CompTIA A+ Core 1 Final Assessment Flashcards
(312 cards)
Which cloud characteristic handles changes in demand requirements in real time?
Rapid elasticity refers to the system’s ability to handle changes to demand in real time. This type of system would not experience loss of service or performance if demand doubles.
Scalability
Scalability means that the costs involved are linear. For example, if the number of users doubles, the costs to maintain the same level of service would also double
High Availability (HA)
High availability (HA) means that the service experiences very little downtime. For example, a service with 99.999% availability experiences only 5 minutes and 15 seconds annual downtime.
Metered Utilization
The per-use billing for resources consumed by the cloud is referred to as metered utilization. The metering measurement is based on the type of resource such as storage, processing, bandwidth, or active users.
How many binary digits are found within a media access control (MAC) address?
A MAC address consists of 48 binary digits, making it 6 bytes in size. MAC addresses are represented in hexadecimal and each hex digit represents half a byte.
IP Address
An IP address is 32 binary digits. This address type is made up of four octets, each with 8 binary digits.
MAC Hexadecimal
A MAC address is typically represented as 12 digits of hexadecimal. Hex is a numbering system often used to represent network addresses of different types.
16 Bits
The number 16 is representative in many areas of computing that usually relate to bits. There are not 16 MAC binary digits.
A small call center office asks their IT service provider to implement a voice-over-IP (VoIP) system for them. After discussing the office’s needs, the technician learns that their ability to make and receive phone calls is critical. Considering this information, which of the following should the technician recommend?
The technician should suggest configuring quality of service (QoS) on the router to prioritize the port used by VoIP over any other type of protocol.
Dynamic frequency selection (DFS)
Dynamic frequency selection (DFS) is used to prevent Wi-Fi signals from interfering with radar and satellites. It is not related to VoIP.
Universal Plug-and-Play (UPnP)
Universal Plug-and-Play (UPnP) is a firewall setting that automatically opens the IP addresses and ports necessary for VoIP calls, but it has many security issues.
Port flapping
Port flapping is when a port transitions continually between up and down states, often caused by bad cabling, external interference, or a faulty network interface card (NIC) at the host end. It is not something that is set up and is not related to VoIP.
A systems administrator looks to control HTTP requests from client computers based on the time of day. What type of service does the administrator deploy when configuring clients in a non-transparent manner?
A proxy can perform a security function by acting as a content filter to block access to sites deemed inappropriate. A non-transparent proxy requires client configuration for the proxy server.
Load Balancer
A load balancer can be deployed to distribute client requests across server nodes in a farm or pool.
A unified threat management (UTM)
A unified threat management (UTM) appliance is one that enforces a variety of security policies and controls, combining the work of multiple security functions.
An embedded system
An embedded system is an electronic device that is designed to perform a specific, dedicated function. An embedded system does not describe the deployed service.
Non-volatile storage devices hold data when the system is powered off. These devices are also referred to as mass storage. What are the three types of technologies that mass storage devices use? (Select all that apply.)
- Magnetic drives, commonly called hard disk drives (HDDs), store data on metal or glass platters that are coated with a magnetic substance.
- Optical drives, such as Compact Discs (CDs), DVDs, and Blu-Ray drives, use a laser to read data that has been encoded on the surface of the disc.
- A solid-state drive (SSD) uses flash memory technology to implement persistent mass storage.
RAM
System memory is implemented as random-access memory (RAM) devices. RAM is faster than the flash memory used for SSDs and much faster than an HDD, but it is volatile. RAM is not a mass storage technology.
An engineer configures 6 disks in a workstation to be part of a redundant array of independent disks (RAID) volume where one-sixth of the space on each disk will be used for parity. Which RAID type does the engineer implement?
RAID 5 requires a minimum of three drives but can be configured with more. When configuring RAID 5, an equal portion of each disk is used for parity.
RAID 0
RAID 0 requires a minimum of two drives but can be configured with more. As this type of RAID provides no redundancy, there is no parity information available.
RAID 1
RAID 1 is a mirrored drive configuration that uses two disks. A read operation may use either disk, however, a write operation is performed on both disks.
RAID 10
RAID 10 is a nested RAID configuration that combines the features of two basic RAID implementations. It pairs a logical striped volume (RAID 0) configured with two mirrored arrays (RAID 1).
A technician needs to repair a laptop. Symptoms are that some keyboard characters are not typing properly and the fingerprint reader is not recognized. What type of component is the technician inspecting?
When replacing components such as a keyboard or touchpad, a connection is made to the motherboard via a data cable, typically with a flat ribbon cable type.
Small Outline DIMM (SODIMM)
Laptop RAM is packaged in a smaller form factor called Small Outline DIMM (SODIMM). The memory is typically fitted into slots that pop up at a 45º angle.