Course Exam Flashcards

1
Q

You are troubleshooting a laptop with multiple sticking keys that result in misspelled words while the user types. Other than several sticking keys, the laptop appears to be functioning properly. You have cleaned the keyboard with compressed air, but the problem persists. After removing one of the key tops, it becomes apparent that a liquid was spilled into the keyboard.

Which of the following is the next step in resolving the issue of sticking keys?

A

Clean the keyboard keys with a contact cleaner.

Contact cleaner can be used to clean a keyboard in which liquid has been spilled. Contact cleaners readily evaporate without leaving any residue. If the keys continue to stick, you will need to replace the keyboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician needs to service a laptop computer that is experiencing an intermittent problem with the display.

Which of the following will be most effective at helping the technician complete the work in a timely and efficient manner? (Select TWO)

A

Document and label the location of the screws and cables before removing them.

Organize and place all parts and screws and in one place.

While most desktop computers contain only one or two types of screws, a laptop may have a variety of screws and washers in various sizes and lengths. It is imperative that a technician document and label screws and cables before removing them. Inserting a screw that is too long may penetrate a cable or circuit board and cause damage. Inserting a screw that is the wrong size can also strip the threads, causing the correct-sized screw not to tighten properly. Documenting and labeling locations will assist in reassembling the unit.

After documenting and labeling the location of the parts and screws, the technician needs to organize them and keep them in one place. Doing so will assist in reassembling the unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When is it okay to touch the inside of a computer that is turned on?

A

When using a multimeter to measure voltage output

Using a multimeter to measure voltage output is the only exception to touching the inside of a computer that is turned on. Even then, you should be very careful to avoid shock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which statement is NOT true regarding motherboards?

A

Has a heat sink on the PCIe slots

PCIe slots do not have heat sinks. PCIe slots are for expansion cards. If an expansion card requires additional cooling, then the expansion card may contain a heat sink. Heat sinks may be found on top of the CPU with a cooling fan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A technician has determined that a laptop keyboard will need to be removed in order to replace the laptop’s CPU cooling fan.

Which of the following steps will most likely be required before the technician can remove the keyboard from the laptop? (Select TWO.)

A

The keyboard bezel will need to be removed.

The keyboard cable(s) will need to be disconnected from the ZIF socket(s).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technician has determined that a laptop keyboard will need to be removed in order to replace the laptop’s CPU cooling fan.

Which of the following steps will most likely be required before the technician can remove the keyboard from the laptop? (Select TWO.)

A

The keyboard bezel will need to be removed.

The keyboard cable(s) will need to be disconnected from the ZIF socket(s).

The keyboard bezel is a part of the plastic covers of a laptop and is the cover that surrounds the top of the keyboard. For some laptops, the case top covers the keyboard. Regardless of whether the cover is the bezel or the case top, it will need to be removed first in order to remove the keyboard.

Typical laptop keyboards are connected to the system board via one or more ribbon cables. The system board end of the ribbon cable utilizes ZIF (zero insertion force) sockets. These cables will need to be disconnected prior to removal of the keyboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Motherboards may contain which of the following ports on the I/O panel?

A

RJ-45 LAN port

Multiple USB ports

PS/2 mouse and keyboard ports

Video ports (HDMI, DVI, or DisplayPort)

All of these (Correct)

Multiple USB ports, PS/2 mouse and keyboard ports, video ports, sound ports, RJ-45 LAN ports, and eSATA ports may be found on the I/O panel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What configuration can you find for PCIe slots?

A

x4
x1
x8
x16

All of these (Correct)

PCIe card slots are commonly configured as x1, x4, x8, and x16 representing the number of lanes used for input/output. Some slots may be configured to run differently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two different methods for partitioning hard drives?

A

Master Boot Record (MBR)
GUID Partition Table (GPT)

MBR is an older method of partitioning hard drives that allows four partitions and is limited to 2 TB drives.

GPT is a newer method of partitioning hard drives that will allow up to 128 partitions on the hard drive and must be used on drives larger than 2 TB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where must virtualization be enabled for VM (virtual machine) software to work?

A

BIOS/UEFI

Most computers require that virtualization be enabled in the BIOS/UEFI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following represents a method for accessing the BIOS/UEFI setup program?

A

Press a key or combination of keys during the BIOS/UEFI POST

You may access the BIOS/UEFI setup program by pressing a key or combination of keys, depending on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the laptop supports 8GB of RAM and that the computer is running only 4GB of RAM. Jenny would like to add four more gigabits of RAM. She opens the computer and finds that there is an open slot for RAM. She checks the other module and determines that the module has 204 pins.

What module should Jenny order?

A

O-DIMM DDR3

SO-DIMM DDR3 has 204 pins. The amount of data transferred using DDR 3 per second can range from 8.5GB to 14.9GB, depending on the speed of the FSB (front-side bus).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A processor housing that contains more than one processor is referred to as what term?

A

Multicore processor

Multicore processors contain more than one processor in the processor housing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of RAM is typically installed onto a motherboard and loses data rapidly, requiring it to be refreshed often?

A

DRAM

DRAM, or dynamic RAM, is the most common type of RAM and loses its data rapidly, so the memory controller must refresh it several thousand times a second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hybrid processors that can process 32 bits or 64 bits are known by what term?

A

x86-64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When selecting a processor to match system needs, what features should you NOT consider?

A

Finding the latest and most powerful processor available no matter the cost

Sometimes you will need to balance power with cost. The latest and most powerful processors will generally cost more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

George is involved with a project at work and notices that he has a pending update for his computer. George knows that updates are important, and he decides to take a break and complete the restart of the computer so that the update can install. After George restarts the computer, he notices that his AutoCAD program is running slowly. The issue continues to the point that George decides to call the technician and ask him to check what is going wrong on his computer. The technician tells George to turn the computer off and then on again and asks George how much RAM is counted. The amount of RAM is 8GB less than the amount that was installed on George’s system.

What hardware could be causing this problem? (Select all that apply.)

A

Motherboard
RAM

The motherboard DIMM slot could also be causing this problem. The best way to determine whether the motherboard is the problem is to remove and replace all the RAM, one module at a time. This process tests each slot to see whether a particular memory slot is the issue.

The most common cause of RAM not being detected is a memory module that is not seated properly. The technician should reseat all the RAM and see if that fixes the problem. If not, then he should check each RAM module individually by placing only one module in a RAM slot and restarting the system to see if a particular RAM module has gone bad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You are troubleshooting a computer that your client said turns off during normal operation. While you are trying to identify the problem, the client also informs you that if he waits a while, the computer will turn back on and run normally for a bit. You open the system and immediately notice a large dust buildup around the processor fan and heat sink.

What problem can you detect on the computer and confidently report to your client?

A

System is overheating.

The dust buildup is not allowing air to flow around the processor and is causing it to overheat. The processor has a diode that will shut the computer down before the processor is damaged. Therefore, your client can turn the computer back on after it has cooled down, and it will still work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You go to work after a long weekend and try to turn on your computer. When you push the button on the desktop, the system does not start to boot. The monitor turns on and displays a message saying that there’s no signal. When you push the desktop button again, you notice that the lights on the computer are turning on, but you don’t hear any sounds coming from the desktop.

What is a possible problem with your computer?

A

Power cord is unplugged.

An unplugged power cord will not allow a computer to turn on, as no power is available. This could have happened accidentally while your office was being cleaned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Paul is playing a game when his computer shuts down unexpectedly. Paul has noticed recently that his fans are running very loud. When Paul turns his computer back on, it starts to boot and then shuts off again.

What is a possible problem with Paul’s computer?

A

Computer is overheating.

His computer is likely overheating, causing the computer to shut down. The fans running louder than usual indicates that the heat sensor is detecting that the processor’s temperature is rising.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When testing your theory, you discover that you are wrong.

What is your next step in the troubleshooting process?

A

Establish a new theory of probable cause.

You should establish a new theory of probable cause. You may want to gather more information and do research on the Internet.

22
Q

Jessica wants to purchase a new hard drive. She wants a drive that has fast access because she will use it to edit videos on her PC. She also needs a lot of storage and wants to have at least 4 TB available to save her videos. Jessica wants to keep the cost down as much as possible possible.

What type of hard drive should Jessica purchase?

A

7200 RPM magnetic HDD

In this scenario, the 7200 RPM HDD is the fastest magnetic hard drive. Its speed is enough for Jessica’s video editing. SSD HDD offers faster access time but costs approximately $350 more for the 4 TB hard drive

23
Q

You are installing a new hard drive in a system in which the hard drive will run at 6.0Gbps.

What can you use to determine whether the SATA port no which you are connecting the drive will also run at 6.0Gbps?

A

Motherboard manual.

The motherboard documentation will indicate the standard for each SATA connection on the motherboard. You will find the documentation online at the manufacturer’s website.

24
Q

What SATA standard provides a transfer rate of 3 Gb/sec?

A

SATA2

SATA2 or SATA II is rated at 3 Gb/sec.

25
Q

If you are adding a hard drive to a system that already has a drive with Windows installed on it, what should you do?

A

Boot Windows and use Disk Management to prepare the new drive.

If you are installing a second hard drive in a system that already has Windows installed on it, you should boot Windows and use Disk Management to prepare the new drive.

26
Q

Tim has an old server computer that his company uses as a backup. One of the hard drives has gone bad and needs to be replaced. The cable that the hard drive uses is not one that Tim has ever seen before, so he posts a picture of it on the company collaboration board to get help in deciding what type of hard drive he will need to order.

Identify the type of cable from the picture.

A

SCSI

This picture shows a SCSI cable. SCSI (Small Computer System Interface) allows up to 15 devices to connect inside or outside the computer. Each device has a priority number that tells the controller who has priority on the line. SCSI hard drives are used primarily on server computers.

27
Q

Today when Dylan turned on his computer, he noticed that the monitor was very dim. He could still see the desktop icon and text. He turned the brightness all the way up, but that did not correct the issue. Dylan also checked to make sure the Power Options brightness was not turned down, causing the screen to go dim. He connected a different monitor, and the screen was fine.

What caused the screen to be very dim?

A

Monitor backlighting.

The backlight on the monitor can go bad, and when it does, the monitor will look very dim. Dylan can replace the backlight, but it is generally more expensive than replacing the monitor.

28
Q

You are using a new LCD monitor and notice that the icons and images look distorted or elongated.

What video setting can you use to fix this problem?

A

Resolution

The cause of the distortion is the resolution. If the LCD has a recommended resolution, use it or use the highest resolution available.

29
Q

Jordan has been asked to help his company find a way to allow all the workers to log on to computers securely but without using a user name and password. The CIO wants everyone use face recognition software.

What peripheral will be needed on each computer to allow the workers to log on using face recognition software?

A

Camera or webcam

The company can use a webcam/camera for face recognition software. The webcam can take a picture of a face and compare it to a stored picture. The software compares points on a person’s face to verify he is the person in the photo.

30
Q

Sherri has recently been injured. She is having a problem using her left hand and would like to use a stylus to move her mouse around the screen on her laptop computer.

What device can Sherri add to her system to allow a non-touch screen laptop to use a stylus to manipulate the screen?

A

Digitizer

Sherri can add a digitizer to a monitor. She will connect it to the computer via a USB port and place the digitizer so that it can read the stylus. This will allow Sherri to use a stylus to manipulate the screen.

31
Q

Jimmy is running out of desk space. He keeps three computers on his desk. The three computers can’t be moved, and they need to be running at the same time. Currently Jimmy has three mice, keyboards, and monitors running on his desk.

What can Jimmy do to free up space on his desk?

A

Use a KVM switch.

A KVM switch will allow Jimmy to have one keyboard, mouse, and monitor for all three computers. He can select which computer he wants to use via a button on the KVM switch.

32
Q

Match the protocol or encryption name with the feature.

A

TKIP Generates a different key for every transmission;
however, the encryption algorithm used for its
calculations is no longer considered secure.

WEP No longer considered secure because the key
used for encryption doesn’t change.

WPA2 Typically uses AES for encryption.

AES Current encryption algorithm used today.

WPA Typically uses TKIP for encryption.

33
Q

The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network.

What is the first step Derek should perform to secure the wireless router?

A

Change default user name and password.

The first thing Derek should do is change the default user name and password to the router, because they can be found easily on the Internet, and if an unauthorized person were to gain access to the company’s network, he would be able to change the settings.

34
Q

A corporate user is attempting to connect to the company’s Windows domain server on the local network with her new laptop through a wired connection.

Which of the following is required for the user to successfully sign in to the Windows domain?

A

Windows domain user name and password

The user must have a valid user name and password configured on the Windows domain controller to authenticate on the network.

35
Q

Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps?

A

Fourth-generation cellular

Fourth-generation (4G) cellular technology uses LTE technology with speeds ranging from 100 Mbps to 1 Gbps.

36
Q

What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest?

A

WAN, MAN, LAN, PAN

This list is from largest to smallest.

37
Q

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA/EIA 568B standard.

Which wire color code will you use starting with pin 1 of the modular plug?

A

Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown

This is the correct color code for the T568B standard starting with pin 1.

38
Q

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)

A

Port 443
SSH

Port 443 is used for secure HTTP (Hypertext Transfer Protocol) web transmissions. HTTPS refers to HTTP working with a security protocol such as SSL (Secure Sockets Layer) or TLS (Transport Layer Security).

SSH (Secure Shell) protocol is assigned port 22 and is used in various situations for encryption, making SSH secure. One application for SSH is as a secure alternative for Telnet.

39
Q

A company requires an Ethernet connection from the north end of its office building to the south end. The distance between connections is 161 meters and will need to provide speeds of up to 10 Gbps in full duplex mode.

Which of the following cable combinations will meet these requirements?

A

Multimode fiber cable with MT-RJ connectors

Multimode fiber is the best option for 10 Gbps speeds at distances over 100 meters.

40
Q

A new Cat6 cable run and keystone jack were installed for a workstation that was moved from the sales department to the shipping department. Since the move, the user has been complaining of slow transfer speeds on both Internet and local network communications. The technician ran a test and is viewing the following output on the tester.

Which of the following is the most likely reason for the sluggish network speeds?

A

The cable run exceeds the specifications for Ethernet over twisted pair.

The length of the cable run exceeds the specifications for Ethernet causing the NIC and switch to auto-negotiate to 10 Mbps and half-duplex. The distance limitation for Cat6 UTP is 100 meters (328 feet)

41
Q

A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in the following message, “Could not find this item. Verify the location of ‘\FileServer\Docs’ and try again.”

Which of the following is the most likely cause for this message?

A

The share to the file server is disconnected.

The most likely reason for this error is that the share is currently not available either on just the user’s computer or server-wide. The next step would be to check for the scope of the problem.

42
Q

John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the data to be synchronized, this service uses a process in which the cloud service and the client on the smartphone will verify the security of all devices’ security certificates.

What type of security does the cloud-base service employ?

A

Mutual authentication

Mutual authentication is a security feature in which a both entities in a communication link must prove its identity to all devices.

43
Q

Several of the contacts in your mobile device are responding to test messages that you sent them. However, you don’t remember sending any of the messages.

Which of the following is the reason for this behavior?

A

Your device is sending spam messages to your contacts.

Your device is infected with malware that is sending spam messages via your contact list.

44
Q

Your company wants to purchase a device that will allow it to give customers a 3D tour of its facility.

What kind of device would you recommend for this type of 3D tour?

A

Tethered VR headset

To give the best experience possible on the 3D tour, the company should use a tethered VR headset. A tethered headset uses a computer to render 3D graphics, allowing a more in-depth 3D experience.

45
Q

James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files.

How can James select what to synchronize from his phone to Google storage?

A

Settings app

In the Settings app, James can navigate to the Google section. There he will navigate to Backups, where he can change what he wants to back up to Google.

46
Q

A mobile phone user in your company is experiencing dropped phone calls. While interviewing the user, you determine the problem started after she checked her email this morning. No other mobile devices in the organization are dropping calls.

Which of the following is the most likely reason for the dropped calls?

A

Malware is interfering with the calls.

The device most likely infected with malware while the user was checking her email, and the malware is attempting to eavesdrop on the phone calls.

47
Q

A user contacted the help desk to report that the laser printer in his department is wrinkling the paper when printed. The user checked the paper in the supply tray, and it is smooth and unwrinkled.

Which of the following is the most likely reason for the wrinkled paper? (Select TWO.)

A

The paper is damp when run through the printer.

The paper does not meet the requirements for the printer.

Damp paper can crease when run through a printer and can cause jams. Paper that is damp can also exhibit image quality problems such as blotchy prints.

If paper is too thin, it can crease when running through the printer. Check the paper specifications for the printer.

48
Q

The receptionist’s directly connected laser printer is printing blank sheets. The technician assigned to the trouble ticket has replaced the toner. However, blank pages continue to print from the receptionist’s PC.

Which of the following steps should be performed next?

A

Print a test print from the printer’s console.

A test print from the printer’s console is necessary to determine the scope of the problem. Is the problem with the printer, OS, driver, application, and so on?

49
Q

A new printer has been added in your office and connected to a WAP for use by all users in the company.

Which of the following best describes the method of connectivity for the new printer?

A

Wireless infrastructure mode

Wireless infrastructure mode is a connectivity method in which devices connect to a central connectivity device such as a WAP (wireless access point). This would be the most likely wireless method of connectivity for a shared printer connected to a WAP.

50
Q

Molly, a technician, has been tasked with researching an emulator for the software developers to test cross-platform applications on various PCs and a variety of mobile devices.

Which of the following will be a required step in selecting an emulator? (Select TWO.)

A

Verify the system requirements of the hypervisor.

Verify the hypervisor software supports the emulator needed for testing.

The hypervisor must be researched to determine whether the workstation running the hypervisor software can support this software.

Hypervisors can emulate hardware devices and present this information to each VM. Hypervisor support is essential in the selection process.

51
Q

A company needs a way to convert 10 years of shipping records currently on paper into files that can be saved to its private cloud storage.

Which of the following will be the best choice to accomplish this goal with the least amount of employee effort?

A

Use a dedicated ADF scanner connected to either a workstation or the LAN.

With 10 years of paperwork to scan, an ADF scanner would be the best choice because stacks of paper can be scanned through the automatic feeder.