer is new to the customer and there are probably no previous versions of the driver on the workstation. References  13.4.1 Printer Troubleshooting  13.4.3 Printer Troubleshooting Facts q_printer_tbr_install_latest_drivers_sol_pp7.question.fex  Question 70:  Correct You would like to control internet access based on user, time of day, and websites visited. Which of the following actions would BEST meet your criteria? Configure internet zones using Internet Options. Install a proxy server. Allow internet access only through the proxy server. Configure a packet-filtering firewall. Add rules to allow or deny access based on time of day and content. Enable Windows Firewall on each system. Add or remove exceptions to control access based on time of day and content. Configure each system's Local Security Policy to add access restrictions based on time of day and content. Explanation You should use a proxy server to control internet access based on user, time of day, and websites visited. You would configure these rules on the proxy server, and all internet access requests would be routed through the proxy server using these rules. You use a packet-filtering firewall, such as Windows Firewall, to allow or deny individual packets based on characteristics such as source or destination address and port number. You configure internet zones to identify trusted or restricted websites and to control the types of actions that can be performed when going to those sites. References  11.4.6 Internet Appliances  11.4.7 Internet Appliances Facts  14.9.3 Proxy Server Facts q_proxy_fct_control_internet_access_proxy_server_pp7.question.fex  Question 71:  Correct Your laptop's LCD screen is beginning to flicker and dim. You have checked the brightness setting to make sure that it is configured correctly. Which of the following is the MOST likely cause of your screen issue? The LCD screen is failing. The LCD screen inverter is failing. The system is configured to use an external display port. The video ribbon cable to the screen is disconnected. Explanation The most likely cause of your dimness and flickering is a failing LCD screen inverter. The inverter is a small electronic component that is used to power the LCD backlight. If the inverter fails or is failing, the backlight may flicker or go off, similar to a fluorescent bulb. If the LCD screen is failing, the system is configured to use an external display port, or the video ribbon cable is disconnected, you will most likely see a blank screen instead of flickering. References  12.7.2 Laptop Maintenance Facts  12.7.4 Laptop Troubleshooting Facts  12.7.5 Mobile Device Troubleshooting  12.7.7 Mobile Device Troubleshooting Facts q_lap_maint_failing_screen_inverter_pp7.question.fex  Question 72:  Correct A technician is tasked with configuring a mobile device to connect securely to the company network when the device is used at off-site locations where only internet connectivity is available. Which of the following should the technician configure? IMAP VPN Bluetooth Hotspot Explanation A VPN (virtual private network) creates an encrypted connection over a less secure network, such as the internet. Sometimes called a tunnel, a VPN allows users to access corporate applications and resources. IMAP (Internet Message Access Protocol) is an email protocol that can be used to synchronize email between multiple email clients on multiple devices. Bluetooth is a technology that wirelessly connects two devices in close proximity to each other. Bluetooth is most often used to connect peripheral devices (such as headphones, speakers, mice, and keyboards) to a computing device. A hotspot is created on a mobile phone to supply internet connectivity to multiple devices through the phone's cellular connection. References  12.5.2 Wireless and Cellular Data Connections Facts q_mob_devcon_secure_internet_connect_vpn_pp7.question.fex  Question 73:  Correct You are troubleshooting a malfunctioning laptop computer system. The customer has indicated that the screen is always dark and difficult to read, even while the system is plugged into a wall outlet. You checked the system and determine that the backlight isn't working. Which of the following is the MOST likely cause of this issue? The laptop video adapter is malfunctioning. The wrong AC adapter is being used with the system. The laptop battery is failing and needs to be replaced. The LCD cutoff switch is stuck in the Off position. Explanation It is possible that the notebook's LCD cutoff switch is stuck in the Off position. The cutoff switch is used to shut off the backlight (and sometimes the video display itself) when the notebook lid is closed. Press and release the cutoff switch to determine if this is actually the problem. Because the problem exists when the laptop is plugged in, you know the problem is not related to the battery or the AC adapter. If the backlight isn't working, it is probably not an issue with the video adapter. References  12.7.2 Laptop Maintenance Facts  12.7.4 Laptop Troubleshooting Facts  12.7.5 Mobile Device Troubleshooting  12.7.7 Mobile Device Troubleshooting Facts q_p_trb_lcd_cutoff_switch_stuck_off_pp7.question.fex  Question 74:  Correct You've just installed a new USB card reader on your Windows computer. Every time you perform a certain action using the card reader, you get an error message that you've never seen before. Which of the following actions should you perform FIRST? Replace the card reader with a new device. Uninstall the device and then reinstall it. Check the manufacturer's website for information about the error. Install the device on another computer. Explanation For information about a specific error, check the manufacturer's website. Taking any other action (such as replacing the card reader, installing the device on another computer, and reinstalling the device) might fix the problem but would most likely just waste time. In most cases, device-specific problems can be corrected with a new driver or other software update. References  2.7.1 Troubleshooting Process  2.7.2 Troubleshooting Process Facts q_trbl_sht_manufacturer_ref_pp7.question.fex  Question 75:  Correct Which of the following factors significantly determine the number of virtual machines that a host can accommodate? (Select two.) Installation of integration services (IS) on the virtual machine. The number of software applications installed on the host machine. What has been allocated by the Hyper-V manager. The components installed on host machine. The VHD file you want to use. Explanation The number of virtual machines a host can accommodate depends on the components installed on the host machine and what has already been allocated by the Hyper-V manager. The number of software applications installed on the host machine, the VHD file you want to use, and the installation of IS have little or no impact on determining the number of virtual machines that a host can accommodate. References  6.4.5 Hyper-V Facts q_win_virt_number_of_vms_on_host_pp7.question.fex  Question 76:  Correct Which of the following is simulated memory that is created through a paging file on the hard drive? Disk thrashing RAM Virtual memory VMM Explanation Virtual memory is simulated memory that is created through a paging file on the hard drive. Disk thrashing is when the amount of physical memory is so low that data must constantly be moved from physical RAM to disk and back again. RAM stands for random access memory, which is a system's physical memory. VMM is the Virtual Memory Manager, which is the utility in charge of swapping data between physical memory and the hard disk. References  7.7.1 Windows Virtual Memory  7.7.2 Manage Virtual Ram  7.7.3 Virtual Memory Facts  7.7.4 Configure Virtual Memory q_vmem_virtual_mem_def_pp7.question.fex  Question 77:  Correct You have an older computer that has four DDR2 memory slots. Currently, there are two 512- MB memory modules installed. You check the motherboard documentation and find that the system has a 4-GB memory limitation. You want to add more memory to this system. What is the maximum total amount of usable RAM you can have in this system by adding new memory modules (and without replacing the existing memory modules)? 1.5 GB 4.5 GB 3 GB 4 GB 2 GB 3.5 GB Explanation The two existing modules total 1 GB of RAM. You have two remaining slots with which you can add memory to the system. Because the motherboard has a 4 GB memory limit, there is also a 1 GB limit for each memory slot. So, you could add (at most) two 1-GB modules in the remaining slots, which would bring the system's total RAM to 3 GB. References  3.5.1 DRAM Types  3.5.2 Random Access Memory (RAM) Facts  3.6.1 Memory Characteristics  3.6.2 Memory Facts q_mem_char_max_usable_ram_pp7.question.fex  Question 78:  Correct Which of the following BEST describe a community cloud? (Select two.) Provides a combination of cloud resources from different service providers. Designed to be shared by several organizations. Access is granted to only the users within a single organization. Commonly hosted externally by a third party. Platforms, applications, and storage are made available to the general public. Explanation Two main characteristics of a community cloud is that it is:: Commonly hosted externally by a third party. Designed to be shared by several organizations. A private cloud only allows access to users within a single organization. A public cloud makes platforms, applications, and storage available to the general public. A hybrid cloud provides a combination of cloud resources from different service providers. References  6.3.2 Cloud Computing Facts q_cloud_cloud_serv_types_pp7.question.fex  Question 79:  Correct While sorting through a box of cables in your storage room, you find one that matches the configuration shown in the image. Which of the following BEST describes the type of cable configuration and the purpose for which it would be used? RJ-11 configuration used to connect wireless routers to phone line connections. Rollover cable configuration used to connect computers to routers for console management. Patch (or straight-though) cable configuration used to connect computers to network devices, such as switches and hubs. Crossover cable configuration used to connect computers directly to one another for networking. Explanation This is a crossover cable configuration. Using this configuration, computers can connect directly to one another. The easiest way to create a crossover cable is to arrange the wires in the first connector using the T568A standard and arrange the wires in the second connector using the T568B standard. The illustrated cable is not a patch (straight-through), RJ-11, or rollover cable. References  3.1.1 Network Cables  3.1.3 Twisted Pair Cable Facts  3.1.4 Twisted Pair Connector Facts q_cable_net_media_pp7.question.fex  Question 80:  Correct Jamie has been tasked with designing a solution for the paralegals in his office. They need to review old documents that are on paper files and create word processor documents from them that can be searched and cross-referenced. Which of the following devices should Jamie use to create the solution? (Select two.) Printer Digitizer Projector Scanner Biometric scanner Explanation Jamie should use a digitizer and a scanner for the solution. Both of these devices have the ability to perform the task of copying data from an analog source into word processing documents. Although some printers also have a scanner built into them, the printer function isn't what performs the task. Biometric scanners are for authentication. Projectors are for displaying computer content on a projection screen or wall. References  10.1.1 Peripheral Devices  10.1.2 Peripheral Device Facts  12.2.1 Display Components  12.2.3 Mobile Device Displays and Components Facts  12.4.1 Mobile Device Overview  12.4.2 Mobile Device Facts q_per_devices_digitizer_pp7.question.fex  Question 81:  Correct You are troubleshooting a company cell phone that is overheating. Which of the following is the FIRST action you should take to resolve the issue? Determine whether the user has been streaming data. Update the operating system. Determine whether the battery is warped or swollen. Close all applications. Explanation Swollen, warped, cracked, or broken batteries can be dangerous. If a cell phone is overheating, check for a defective battery first. If the battery is normal, closing applications may reduce the heat generated by the elevated workload. If the battery is normal, updating the operating system may increase efficiency, thereby reducing the workload that is causing the overheating. If the battery is normal, allowing the phone to rest and cool down reduces any heat caused by the increased workload of data streaming, such as watching an online movie. References  12.7.2 Laptop Maintenance Facts  12.7.4 Laptop Troubleshooting Facts  12.7.5 Mobile Device Troubleshooting  12.7.7 Mobile Device Troubleshooting Facts q_mob_trbl_overheated_cell_phone_issue_pp7.question.fex  Question 82:  Correct A technician suspects that data is being leaked from a tablet. Which of the following is the BEST tool to troubleshoot this issue? Force stop Wi-Fi analyzer App scanner Anti-malware Explanation An app scanner can test a mobile app for security flaws. This is the best option in this scenario. Anti-malware can safeguard a mobile device from malware and ransomware, but typically doesn't check poorly written or poorly configured mobile apps for vulnerabilities. A Wi-Fi analyzer can provide signal strength and signal quality information. This tool can detect unauthorized devices on a Wi-Fi network, but is not used to check mobile apps for security flaws. A force stop can be used to stop an application from running so that it can be uninstalled. This feature is not used to check mobile apps for security flaws. References  12.7.7 Mobile Device Troubleshooting Facts q_mob_trbl_app_scanner_leaked_data_pp7.question.fex  Question 83:  Correct You need to replace the hard disk in your laptop computer. Which of the following hard drive sizes should you choose for the laptop? 5.25" 3.5" 2.5" 1.25" Explanation Notebook hard drives and SSD drives are typically 2.5". 3.5" drives are normal-sized drives for desktop computers. 5.25" drives are for older hard drives and floppy drives. References  1.1.2 Computing Basics  1.1.3 Computing Facts  5.8.5 Disk Optimization Facts  12.1.1 Laptops  12.1.2 External Laptop Ports and Functions  12.1.3 Laptop Facts  12.1.5 Change a Laptop Hard Drive  12.1.9 Laptop Upgrade and Repair Facts q_nb_repair_laptop_hard_drive_size_pp7.question.fex  Question 84:  Correct You are in charge of putting together the display design for a new conference center at your orga

Use Quizgecko on...
Browser
Browser