A+ 2nd test Flashcards
(35 cards)
Which protocol defines how a client can query and update network resources?
File Transfer Protocol (FTP)
Simple Network Management Protocol (SNMP)
Lightweight Directory Access Protocol (LDAP)
Common Internet File System (CIFS)
The Lightweight Directory Access Protocol (LDAP)
The Lightweight Directory Access Protocol (LDAP) defines how a client can access information, perform operations, and share directory data on a directory server. Network resources are objects within the directory, which is like a database.
What speed does Thunderbolt 3 support?
10 Gbps
20 Gbps
5 Gbps
40 Gbps
40 Gbps
Thunderbolt 3 doubles the speed of the prior version 2 by supporting speeds of up to 40 Gbps over a short high-quality cable (up to 0.5 m / 1.6 ft). Thunderbolt 3 uses a USB-C connector.
What service uses port 80?
Post Office Protocol 3 (POP3)
HyperText Transfer Protocol (HTTP)
Domain Name System (DNS)
Secure Shell (SSH)
HyperText Transfer Protocol (HTTP)
The HyperText Transfer Protocol (HTTP) uses port 80. HTTP enables clients (typically web browsers) to request resources from an HTTP server.
What is the first thing you should do if you are experiencing battery problems with your laptop?
Expose the battery to extreme heat.
Use a “known good” battery.
Test the power circuitry on the motherboard.
Check if the battery is correctly inserted.
Check if the battery is correctly inserted.
If working from the battery, first check that it is inserted correctly and seated properly in its compartment.
What is the defining quality of a network-based printer?
It uses 802.11x technology and manages its own print queue.
It connects directly to a specific computer.
It uses Bluetooth technology to connect to other computers.
It is managed by a network computer called a print server.
It is managed by a network computer called a print server.
The defining aspect of a network-based printer is that it is managed by a network computer called a print server. The print server holds the print queue, not the networked printer.
What is the purpose of having an accelerometer in a laptop?
To provide navigation
To orient the screen
To protect the hard drive
To overclock the CPU
To protect the hard drive
A laptop may have an accelerometer built in. This hardware technology detects if the laptop has suddenly dropped by using a sensor to detect sudden rapid movement such as a free fall. As a result, the hard drive will stop spinning and it will use measures to prevent itself from crashing and failing.
What is the first thing you should do when troubleshooting the built-in display on a laptop?
Send it to get it repaired.
Connect the laptop to an external monitor.
Check that the cutoff switch is not stuck.
Check if the settings are in energy saving mode.
Connect the laptop to an external monitor.
When troubleshooting the built-in display, first check that the video card is good by using an external monitor. Toggle the appropriate Fn key.
You need to build out the networking for your small local business. You have purchased a core switch and will pull home runs to each of the devices. What type of cabling will you use to connect your network?
Use a RG-6 patch cable.
Use a RJ-11 cable.
Use a RG-59 patch cable.
Use a RJ-45 cable.
Use a RJ-45 cable.
A RJ-45 (Registered Jack) connector is used with twisted pair cable for Ethernet local area networking products with RJ-45 ports, such as the core switch you have installed.
Which of the following ACPI (Advanced Configuration and Power Interface) power modes would cut power to most of a laptop’s devices and peripherals, but would maintain power to system memory to save the system’s state when the battery may be running low?
Hibernate
Standby
Energy Star
ACPI Mode S4
Standby
Standby mode cuts power to most devices and peripherals on a system and suspends the system to RAM. These means that power is provided to memory in order to save the system’s current state.
You are building a new server and need to ensure that it has the highest achievable disk fault tolerance. Which type of RAID (Redundant Array of Independent Disks) do you need?
RAID 10
RAID 1
RAID 0
RAID 5
RAID 10
RAID 10 is a combination of both RAID 0 (Striping without Parity) and RAID 1 (Mirroring). This configuration provides a high level of fault tolerance.
Which type of networking problem does encryption help resolve?
Unsecured traffic is easily intercepted by authorized devices snooping on the network.
Hackers are easily able to determine the internal IP address scheme of a network.
Network admins need to manually configure Transmission Control Protocol/Internet Protocol (TCP/IP) information on every client device.
Users are experiencing lag in time-sensitive applications such as video chat and streaming.
Unsecured traffic is easily intercepted by authorized devices snooping on the network.
Encryption scrambles the messages being sent over a network so that anyone intercepting them is not able to capture any valuable information.
Which of the following authentication methods allows for Single Sign On (SSO) on a network?
Username/password
Host-based authentication
Public key authentication
Kerberos
Kerberos
Kerberos allows Single Sign On (SSO) on a network that runs the Kerberos authentication protocol. Windows Active Directory domain networks use Kerberos.
Which of the following cloud services offers application hosting with web based management and access for users?
PaaS
SaaS
IaaS
Elastic
SaaS
SaaS (Software as a Service) is a cloud based offering that provides application access to users via the Internet. Examples of popular SaaS applications are Office 365, Google Suite, SalesForce, and Zoho Office.
What is true about identifying the cause of a problem?
There is always only one cause to every problem.
The solution to a problem will never cause additional problems.
It is better to be methodical, than to resolve the problem quickly.
You must balance being methodical with being efficient.
You must balance being methodical with being efficient.
In the real world, you often must balance being methodical (so that possible causes are not overlooked) with being efficient (so that the problem can be solved quickly).
A user has lost the charging cable for their company issued Android smartphone. You are tasked with providing them with a replacement. The user has requested to make the cable work with their device without an adapter. While you would need to know the specific make and model of the device to supply the correct charging cable, you can immediately rule out one of the following cables:
Micro-USB
Mini-USB
USB Type B
USB Type C
USB Type B
USB Type B connectors are typically utilized for connecting devices such as printers and while they can provide power to devices, they are not used with Android devices.
You are installing a Redundant Array of Independent Disks 1 (RAID 1) and want to ensure that the controller card is not a single point of failure. What technique do you need to employ in this configuration?
Disk partitioning
Disk mirroring
Disk duplexing
Disk striping
Disk duplexing
In a RAID 1 configuration, data from an entire partition is duplicated on two identical drives through duplexing.
Which of these is a type of fiber optic connector?
F-connector
RJ-45
Straight tip
BNC
Straight tip
A straight tip connector (ST connector) is a connector used in fiber-optic cables that utilizes a bayonet-style plug and socket; used mostly for multi-mode networks. The ST connector setup allows for unidirectional communication, so two ST connectors and two fiber cables are used for bidirectional communication.
Which of these is true about Solid State Disks (SSDs)?
SSD’s only use mSATA or m.2 connectors.
SSDs utilize faster spinning platters.
SSDs use magnetic disk technology.
SSDs use flash memory.
SSDs use flash memory.
Solid State Drives (SSDs) use flash memory technology offering much faster performance and less weight and power consumption than Hard Disk Drives (HDDs). SSDs are now the mainstream choice for laptops.
What is the main connection difference between USB-A and other versions of USB?
The connector is square with a beveled top.
The connector is small and beveled.
The connector is a large flat rectangle.
The connector is small, flat and reversible.
The connector is a large flat rectangle.
You use USB Type A to connect to a host. The connector and port are shaped like large flat rectangles.
Which of the following is used to distinguish between the host number and the network number?
Broadcast address
Subnet mask
Default gateway
IPv4
Subnet mask
A subnet mask (or netmask) is used to distinguish these two components within a single IP address. It is used to “mask” the host ID portion of the IP address and thereby reveal the network ID portion.
How can you verify whether a solution you apply fixes a problem?
Substitute the part for a “known good” one.
Eliminate any factors that could cause the problem.
Re-establish a new theory.
Document the outcomes.
Substitute the part for a “known good” one.
A basic technique when troubleshooting a cable, connector, or device is to have a ““known good”” duplicate to hand. This approach very quickly identifies ““non-causes.””
Which of the following Hypervisors is included with Linux distributions?
KVM
VMWare Fusion
ESXi
Hyper-V
KVM
KVM is a virtualization hypervisor that is included with Linux distributions. It is an open source type-2 hypervisor. A type-2 hypervisor requires an underlying operating system and does not have direct access to the host system’s hardware.
Which type of server provides an access control system for the network?
DHCP server
Authentication Server
Mail server
DNS server
Authentication Server
An authentication server is one that consolidates authentication services across multiple access devices, such as switches, routers, and access points.
Under 802.1X, what is the term for the switch that waits for the device to send authentication data?
PNAC
Authenticator
Authenticating server
Supplicant
Authenticator
The authenticator is the switch that enables the Extensible Authentication Protocol over LAN (EAPoL) protocol and waits for the device to supply the authentication data.