Exam 1 Flashcards

1
Q

A6. The printer in the accounting department has stopped all printing
processes. The print queue shows that there are seven jobs in the queue
that are waiting to be printed. Which of the following would be the BEST
next troubleshooting step?

A

The Answer: B. Restart the printer’s spooler
The print spooler is the software responsible for storing print jobs and
sending them to the printer. If the printer spooler has failed or has
stopped, then none of the print jobs will be sent to the printer.
The incorrect answers:
A. Send a test job to the printer and move it to the top of the queue
Since the print spooler is the issue, it won’t matter where a print job might
be in the queue. A test print job will sit at the top of the queue just like
any other print job.
C. Install an updated version of the printer driver
The printer driver on a client workstation is responsible for formatting
the print job in a way that the printer can properly interpret during the
printing process. Changing the print driver won’t fix problems with the
print spooler.
D. Delete everything in the queue and resend the print jobs
If the spooler is having problems, then deleting the print jobs will only
require users to resend the print requests, which will then sit in the queue
and not print

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A system administrator has connected an external USB drive to a
computer to transfer some documents. When booting the computer, the
system tries to boot from the external drive and gives an error message.
Which of the following would be the BEST way to prevent the USB drive
from booting?

A

The Answer: A. Modify the BIOS to boot from the internal hard drive
The boot order is managed in the system BIOS, and one way to avoid the
computer from attempting to boot from an external storage device is to
move the internal drive to have a higher boot priority.
The incorrect answers:
B. Modify the boot order in Windows Disk Management
Windows Disk Management is not used to configure the boot order of
the computer. By the time Windows has loaded, the boot order has already
been determined. The boot order is configured in the system BIOS.
C. Rebuild the MBR on the external hard drive
Rebuilding the MBR (Master Boot Record) of the external hard drive will
not prevent the computer from attempting to boot to the drive.
Rebuilding the MBR would only be necessary if the boot record was
erased or damaged.
D. Disable the external drive in Device Manager
Since Windows Device Manager is only active after the system boots,
disabling the external drive would not prevent the boot process. Disabling
the drive in Device Manager would only prevent Windows from accessing
the drive once the system was booted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A8. A computer has been configured with an SSD, a high-end video adapter,
and the maximum amount of RAM. Which of the following would be the
MOST likely use for this computer?

A

The Answer: C. CAD/CAM workstation
The graphical designs created by a CAD/CAM (Computer Aided
Design / Computer Aided Manufacturing) computer requires high-speed
SSD (Solid State Drive) storage, high-end video, and as much RAM as
possible.
The incorrect answers:
A. Thin client
A thin client is a computer with the minimum hardware resources
required to perform a remote desktop or remote control function. The
applications used on a thin client are run on a remote server, so the local
device does not require any high-end components.
B. Network attached storage device
A NAS (Network Attached Storage) server requires plenty of storage and
high-speed networking, but does not require advanced video functionality.
D. VDI client
VDI (Virtual Desktop Infrastructure) clients display applications that are
running on other servers, and it’s very common to run VDI clients on thin
clients or other minimally-configured systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A9. A network connection in a conference room was installed years ago, and
there’s no documentation for the cable run. Connecting a device to the
cable results in a successful Ethernet connection, so the other end of
the cable should terminate somewhere in the wiring closet. Which of
these tools would be the best choice to find the other end of the network
connection?

A

The Answer: B. Tone generator
A tone generator is used to produce an analog tone on the cable, and an
inductive probe is used to “listen” for the tone on the other end of the
cable.
The incorrect answers:
A. Cable tester
A cable tester could be used to confirm the wire map of the cable, but you
would first need to locate both ends before that would be possible. A cable
tester doesn’t provide a way to locate both ends of a cable.
C. Multimeter
A multimeter could be used to verify continuity and the wire map of the
cable, but both ends of the cable would need to be close to the multimeter.
A multimeter can’t be used to locate both ends of a cable.
D. Crimper
If the RJ45 connector on the cable was faulty, a crimper could be used to
attach a new connector to the cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A10. A client’s laptop has recently had its internal mini-PCIe wireless adapter
card replaced. Although Device Manager shows the card working
properly, the wireless card management software shows very low signal
strength. The wireless card keeps dropping its wireless connection and
will not maintain a consistent network link. What is the most likely
reason for this problem?

A

The Answer: B. The wireless adapter antenna cable isn’t connected
The antenna cable connectors are very small, and it’s easy to leave them
disconnected after working inside of a laptop. A missing antenna cable
will cause the wireless signal strength to be very low, and often there’s not
enough signal strength to reliably send or receive data.
The incorrect answers:
A. The mini-PCIe card isn’t compatible with the laptop
The mini-PCIe (mini-Peripheral Component Interconnect Express)
standard will install into any laptop’s mini-PCIe interface. If the laptop
was not compatible, the shape and physical format of the interface would
not allow the adapter to be installed.
C. The operating system doesn’t support the wireless card
An incompatible mini-PCIe adapter would not be usable by the operating
system. In this example, the adapter card was operational except for the
low network signal.
D. The wireless card is administratively powered off
If the adapter was powered off, it would not have been able to show signal
strength data in the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A11. A user has powered on their computer and received the message
“Operating system not found.” A check of the system shows that the hard
drive cables are properly connected. Which of the following would be the
NEXT best troubleshooting step?

A

The Answer: D. Check for removable drives
If a USB (Universal Serial Bus) storage device is connected to a computer
and the BIOS (Basic Input/Output System) is checking USB devices
before the primary storage drive, the “Operating system not found” error
could appear with some USB devices. To avoid this error, the boot order in
the BIOS can be changed, or the USB device can be disconnected during
the boot process and reconnected after the operating system has started.
The incorrect answers:
A. Boot to Safe Mode
Safe Mode is a Windows mode that will launch the operating system with
minimal services and OS requirements. Safe Mode requires a bootable
drive, so the error message in this question would prevent Safe Mode
from starting.
B. Replace the boot drive
There’s not enough information to determine if the boot drive is bad or
faulty, so immediately replacing it would be premature. If there aren’t any
removable storage devices connected to the system, then running hardware
diagnostics of the drive would be a good next step before considering a
hardware replacement.
C. Restore from a known good backup
This question doesn’t provide enough information about the state of the
primary boot drive, so making any significant changes to the data on the
drive would not be the best next step.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A12. A user is having an issue with a smartphone not recognizing their
location on a map. All other Internet and phone features are working
properly. Which of the following would be the MOST likely cause of this
issue?

A

The Answer: A. GPS is disabled
The GPS (Global Positioning System) option on a smartphone provides
precise location services for apps and utilities. The map feature on the
smartphone uses the GPS to help determine the location, speed, and
direction of the user.
The incorrect answers:
B. The battery is low
Although some mobile devices will minimize unnecessary services when
the battery is low, a notification is usually provided to inform the user of
this situation. A low battery would not be the most likely reason for the
GPS to be disabled.
C. Wi-Fi is enabled
Wi-Fi would actually help with location services, especially when a clear
view of the sky and GPS satellites is not available. Enabling Wi-Fi would
not cause any issues with apps that need location services.
D. Storage space is low
Location services do not require any significant storage space on a
smartphone, so a lack of storage would not cause any issues with apps that
need to use location services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A13. A client’s laptop sounds like it is booting normally, but nothing appears
on the LCD display. After closer inspection, you notice the output is
visible but it’s too faint to clearly see anything. What is the MOST likely
cause of this issue?

A

The Answer: B. Inverter
The inverter powers the CCFL (Cold Cathode Fluorescent Lamp) LCD
(Liquid Crystal Display) backlight, allowing you to easily view the pixels
on the display. Most newer laptops will use LED (Light Emitting Diode)
backlights that use the existing DC (Direct Current) power and don’t
require an inverter.
The incorrect answers:
A. Video card
A faulty video card might cause the video display to stop working
completely, or the information on the screen may be corrupted. A faulty
video adapter does not commonly cause the display to have a decreased
backlight setting.
C. Video driver
Bad video drivers often cause issues with resolution settings or aspect
ratios, but a bad video driver does not commonly affect the backlight
settings.
D. Power adapter
A bad power adapter would cause a laptop to fail during the boot process
or fail to properly charge a battery. A bad power supply would not usually
cause everything to work properly except for the backlight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A14. A graphics designer is experiencing increasing delays when accessing files
on her hard drive. The user maintains a daily backup of all data on the
drive. Which of these would be the BEST next troubleshooting step for
this issue?

A

The Answer: B. Perform a hard drive diagnostic
Before making any changes, it would be useful to gather more information
about this problem. A hardware diagnostic would determine if the hard
drive itself is working properly. If the hard drive is operating normally, the
troubleshooting process can then shift to the operating system
and software.
The incorrect answers:
A. Reinstall Windows
Reinstalling Windows won’t help if the hard drive is not operating
properly. The reinstallation process is also a time-consuming and is a
significant change, so it’s important to know if the underlying hardware is
working.
C. Restore from the daily backup
The root cause of this issue hasn’t been identified, so any significant
change to the user’s data would be premature. The user may have also
modified some of this data since the backup was taken, so restoring the
backup could potentially lose data.
D. Boot to Safe Mode
Safe Mode will start Windows with a minimal configuration, and this
could help troubleshoot software issues with the operating system itself.
Before analyzing the software, it would be important to know if the
underlying hardware is working properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A15. Which of the following would be MOST likely found on a DVD-ROM?

A

The Answer: A. Document archive
The DVD-ROM (Digital Versatile Disc - Read Only Memory) format
has the advantage of a relatively large storage area and the ability to
write once and never worry about an accidental deletion. The storage of
documents and other files is a common use of DVD-ROM optical discs.
The incorrect answers:
B. Operating system boot files
Although it is possible to boot an operating system from a DVD-ROM,
it’s not a common use of the format. It’s much more common to store
operating system files on a local storage drive with a higher storage
capacity and throughput, such as a hard drive or SSD (Solid-State Drive).
C. RAID parity files
A RAID (Redundant Array of Independent Disks) array requires that all
of the data and parity information reside on the local storage drives. Parity
information would not be stored on a DVD-ROM disc.
D. BIOS configurations
BIOS configurations need to be accessible from the motherboard of a
computer, and not from other storage devices. BIOS configurations would
not be found on a DVD-ROM disc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A16. When a user starts their computer, the screen remains blank and the
computer beeps twice. Which of these would be the MOST likely cause
of this issue?

A

The Answer: B. The memory is faulty
The POST (Power On Self Test) is the initial hardware check that occurs
during the startup process. If a major hardware component is faulty, the
computer will beep and a message will be displayed on the screen. If the
issue is related to a critical component, the computer will not be able to
display a message on the screen and instead will beep a certain number of
times as a code to specify the error.
The incorrect answers:
A. The boot device is not connected
A missing boot device would display the normal BIOS startup and display
a message on the screen for “No Boot Device Found.”
C. The operating system has become corrupted
A bad operating system would display the normal BIOS startup messages.
When the operating system attempted to load, the OS will provide error
messages on the screen for any issues related to the corrupted files.
D. The PC is infected with malware
A malware infection would not commonly cause a system to boot with
a blank screen and a beep code. Malware would be identified once the
operating system has started.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A firewall is configured to block email transfers from a remote server.
Which of the following ports is the firewall blocking?

A

The Answer: D. 25
Port 25 is used by SMTP (Simple Mail Transfer Protocol) to send email
messages from devices and transfer those messages between SMTP email
servers.
The incorrect answers:
A. 443
Port 443 is commonly used by web browsers to transfer information using
SSL (Secure Sockets Layer) or TLS (Transport Layer Security) encryption
protocols.
B. 22
The SSH (Secure Shell) protocol uses port 22 as an encrypted terminal
communication. SSH is commonly used to access the command line
terminal of remote devices and servers.
C. 23
Port 23 is used by Telnet for non-encrypted terminal communication
between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A18. A technician is connecting a laptop to an LCD projector in a conference
room. The display on the laptop works properly, but the projector image
is constantly flickering and pixelating. The technician has modified the
resolution and refresh rates, but the projector image continues to flicker.
Which of the following would be the BEST next troubleshooting step?

A

The Answer: A. Replace the video cable
A display issue associated with flickering and poor video quality would
commonly point to the connection between the video adapter and the
display device. In the case of an LCD (Liquid Crystal Display) projector,
there’s sometimes a very long (and very worn) cable that can cause signal
issues to show on the projected image.
The incorrect answers:
B. Disable the laptop display
Disabling the laptop display won’t help with any signal problems, and
would probably hinder the troubleshooting process because you wouldn’t
be able to properly see the display information due to all of the flickering
and pixelating.
C. Replace the projector bulb
The bulb in an LCD projector either works or doesn’t, so it will be very
obvious if the bulb is faulty. In this example, the projector bulb is working,
but the information displayed on the projector is an issue.
D. Power cycle the projector
The projector itself would not commonly cause any display flickering
or image problems, so power cycling the projector wouldn’t normally
resolve this type of problem. If all other troubleshooting tasks fail, then
power cycling everything might be an option, but it wouldn’t be the first
troubleshooting step.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A19. The stylus on a Windows tablet will no longer interact with the user
interface. Which of these would be the MOST likely cause of this issue?

A

he Answer: A. Digitizer
The digitizer is the component in a touch screen that converts the
analog input from a fingerprint or stylus into a digital input that can
be understood by the computer. If the digitizer is having an issue, then
problems will occur with any direct screen input.
The incorrect answers:
B. Backlight
An LCD screen does not produce any light, so a backlight is used to make
the screen bright enough to see. The brightness of the screen does not have
any effect on the stylus.
C. Antennas
There are a number of antennas in a computer for 802.11 networks and
Bluetooth connections. The stylus does not use any of these antennas.
D. Inverter
An inverter is used in older LCDs (Liquid Crystal Displays) to invert DC
(Direct Current) power into AC (Alternating Current) power. This AC
power is used by CCFL (Cold Cathode Fluorescent Lamp) backlights.
Most of the newer LCD displays contain LED (Light Emitting Diode)
backlights that use the existing DC power and do not require an inverter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A20. A user in the accounting department needs to output a form on the laser
printer that prints on both sides of the page. Which of the following
options should be configured in the accounting software?

A

The Answer: C. Duplex
The duplex setting prints the output on both sides of the page, and a
printer that supports duplexing will flip the page over without any manual
intervention from the user.
The incorrect answers:
A. Collate
When printing multiple copies, the collate option will print all of the
pages in a document before printing the next copy.
B. Orientation
The orientation setting will change the output between portrait or
landscape. The orientation option will not change which sides of the page
are used.
D. Resolution
The resolution setting will modify the number of dots per inch used for
the output. A larger number of dots per inch will increase the resolution
and make the text and images appear sharper on the page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A user needs to connect their laptop to the wired Ethernet network, but
the laptop does not have an integrated Ethernet interface. Which of the
following would allow the laptop to connect to an Ethernet network?
(Pick TWO)

A

The Answer: A. Docking station
C. USB to Ethernet adapter
There are a few ways to create a wired Ethernet connection on a laptop
computer. Using a docking station is a common solution that provides
many different interfaces, and often includes the ability to install a fullsize PCI Express (Peripheral Component Interconnect Express) adapter.
A USB (Universal Serial Bus) to Ethernet adapter is a simpler solution
that only provides an Ethernet interface, but it’s much more portable than
a docking station.
The incorrect answers:
B. VGA interface
A VGA (Video Graphics Array) interface is an interface for video output
and does not provide Ethernet connectivity.
D. DisplayPort to HDMI cable
Both DisplayPort and HDMI (High-Definition Multimedia Interface)
provide video output and are not used for Ethernet on a laptop computer.
E. DVI to HDMI adapter
DVI (Digital Visual Interface) and HDMI are video interfaces and do not
provide a wired Ethernet link.
F. Bluetooth
Bluetooth is a wireless PAN (Personal Area Network), and it does not
provide wired Ethernet connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A22. A server administrator has received an alert showing that one drive in a
RAID 1 array has failed. Which of the following would be the best way
to resolve this alert?
❍ A. Replace the bad drive and resync the array
❍ B. Replace all drives in the array and resync the array
❍ C. Replace the bad drive and restore from backup
❍ D. Convert the array to RAID 0 and replace the drive
❍ E. Replace all drives in the array and restore from backup
The Answer: A. Replace the bad drive and resync the array
A RAID 1 (Redundant Array of Independent Disks, level 1) array is a
mirrored array, which means that all of the information on one physical
drive is also copied and maintained on a separate drive. If one drive fails,
then the drive with the redundant data continues to be available. To
repair the array, the bad drive needs to be replaced and the data from the
redundant drive is synchronized to the new drive.

A

The incorrect answers:
B. Replace all drives in the array and resync the array
A RAID 1 array continues to run after a drive outage, and all data
continues to be available. There’s no reason to replace all of the drives in
the array, and if all drives were replaced there would be nothing to resync.
C. Replace the bad drive and restore from backup
Since no data is lost after a single drive failure in a RAID 1 array, restoring
from backup is not necessary.
D. Convert the array to RAID 0 and replace the drive
RAID 0 is striping data across drives, and there is no redundancy in a
RAID 0 array. It’s not common to convert arrays between RAID levels,
and a conversion is not necessary to restore full functionality to this
RAID 1 array.
E. Replace all drives in the array and restore from backup
There’s no need to restore from backup when replacing a single drive in a
RAID 1 array.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A23. A system administrator is building a server for a data center in another
country. The server will manage a print queue and provide a local storage
partition for temporary file transfers. Which of the following power
supply specifications will be the MOST important for this server?

A

The Answer: A. Voltage input options
Connecting to the power source in a different country is an important
consideration when selecting a power supply. If the voltage specifications
are incorrect, the server may not operate at all or components in the server
may be damaged. Many servers use auto-switching power supplies are
compatible with the power systems in other countries.
The incorrect answers:
B. Number of PCIe connectors
PCIe (Peripheral Component Interconnect Express) is a standard bus
type, and some of the adapters on this bus may require additional power.
However, none of the requirements of this server would need more PCIe
connectors than a standard power supply.
C. Modular cabling
Using a power supply with modular cables can help with airflow, but this
modularity isn’t a requirement for most systems. Most data centers are
climate controlled, so it shouldn’t be difficult to maintain a reasonable
temperature with a non-modular power supply.
D. Fan noise rating
A data center is usually quite noisy, so the noise rating of a power supply is
not going to be a significant concern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A24. Which of the following ports are used for file transfers? (Select TWO)

A

The Answer: A. 21 and E. 20
FTP (File Transfer Protocol) is a standard method of transferring files
across different operating systems. FTP uses TCP (Transmission Control
Protocol) port 21 for control messages and port 20 to transfer data.
The incorrect answers:
B. 110
Port 110 is the default port for POP3 (Post Office Protocol version 3).
POP3 is commonly used to retrieve email messages from an email server
into a local email client application.
C. 25
Another common email protocol is SMTP (Simple Mail Transfer
Protocol), which uses port 25 for sending mail to a mail server and to
transfer email messages between mail servers.
D. 23
Non-encrypted (in-the-clear) terminal communication is provided with
the Telnet (Telecommunication Network) protocol over port 23.
F. 53
Port 53 is the default port for DNS (Domain Name System). DNS is
commonly used to convert fully qualified domain names to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A25. Which of these technologies do not require a backlight to provide a
viewable display?

A

The Answer: C. OLED
An OLED (Organic Light Emitting Diode) display emits light when a
current is provided to an organic compound, so a backlight would not be
necessary with an OLED display.
The incorrect answers:
A. LCD
An LCD (Liquid Crystal Display) screen does not produce any light, so
a backlight is required to see the screen contents. Most LCD displays use
LEDs (Light Emitting Diodes) or CCFLs (Cold Cathode Fluorescent
Lamps) as a backlight.
B. IPS
IPS (In Plane Switching) LCD monitors provide excellent color
representation, but they are still LCD displays that require a backlight.
D. LED
LED is a type of backlight that is commonly used on LCD displays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A26. A system administrator has tripped over an Ethernet cable and the cable’s
RJ45 connector has broken. Which of the following should be used to
resolve this issue?

A

The Answer: D. Crimper
A crimper is used to attach a modular connector to a cable. In this
example, a new connector can be reattached to the cable using an RJ45
(Registered Jack type 45) crimper.
The incorrect answers:
A. Punch-down tool
A punch-down tool is used to connect wires to punch-down blocks, such
as a 110 block. A punch-down tool can’t be used to attach a new RJ45
connector to a cable.
B. Tone generator and probe
Tone generators and inductive probes are used together to find the two
ends of a cable run. Toner probes are not used to connect RJ45 connectors.
C. Cable tester
Cable testers can identify the wire map of a cable. Once the crimper has
been used to attach the RJ45 connector, the cable tester can confirm that
the connector is properly wired. Cable testers are not used to connect
modular connectors to a cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A27. A network administrator is troubleshooting a network outage, and she
believes that the issue is related to a bad switch. The old switch is replaced
with a newer model and the cabling is moved to the new switch. Which
of the following should be the NEXT troubleshooting steps? (Choose
TWO)

A

The Answers: B. Verify full system functionality, and
E. Document the findings
Once the theory has been tested, a plan of action has been determined,
and the plan has been implemented, it’s important to verify that full
system functionality has been restored. After all of this work, it’s useful to
document the problem, the proposed solutions, and the ultimate fix. This
problem might occur again, and it would be useful to have some historical
documentation on how to address the issue.
The incorrect answers:
A. Test the theory
The testing of possible theories should occur before making any changes.
In this example, the replacement of the switch is the theory that was tested
in the lab prior to implementation.
C. Establish a plan of action
The plan of action was created prior to the replacement of the switch.
The plan design might be relatively simple or may have a complex
set of processes. The complexity of the plan generally depends on the
organization and the type of problem.
D. Identify the problem
Identifying the problem is the first step in the troubleshooting process.
Before you can resolve an issue, it’s important to fully understand what
might not be working.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A28. A gaming enthusiast is building her own computer to provide the best
performance with 3D action games. Which of these would be the most
important components of a gaming PC? (Choose TWO)

A

The Answers: C. High-end GPU, and E. SSD
The GPU (Graphics Processing Unit) is an important consideration when
building a gaming computer. Many computer games also read extensively
from storage, so the speed of an SSD (Solid State Drive) will provide the
fastest possible data access.
The incorrect answers:
A. RAID array
A RAID array (Redundant Array of Independent Disks) is useful when
uptime is an important priority. Since gaming is generally considered
a leisure activity, ensuring one-hundred percent uptime isn’t usually
associated with this uptime requirement.
B. Small form factor
A small form factor refers to the size of the computer case, and gaming
systems don’t usually need to fit in a small cabinet or a limited space.
D. Built-in tuner
Television tuners are useful when capturing television signals, but gaming
systems don’t often need this functionality.
F. Network-connected printer
Printers are useful for sharing physical documents and other files, but they
have limited use for a gaming system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A29. What type of device connects multiple computers to the network, but
becomes less efficient as network traffic increases?

A

The Answer: B. Hub
A hub operates as a multi-port repeater, where incoming traffic is repeated
to every other port in the hub. If more than one device attempts to do this
at the same time, these conflicting signals are called a collision. Each time
a collision occurs, the sending devices have to stop transmitting, wait a
random amount of time, and try sending traffic again. If many devices are
sending large amounts of data, the overall network efficiency will decrease
as the number of collisions increase.
The incorrect answers:
A. Switch
A switch makes forwarding decisions based on destination MAC (Media
Access Control) address and can communicate over full-duplex links. This
communication method ensures that no collisions can occur.
C. Repeater
The relatively simple forwarding process of a repeater ensures that
slowdowns will not occur as network traffic increases.
D. Router
Routers forward traffic based on the destination IP address, and this
process does not create an inefficiency as the network traffic increases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A30. In which of the following would a Lightning cable MOST likely be used?

A

The Answer: D. Charge a mobile device
The Lightning interface is a proprietary interface used exclusively
on mobile devices from Apple. The Lightning interface is a common
connection for data transfers and power charging for most Apple mobile
devices.
The incorrect answers:
A. Connect a server to a display monitor
Although there are video output adapters available for Lightning
connectors, these options are currently only available for Apple’s phones
and tablets and is not used on standalone computers or servers.
B. Increase the available memory of a device
Although there are options to provide external storage using a lightning
connection, the memory used in an Apple mobile device is limited to the
installed internal RAM (Random Access Memory).
C. Remotely control a mobile device
Although there are remote control options available for Apple devices,
these solutions use an existing network connection and do not use the
Lightning interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A31. A network administrator would like to enable DHCP on a laptop, but he
would like the same IP address to be assigned to the laptop each time it
starts. Which of the following would provide this functionality?

A

The Answer: A. Create an IP reservation on the DHCP server
A DHCP (Dynamic Host Configuration Protocol) server will
automatically assign IP (Internet Protocol) addresses to devices on the
network from an available pool. This means that the IP address for a
device may change over time based on the IP addresses that are currently
available in the pool. To force the same IP address assignment each time,
the network administrator can create an IP reservation in the DHCP
server that will associate a specific IP address to the MAC (Media Access
Control) address of the laptop.
The incorrect answers:
B. Administratively configure the laptop’s MAC address
The MAC address of a device will rarely need to changed through an
administrative configuration, and administratively configuring the MAC
address will not permanently assign a particular IP address.
C. Use APIPA addressing
APIPA (Automatic Private IP addressing) can provide limited networking
when a DHCP server is not available, but APIPA addressing does not
provide any static or permanent IP addressing on a device.
D. Assign the laptop to a static IP VLAN
VLANs (Virtual Local Area Networks) are commonly used to segment
the network into individual broadcast domains. Assigning a device to a
particular VLAN does not provide a method of static or permanent IP
addressing on a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A32. A user is complaining about slow network performance from their
workstation. A network technician checks the data closet and finds
that the wires are not properly seated in the 110 block. Which of the
following should the technician use to correct this issue?

A

The Answer: C. Punch-down tool
A punch-down tool is used to firmly “punch” a wire into a wiring block,
such as a 110 block. These blocks are usually located in a wiring closet or
on the back of a patch panel.
The incorrect answers:
A. Crimper
A crimper is used to fasten the modular connector onto the end of a
cable. For Ethernet, a crimper fastens the RJ45 connector used by the
workstation or laptop.
B. Multimeter
A multimeter can be used to check for voltages or continuity, but it won’t
help fasten wires to a 110 block.
D. Cable tester
Cable testers can identify the wire map on a cable to ensure that the
punch-down or crimping process has been performed properly. After
punching down this connection, the technician could use a cable tester to
validate that all of the wires are now properly connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A33. A user has just connected to a new wireless network, but they cannot view
any Internet web sites. Their network configuration shows the IP address
as 169.254.228.109, the subnet mask is 255.255.0.0, and they have not
been assigned a default gateway. Which of these is the MOST likely
cause of this issue?

A

The Answer: C. The DHCP server is down
If a DHCP (Dynamic Host Configuration Protocol) server is not
responding, then the local workstation will configure itself with an
APIPA (Automatic Private IP Addressing) address. The usable APIPA
addresses are in the range between 169.254.1.0 through 169.254.254.255.
An APIPA address is a link-local address, so network communication is
limited to the local IP subnet.
The incorrect answers:
A. The subnet mask is not correct
The subnet mask has been configured through APIPA, and the mask of
255.255.0.0 is normal for an APIPA configuration. The subnet mask is not
the cause of the browsing issues on the workstation.
B. The Internet provider is experiencing a temporary outage
In this example, the issue is related to the APIPA link-local address
assigned to the workstation. Although the Internet provider could
potentially be experiencing issues, it would not be the most likely cause of
the problem.
D. The wireless adapter is not working properly
The wireless adapter has configured itself and assigned a link-local APIPA
address, so it appears that the adapter itself is functional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A34. A help desk technician needs to use different Windows versions to
study for an industry certification exam. The technician currently uses
a Windows desktop computer with 4 GB of RAM and a 750 GB free
on the hard drive. Which of the following would be the BEST way to
perform this task? (Choose TWO)

A

The Answer: D. Upgrade the system RAM, and
E. Install Windows guest VMs
The easiest way to use multiple operating systems on a single machine
is to run them as virtual machines. Although there’s plenty of storage
space for multiple virtual machines, the 4 GB (Gigabytes) of RAM
(Random Access Memory) on the host computer is too small to support
multiple Windows operating systems at the same time. Once the memory
upgrade is complete, it’s a relatively easy process to install the guest virtual
machines on the existing hard drive.
The incorrect answers:
A. Install a KVM
A KVM (Keyboard, Video, and Mouse) controller is used to consolidate
the keyboard, mouse and video monitor for multiple devices. In this
example, all of the operating systems will be running on a single device.
B. Install an additional hard drive
The available hard drive is large enough to support the installation of
multiple virtual machines.
C. Create a Windows Recovery Environment boot drive
A Windows Recovery Environment drive is useful for troubleshooting the
existing Windows installation, but it won’t help with multiple operating
systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A35. While configuring a new workstation in the lab, one of the engineers
recommends using 255.255.255.0. What part of the configuration is this
associated with?

A

The Answer: B. Subnet mask
Subnet masks are used by the local device to determine what subnet
it’s connected to. Subnet masks are a series of binary ones that are
used to “mask” the subnet address from the host address. Instead of
representing this mask in binary, it’s almost always shown in decimal form.
Common decimal representations of subnet mask start with 255, such as
255.255.255.0.
The incorrect answers:
A. Default gateway
A default gateway on an internal lab network will most likely be using
private IP (Internet Protocol) addressing that starts with 10, 172, or a 192.
IP addresses cannot start with an octet of 255. Therefore, a default gateway
in this environment would not have an IP address of 255.255.255.0.
C. DNS server
Since an IP address cannot start with the octet of 255, this address would
not be associated with a DNS server.
D. IP address
The IP address of a device cannot start with 255. It’s most likely that a
device in a lab would use an internal IP address that starts with an octet of
10, 172, or 192.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A36. Which of the following BEST describes a Bluetooth network?

A

The Answer: A. PAN
A PAN (Personal Area Network) is designed for a small area and usually
an individual person. Bluetooth devices such as headsets, speakers, and
automobile connections are considered PANs.
The incorrect answers:
B. WAN
A WAN (Wide Area Network) usually connects locations over a long
geographical distance. A network link between cities, states, or countries
would be considered a WAN connection.
C. LAN
The network in your building or home is a LAN (Local Area Network). If
you’re connected to an Ethernet or 802.11 wireless network, then you’re
connected to a LAN.
D. MAN
A MAN (Metropolitan Area Network) is a bit bigger than a LAN, but
smaller than a WAN. Connecting sites in the same city or metropolitan
area would use a MAN link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A37. Sam, a user in the accounting department, is migrating from Android to
iOS. She would like all of her emails, contact lists, and calendar events to
be moved to her new phone. Which of the following would be the BEST
way to accomplish this task?

A

The Answer: C. Connect the new phone to the corporate Exchange
server
Microsoft Exchange manages email, calendar events, and contact
information in a single database. Using this central database, Exchange can
synchronize all of this information to both iOS and Android smartphones.
The incorrect answers:
A. Use a Windows-based migration tool
Since most smartphones can synchronize email, calendar, and events to an
existing email platform, a third-party migration tool is unnecessary.
B. Save the Android phone data as a CSV file
Most mobile phones do not provide data in CSV (Comma Separated
Value) format. Even if the Android data was available, there’s no common
way to import that data into an iOS device.
D. Use a USB-to-Lightning cable
Connecting the phones to another device or to each other would not
migrate any data between the devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A38. The internal Bluetooth adapter of a laptop has failed, and the user would
like to get a repair estimate. Which of the following would be the BEST
way to determine an accurate price of an exact replacement?

A

The Answer: C. Disassemble the laptop case and document the process
Although the operating system driver can sometimes provide details about
what’s inside, they often can hide details about the specific hardware. The
only way to know the exact make and model of the Bluetooth adapter is
a physical examination. Some laptops are easier to open than others, so
it’s useful to document the process used to gain access to the Bluetooth
hardware.
The incorrect answers:
A. Research online forums
Online forums are useful for troubleshooting technical issues, but they
won’t provide information on pricing or be able to determine the exact
make and model of the Bluetooth adapter.
B. Determine the purchase price of a USB to Bluetooth adapter
In this example, the user would like to replace the existing internal adapter.
An external USB to Bluetooth adapter may provide similar functionality,
but it would not have the same “invisible” footprint as the internal adapter.
D. View the Bluetooth information in Network settings
The operating system is often quite good at providing hardware
information, but the only way to know if it’s providing an accurate
representation of the installed Bluetooth adapter is to physically view the
actual hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A39. A server administrator has been asked to configure the storage
requirements for a new database server. The database owner requires the
fastest performance, and redundancy if a single drive fails. The storage
array should support 8 TB or larger of available space. Which of the
following options would be the BEST choice?

A

The Answer: B. RAID 5 with 10,000 RPM, 5 TB drives
The question is focused on three requirements; performance, drive space,
and redundancy. This option provides the highest number of RPMs
(Revolutions Per Minute), the RAID 5 (Redundant Array of Independent
Disks) redundancy, and enough storage to support more than 8 TB
(terabytes) of drive space.
The incorrect answers:
A. RAID 10 with 5,400 RPM, 8 TB drives
Although RAID 10 would provide the redundancy requirement and a
series of 8 TB drives would more than cover the storage requirement.
However, the slow throughput of 5,400 RPM drives would not provide
the performance requirement.
C. RAID 1 with 7,200 RPM, 8 TB drives
RAID 1 mirroring provides the redundancy required, and 8 TB drives
provide plenty of storage space. However, the 7,200 RPM specification is
slower than the 10,000 RPMs available in answer B.
D. RAID 0 with 15,000 RPM, 5 TB drives
15,000 RPM drives provide a very fast throughput, and multiple 5 TB
drives would provide more than 8 TB of available space. However, RAID
0 striping does not provide any redundancy if a drive was to fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A40. A user would like to access email from their Windows 10 laptop using a
smartphone’s Internet connection. Which of these technologies needs to
be enabled on the laptop?

A

The Answer: B. Bluetooth
Bluetooth can be used to tether the laptop to the smartphone, and the
smartphone can then be used to allow access to resources on the Internet.
The incorrect answers:
A. LTE
LTE (Long-Term Evolution) may be used by the smartphone for Internet
data communication, but the laptop does not communicate using LTE.
C. NFC
NFC (Near Field Communication) is a short-distance wireless technology
that is commonly used for payment systems or in-person information
exchange. NFC is not used for tethering a laptop to a phone.
D. IR
IR (Infrared) is often used to control other IR devices, such as
entertainment centers or televisions. IR is not used during the tethering
process.

36
Q

A41. A user has connected their laptop to an LCD projector, but video isn’t
displaying through the projector. What laptop key is often combined with
the “CRT/LCD” key to control the video output?

A

The Answer: A. Fn
The laptop function key (Fn) is usually combined with another laptop
key to control features such as volume, wireless adapter functionality,
and video output. This allows the laptop manufacturers to add additional
functionality to the laptop keyboard without adding any physical keys or
switches.
The incorrect answers:
B. Alt
The Alt (Alternate) key is a modifier that’s commonly used in applications
to provide secondary features. The Alt key is not commonly used to control
laptop hardware.
C. Windows
The Windows key is used as a shortcut to Windows-specific operating
system features. The Windows key is not commonly used to control laptop
hardware.
D. Ctrl
The Ctrl (Control) key is very similar in use to the Alt key. Applications
commonly used the Ctrl key as a modifier to enable shortcuts or secondary
features. The Ctrl key is not commonly used to control laptop hardware.

37
Q

A42. A member of the management team is developing a product based on
wearable technology. Which of the following would BEST describe this
product type?

A

The Answer: C. Smart watch
Wearable technologies are devices that can be worn all day as an extension
of a phone and body. Common wearable technologies would be smart
watches and fitness monitors.
The incorrect answers:
A. Virtual reality
Although it’s true that many virtual reality headsets are devices that are
worn or placed on the head, they are not part of the device category of
wearable technology. Wearable products are designed to be worn all day,
and virtual reality headsets don’t fit that characteristic.
B. e-Reader
An e-Reader is a hand-held device that is commonly used for reading
books or magazines. e-Readers aren’t worn on the body, so they don’t
qualify as a wearable technology.
D. Smart phone
A smart phone is technically not a wearable technology, although it’s
common for someone to carry their phone around throughout the day.
Since the phone is often used while not connected to the body, it would
not qualify as a wearable technology.

38
Q

A43. A system administrator is using a maintenance kit on a networkconnected laser printer. Which of the following should be the LAST step
when performing this maintenance?

A

The Answer: C. Reset the page counter
The page counter is a helpful metric to determine how much the printer
is used, which in turn determines when the next maintenance should be
scheduled. After performing the current maintenance cycle and verifying
the printer’s operation, the page counter should be reset so that the next
maintenance time-frame can be properly estimated.
The incorrect answers:
A. Examine the feed rollers
Examining or replacing the feed rollers is a normal part of the
maintenance process, but it would not often be the last step in the
maintenance process.
B. Wait until the fuser unit cools down and replace it
Fusers are commonly replaced during maintenance, but this would not be
the last step in the process.
D. Replace the power cord
Replacing the power cord is not commonly part of the maintenance
process. The only time the power cord would need replacing is if it
has been damaged. Power cords do not generally wear out or need
replacement.

39
Q

A44. An application developer needs to test an application across all of the
operating systems used by the company. Each operating system will be
tested individually in a lab environment. The company would like to
minimize any additional hardware purchases for this project. Which of
the following would be the BEST way to test this application?

A

The Answer: A. Purchase a system that is configured just above the
hardware requirements for the highest-end operating system. Create
separate VMs for each operating system.
Creating virtual machines for these tests would be a great way to
minimize hardware costs, and the machine used for the testing should be
able to properly virtualize the testing OS while the host OS is running.
Purchasing a system that is slightly more powerful than the highest-level
operating system configuration should cover any technical requirements.
The incorrect answers:
B. Purchase individual test computers that match the hardware
requirements for each OS. Install different operating systems on each
test computer.
Since one of the project requirements was to minimize the hardware cost,
purchasing separate computers for all of these systems would be much
more expensive than purchasing a single computer and virtualizing the
operating systems.

40
Q

A45. Which wireless standard operates in the 5 GHz band and provides over
5 Gbit/sec of throughput?

A

The Answer: C. 802.11ac
802.11ac operates in the 5 GHz band and can provide almost 7 gigabits
per second of total throughput.
The incorrect answers:
A. 802.11n
Although 802.11n can operate in the 2.4 GHz band and the 5 GHz band,
the maximum theoretical throughput of 802.11n is 600 megabits per
second.
B. 802.11g
802.11g operates in the 2.4 GHz band exclusively, and can provide a
maximum throughput of only 54 megabits per second.
D. 802.11a
802.11a operates in the 5 GHz band, but the total throughput of 802.11a
is 54 megabits per second.

41
Q

A46. A user in the manufacturing department reports that every page printed
from the central networked laser printer has a single black line that
extends from the top of the page to the very bottom. Which of the
following is the MOST likely cause of this issue?

A

The Answer: C. The photosensitive drum is damaged
A scratched photosensitive drum would cause a line to appear down the
printed page as the toner sticks to the scratched part of the drum. Some
printers allow individual drums to be replaced, and others require the
entire toner cartridge with drum to be replaced. Once the scratched drum
is replaced, the black line will no longer appear on the printer output.
The incorrect answers:
A. The fuser is damaged
The fuser provides the heat and pressure required to permanently affix the
toner to the printed page. The fuser would not commonly add additional
black lines to the printer output.
B. The printer is out of memory
The laser printer will render an entire page in memory before printing, and
running out of memory will cause the output to be truncated or missing. If
only a portion of the page is printing, then the printer is most likely out of
memory.
D. The toner is low
If the printer output was very faint or difficult to read, then the toner levels
may be low. Most printers will provide a message when it’s time to replace
the toner cartridge.

42
Q

A47. Which mobile device connection is commonly used for making payments
at a store checkout?

A

The Answer: A. NFC
NFC (Near Field Communication) is designed to transfer small amounts
of data wirelessly over a limited area. It’s common to use a smart phone or
smart watch with a credit card terminal to pay for goods or services.
The incorrect answers:
B. Infrared
Infrared, or IR, is included on many smart phones, tablets, and smart
watches, but it’s used mostly for controlling other infrared devices such as
television and audio components. Infrared would not be used during the
purchase process.
C. Cellular
Cellular networks are used for voice and data communication, but those
cellular networks are not part of the in-store purchase process.
D. Bluetooth
Although Bluetooth supports many different features, it’s not used during
the checkout process in a store.

43
Q

A48. A company is planning to use a cloud-based file storage service to store,
share, and synchronize files across all company devices. Which of the
following would be the MOST important resource requirement for
this service?

A

The Answer: B. Internet bandwidth
Cloud-based services work almost exclusively over the network, and file
synchronization services will require additional bandwidth to process
constant updates and changes over the network.
The incorrect answers:
A. Local storage capacity
Local storage is certainly an important consideration, but cloud-based
file storage and synchronization will require network bandwidth as the
primary resource.
C. CPU utilization
The CPU processes required to support a cloud-based file storage or file
synchronization service are relatively small on the local devices.
D. System memory
The memory required to support a cloud-based file storage application is
relatively small compared to most applications.

44
Q

A49. When printing a document on a laser printer, a user finds that all of the
text on the page smears when touched. What is the MOST likely cause
of this issue?
❍ A. Fuser is damaged
❍ B. Toner cartridge is low
❍ C. Photosensitive drum has been scratched
❍ D. Incorrect printer driver is installed
❍ E. Printer cleaning process is not working
The Answer: A. Fuser is damaged
The fuser permanently melts the toner to the paper using heat and
pressure. If the fuser is not working, the toner will easily smear when
touched.

A

The incorrect answers:
B. Toner cartridge is low
A low toner cartridge will cause the output to appear faded and difficult
to read. A low toner cartridge will not cause the output to smear when
touched.
C. Photosensitive drum has been scratched
A scratched drum will cause lines and other stray marks to appear on the
printed page. The toner sticks to the scratches and is transferred to the
final page output.
D. Incorrect printer driver is installed
The printer driver will format the output into a page description language
that the printer can understand. An incorrect driver would not cause the
printer output to smear.
E. Printer cleaning process is not working
If the cleaning process is not working, then a “ghost” of previous passes
around the drum will appear on different parts of the printed page. It’s
common that poor cleaning will cause multiple faded versions of a page to
appear in the printed output. A non-working cleaning process would not
cause the printer output to smear, however.

45
Q

A50. A manager’s computer is able to connect to Internet sites while in
conference rooms or in the building courtyard. When the laptop is
brought back to the manager’s desk and placed into the docking station,
the Internet access is unavailable but all other features are working.
Which of the following should be the FIRST troubleshooting task for
this issue?

A

The Answer: D. Check the docking station network cable
The Internet access on the laptop appears to be working properly on the
wireless network, but the docking station connection would use a wired
Ethernet connection. If everything else is working properly, then the issue
would most likely be associated with the Ethernet interface in the docking
station.
The incorrect answers:
A. Replace the docking station power supply
If other docking station features were not working, then there could be an
issue with the power connection on the docking station. In this situation,
all of the other features appeared to be working properly when connected
to the docking station.
B. Upgrade the laptop BIOS
A BIOS upgrade is a significant change, and it’s rarely the first step in the
troubleshooting process.
C. Replace the docking station
Although it’s certainly possible that the docking station could be faulty,
there are no obvious issues with other features. Before replacing the entire
docking station, it would be useful to check the individual components
associated with the problem.

46
Q

A51. A company is developing an internal application that will run on
smartphones and tablets. What should the application use to simplify the
authentication process?

A

The Answer: B. SSO
SSO (Single Sign-on) is a method of centralizing authentication to a
common database. This allows the users to authenticate once with a single
username and password, and those credentials will be used across all
services.
The incorrect answers:
A. Strong passwords
Although a strong password is always a best-practice, including a strong
password policy for an application does not simplify the authentication
process.
C. VPN
A VPN (Virtual Private Network) is a method of encrypting data between
two devices, and it’s commonly used to create an encrypted tunnel over an
untrusted network. VPNs don’t simplify the authentication process.
D. SSL
SSL (Secure Sockets Layer) is a common encryption method used to
protect data sent and received from a web browser. SSL doesn’t simplify
the authentication process.

47
Q

A52. One of the software developers in your company would like to install six
virtual machines on their desktop for application testing. Each VM would
run a different operating system, but only one VM would be running at
any particular time. Which of the following components would be the
MOST important for this configuration? (Choose TWO)

A

The Answers: B. Hard drive space and D. System RAM
Six virtual machines will require enough hard drive space to install all
six operating systems, so it will be important to have enough free storage
space. Running more than one operating system at a time on a computer
also requires additional memory, so having enough system RAM is also an
important consideration.
The incorrect answers:
A. Video adapter RAM
The question didn’t specify any unique requirement for video, so a
requirement for video adapter RAM would not be the most important in
this configuration.
C. Gigabit NIC
Although gigabit network connections are relatively standard, nothing in
the requirements specified a need for high-speed network connectivity.
E. Enhanced audio
The configuration for this test system did not specify any enhanced audio
requirement.

48
Q

A53. What is the minimum category of unshielded copper cable that would
run a 10 gigabit per second Ethernet link with a fifteen meter distance?

A

The Answer: B. Category 6
The physical characteristics of networking cables are separated into
categories. A category 6 cable can support a ten gigabit per second
10GBASE-T network to a distance of thirty-seven to fifty-five meters.
The incorrect answers:
A. Category 5
Category 5 copper cables can support a one gigabit per second
1000BASE-T network up to one hundred meters. Ten gigabit per second
speeds are not support over category 5 cable.
C. Category 5e
Category 5e (enhanced) is a minor update to category 5, and the Ethernet
standards supported for a category 5e cable are identical to those of a
category 5 cable. Therefore, category 5e copper cables can support a one
gigabit per second 1000BASE-T network up to one hundred meters in
length.
D. Category 6A
Category 6A (augmented) cables can support ten gigabit per second
10GBASE-T connections to a distance of one hundred meters.

49
Q

A54. An engineer has manually configured IP addresses for a small office
that uses a cable modem for Internet connectivity. However, none of the
devices configured with a manual IP address are able to browse Internet
websites. All devices are connected to the cable modem with twisted-pair
Ethernet cables. This is the configuration of one device:
IP address: 192.168.1.7
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.1
DNS: 192.168.1.7
The engineer can successfully ping the local IP address and the
default gateway address. Which of the following should be the NEXT
troubleshooting step?

A

The Answer: C. Check the DNS configuration
One of the most noticeable of the IP (Internet Protocol) configuration
settings was that the DNS (Domain Name Service) server IP address
was configured to be the same as the local device. Since DNS servers are
commonly separate (and often remote) devices, it would be unusual to
see a DNS configured with the same IP address of the local device. The
next step should be to confirm the DNS settings with the local network
administrator.
The incorrect answers:
A. Check for duplicate IP addresses
No mention was made of an duplicate IP address warning, and some of
the ping tests worked properly to devices on the local subnet.
B. Replace the Ethernet cable
Since the ping tests worked locally, we can conclude that the Ethernet
cable is most likely not related to this issue.
D. Replace the cable modem
The cable modem is most likely the default gateway, and a ping of that IP
address worked properly. More tests would need to be performed before
replacing any hardware.

50
Q

A55. A user in a SOHO office needs to connect a laptop to the DSL router.
Which of the following cables should be used for this connection?

A

The Answer: A. Ethernet
A SOHO (Small Office Home Office) with a DSL (Digital Subscriber
Link) modem will commonly connect to the modem using an Ethernet
cable connection.
The incorrect answers:
B. Lightning
Apple Lightning cables are used to connect mobile devices to power or
external peripherals. Lightning connections are not used for DSL links.
C. Coaxial
Coaxial cable is commonly used for the cable modem connection to the
Internet service provider.
D. USB-C
USB-C is used for connectivity to peripherals or other devices, but it is
not commonly used for network links. The large majority of wired network
connections inside of a network will use Ethernet cables.

51
Q

A56. A user in the accounting department has turned on their computer and
received the message “Date and Time not set.” Which of the following
would be the MOST likely reason for this message?

A

The Answer: A. The motherboard battery has discharged
The battery on a motherboard is used to maintain the date and time
configuration when the computer is not connected to a power source. If
the battery has discharged, the computer will not be able to maintain the
proper time and an error message will appear during startup.
The incorrect answers:
B. Windows update has rebooted the computer
Rebooting the computer will not cause the date and time to be reset.
C. Daylight Saving Time occurred during the weekend
Daylight Saving Time does not cause the computer’s date and time to be
reset, and any changes to the clock in Windows will be reflected in
the BIOS.
D. The BIOS was just upgraded
A BIOS upgrade does not commonly reset the date and time on the
BIOS clock.

52
Q

A57. A technician has just replaced a broken touch screen on a laptop used for
trade shows. However, the touch functionality is no longer working on
the display. Which of the following would be the MOST likely reason for
this issue? (Select TWO)

A

The Answers: B. The replacement screen is not a touch screen, and
E. The digitizer is not properly connected
When replacing a touch screen display, it’s important to make sure the
replacement is also a touch screen unit. The two look almost identical, so it
would be a common mistake to accidentally install the wrong hardware.
After installation, a separate connection is often required to enable the
digitizer. If the display panel is the correct hardware, then it’s important to
check that all of the cables are connected, especially the cables specific to
the digitizer features.
The incorrect answers:
A. The digitizer is not calibrated
An uncalibrated digitizer would work, although the input locations would
not be accurate. Most modern digitizers do not require the user to perform
any calibration routines.
C. The BIOS needs to be updated
Since this is a replacement unit, we can assume that any BIOS (Basic
Input Output System) settings associated with the digitizer are still valid.
A BIOS upgrade would not be required to enable digitizer functionality.

53
Q

A58. A system administrator created a series of VMs that will use a portion of
a server’s available physical memory. Which of the following describes
this cloud computing characteristic?

A

The Answer: A. Resource pooling
Resource pooling places all of the computing resources in one place, and
then distributes from the pool when needed. A VM (Virtual Machine)
manager using a portion of available physical memory is taking advantage
of resource pooling.
The incorrect answers:
B. Rapid elasticity
Rapid elasticity is the characteristic of scaling up or down cloud resources
with demand. More resources will be made available during busy times,
and those resources will be seamlessly removed when the demand is low.
C. Metered
Metered resources are measured based on usage. As more information
is uploaded, stored, and downloaded, the costs are tracked and billed
accordingly.
D. On-demand
Cloud computing allows the users to create or remove resources at any
time, or on-demand. This flexibility allows organizations to quickly react to
changes, deploy updates, and remove excess resources.

54
Q

A59. A group of wireless laptops in a conference room are reporting
intermittent connectivity issues. The wired computers in the room are not
experiencing any network problems. A check of the laptops shows that
the IP addresses and configurations appear to be correct. Which of the
following would be the best NEXT troubleshooting step?

A

The Answer: A. Verify the wireless signal strength
Since the wired devices are working properly, the troubleshooting process
should focus on the wireless network. The connectivity is also intermittent,
which means that the network is operating normally during certain
periods. This would move the focus from the network configuration to an
availability issue.
The incorrect answers:
B. Check the ARP table on the default gateway
Since the wired devices are working normally and the network is
intermittently working, the overall configuration of the network would not
be the first place to start the troubleshooting process.
C. Confirm the operation of the DHCP server
An inoperable DHCP (Dynamic Host Configuration Protocol) server
would cause the local devices to automatically configure a link-local IP
address. Since there are no reports beyond general connectivity issues and
DHCP server outages are relatively unusual, checking on the DHCP
server would not be the next step in the troubleshooting process.
D. Perform a wire map on the network drops
The issue reported in this scenario is relating to the wireless network only.
The wired devices are not experiencing any issues with connectivity, so
obtaining a wire map would not be the next troubleshooting step.

55
Q

A60. A server administrator has been asked to troubleshoot a system that
has been slowing down over time. While examining the computer, the
administrator can hear a series of clicks from the inside of the case.
Which of the following should be the FIRST step to address this issue?

A

The Answer: D. Perform a full backup of the server
A clicking noise indicates some type of hardware issue with the computer,
so the first step would be to confirm that a recent backup is available for
all of the data on this system. If the computer fails completely, at least the
data will be secure.
The incorrect answers:
A. Replace the motherboard
Motherboards don’t tend to have any moving parts, so a clicking noise
would probably not be related to the motherboard. There’s also not enough
information in this question to definitively identify the source of the noise,
so replacing hardware would not commonly be the first step.
B. Power the system off and back on
Although software can often be corrected with a reset, hardware isn’t
commonly fixed with a power cycle. Before making any changes, it would
be useful to confirm a good back exists and perform more investigation
regarding the noise.
C. Replace the hard drive
If the sound was related to a problem with the hard drive, it would be even
more important to have a good backup of the data.
E. Replace the power supply
There’s no evidence that the power supply is faulty, but it would be useful
to investigate the source of the noise after backing up the data.

56
Q

A61. When pressing the power button on a desktop computer, the power
indicator lights up but the computer does not display any message on the
screen. The voltage at the wall outlet has been checked with a multimeter
and it appears to be normal. The motherboard power connector voltage
was checked, and the 12 volt pin was showing 6 volts. What is the
MOST likely cause of this issue?

A

The Answer: B. The power supply is faulty
If the 12 volt line from the power supply to the motherboard is showing
6 volts, it’s likely a problem with the power supply itself. A power supply
replacement should be the next troubleshooting step for this system.
The incorrect answers:
A. The components that use 12 volt power are faulty
Even if the components are faulty, the power supply should still be
providing 12 volts for those devices.
C. The wall outlet voltage does not match the power supply
Many power supplies can automatically switch to the correct input voltage
from the wall outlet. A mismatch would result in a non-working system or
damage to the computer’s components.
D. The motherboard is faulty
A bad motherboard would not prevent the power supply from operating at
the correct voltage.

57
Q

A62. A manager in the marketing department is printing many copies of a
twenty page document. The manager would like to print all twenty pages
of the document before the next copy begins printing. What setting
should the manager configure in the output settings?

A

The Answer: B. Collate
The printing of multiple copies in their proper order is called collating the
output. If the output was not collated, all of the page one copies would
print, then all of the page 2, etc.
The incorrect answers:
A. Duplex
Duplex refers to printing on both sides of the page. Many printers
will have an option for duplexing that will print on both sides without
manually flipping the pages over.
C. Quality
The quality settings on a printer will change the resolution, color settings,
or grayscale options. The quality settings will not change the order of the
pages during the output process.
D. Orientation
The orientation of the paper refers to the portrait or landscape setting.
Changing the orientation will not change the order of the pages during
the printing process.

58
Q

A63. A remote user is visiting their corporate office. They are trying to connect
their laptop to the office wireless network, but the network name does not
appear in the list of available wireless networks. Which of the following
would be the most likely reason for this issue?

A

The Answer: D. SSID broadcasts have been disabled
The name of the wireless network, or SSID (Service Set Identifier) is
normally broadcast to all nearby devices. If the SSID broadcasts are
administratively disabled, the network name will not appear in the dropdown list of available wireless networks.
The incorrect answers:
A. There is interference with the wireless signal
The wireless network name is broadcast many times a second, so spurious
interference would still allow some SSID advertisements to be seen by
remote devices.
B. The laptop has been assigned an APIPA address
APIPA (Automatic Private IP Addressing) is an automated method of
assigning IP addresses when a DHCP server is not available. An APIPA
address would not limit or filter SSID broadcasts from wireless access
points.
C. The user does not have permission to use the wireless network
The wireless authentication process occurs after a device has attempted to
connect to the wireless network. An authentication issue would not cause
the wireless network name to be filtered prior to connecting.

59
Q

A64. A manager is able to receive email messages on their tablet, but they’re
having problems configuring the tablet to send email messages. Which of
the following should be the FIRST troubleshooting step?

A

The Answer: A. Check the SMTP settings
If you’re sending an email message from an email client, you’re commonly
using SMTP (Simple Mail Transfer Protocol). There are three SMTP
configuration settings that are important; the SMTP server name or IP
address, the SMTP username, and the SMTP password.
The incorrect answers:
B. Check the IP address configuration
If there were problems with the IP configuration, the manager would not
be able to receive any email messages. In this question, the issue does not
appear to be related to the IP address configuration.
C. Send a test message using web-based email
Sending an email message over web-based email would effectively bypass
the local email client and would not help troubleshoot the local issues.
D. Check the IMAP settings
IMAP (Internet Message Access Protocol) is used for receiving email and
not for sending email. In this example, the manager was able to receive
messages, so the IMAP settings would most likely be working properly.

60
Q

A65. A user is reporting that a shared laser printer in the marketing
department is not printing from one particular application. The front
panel of the printer shows that the printer is online and ready to receive
print jobs. Other users in the department are able to successfully
print to the printer. Which of the following would be the BEST next
troubleshooting step?

A

The Answer: D. Verify the network printer name in the application
We know that the printer is working normally because other people are
able to print successfully. This also means that the spooling process is
working and that the print server is successfully queuing the print jobs.
Given the other options, it’s most likely that the user is directing the print
job to a different printer.
The incorrect answers:
A. Power cycle the printer
We know that the printer is working for other users, so power cycling the
printer would not resolve this particular issue.
B. Restart the print spooler
Other users are printing to the network printer, so we know that the print
spooler is working properly. Restarting the spooling would not resolve this
issue.
C. Perform a test print from the printer console
A test print from the printer console would verify that the printer itself is
working properly, but we already know this because of the print jobs sent
by other users on the network.

61
Q

A66. A network administrator is connecting four company locations that reside
in different countries. Which of the following would BEST describe this
configuration?

A

The Answer: D. WAN
A WAN (Wide Area Network) connects LANs across a long geographical
distance. Once the link extends past the local city area, the connection
would be considered a WAN link.
The incorrect answers:
A. LAN
LANs (Local Area Networks) are located in the same building or group of
buildings that are located nearby. Ethernet and 802.11 wireless networks
are generally considered to be LAN connections.
B. PAN
A private network designed for an individual is a PAN (Personal Area
Network). Bluetooth, infrared, and near field communication links are
categorized as PAN connections.
C. MAN
Sometimes, a local network provider can link together sites in the same
city area. These connections would be MANs (Metropolitan Area
Networks).

62
Q

A67. A new SOHO remote site includes the installation of IoT lights,
thermostats, and cameras. Which of the following would be the BEST
way to protect the rest of the network against IoT hacking?

A

The Answer: C. Connect the IoT devices to a DMZ
One of the concerns around IoT (Internet of Things) is that a single
exploit of an IoT device can potentially put the entire network at risk.
To avoid this issue, it’s useful to put IoT devices into their own protected
network, such as a DMZ (Demilitarized Zone). This means that if an IoT
device was exploited, the attacker would not have any access to the more
important devices and services on the rest of the network.
The incorrect answers:
A. Use WPA2 encryption
If the IoT devices are on the same network as everything else, then
encryption isn’t going to help much when the IoT device is exploited.
Once the attacker is in control of the IoT device, they’ll be on the same
encrypted network as internal servers, storage arrays, and any other
important device.
B. Configure SSID suppression on the wireless network
SSID (Service Set Identifier) suppression will prevent other devices from
showing the wireless network on the list of available networks, but it won’t
provide any additional security if an IoT device is hacked.
D. Configure static IP addressing
Static IP (Internet Protocol) addressing is sometimes used when devices
are required to maintain a particular IP address, but it won’t add any
additional security if the IoT devices are under the control of an attacker.

63
Q

A68. A system administrator has configured a VM for dual processors, 16 GB
of RAM, and 120 GB of disk space. Which of the following is required
to start this VM?

A

The Answer: B. Hypervisor
A hypervisor, or virtual machine manager, is the software that manages the
virtual platform and guest operating systems.
The incorrect answers:
A. Shared network address
There are many options for a virtual machine, including shared, bridged,
and private network addresses. A shared network address is not required to
start a virtual machine.
C. Virtual switch
Like physical switches, virtual switches can be used to provide connectivity
and segmentation for virtual machines. A virtual switch is not a
requirement to start or use a virtual machine
D. Video display
Many servers operate without a video display, mouse, or keyboard. These
systems are “headless,” and a video display is not required to start a virtual
machine.

64
Q

A69. A site manager has found that her smartphone has a short battery life
when used at work, and the battery life is normal when working from
home. The work location has limited mobile service reception, but most
office services are provided over the local 802.11 Wi-Fi network. The site
manager does not enable Bluetooth on her smartphone. Which of the
following would be the BEST way to extend the battery life of her mobile
device?

A

The Answer: B. Disable the cellular radio at work
When a mobile provider’s network isn’t available, a phone will constantly
try to reconnect to a cellular network. This reconnection process constantly
uses the radio, and subsequently more of the battery is used in the process.
To conserve battery life, it would be useful to disable the cellular network
connection when outside of a coverage area.
The incorrect answers:
A. Disable 802.11 Wi-Fi
The Wi-Fi network is used at work for office services, so disabling Wi-Fi
is not a good option. Since Wi-Fi does not require a constant connection,
it’s unlikely that the battery usage is associated with the Wi-Fi radio.
C. Replace the battery
It’s possible that the battery in the mobile device could need replacing, but
the battery problem doesn’t appear to happen while at home. If the battery
was the primary issue, the battery would work just as poorly at home as in
the office.
D. Enable Bluetooth on the mobile device
Enabling a feature like the Bluetooth radio would only serve to increase
battery usage. If the battery is the biggest concern and no Bluetooth
features are in use, it’s a better idea to keep Bluetooth disabled.

65
Q

A70. A desktop computer has just abruptly shut off, and pressing the power
button doesn’t restart the system. There are no fans spinning, no lights are
on, and no messages appear on the display. Which of these would be the
MOST likely cause of this issue?

A

The Answer: C. The power supply is faulty
A faulty power supply could cause a loss of power across all computer
systems, and the lack of fans, lights, and output on the display would be
the most likely cause given the available options.
The incorrect answers:
A. The BIOS is configured with a startup password
A startup password would not cause the system to power down, and the
password prompt would be presented if the computer was powering on.
B. The LCD display backlight has failed
A failure of the LCD backlight would make it appear that the monitor
screen is not working, but the fans and lights would still be working
normally.
D. The master boot record is corrupted
A corrupted master boot record may prevent a system from booting, but
the fans, lights, and screen output would still be working properly.
E. The boot sector is missing
A missing boot sector would not prevent the fans and lights from working
properly. The screen would commonly show an error explaining that an
operating system was not able to properly start.

66
Q

A71. What kind of device is commonly used to filter traffic based on a
predefined set of rules?

A

The Answer: D. Firewall
A firewall is designed to evaluate inbound traffic, compare that traffic
to predefined security policies, and then allow or block that traffic from
passing through the firewall. Firewalls are common security appliances
between an organization’s internal network and the Internet.
The incorrect answers:
A. PoE Switch
PoE (Power over Ethernet) switches are used to provide power to
Ethernet-connected devices. This allows devices such as access points,
cameras, and VoIP phones to connect with a single Ethernet link for both
data connectivity and device power.
B. Repeater
Repeaters are relatively simple devices. Repeaters receive a signal,
regenerate that signal, and then resend that signal out another network
connection. Repeaters do not make any forwarding decisions and they
don’t filter based on a set of rules.
C. DSL modem
DSL (Digital Subscriber Line) networks is a common Internet connection
technology provided over the same twisted pair copper used by analog
telephone services. A DSL modem allows the end-user to connect their
existing network to the DSL network, but the DSL modem does not filter
traffic based on a set of access rules.

67
Q

A72. Which of these connection types use coax to provide Internet data, voice,
and video over the same wire?

A

The Answer: B. Cable
Cable television brought cable into everyone’s home, and now they include
voice and Internet services on the same coax cable.
The incorrect answers:
A. DSL
DSL (Digital Subscriber Line) uses a pair of copper wires to provide
Internet access over the same lines as a traditional telephone service.
C. ISDN
ISDN (Integrated Services Digital Network) was the precursor to DSL,
and also used a pair of copper wires to provide high-speed dialup Internet
service.
D. Dialup
Dialup lines traditionally used the same network as the telephone service,
and you would only need a modem on each end of the phone line to
provide digital communication.

68
Q

A73. A desktop administrator has been asked to troubleshoot a laptop
computer that beeps during the power on process while the laptop
screen remains dark. Which of the following would be the best NEXT
troubleshooting step?

A

The Answer: C. Establish a theory
Once an issue has been identified, it’s important to consider all of the
possible reasons the problem may have occurred. It’s useful to list all
possible causes, even those that might not be obvious.
The incorrect answers:
A. Implement a solution
The implementation of a solution would occur after possible theories have
been determined and tested. Once a plan of action is created, the solution
can be implemented.
B. Document findings
Once the problem has been resolved, the last step of the troubleshooting
process is to document the issue, the resolution, and any other important
steps during the process.
D. Evaluate results
When testing theories for possible fixes, the results of each test should be
evaluated to determine if the fix was successful.

69
Q

A74. A manager is complaining of short battery life on their laptop when
traveling. Which of the following should be disabled to provide the
BEST battery conservation?

A

The Answer: D. Bluetooth
Bluetooth, and any radio-based communication, constantly uses some of
the power, and those systems can quickly deplete the battery. If you’re not
going to be using wireless devices, then it’s useful to place the device in
airplane mode or disable Bluetooth, 802.11, and cellular radios.
The incorrect answers:
A. Internal speakers
Unless the speakers are currently in use, there’s little to no battery used to
keep the speakers enabled. Even when the speakers are used, they don’t
tend to deplete the battery faster than wireless network radios.
B. Webcam
A webcam may be used intermittently when traveling, but even then
there’s relatively little battery use when compared to wireless networking.
C. Smart card interface
A smart card interface in a laptop allows a smart card to be used as an
authentication factor. A smart card interface does not constantly use
battery power, and it certainly wouldn’t use more than Bluetooth or other
wireless network communication methods.
E. Touchpad
A touchpad uses very little power, and it’s almost required for use with
laptops when traveling.

70
Q

A75. A company is deploying cloud-hosted virtual desktops for training room
classes. The VMs have already been configured in the cloud. Which of the
following is required to access these VMs using thin clients in the
training room?

A

The Answer: C. Mouse, keyboard, and monitor
Cloud-hosted virtual desktops are a type of VDI (Virtual Desktop
Infrastructure). Access to the desktop is provided over a remote accessstyle client, and access can be provided from almost any operating system
using a low-bandwidth network connection. The client device is usually a
thin-client that has a minimum set of resources, a mouse, keyboard, and a
monitor.
The incorrect answers:
A. High-end video cards
Cloud-based virtual desktops are being processed on servers in the cloud,
so the local thin clients do not require any advanced graphics capabilities.
B. Separate Internet connection
The communication to the virtual desktops is sending video, keyboard, and
mouse updates, and all of this can operate with a minimum of network
bandwidth. A separate or dedicated Internet connection is not required.
D. Category 6A cabling
Category 6A cabling would commonly be associated with very high-speed
10 gigabit per second Ethernet networking. A thin client communicating
to a cloud-hosted virtual desktop can operate at relatively low bandwidths.

71
Q

A76. A technician has connected a laptop to an LCD display. The LCD display
is presenting the correct information, but all of the content appears to be
compressed vertically. Which of the following is the MOST likely reason
for this issue?

A

The Answer: C. The laptop resolution is incorrect
An LCD (Liquid Crystal Display) has an optimal resolution that is based
on the physical dimensions of the display. If the resolution settings in the
operating system don’t match the physical display, then the information on
the screen may appear blurry or skewed. Configuring the correct resolution
in the operating system will commonly resolve this issue.
The incorrect answers:
A. The LCD display is faulty
If the LCD display is showing information (however skewed), then it may
not be a hardware failure. Adjusting the operating system’s video settings
to match the LCD display hardware will often resolve any odd visual
display quirks.
B. The laptop display adapter is incompatible with the LCD display
Most display adapters will include a video output format that would be
compatible with most LCD displays. It would be unusual to find an LCD
display that would not operate with a specific video adapter.
D. The LCD display cable is faulty
A bad cable will commonly show flashes of information or intermittent
periods of a black screen. A bad cable would not commonly display
information in a fuzzy or skewed format.

72
Q

A77. An engineering firm is upgrading their storage array to include additional
drive space for documents and designs. The primary goal is to provide
high performance and uptime, even if two drives were to fail. Which of
the following would be the BEST choice for this firm?

A

The Answer: D. RAID 10
RAID (Redundant Array of Independent Disks) is a method of
combining storage drives together to add speed and/or redundancy. A
RAID 10 array is a nested RAID configuration that creates a mirrored set
of RAID 0 drives. As long as only one drive fails in each RAID 0 mirror,
the redundancy will remain valid and the user’s data will continue to be
available.
The incorrect answers:
A. RAID 1
RAID 1 is also called mirroring, because file blocks are duplicated between
two or more physical drives. Losing a single drive in a RAID 1 array will
still allow access to the data on the other mirrored drive, but losing two
drives would cause the data to be inaccessible.
B. RAID 5
RAID 5 is striping with parity, where file blocks are striped across multiple
storage drives and one storage drive maintains parity data. Data would still
be available after a single drive failure in RAID 5, but two failed drives
would cause data loss.
C. RAID 0
RAID 0 is also called striping, where file blocks are split across multiple
physical drives. However, RAID 0 does not include any redundancy
features. A single drive failure in RAID 0 results in data loss.

73
Q

A78. A network administrator is installing a wireless access point in a new
conference room. Which of these settings would provide the BEST
security for this installation?

A

The Answer: A. WPA2 encryption
Configuring WPA2 (Wi-Fi Protected Access II) encryption would
prevent unauthorized users from accessing the wireless network and would
encrypt the data sent over the wireless network.
The incorrect answers:
B. SSID suppression
Preventing the SSID (Service Set Identifier) from appearing in lists of
available wireless networks would not provide any significant security
feature. If someone knows the name of the network, they would still be
able to connect.
C. Static IP addressing
Static IP (Internet Protocol) addressing is useful for unique environments
that require specific IP address assignments, but assigning IP addresses
statically doesn’t add any significant security to the network.
D. UPnP
UPnP (Universal Plug and Play) allows network devices to automatically
locate and configure other network devices. Generally speaking, the
automatic configuration feature of UPnP makes the network LESS secure.
E. MAC filtering
Filtering traffic by MAC (Media Access Control) address can be easily
circumvented with a packet capture application, so MAC filtering would
not be considered a security feature.

74
Q

A79. A university library needs to purchase a new printer for an open study
area. The primary requirement of this printer is to be as quiet as possible.
Which of these printer types would be the best fit for this requirement?

A

The Answer: D. Thermal
Of the available options, thermal printers are the quietest. The only
moving parts in a thermal printer are the motors that push the paper
through the printer, and those motors are small and run almost silently.
The incorrect answers:
A. Dot-matrix
Dot matrix printers are probably the loudest option in this list. The metal
pins in a dot matrix print head are impacting the page, and that printing
process makes a significant amount of noise.
B. Inkjet
An inkjet printer’s printing process is a bit quieter than a dot matrix
printer, but it’s not as quiet as thermal printing. The sound of the carriage
moving the print heads across the page and the printing process itself
would not provide the quietest printing option given the available options.
C. Laser
A laser printer uses many moving parts, high voltages, and a large motor to
print a single page. This process makes a bit of noise, so it wouldn’t fit the
requirements for the library.

75
Q
  1. Which of the following would be the BEST choice for reading textbooks
    in bright sunlight?
A

The Answer: D. e-Reader
e-Readers are standalone book and magazine reading devices that are
often designed with electronic paper or electronic ink technology. The
electronic ink screens on the e-Readers are specifically designed for
reading text-based content in bright sunlight.
The incorrect answers:
A. Tablet
Although tablets are quite useful for reading books and magazines, the
LCD screens in most tablets are not very visible when working in direct
sunlight.
B. Augmented reality
Augmented reality works with phones or glasses to overlay a virtual
augmentation over the physical world. Augmented reality can be used to
add games to the physical world, annotate travel information, or overlay
healthcare information, but it doesn’t make an ideal book reader.
C. Wearable technology
Wearable technologies are usually worn all day and are relatively small
devices. A wearable device would not commonly be used for reading books
or magazines.

76
Q

A81. A company has designed an application platform to scale up when the
application use increases during the day, and scale back down at night.
Which of the following BEST describes this characteristic of
cloud computing?

A

The Answer: D. Rapid elasticity
Scaling up and down as needed is a significant characteristic of cloud
computing. This allows organizations to manage and pay for resources
when busy, but save time and money when the resources are no longer
needed.
The incorrect answers:
A. Resource pooling
To provide rapid elasticity, there needs to be plenty of resources available
when needed. Resource pooling puts all of the computing power in one
place, and portions of the pool can be distributed as-needed.
B. Measured service
Tracking costs and utilization is useful for tracking and billing, and a
measured service provides a way to monitor and view the use of cloudbased resources.
C. Hybrid
A hybrid cloud model combines both public and private clouds together.
The hybrid cloud does not describe the scalability of these cloud
deployment models.

77
Q

A82. A user’s tablet has stopped responding to any type of finger input on the
screen. The clock and other tablet functions appear to be working. Which
of the following would be the BEST way to correct this issue?

A

The Answer: D. Restart the tablet
Before making any changes to hardware or software, it’s useful to restart
the tablet to see if a software glitch may have been the underlying issue.
The incorrect answers:
A. Replace the screen
Without running additional tests, it’s impossible to know if the screen is
actually the issue. Before switching out any hardware, it’s useful to restart
the system and run some hardware diagnostics.
B. Reset the wireless network
The wireless network would not have any impact on the screen digitizer.
If the tablet was experiencing network issues, then resetting the wireless
network may resolve any problems.
C. Connect to a power source
A tablet will continue to provide input to the digitizer, even in situations
of low battery life. Connecting to a power source would not be a common
solution for this issue.

78
Q

A83. A user would like to connect a tablet to their laptop computer using
802.11, but they are in a location without a wireless access point. Which
of the following would be the BEST way to make this connection?

A

The Answer: D. Use ad hoc mode
Ad hoc mode allows two devices to directly communicate over an 802.11
wireless link without using an access point.
The incorrect answers:
A. Enable Bluetooth discovery on the tablet
Enabling Bluetooth discovery would allow the tablet to use Bluetooth
peripherals, but it would not enable 802.11 networking between the tablet
and the laptop.
B. Configure infrastructure mode on both devices
Infrastructure mode is the 802.11 configuration used with an access point.
In this question, the two devices need to communicate without using an
access point.
C. Create shared folders on the laptop computer
Creating shared folders would potentially allow access from another
device, but the network would need to be available to provide the
connectivity.

79
Q

A84. A server administrator is upgrading the memory in a web server from
16 GB of non-ECC RAM to 64 GB of ECC RAM. After starting
the system with the new memory, the computer beeps and nothing is
displayed on the screen. Changing the number and location of new RAM
modules results in the same beeping sounds and blank screen. After
replacing the original 16 GB modules, the system starts normally. Which
of the following is the MOST likely reason for this issue?

A

The Answer: A. The new memory is not compatible with the
motherboard
ECC (Error Correcting Code) memory is designed to detect errors
and correct them on the fly. Not all systems use ECC memory, and it’s
important that the memory matches the motherboard requirements. If
non-ECC RAM (Random Access Memory) is replaced with ECC RAM
and the system fails to start, then the issue is most likely associated with
the change from non-ECC to ECC RAM.
The incorrect answers:
B. The new memory is faulty
Although it’s possible that the new RAM is faulty, the more likely and
obvious issue is the switch from non-ECC to ECC memory. Before
blaming the RAM, it would be useful to know what type of memory the
motherboard is expecting.
C. The BIOS needs to be updated
Although a BIOS upgrade may be a rare upgrade requirement, the more
obvious issue with this upgrade is related to the memory type.
D. The system is overheating during the startup process
It takes a bit of time to heat up the components inside of a computer, so a
failure that occurs at startup is most likely not related to thermal or heat
issues inside of the computer.

80
Q

A85. A workstation has been assigned an APIPA address. Which of the
following would be the MOST likely reason for this configuration?

A

The Answer: D. The DHCP server is down
APIPA (Automatic Private IP Addressing) is an IPv4 (Internet Protocol
version 4) link-local addressing scheme. If a device does not have a static
IP address and an address is not available from a DHCP server, the local
device will assign itself an APIPA address so that communication to other
APIPA devices on the same subnet will be available.
The incorrect answers:
A. The workstation is not connected to the wireless network
APIPA addresses are used for any IP connected device, regardless of the
type of network in use.
B. The DNS server is misconfigured
APIPA addresses are related to the local IP address and the availability
of a DHCP server. The DNS server is not involved in the assigning of an
APIPA address.
C. The network is using public Internet addresses
Assigned APIPA addresses include the range between 169.254.1.0 and
169.254.254.255. These addresses are considered “link-local” addresses
and can only communicate within the same local IP subnet. APIPA
addresses are not routable and devices with an APIPA address cannot send
or receive traffic to the Internet. APIPA addresses are not public Internet
addresses.

81
Q

A86. Which of the following is used to forward traffic based on a destination
MAC address?

A

The Answer: A. Unmanaged switch
Switches determine how traffic is forwarded based on the destination
MAC (Media Access Control) address in the frame. The qualification of
managed or unmanaged is not important in this case, since both types
of switches make forwarding decisions the same way. The difference
between a managed and unmanaged switch are based on other features not
associated with the forwarding process.

82
Q

A87. A system administrator made some BIOS changes to a desktop computer
running Windows 10, and now this message appears when starting the
computer:
“This drive can only boot in UEFI mode.”
Which of the following would be the BEST next troubleshooting step?

A

The Answer: B. Enable Secure Boot
Secure Boot is part of the UEFI (Unified Extensible Firmware Interface)
standard for a computer BIOS (Basic Input Output System). Secure Boot
ensures that the underlying operating system has not been modified by
malware or any other process.
The incorrect answers:
A. Modify the boot drive sequence
Changing the boot drive sequence in the BIOS would not resolve the
UEFI or Security Boot process.
C. Remove the BIOS password
UEFI mode and Secure Boot do not require a boot or management
password, and removing any of those passwords will not resolve the error
message.
D. Boot the system with the Windows setup media
Booting with separate media would not resolve this issue when booting
to the primary storage drive. UEFI mode with Secure Boot is required for
this system.

83
Q

A88. A user has spilled coffee on their laptop keyboard, and now the system
will not start. The laptop contains a presentation for an upcoming
conference. Which of the following would be the BEST way to gain
access to this presentation?

A

The Answer: D. Remove the storage drive and place it into an
external enclosure
The current laptop will not boot due to the liquid damage, so the only
option would be to remove the storage device from this laptop and use a
different computer to access the required presentation files.
The incorrect answers:
A. Boot the system with a drive image utility
Since this laptop will not start, attempting to boot with a drive imaging
utility would not be a useful troubleshooting step.
B. Connect an external monitor and boot from a USB drive
Although this would bypass the laptop’s storage drive, the primary issue
in this system is the liquid damage to the motherboard. Unfortunately, the
system will not allow booting to any drive on the laptop.
C. Boot to the Windows Recovery Environment
The Windows Recovery Environment would allow access to the file
system if the computer was working, but the liquid damage prevents any
software from starting on this laptop.

84
Q

A89. A technician is installing a DSL modem at a SOHO facility. Which of
the following connectors would be used to connect the DSL modem to
the Internet provider line?

A

The Answer: B. RJ11
The RJ11 connector (Registered Jack 11) is the modular connector
commonly associated with analog POTS (Plain Old Telephone System)
lines. Since DSL (Digital Subscriber Line) uses the existing telephone
lines, the DSL connection from an Internet Service Provider will also use
those same lines with RJ11 connectors. These connectors will be the same
for both residential, large-scale commercial, and SOHO (Small Office /
Home Office) use.
The incorrect answers:
A. RS-232
RS-232 (Recommended Standard 232) is associated with the transmission
of serial data across a link. These are slower speed connections that are
commonly used today to connect and manage infrastructure devices such
as switches, routers, and firewalls. RS-232 is not used for DSL or any
high-speed Internet connection.
C. BNC
BNC (Bayonet Neill–Concelman) connectors are commonly used for
coaxial connections used in larger enterprise environments. BNC is not
used for SOHO DSL connections.
D. F-connector
The F-connector is the screw-on connector commonly used to attach cable
television or cable modem coax connections. F-connectors are not used
with twisted-pair copper DSL installations.

85
Q

A90. Which of the following would be the BEST choice for capturing an
image from a printed page and saving it on a computer?

A

The Answer: C. Flatbed scanner
A flatbed scanner is designed to capture images from paper and convert
them into digital form.
The incorrect answers:
A. QR code reader
A Quick Response code is the square image at the end of each detailed
answer in this book, and the QR code for this question can be found at
the bottom of this page. QR codes are used to abbreviate or summarize
information into a code that can be easily converted using a QR code
scanner or camera.
B. Optical drive
Optical drives, such as DVD-ROM (Digital Versatile Disc - Read Only
Memory) readers can store digital information onto an optical disc that
can be read by laser beams on the appropriate DVD reader.
D. Webcam
Webcams are designed to capture moving images and not printed pages.