Exam 1 Flashcards

(85 cards)

1
Q

A6. The printer in the accounting department has stopped all printing
processes. The print queue shows that there are seven jobs in the queue
that are waiting to be printed. Which of the following would be the BEST
next troubleshooting step?

A

The Answer: B. Restart the printer’s spooler
The print spooler is the software responsible for storing print jobs and
sending them to the printer. If the printer spooler has failed or has
stopped, then none of the print jobs will be sent to the printer.
The incorrect answers:
A. Send a test job to the printer and move it to the top of the queue
Since the print spooler is the issue, it won’t matter where a print job might
be in the queue. A test print job will sit at the top of the queue just like
any other print job.
C. Install an updated version of the printer driver
The printer driver on a client workstation is responsible for formatting
the print job in a way that the printer can properly interpret during the
printing process. Changing the print driver won’t fix problems with the
print spooler.
D. Delete everything in the queue and resend the print jobs
If the spooler is having problems, then deleting the print jobs will only
require users to resend the print requests, which will then sit in the queue
and not print

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A system administrator has connected an external USB drive to a
computer to transfer some documents. When booting the computer, the
system tries to boot from the external drive and gives an error message.
Which of the following would be the BEST way to prevent the USB drive
from booting?

A

The Answer: A. Modify the BIOS to boot from the internal hard drive
The boot order is managed in the system BIOS, and one way to avoid the
computer from attempting to boot from an external storage device is to
move the internal drive to have a higher boot priority.
The incorrect answers:
B. Modify the boot order in Windows Disk Management
Windows Disk Management is not used to configure the boot order of
the computer. By the time Windows has loaded, the boot order has already
been determined. The boot order is configured in the system BIOS.
C. Rebuild the MBR on the external hard drive
Rebuilding the MBR (Master Boot Record) of the external hard drive will
not prevent the computer from attempting to boot to the drive.
Rebuilding the MBR would only be necessary if the boot record was
erased or damaged.
D. Disable the external drive in Device Manager
Since Windows Device Manager is only active after the system boots,
disabling the external drive would not prevent the boot process. Disabling
the drive in Device Manager would only prevent Windows from accessing
the drive once the system was booted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A8. A computer has been configured with an SSD, a high-end video adapter,
and the maximum amount of RAM. Which of the following would be the
MOST likely use for this computer?

A

The Answer: C. CAD/CAM workstation
The graphical designs created by a CAD/CAM (Computer Aided
Design / Computer Aided Manufacturing) computer requires high-speed
SSD (Solid State Drive) storage, high-end video, and as much RAM as
possible.
The incorrect answers:
A. Thin client
A thin client is a computer with the minimum hardware resources
required to perform a remote desktop or remote control function. The
applications used on a thin client are run on a remote server, so the local
device does not require any high-end components.
B. Network attached storage device
A NAS (Network Attached Storage) server requires plenty of storage and
high-speed networking, but does not require advanced video functionality.
D. VDI client
VDI (Virtual Desktop Infrastructure) clients display applications that are
running on other servers, and it’s very common to run VDI clients on thin
clients or other minimally-configured systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A9. A network connection in a conference room was installed years ago, and
there’s no documentation for the cable run. Connecting a device to the
cable results in a successful Ethernet connection, so the other end of
the cable should terminate somewhere in the wiring closet. Which of
these tools would be the best choice to find the other end of the network
connection?

A

The Answer: B. Tone generator
A tone generator is used to produce an analog tone on the cable, and an
inductive probe is used to “listen” for the tone on the other end of the
cable.
The incorrect answers:
A. Cable tester
A cable tester could be used to confirm the wire map of the cable, but you
would first need to locate both ends before that would be possible. A cable
tester doesn’t provide a way to locate both ends of a cable.
C. Multimeter
A multimeter could be used to verify continuity and the wire map of the
cable, but both ends of the cable would need to be close to the multimeter.
A multimeter can’t be used to locate both ends of a cable.
D. Crimper
If the RJ45 connector on the cable was faulty, a crimper could be used to
attach a new connector to the cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A10. A client’s laptop has recently had its internal mini-PCIe wireless adapter
card replaced. Although Device Manager shows the card working
properly, the wireless card management software shows very low signal
strength. The wireless card keeps dropping its wireless connection and
will not maintain a consistent network link. What is the most likely
reason for this problem?

A

The Answer: B. The wireless adapter antenna cable isn’t connected
The antenna cable connectors are very small, and it’s easy to leave them
disconnected after working inside of a laptop. A missing antenna cable
will cause the wireless signal strength to be very low, and often there’s not
enough signal strength to reliably send or receive data.
The incorrect answers:
A. The mini-PCIe card isn’t compatible with the laptop
The mini-PCIe (mini-Peripheral Component Interconnect Express)
standard will install into any laptop’s mini-PCIe interface. If the laptop
was not compatible, the shape and physical format of the interface would
not allow the adapter to be installed.
C. The operating system doesn’t support the wireless card
An incompatible mini-PCIe adapter would not be usable by the operating
system. In this example, the adapter card was operational except for the
low network signal.
D. The wireless card is administratively powered off
If the adapter was powered off, it would not have been able to show signal
strength data in the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A11. A user has powered on their computer and received the message
“Operating system not found.” A check of the system shows that the hard
drive cables are properly connected. Which of the following would be the
NEXT best troubleshooting step?

A

The Answer: D. Check for removable drives
If a USB (Universal Serial Bus) storage device is connected to a computer
and the BIOS (Basic Input/Output System) is checking USB devices
before the primary storage drive, the “Operating system not found” error
could appear with some USB devices. To avoid this error, the boot order in
the BIOS can be changed, or the USB device can be disconnected during
the boot process and reconnected after the operating system has started.
The incorrect answers:
A. Boot to Safe Mode
Safe Mode is a Windows mode that will launch the operating system with
minimal services and OS requirements. Safe Mode requires a bootable
drive, so the error message in this question would prevent Safe Mode
from starting.
B. Replace the boot drive
There’s not enough information to determine if the boot drive is bad or
faulty, so immediately replacing it would be premature. If there aren’t any
removable storage devices connected to the system, then running hardware
diagnostics of the drive would be a good next step before considering a
hardware replacement.
C. Restore from a known good backup
This question doesn’t provide enough information about the state of the
primary boot drive, so making any significant changes to the data on the
drive would not be the best next step.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A12. A user is having an issue with a smartphone not recognizing their
location on a map. All other Internet and phone features are working
properly. Which of the following would be the MOST likely cause of this
issue?

A

The Answer: A. GPS is disabled
The GPS (Global Positioning System) option on a smartphone provides
precise location services for apps and utilities. The map feature on the
smartphone uses the GPS to help determine the location, speed, and
direction of the user.
The incorrect answers:
B. The battery is low
Although some mobile devices will minimize unnecessary services when
the battery is low, a notification is usually provided to inform the user of
this situation. A low battery would not be the most likely reason for the
GPS to be disabled.
C. Wi-Fi is enabled
Wi-Fi would actually help with location services, especially when a clear
view of the sky and GPS satellites is not available. Enabling Wi-Fi would
not cause any issues with apps that need location services.
D. Storage space is low
Location services do not require any significant storage space on a
smartphone, so a lack of storage would not cause any issues with apps that
need to use location services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A13. A client’s laptop sounds like it is booting normally, but nothing appears
on the LCD display. After closer inspection, you notice the output is
visible but it’s too faint to clearly see anything. What is the MOST likely
cause of this issue?

A

The Answer: B. Inverter
The inverter powers the CCFL (Cold Cathode Fluorescent Lamp) LCD
(Liquid Crystal Display) backlight, allowing you to easily view the pixels
on the display. Most newer laptops will use LED (Light Emitting Diode)
backlights that use the existing DC (Direct Current) power and don’t
require an inverter.
The incorrect answers:
A. Video card
A faulty video card might cause the video display to stop working
completely, or the information on the screen may be corrupted. A faulty
video adapter does not commonly cause the display to have a decreased
backlight setting.
C. Video driver
Bad video drivers often cause issues with resolution settings or aspect
ratios, but a bad video driver does not commonly affect the backlight
settings.
D. Power adapter
A bad power adapter would cause a laptop to fail during the boot process
or fail to properly charge a battery. A bad power supply would not usually
cause everything to work properly except for the backlight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A14. A graphics designer is experiencing increasing delays when accessing files
on her hard drive. The user maintains a daily backup of all data on the
drive. Which of these would be the BEST next troubleshooting step for
this issue?

A

The Answer: B. Perform a hard drive diagnostic
Before making any changes, it would be useful to gather more information
about this problem. A hardware diagnostic would determine if the hard
drive itself is working properly. If the hard drive is operating normally, the
troubleshooting process can then shift to the operating system
and software.
The incorrect answers:
A. Reinstall Windows
Reinstalling Windows won’t help if the hard drive is not operating
properly. The reinstallation process is also a time-consuming and is a
significant change, so it’s important to know if the underlying hardware is
working.
C. Restore from the daily backup
The root cause of this issue hasn’t been identified, so any significant
change to the user’s data would be premature. The user may have also
modified some of this data since the backup was taken, so restoring the
backup could potentially lose data.
D. Boot to Safe Mode
Safe Mode will start Windows with a minimal configuration, and this
could help troubleshoot software issues with the operating system itself.
Before analyzing the software, it would be important to know if the
underlying hardware is working properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A15. Which of the following would be MOST likely found on a DVD-ROM?

A

The Answer: A. Document archive
The DVD-ROM (Digital Versatile Disc - Read Only Memory) format
has the advantage of a relatively large storage area and the ability to
write once and never worry about an accidental deletion. The storage of
documents and other files is a common use of DVD-ROM optical discs.
The incorrect answers:
B. Operating system boot files
Although it is possible to boot an operating system from a DVD-ROM,
it’s not a common use of the format. It’s much more common to store
operating system files on a local storage drive with a higher storage
capacity and throughput, such as a hard drive or SSD (Solid-State Drive).
C. RAID parity files
A RAID (Redundant Array of Independent Disks) array requires that all
of the data and parity information reside on the local storage drives. Parity
information would not be stored on a DVD-ROM disc.
D. BIOS configurations
BIOS configurations need to be accessible from the motherboard of a
computer, and not from other storage devices. BIOS configurations would
not be found on a DVD-ROM disc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A16. When a user starts their computer, the screen remains blank and the
computer beeps twice. Which of these would be the MOST likely cause
of this issue?

A

The Answer: B. The memory is faulty
The POST (Power On Self Test) is the initial hardware check that occurs
during the startup process. If a major hardware component is faulty, the
computer will beep and a message will be displayed on the screen. If the
issue is related to a critical component, the computer will not be able to
display a message on the screen and instead will beep a certain number of
times as a code to specify the error.
The incorrect answers:
A. The boot device is not connected
A missing boot device would display the normal BIOS startup and display
a message on the screen for “No Boot Device Found.”
C. The operating system has become corrupted
A bad operating system would display the normal BIOS startup messages.
When the operating system attempted to load, the OS will provide error
messages on the screen for any issues related to the corrupted files.
D. The PC is infected with malware
A malware infection would not commonly cause a system to boot with
a blank screen and a beep code. Malware would be identified once the
operating system has started.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A firewall is configured to block email transfers from a remote server.
Which of the following ports is the firewall blocking?

A

The Answer: D. 25
Port 25 is used by SMTP (Simple Mail Transfer Protocol) to send email
messages from devices and transfer those messages between SMTP email
servers.
The incorrect answers:
A. 443
Port 443 is commonly used by web browsers to transfer information using
SSL (Secure Sockets Layer) or TLS (Transport Layer Security) encryption
protocols.
B. 22
The SSH (Secure Shell) protocol uses port 22 as an encrypted terminal
communication. SSH is commonly used to access the command line
terminal of remote devices and servers.
C. 23
Port 23 is used by Telnet for non-encrypted terminal communication
between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A18. A technician is connecting a laptop to an LCD projector in a conference
room. The display on the laptop works properly, but the projector image
is constantly flickering and pixelating. The technician has modified the
resolution and refresh rates, but the projector image continues to flicker.
Which of the following would be the BEST next troubleshooting step?

A

The Answer: A. Replace the video cable
A display issue associated with flickering and poor video quality would
commonly point to the connection between the video adapter and the
display device. In the case of an LCD (Liquid Crystal Display) projector,
there’s sometimes a very long (and very worn) cable that can cause signal
issues to show on the projected image.
The incorrect answers:
B. Disable the laptop display
Disabling the laptop display won’t help with any signal problems, and
would probably hinder the troubleshooting process because you wouldn’t
be able to properly see the display information due to all of the flickering
and pixelating.
C. Replace the projector bulb
The bulb in an LCD projector either works or doesn’t, so it will be very
obvious if the bulb is faulty. In this example, the projector bulb is working,
but the information displayed on the projector is an issue.
D. Power cycle the projector
The projector itself would not commonly cause any display flickering
or image problems, so power cycling the projector wouldn’t normally
resolve this type of problem. If all other troubleshooting tasks fail, then
power cycling everything might be an option, but it wouldn’t be the first
troubleshooting step.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A19. The stylus on a Windows tablet will no longer interact with the user
interface. Which of these would be the MOST likely cause of this issue?

A

he Answer: A. Digitizer
The digitizer is the component in a touch screen that converts the
analog input from a fingerprint or stylus into a digital input that can
be understood by the computer. If the digitizer is having an issue, then
problems will occur with any direct screen input.
The incorrect answers:
B. Backlight
An LCD screen does not produce any light, so a backlight is used to make
the screen bright enough to see. The brightness of the screen does not have
any effect on the stylus.
C. Antennas
There are a number of antennas in a computer for 802.11 networks and
Bluetooth connections. The stylus does not use any of these antennas.
D. Inverter
An inverter is used in older LCDs (Liquid Crystal Displays) to invert DC
(Direct Current) power into AC (Alternating Current) power. This AC
power is used by CCFL (Cold Cathode Fluorescent Lamp) backlights.
Most of the newer LCD displays contain LED (Light Emitting Diode)
backlights that use the existing DC power and do not require an inverter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A20. A user in the accounting department needs to output a form on the laser
printer that prints on both sides of the page. Which of the following
options should be configured in the accounting software?

A

The Answer: C. Duplex
The duplex setting prints the output on both sides of the page, and a
printer that supports duplexing will flip the page over without any manual
intervention from the user.
The incorrect answers:
A. Collate
When printing multiple copies, the collate option will print all of the
pages in a document before printing the next copy.
B. Orientation
The orientation setting will change the output between portrait or
landscape. The orientation option will not change which sides of the page
are used.
D. Resolution
The resolution setting will modify the number of dots per inch used for
the output. A larger number of dots per inch will increase the resolution
and make the text and images appear sharper on the page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A user needs to connect their laptop to the wired Ethernet network, but
the laptop does not have an integrated Ethernet interface. Which of the
following would allow the laptop to connect to an Ethernet network?
(Pick TWO)

A

The Answer: A. Docking station
C. USB to Ethernet adapter
There are a few ways to create a wired Ethernet connection on a laptop
computer. Using a docking station is a common solution that provides
many different interfaces, and often includes the ability to install a fullsize PCI Express (Peripheral Component Interconnect Express) adapter.
A USB (Universal Serial Bus) to Ethernet adapter is a simpler solution
that only provides an Ethernet interface, but it’s much more portable than
a docking station.
The incorrect answers:
B. VGA interface
A VGA (Video Graphics Array) interface is an interface for video output
and does not provide Ethernet connectivity.
D. DisplayPort to HDMI cable
Both DisplayPort and HDMI (High-Definition Multimedia Interface)
provide video output and are not used for Ethernet on a laptop computer.
E. DVI to HDMI adapter
DVI (Digital Visual Interface) and HDMI are video interfaces and do not
provide a wired Ethernet link.
F. Bluetooth
Bluetooth is a wireless PAN (Personal Area Network), and it does not
provide wired Ethernet connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A22. A server administrator has received an alert showing that one drive in a
RAID 1 array has failed. Which of the following would be the best way
to resolve this alert?
❍ A. Replace the bad drive and resync the array
❍ B. Replace all drives in the array and resync the array
❍ C. Replace the bad drive and restore from backup
❍ D. Convert the array to RAID 0 and replace the drive
❍ E. Replace all drives in the array and restore from backup
The Answer: A. Replace the bad drive and resync the array
A RAID 1 (Redundant Array of Independent Disks, level 1) array is a
mirrored array, which means that all of the information on one physical
drive is also copied and maintained on a separate drive. If one drive fails,
then the drive with the redundant data continues to be available. To
repair the array, the bad drive needs to be replaced and the data from the
redundant drive is synchronized to the new drive.

A

The incorrect answers:
B. Replace all drives in the array and resync the array
A RAID 1 array continues to run after a drive outage, and all data
continues to be available. There’s no reason to replace all of the drives in
the array, and if all drives were replaced there would be nothing to resync.
C. Replace the bad drive and restore from backup
Since no data is lost after a single drive failure in a RAID 1 array, restoring
from backup is not necessary.
D. Convert the array to RAID 0 and replace the drive
RAID 0 is striping data across drives, and there is no redundancy in a
RAID 0 array. It’s not common to convert arrays between RAID levels,
and a conversion is not necessary to restore full functionality to this
RAID 1 array.
E. Replace all drives in the array and restore from backup
There’s no need to restore from backup when replacing a single drive in a
RAID 1 array.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A23. A system administrator is building a server for a data center in another
country. The server will manage a print queue and provide a local storage
partition for temporary file transfers. Which of the following power
supply specifications will be the MOST important for this server?

A

The Answer: A. Voltage input options
Connecting to the power source in a different country is an important
consideration when selecting a power supply. If the voltage specifications
are incorrect, the server may not operate at all or components in the server
may be damaged. Many servers use auto-switching power supplies are
compatible with the power systems in other countries.
The incorrect answers:
B. Number of PCIe connectors
PCIe (Peripheral Component Interconnect Express) is a standard bus
type, and some of the adapters on this bus may require additional power.
However, none of the requirements of this server would need more PCIe
connectors than a standard power supply.
C. Modular cabling
Using a power supply with modular cables can help with airflow, but this
modularity isn’t a requirement for most systems. Most data centers are
climate controlled, so it shouldn’t be difficult to maintain a reasonable
temperature with a non-modular power supply.
D. Fan noise rating
A data center is usually quite noisy, so the noise rating of a power supply is
not going to be a significant concern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A24. Which of the following ports are used for file transfers? (Select TWO)

A

The Answer: A. 21 and E. 20
FTP (File Transfer Protocol) is a standard method of transferring files
across different operating systems. FTP uses TCP (Transmission Control
Protocol) port 21 for control messages and port 20 to transfer data.
The incorrect answers:
B. 110
Port 110 is the default port for POP3 (Post Office Protocol version 3).
POP3 is commonly used to retrieve email messages from an email server
into a local email client application.
C. 25
Another common email protocol is SMTP (Simple Mail Transfer
Protocol), which uses port 25 for sending mail to a mail server and to
transfer email messages between mail servers.
D. 23
Non-encrypted (in-the-clear) terminal communication is provided with
the Telnet (Telecommunication Network) protocol over port 23.
F. 53
Port 53 is the default port for DNS (Domain Name System). DNS is
commonly used to convert fully qualified domain names to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A25. Which of these technologies do not require a backlight to provide a
viewable display?

A

The Answer: C. OLED
An OLED (Organic Light Emitting Diode) display emits light when a
current is provided to an organic compound, so a backlight would not be
necessary with an OLED display.
The incorrect answers:
A. LCD
An LCD (Liquid Crystal Display) screen does not produce any light, so
a backlight is required to see the screen contents. Most LCD displays use
LEDs (Light Emitting Diodes) or CCFLs (Cold Cathode Fluorescent
Lamps) as a backlight.
B. IPS
IPS (In Plane Switching) LCD monitors provide excellent color
representation, but they are still LCD displays that require a backlight.
D. LED
LED is a type of backlight that is commonly used on LCD displays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A26. A system administrator has tripped over an Ethernet cable and the cable’s
RJ45 connector has broken. Which of the following should be used to
resolve this issue?

A

The Answer: D. Crimper
A crimper is used to attach a modular connector to a cable. In this
example, a new connector can be reattached to the cable using an RJ45
(Registered Jack type 45) crimper.
The incorrect answers:
A. Punch-down tool
A punch-down tool is used to connect wires to punch-down blocks, such
as a 110 block. A punch-down tool can’t be used to attach a new RJ45
connector to a cable.
B. Tone generator and probe
Tone generators and inductive probes are used together to find the two
ends of a cable run. Toner probes are not used to connect RJ45 connectors.
C. Cable tester
Cable testers can identify the wire map of a cable. Once the crimper has
been used to attach the RJ45 connector, the cable tester can confirm that
the connector is properly wired. Cable testers are not used to connect
modular connectors to a cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A27. A network administrator is troubleshooting a network outage, and she
believes that the issue is related to a bad switch. The old switch is replaced
with a newer model and the cabling is moved to the new switch. Which
of the following should be the NEXT troubleshooting steps? (Choose
TWO)

A

The Answers: B. Verify full system functionality, and
E. Document the findings
Once the theory has been tested, a plan of action has been determined,
and the plan has been implemented, it’s important to verify that full
system functionality has been restored. After all of this work, it’s useful to
document the problem, the proposed solutions, and the ultimate fix. This
problem might occur again, and it would be useful to have some historical
documentation on how to address the issue.
The incorrect answers:
A. Test the theory
The testing of possible theories should occur before making any changes.
In this example, the replacement of the switch is the theory that was tested
in the lab prior to implementation.
C. Establish a plan of action
The plan of action was created prior to the replacement of the switch.
The plan design might be relatively simple or may have a complex
set of processes. The complexity of the plan generally depends on the
organization and the type of problem.
D. Identify the problem
Identifying the problem is the first step in the troubleshooting process.
Before you can resolve an issue, it’s important to fully understand what
might not be working.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A28. A gaming enthusiast is building her own computer to provide the best
performance with 3D action games. Which of these would be the most
important components of a gaming PC? (Choose TWO)

A

The Answers: C. High-end GPU, and E. SSD
The GPU (Graphics Processing Unit) is an important consideration when
building a gaming computer. Many computer games also read extensively
from storage, so the speed of an SSD (Solid State Drive) will provide the
fastest possible data access.
The incorrect answers:
A. RAID array
A RAID array (Redundant Array of Independent Disks) is useful when
uptime is an important priority. Since gaming is generally considered
a leisure activity, ensuring one-hundred percent uptime isn’t usually
associated with this uptime requirement.
B. Small form factor
A small form factor refers to the size of the computer case, and gaming
systems don’t usually need to fit in a small cabinet or a limited space.
D. Built-in tuner
Television tuners are useful when capturing television signals, but gaming
systems don’t often need this functionality.
F. Network-connected printer
Printers are useful for sharing physical documents and other files, but they
have limited use for a gaming system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A29. What type of device connects multiple computers to the network, but
becomes less efficient as network traffic increases?

A

The Answer: B. Hub
A hub operates as a multi-port repeater, where incoming traffic is repeated
to every other port in the hub. If more than one device attempts to do this
at the same time, these conflicting signals are called a collision. Each time
a collision occurs, the sending devices have to stop transmitting, wait a
random amount of time, and try sending traffic again. If many devices are
sending large amounts of data, the overall network efficiency will decrease
as the number of collisions increase.
The incorrect answers:
A. Switch
A switch makes forwarding decisions based on destination MAC (Media
Access Control) address and can communicate over full-duplex links. This
communication method ensures that no collisions can occur.
C. Repeater
The relatively simple forwarding process of a repeater ensures that
slowdowns will not occur as network traffic increases.
D. Router
Routers forward traffic based on the destination IP address, and this
process does not create an inefficiency as the network traffic increases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A30. In which of the following would a Lightning cable MOST likely be used?
The Answer: D. Charge a mobile device The Lightning interface is a proprietary interface used exclusively on mobile devices from Apple. The Lightning interface is a common connection for data transfers and power charging for most Apple mobile devices. The incorrect answers: A. Connect a server to a display monitor Although there are video output adapters available for Lightning connectors, these options are currently only available for Apple's phones and tablets and is not used on standalone computers or servers. B. Increase the available memory of a device Although there are options to provide external storage using a lightning connection, the memory used in an Apple mobile device is limited to the installed internal RAM (Random Access Memory). C. Remotely control a mobile device Although there are remote control options available for Apple devices, these solutions use an existing network connection and do not use the Lightning interface.
26
A31. A network administrator would like to enable DHCP on a laptop, but he would like the same IP address to be assigned to the laptop each time it starts. Which of the following would provide this functionality?
The Answer: A. Create an IP reservation on the DHCP server A DHCP (Dynamic Host Configuration Protocol) server will automatically assign IP (Internet Protocol) addresses to devices on the network from an available pool. This means that the IP address for a device may change over time based on the IP addresses that are currently available in the pool. To force the same IP address assignment each time, the network administrator can create an IP reservation in the DHCP server that will associate a specific IP address to the MAC (Media Access Control) address of the laptop. The incorrect answers: B. Administratively configure the laptop’s MAC address The MAC address of a device will rarely need to changed through an administrative configuration, and administratively configuring the MAC address will not permanently assign a particular IP address. C. Use APIPA addressing APIPA (Automatic Private IP addressing) can provide limited networking when a DHCP server is not available, but APIPA addressing does not provide any static or permanent IP addressing on a device. D. Assign the laptop to a static IP VLAN VLANs (Virtual Local Area Networks) are commonly used to segment the network into individual broadcast domains. Assigning a device to a particular VLAN does not provide a method of static or permanent IP addressing on a device.
27
A32. A user is complaining about slow network performance from their workstation. A network technician checks the data closet and finds that the wires are not properly seated in the 110 block. Which of the following should the technician use to correct this issue?
The Answer: C. Punch-down tool A punch-down tool is used to firmly "punch" a wire into a wiring block, such as a 110 block. These blocks are usually located in a wiring closet or on the back of a patch panel. The incorrect answers: A. Crimper A crimper is used to fasten the modular connector onto the end of a cable. For Ethernet, a crimper fastens the RJ45 connector used by the workstation or laptop. B. Multimeter A multimeter can be used to check for voltages or continuity, but it won't help fasten wires to a 110 block. D. Cable tester Cable testers can identify the wire map on a cable to ensure that the punch-down or crimping process has been performed properly. After punching down this connection, the technician could use a cable tester to validate that all of the wires are now properly connected.
28
A33. A user has just connected to a new wireless network, but they cannot view any Internet web sites. Their network configuration shows the IP address as 169.254.228.109, the subnet mask is 255.255.0.0, and they have not been assigned a default gateway. Which of these is the MOST likely cause of this issue?
The Answer: C. The DHCP server is down If a DHCP (Dynamic Host Configuration Protocol) server is not responding, then the local workstation will configure itself with an APIPA (Automatic Private IP Addressing) address. The usable APIPA addresses are in the range between 169.254.1.0 through 169.254.254.255. An APIPA address is a link-local address, so network communication is limited to the local IP subnet. The incorrect answers: A. The subnet mask is not correct The subnet mask has been configured through APIPA, and the mask of 255.255.0.0 is normal for an APIPA configuration. The subnet mask is not the cause of the browsing issues on the workstation. B. The Internet provider is experiencing a temporary outage In this example, the issue is related to the APIPA link-local address assigned to the workstation. Although the Internet provider could potentially be experiencing issues, it would not be the most likely cause of the problem. D. The wireless adapter is not working properly The wireless adapter has configured itself and assigned a link-local APIPA address, so it appears that the adapter itself is functional.
29
A34. A help desk technician needs to use different Windows versions to study for an industry certification exam. The technician currently uses a Windows desktop computer with 4 GB of RAM and a 750 GB free on the hard drive. Which of the following would be the BEST way to perform this task? (Choose TWO)
The Answer: D. Upgrade the system RAM, and E. Install Windows guest VMs The easiest way to use multiple operating systems on a single machine is to run them as virtual machines. Although there's plenty of storage space for multiple virtual machines, the 4 GB (Gigabytes) of RAM (Random Access Memory) on the host computer is too small to support multiple Windows operating systems at the same time. Once the memory upgrade is complete, it's a relatively easy process to install the guest virtual machines on the existing hard drive. The incorrect answers: A. Install a KVM A KVM (Keyboard, Video, and Mouse) controller is used to consolidate the keyboard, mouse and video monitor for multiple devices. In this example, all of the operating systems will be running on a single device. B. Install an additional hard drive The available hard drive is large enough to support the installation of multiple virtual machines. C. Create a Windows Recovery Environment boot drive A Windows Recovery Environment drive is useful for troubleshooting the existing Windows installation, but it won't help with multiple operating systems.
30
A35. While configuring a new workstation in the lab, one of the engineers recommends using 255.255.255.0. What part of the configuration is this associated with?
The Answer: B. Subnet mask Subnet masks are used by the local device to determine what subnet it's connected to. Subnet masks are a series of binary ones that are used to "mask" the subnet address from the host address. Instead of representing this mask in binary, it's almost always shown in decimal form. Common decimal representations of subnet mask start with 255, such as 255.255.255.0. The incorrect answers: A. Default gateway A default gateway on an internal lab network will most likely be using private IP (Internet Protocol) addressing that starts with 10, 172, or a 192. IP addresses cannot start with an octet of 255. Therefore, a default gateway in this environment would not have an IP address of 255.255.255.0. C. DNS server Since an IP address cannot start with the octet of 255, this address would not be associated with a DNS server. D. IP address The IP address of a device cannot start with 255. It's most likely that a device in a lab would use an internal IP address that starts with an octet of 10, 172, or 192.
31
A36. Which of the following BEST describes a Bluetooth network?
The Answer: A. PAN A PAN (Personal Area Network) is designed for a small area and usually an individual person. Bluetooth devices such as headsets, speakers, and automobile connections are considered PANs. The incorrect answers: B. WAN A WAN (Wide Area Network) usually connects locations over a long geographical distance. A network link between cities, states, or countries would be considered a WAN connection. C. LAN The network in your building or home is a LAN (Local Area Network). If you're connected to an Ethernet or 802.11 wireless network, then you're connected to a LAN. D. MAN A MAN (Metropolitan Area Network) is a bit bigger than a LAN, but smaller than a WAN. Connecting sites in the same city or metropolitan area would use a MAN link.
32
A37. Sam, a user in the accounting department, is migrating from Android to iOS. She would like all of her emails, contact lists, and calendar events to be moved to her new phone. Which of the following would be the BEST way to accomplish this task?
The Answer: C. Connect the new phone to the corporate Exchange server Microsoft Exchange manages email, calendar events, and contact information in a single database. Using this central database, Exchange can synchronize all of this information to both iOS and Android smartphones. The incorrect answers: A. Use a Windows-based migration tool Since most smartphones can synchronize email, calendar, and events to an existing email platform, a third-party migration tool is unnecessary. B. Save the Android phone data as a CSV file Most mobile phones do not provide data in CSV (Comma Separated Value) format. Even if the Android data was available, there's no common way to import that data into an iOS device. D. Use a USB-to-Lightning cable Connecting the phones to another device or to each other would not migrate any data between the devices.
33
A38. The internal Bluetooth adapter of a laptop has failed, and the user would like to get a repair estimate. Which of the following would be the BEST way to determine an accurate price of an exact replacement?
The Answer: C. Disassemble the laptop case and document the process Although the operating system driver can sometimes provide details about what's inside, they often can hide details about the specific hardware. The only way to know the exact make and model of the Bluetooth adapter is a physical examination. Some laptops are easier to open than others, so it's useful to document the process used to gain access to the Bluetooth hardware. The incorrect answers: A. Research online forums Online forums are useful for troubleshooting technical issues, but they won't provide information on pricing or be able to determine the exact make and model of the Bluetooth adapter. B. Determine the purchase price of a USB to Bluetooth adapter In this example, the user would like to replace the existing internal adapter. An external USB to Bluetooth adapter may provide similar functionality, but it would not have the same "invisible" footprint as the internal adapter. D. View the Bluetooth information in Network settings The operating system is often quite good at providing hardware information, but the only way to know if it's providing an accurate representation of the installed Bluetooth adapter is to physically view the actual hardware.
34
A39. A server administrator has been asked to configure the storage requirements for a new database server. The database owner requires the fastest performance, and redundancy if a single drive fails. The storage array should support 8 TB or larger of available space. Which of the following options would be the BEST choice?
The Answer: B. RAID 5 with 10,000 RPM, 5 TB drives The question is focused on three requirements; performance, drive space, and redundancy. This option provides the highest number of RPMs (Revolutions Per Minute), the RAID 5 (Redundant Array of Independent Disks) redundancy, and enough storage to support more than 8 TB (terabytes) of drive space. The incorrect answers: A. RAID 10 with 5,400 RPM, 8 TB drives Although RAID 10 would provide the redundancy requirement and a series of 8 TB drives would more than cover the storage requirement. However, the slow throughput of 5,400 RPM drives would not provide the performance requirement. C. RAID 1 with 7,200 RPM, 8 TB drives RAID 1 mirroring provides the redundancy required, and 8 TB drives provide plenty of storage space. However, the 7,200 RPM specification is slower than the 10,000 RPMs available in answer B. D. RAID 0 with 15,000 RPM, 5 TB drives 15,000 RPM drives provide a very fast throughput, and multiple 5 TB drives would provide more than 8 TB of available space. However, RAID 0 striping does not provide any redundancy if a drive was to fail
35
A40. A user would like to access email from their Windows 10 laptop using a smartphone’s Internet connection. Which of these technologies needs to be enabled on the laptop?
The Answer: B. Bluetooth Bluetooth can be used to tether the laptop to the smartphone, and the smartphone can then be used to allow access to resources on the Internet. The incorrect answers: A. LTE LTE (Long-Term Evolution) may be used by the smartphone for Internet data communication, but the laptop does not communicate using LTE. C. NFC NFC (Near Field Communication) is a short-distance wireless technology that is commonly used for payment systems or in-person information exchange. NFC is not used for tethering a laptop to a phone. D. IR IR (Infrared) is often used to control other IR devices, such as entertainment centers or televisions. IR is not used during the tethering process.
36
A41. A user has connected their laptop to an LCD projector, but video isn't displaying through the projector. What laptop key is often combined with the "CRT/LCD" key to control the video output?
The Answer: A. Fn The laptop function key (Fn) is usually combined with another laptop key to control features such as volume, wireless adapter functionality, and video output. This allows the laptop manufacturers to add additional functionality to the laptop keyboard without adding any physical keys or switches. The incorrect answers: B. Alt The Alt (Alternate) key is a modifier that's commonly used in applications to provide secondary features. The Alt key is not commonly used to control laptop hardware. C. Windows The Windows key is used as a shortcut to Windows-specific operating system features. The Windows key is not commonly used to control laptop hardware. D. Ctrl The Ctrl (Control) key is very similar in use to the Alt key. Applications commonly used the Ctrl key as a modifier to enable shortcuts or secondary features. The Ctrl key is not commonly used to control laptop hardware.
37
A42. A member of the management team is developing a product based on wearable technology. Which of the following would BEST describe this product type?
The Answer: C. Smart watch Wearable technologies are devices that can be worn all day as an extension of a phone and body. Common wearable technologies would be smart watches and fitness monitors. The incorrect answers: A. Virtual reality Although it's true that many virtual reality headsets are devices that are worn or placed on the head, they are not part of the device category of wearable technology. Wearable products are designed to be worn all day, and virtual reality headsets don't fit that characteristic. B. e-Reader An e-Reader is a hand-held device that is commonly used for reading books or magazines. e-Readers aren't worn on the body, so they don't qualify as a wearable technology. D. Smart phone A smart phone is technically not a wearable technology, although it's common for someone to carry their phone around throughout the day. Since the phone is often used while not connected to the body, it would not qualify as a wearable technology.
38
A43. A system administrator is using a maintenance kit on a networkconnected laser printer. Which of the following should be the LAST step when performing this maintenance?
The Answer: C. Reset the page counter The page counter is a helpful metric to determine how much the printer is used, which in turn determines when the next maintenance should be scheduled. After performing the current maintenance cycle and verifying the printer's operation, the page counter should be reset so that the next maintenance time-frame can be properly estimated. The incorrect answers: A. Examine the feed rollers Examining or replacing the feed rollers is a normal part of the maintenance process, but it would not often be the last step in the maintenance process. B. Wait until the fuser unit cools down and replace it Fusers are commonly replaced during maintenance, but this would not be the last step in the process. D. Replace the power cord Replacing the power cord is not commonly part of the maintenance process. The only time the power cord would need replacing is if it has been damaged. Power cords do not generally wear out or need replacement.
39
A44. An application developer needs to test an application across all of the operating systems used by the company. Each operating system will be tested individually in a lab environment. The company would like to minimize any additional hardware purchases for this project. Which of the following would be the BEST way to test this application?
The Answer: A. Purchase a system that is configured just above the hardware requirements for the highest-end operating system. Create separate VMs for each operating system. Creating virtual machines for these tests would be a great way to minimize hardware costs, and the machine used for the testing should be able to properly virtualize the testing OS while the host OS is running. Purchasing a system that is slightly more powerful than the highest-level operating system configuration should cover any technical requirements. The incorrect answers: B. Purchase individual test computers that match the hardware requirements for each OS. Install different operating systems on each test computer. Since one of the project requirements was to minimize the hardware cost, purchasing separate computers for all of these systems would be much more expensive than purchasing a single computer and virtualizing the operating systems.
40
A45. Which wireless standard operates in the 5 GHz band and provides over 5 Gbit/sec of throughput?
The Answer: C. 802.11ac 802.11ac operates in the 5 GHz band and can provide almost 7 gigabits per second of total throughput. The incorrect answers: A. 802.11n Although 802.11n can operate in the 2.4 GHz band and the 5 GHz band, the maximum theoretical throughput of 802.11n is 600 megabits per second. B. 802.11g 802.11g operates in the 2.4 GHz band exclusively, and can provide a maximum throughput of only 54 megabits per second. D. 802.11a 802.11a operates in the 5 GHz band, but the total throughput of 802.11a is 54 megabits per second.
41
A46. A user in the manufacturing department reports that every page printed from the central networked laser printer has a single black line that extends from the top of the page to the very bottom. Which of the following is the MOST likely cause of this issue?
The Answer: C. The photosensitive drum is damaged A scratched photosensitive drum would cause a line to appear down the printed page as the toner sticks to the scratched part of the drum. Some printers allow individual drums to be replaced, and others require the entire toner cartridge with drum to be replaced. Once the scratched drum is replaced, the black line will no longer appear on the printer output. The incorrect answers: A. The fuser is damaged The fuser provides the heat and pressure required to permanently affix the toner to the printed page. The fuser would not commonly add additional black lines to the printer output. B. The printer is out of memory The laser printer will render an entire page in memory before printing, and running out of memory will cause the output to be truncated or missing. If only a portion of the page is printing, then the printer is most likely out of memory. D. The toner is low If the printer output was very faint or difficult to read, then the toner levels may be low. Most printers will provide a message when it's time to replace the toner cartridge.
42
A47. Which mobile device connection is commonly used for making payments at a store checkout?
The Answer: A. NFC NFC (Near Field Communication) is designed to transfer small amounts of data wirelessly over a limited area. It's common to use a smart phone or smart watch with a credit card terminal to pay for goods or services. The incorrect answers: B. Infrared Infrared, or IR, is included on many smart phones, tablets, and smart watches, but it's used mostly for controlling other infrared devices such as television and audio components. Infrared would not be used during the purchase process. C. Cellular Cellular networks are used for voice and data communication, but those cellular networks are not part of the in-store purchase process. D. Bluetooth Although Bluetooth supports many different features, it's not used during the checkout process in a store.
43
A48. A company is planning to use a cloud-based file storage service to store, share, and synchronize files across all company devices. Which of the following would be the MOST important resource requirement for this service?
The Answer: B. Internet bandwidth Cloud-based services work almost exclusively over the network, and file synchronization services will require additional bandwidth to process constant updates and changes over the network. The incorrect answers: A. Local storage capacity Local storage is certainly an important consideration, but cloud-based file storage and synchronization will require network bandwidth as the primary resource. C. CPU utilization The CPU processes required to support a cloud-based file storage or file synchronization service are relatively small on the local devices. D. System memory The memory required to support a cloud-based file storage application is relatively small compared to most applications.
44
A49. When printing a document on a laser printer, a user finds that all of the text on the page smears when touched. What is the MOST likely cause of this issue? ❍ A. Fuser is damaged ❍ B. Toner cartridge is low ❍ C. Photosensitive drum has been scratched ❍ D. Incorrect printer driver is installed ❍ E. Printer cleaning process is not working The Answer: A. Fuser is damaged The fuser permanently melts the toner to the paper using heat and pressure. If the fuser is not working, the toner will easily smear when touched.
The incorrect answers: B. Toner cartridge is low A low toner cartridge will cause the output to appear faded and difficult to read. A low toner cartridge will not cause the output to smear when touched. C. Photosensitive drum has been scratched A scratched drum will cause lines and other stray marks to appear on the printed page. The toner sticks to the scratches and is transferred to the final page output. D. Incorrect printer driver is installed The printer driver will format the output into a page description language that the printer can understand. An incorrect driver would not cause the printer output to smear. E. Printer cleaning process is not working If the cleaning process is not working, then a "ghost" of previous passes around the drum will appear on different parts of the printed page. It's common that poor cleaning will cause multiple faded versions of a page to appear in the printed output. A non-working cleaning process would not cause the printer output to smear, however.
45
A50. A manager’s computer is able to connect to Internet sites while in conference rooms or in the building courtyard. When the laptop is brought back to the manager’s desk and placed into the docking station, the Internet access is unavailable but all other features are working. Which of the following should be the FIRST troubleshooting task for this issue?
The Answer: D. Check the docking station network cable The Internet access on the laptop appears to be working properly on the wireless network, but the docking station connection would use a wired Ethernet connection. If everything else is working properly, then the issue would most likely be associated with the Ethernet interface in the docking station. The incorrect answers: A. Replace the docking station power supply If other docking station features were not working, then there could be an issue with the power connection on the docking station. In this situation, all of the other features appeared to be working properly when connected to the docking station. B. Upgrade the laptop BIOS A BIOS upgrade is a significant change, and it's rarely the first step in the troubleshooting process. C. Replace the docking station Although it's certainly possible that the docking station could be faulty, there are no obvious issues with other features. Before replacing the entire docking station, it would be useful to check the individual components associated with the problem.
46
A51. A company is developing an internal application that will run on smartphones and tablets. What should the application use to simplify the authentication process?
The Answer: B. SSO SSO (Single Sign-on) is a method of centralizing authentication to a common database. This allows the users to authenticate once with a single username and password, and those credentials will be used across all services. The incorrect answers: A. Strong passwords Although a strong password is always a best-practice, including a strong password policy for an application does not simplify the authentication process. C. VPN A VPN (Virtual Private Network) is a method of encrypting data between two devices, and it's commonly used to create an encrypted tunnel over an untrusted network. VPNs don't simplify the authentication process. D. SSL SSL (Secure Sockets Layer) is a common encryption method used to protect data sent and received from a web browser. SSL doesn't simplify the authentication process.
47
A52. One of the software developers in your company would like to install six virtual machines on their desktop for application testing. Each VM would run a different operating system, but only one VM would be running at any particular time. Which of the following components would be the MOST important for this configuration? (Choose TWO)
The Answers: B. Hard drive space and D. System RAM Six virtual machines will require enough hard drive space to install all six operating systems, so it will be important to have enough free storage space. Running more than one operating system at a time on a computer also requires additional memory, so having enough system RAM is also an important consideration. The incorrect answers: A. Video adapter RAM The question didn't specify any unique requirement for video, so a requirement for video adapter RAM would not be the most important in this configuration. C. Gigabit NIC Although gigabit network connections are relatively standard, nothing in the requirements specified a need for high-speed network connectivity. E. Enhanced audio The configuration for this test system did not specify any enhanced audio requirement.
48
A53. What is the minimum category of unshielded copper cable that would run a 10 gigabit per second Ethernet link with a fifteen meter distance?
The Answer: B. Category 6 The physical characteristics of networking cables are separated into categories. A category 6 cable can support a ten gigabit per second 10GBASE-T network to a distance of thirty-seven to fifty-five meters. The incorrect answers: A. Category 5 Category 5 copper cables can support a one gigabit per second 1000BASE-T network up to one hundred meters. Ten gigabit per second speeds are not support over category 5 cable. C. Category 5e Category 5e (enhanced) is a minor update to category 5, and the Ethernet standards supported for a category 5e cable are identical to those of a category 5 cable. Therefore, category 5e copper cables can support a one gigabit per second 1000BASE-T network up to one hundred meters in length. D. Category 6A Category 6A (augmented) cables can support ten gigabit per second 10GBASE-T connections to a distance of one hundred meters.
49
A54. An engineer has manually configured IP addresses for a small office that uses a cable modem for Internet connectivity. However, none of the devices configured with a manual IP address are able to browse Internet websites. All devices are connected to the cable modem with twisted-pair Ethernet cables. This is the configuration of one device: IP address: 192.168.1.7 Subnet mask: 255.255.255.0 Default gateway: 192.168.1.1 DNS: 192.168.1.7 The engineer can successfully ping the local IP address and the default gateway address. Which of the following should be the NEXT troubleshooting step?
The Answer: C. Check the DNS configuration One of the most noticeable of the IP (Internet Protocol) configuration settings was that the DNS (Domain Name Service) server IP address was configured to be the same as the local device. Since DNS servers are commonly separate (and often remote) devices, it would be unusual to see a DNS configured with the same IP address of the local device. The next step should be to confirm the DNS settings with the local network administrator. The incorrect answers: A. Check for duplicate IP addresses No mention was made of an duplicate IP address warning, and some of the ping tests worked properly to devices on the local subnet. B. Replace the Ethernet cable Since the ping tests worked locally, we can conclude that the Ethernet cable is most likely not related to this issue. D. Replace the cable modem The cable modem is most likely the default gateway, and a ping of that IP address worked properly. More tests would need to be performed before replacing any hardware.
50
A55. A user in a SOHO office needs to connect a laptop to the DSL router. Which of the following cables should be used for this connection?
The Answer: A. Ethernet A SOHO (Small Office Home Office) with a DSL (Digital Subscriber Link) modem will commonly connect to the modem using an Ethernet cable connection. The incorrect answers: B. Lightning Apple Lightning cables are used to connect mobile devices to power or external peripherals. Lightning connections are not used for DSL links. C. Coaxial Coaxial cable is commonly used for the cable modem connection to the Internet service provider. D. USB-C USB-C is used for connectivity to peripherals or other devices, but it is not commonly used for network links. The large majority of wired network connections inside of a network will use Ethernet cables.
51
A56. A user in the accounting department has turned on their computer and received the message “Date and Time not set.” Which of the following would be the MOST likely reason for this message?
The Answer: A. The motherboard battery has discharged The battery on a motherboard is used to maintain the date and time configuration when the computer is not connected to a power source. If the battery has discharged, the computer will not be able to maintain the proper time and an error message will appear during startup. The incorrect answers: B. Windows update has rebooted the computer Rebooting the computer will not cause the date and time to be reset. C. Daylight Saving Time occurred during the weekend Daylight Saving Time does not cause the computer's date and time to be reset, and any changes to the clock in Windows will be reflected in the BIOS. D. The BIOS was just upgraded A BIOS upgrade does not commonly reset the date and time on the BIOS clock.
52
A57. A technician has just replaced a broken touch screen on a laptop used for trade shows. However, the touch functionality is no longer working on the display. Which of the following would be the MOST likely reason for this issue? (Select TWO)
The Answers: B. The replacement screen is not a touch screen, and E. The digitizer is not properly connected When replacing a touch screen display, it's important to make sure the replacement is also a touch screen unit. The two look almost identical, so it would be a common mistake to accidentally install the wrong hardware. After installation, a separate connection is often required to enable the digitizer. If the display panel is the correct hardware, then it's important to check that all of the cables are connected, especially the cables specific to the digitizer features. The incorrect answers: A. The digitizer is not calibrated An uncalibrated digitizer would work, although the input locations would not be accurate. Most modern digitizers do not require the user to perform any calibration routines. C. The BIOS needs to be updated Since this is a replacement unit, we can assume that any BIOS (Basic Input Output System) settings associated with the digitizer are still valid. A BIOS upgrade would not be required to enable digitizer functionality.
53
A58. A system administrator created a series of VMs that will use a portion of a server's available physical memory. Which of the following describes this cloud computing characteristic?
The Answer: A. Resource pooling Resource pooling places all of the computing resources in one place, and then distributes from the pool when needed. A VM (Virtual Machine) manager using a portion of available physical memory is taking advantage of resource pooling. The incorrect answers: B. Rapid elasticity Rapid elasticity is the characteristic of scaling up or down cloud resources with demand. More resources will be made available during busy times, and those resources will be seamlessly removed when the demand is low. C. Metered Metered resources are measured based on usage. As more information is uploaded, stored, and downloaded, the costs are tracked and billed accordingly. D. On-demand Cloud computing allows the users to create or remove resources at any time, or on-demand. This flexibility allows organizations to quickly react to changes, deploy updates, and remove excess resources.
54
A59. A group of wireless laptops in a conference room are reporting intermittent connectivity issues. The wired computers in the room are not experiencing any network problems. A check of the laptops shows that the IP addresses and configurations appear to be correct. Which of the following would be the best NEXT troubleshooting step?
The Answer: A. Verify the wireless signal strength Since the wired devices are working properly, the troubleshooting process should focus on the wireless network. The connectivity is also intermittent, which means that the network is operating normally during certain periods. This would move the focus from the network configuration to an availability issue. The incorrect answers: B. Check the ARP table on the default gateway Since the wired devices are working normally and the network is intermittently working, the overall configuration of the network would not be the first place to start the troubleshooting process. C. Confirm the operation of the DHCP server An inoperable DHCP (Dynamic Host Configuration Protocol) server would cause the local devices to automatically configure a link-local IP address. Since there are no reports beyond general connectivity issues and DHCP server outages are relatively unusual, checking on the DHCP server would not be the next step in the troubleshooting process. D. Perform a wire map on the network drops The issue reported in this scenario is relating to the wireless network only. The wired devices are not experiencing any issues with connectivity, so obtaining a wire map would not be the next troubleshooting step.
55
A60. A server administrator has been asked to troubleshoot a system that has been slowing down over time. While examining the computer, the administrator can hear a series of clicks from the inside of the case. Which of the following should be the FIRST step to address this issue?
The Answer: D. Perform a full backup of the server A clicking noise indicates some type of hardware issue with the computer, so the first step would be to confirm that a recent backup is available for all of the data on this system. If the computer fails completely, at least the data will be secure. The incorrect answers: A. Replace the motherboard Motherboards don't tend to have any moving parts, so a clicking noise would probably not be related to the motherboard. There's also not enough information in this question to definitively identify the source of the noise, so replacing hardware would not commonly be the first step. B. Power the system off and back on Although software can often be corrected with a reset, hardware isn't commonly fixed with a power cycle. Before making any changes, it would be useful to confirm a good back exists and perform more investigation regarding the noise. C. Replace the hard drive If the sound was related to a problem with the hard drive, it would be even more important to have a good backup of the data. E. Replace the power supply There's no evidence that the power supply is faulty, but it would be useful to investigate the source of the noise after backing up the data.
56
A61. When pressing the power button on a desktop computer, the power indicator lights up but the computer does not display any message on the screen. The voltage at the wall outlet has been checked with a multimeter and it appears to be normal. The motherboard power connector voltage was checked, and the 12 volt pin was showing 6 volts. What is the MOST likely cause of this issue?
The Answer: B. The power supply is faulty If the 12 volt line from the power supply to the motherboard is showing 6 volts, it's likely a problem with the power supply itself. A power supply replacement should be the next troubleshooting step for this system. The incorrect answers: A. The components that use 12 volt power are faulty Even if the components are faulty, the power supply should still be providing 12 volts for those devices. C. The wall outlet voltage does not match the power supply Many power supplies can automatically switch to the correct input voltage from the wall outlet. A mismatch would result in a non-working system or damage to the computer's components. D. The motherboard is faulty A bad motherboard would not prevent the power supply from operating at the correct voltage.
57
A62. A manager in the marketing department is printing many copies of a twenty page document. The manager would like to print all twenty pages of the document before the next copy begins printing. What setting should the manager configure in the output settings?
The Answer: B. Collate The printing of multiple copies in their proper order is called collating the output. If the output was not collated, all of the page one copies would print, then all of the page 2, etc. The incorrect answers: A. Duplex Duplex refers to printing on both sides of the page. Many printers will have an option for duplexing that will print on both sides without manually flipping the pages over. C. Quality The quality settings on a printer will change the resolution, color settings, or grayscale options. The quality settings will not change the order of the pages during the output process. D. Orientation The orientation of the paper refers to the portrait or landscape setting. Changing the orientation will not change the order of the pages during the printing process.
58
A63. A remote user is visiting their corporate office. They are trying to connect their laptop to the office wireless network, but the network name does not appear in the list of available wireless networks. Which of the following would be the most likely reason for this issue?
The Answer: D. SSID broadcasts have been disabled The name of the wireless network, or SSID (Service Set Identifier) is normally broadcast to all nearby devices. If the SSID broadcasts are administratively disabled, the network name will not appear in the dropdown list of available wireless networks. The incorrect answers: A. There is interference with the wireless signal The wireless network name is broadcast many times a second, so spurious interference would still allow some SSID advertisements to be seen by remote devices. B. The laptop has been assigned an APIPA address APIPA (Automatic Private IP Addressing) is an automated method of assigning IP addresses when a DHCP server is not available. An APIPA address would not limit or filter SSID broadcasts from wireless access points. C. The user does not have permission to use the wireless network The wireless authentication process occurs after a device has attempted to connect to the wireless network. An authentication issue would not cause the wireless network name to be filtered prior to connecting.
59
A64. A manager is able to receive email messages on their tablet, but they’re having problems configuring the tablet to send email messages. Which of the following should be the FIRST troubleshooting step?
The Answer: A. Check the SMTP settings If you're sending an email message from an email client, you're commonly using SMTP (Simple Mail Transfer Protocol). There are three SMTP configuration settings that are important; the SMTP server name or IP address, the SMTP username, and the SMTP password. The incorrect answers: B. Check the IP address configuration If there were problems with the IP configuration, the manager would not be able to receive any email messages. In this question, the issue does not appear to be related to the IP address configuration. C. Send a test message using web-based email Sending an email message over web-based email would effectively bypass the local email client and would not help troubleshoot the local issues. D. Check the IMAP settings IMAP (Internet Message Access Protocol) is used for receiving email and not for sending email. In this example, the manager was able to receive messages, so the IMAP settings would most likely be working properly.
60
A65. A user is reporting that a shared laser printer in the marketing department is not printing from one particular application. The front panel of the printer shows that the printer is online and ready to receive print jobs. Other users in the department are able to successfully print to the printer. Which of the following would be the BEST next troubleshooting step?
The Answer: D. Verify the network printer name in the application We know that the printer is working normally because other people are able to print successfully. This also means that the spooling process is working and that the print server is successfully queuing the print jobs. Given the other options, it's most likely that the user is directing the print job to a different printer. The incorrect answers: A. Power cycle the printer We know that the printer is working for other users, so power cycling the printer would not resolve this particular issue. B. Restart the print spooler Other users are printing to the network printer, so we know that the print spooler is working properly. Restarting the spooling would not resolve this issue. C. Perform a test print from the printer console A test print from the printer console would verify that the printer itself is working properly, but we already know this because of the print jobs sent by other users on the network.
61
A66. A network administrator is connecting four company locations that reside in different countries. Which of the following would BEST describe this configuration?
The Answer: D. WAN A WAN (Wide Area Network) connects LANs across a long geographical distance. Once the link extends past the local city area, the connection would be considered a WAN link. The incorrect answers: A. LAN LANs (Local Area Networks) are located in the same building or group of buildings that are located nearby. Ethernet and 802.11 wireless networks are generally considered to be LAN connections. B. PAN A private network designed for an individual is a PAN (Personal Area Network). Bluetooth, infrared, and near field communication links are categorized as PAN connections. C. MAN Sometimes, a local network provider can link together sites in the same city area. These connections would be MANs (Metropolitan Area Networks).
62
A67. A new SOHO remote site includes the installation of IoT lights, thermostats, and cameras. Which of the following would be the BEST way to protect the rest of the network against IoT hacking?
The Answer: C. Connect the IoT devices to a DMZ One of the concerns around IoT (Internet of Things) is that a single exploit of an IoT device can potentially put the entire network at risk. To avoid this issue, it's useful to put IoT devices into their own protected network, such as a DMZ (Demilitarized Zone). This means that if an IoT device was exploited, the attacker would not have any access to the more important devices and services on the rest of the network. The incorrect answers: A. Use WPA2 encryption If the IoT devices are on the same network as everything else, then encryption isn't going to help much when the IoT device is exploited. Once the attacker is in control of the IoT device, they'll be on the same encrypted network as internal servers, storage arrays, and any other important device. B. Configure SSID suppression on the wireless network SSID (Service Set Identifier) suppression will prevent other devices from showing the wireless network on the list of available networks, but it won't provide any additional security if an IoT device is hacked. D. Configure static IP addressing Static IP (Internet Protocol) addressing is sometimes used when devices are required to maintain a particular IP address, but it won't add any additional security if the IoT devices are under the control of an attacker.
63
A68. A system administrator has configured a VM for dual processors, 16 GB of RAM, and 120 GB of disk space. Which of the following is required to start this VM?
The Answer: B. Hypervisor A hypervisor, or virtual machine manager, is the software that manages the virtual platform and guest operating systems. The incorrect answers: A. Shared network address There are many options for a virtual machine, including shared, bridged, and private network addresses. A shared network address is not required to start a virtual machine. C. Virtual switch Like physical switches, virtual switches can be used to provide connectivity and segmentation for virtual machines. A virtual switch is not a requirement to start or use a virtual machine D. Video display Many servers operate without a video display, mouse, or keyboard. These systems are "headless," and a video display is not required to start a virtual machine.
64
A69. A site manager has found that her smartphone has a short battery life when used at work, and the battery life is normal when working from home. The work location has limited mobile service reception, but most office services are provided over the local 802.11 Wi-Fi network. The site manager does not enable Bluetooth on her smartphone. Which of the following would be the BEST way to extend the battery life of her mobile device?
The Answer: B. Disable the cellular radio at work When a mobile provider's network isn't available, a phone will constantly try to reconnect to a cellular network. This reconnection process constantly uses the radio, and subsequently more of the battery is used in the process. To conserve battery life, it would be useful to disable the cellular network connection when outside of a coverage area. The incorrect answers: A. Disable 802.11 Wi-Fi The Wi-Fi network is used at work for office services, so disabling Wi-Fi is not a good option. Since Wi-Fi does not require a constant connection, it's unlikely that the battery usage is associated with the Wi-Fi radio. C. Replace the battery It's possible that the battery in the mobile device could need replacing, but the battery problem doesn't appear to happen while at home. If the battery was the primary issue, the battery would work just as poorly at home as in the office. D. Enable Bluetooth on the mobile device Enabling a feature like the Bluetooth radio would only serve to increase battery usage. If the battery is the biggest concern and no Bluetooth features are in use, it's a better idea to keep Bluetooth disabled.
65
A70. A desktop computer has just abruptly shut off, and pressing the power button doesn’t restart the system. There are no fans spinning, no lights are on, and no messages appear on the display. Which of these would be the MOST likely cause of this issue?
The Answer: C. The power supply is faulty A faulty power supply could cause a loss of power across all computer systems, and the lack of fans, lights, and output on the display would be the most likely cause given the available options. The incorrect answers: A. The BIOS is configured with a startup password A startup password would not cause the system to power down, and the password prompt would be presented if the computer was powering on. B. The LCD display backlight has failed A failure of the LCD backlight would make it appear that the monitor screen is not working, but the fans and lights would still be working normally. D. The master boot record is corrupted A corrupted master boot record may prevent a system from booting, but the fans, lights, and screen output would still be working properly. E. The boot sector is missing A missing boot sector would not prevent the fans and lights from working properly. The screen would commonly show an error explaining that an operating system was not able to properly start.
66
A71. What kind of device is commonly used to filter traffic based on a predefined set of rules?
The Answer: D. Firewall A firewall is designed to evaluate inbound traffic, compare that traffic to predefined security policies, and then allow or block that traffic from passing through the firewall. Firewalls are common security appliances between an organization's internal network and the Internet. The incorrect answers: A. PoE Switch PoE (Power over Ethernet) switches are used to provide power to Ethernet-connected devices. This allows devices such as access points, cameras, and VoIP phones to connect with a single Ethernet link for both data connectivity and device power. B. Repeater Repeaters are relatively simple devices. Repeaters receive a signal, regenerate that signal, and then resend that signal out another network connection. Repeaters do not make any forwarding decisions and they don't filter based on a set of rules. C. DSL modem DSL (Digital Subscriber Line) networks is a common Internet connection technology provided over the same twisted pair copper used by analog telephone services. A DSL modem allows the end-user to connect their existing network to the DSL network, but the DSL modem does not filter traffic based on a set of access rules.
67
A72. Which of these connection types use coax to provide Internet data, voice, and video over the same wire?
The Answer: B. Cable Cable television brought cable into everyone's home, and now they include voice and Internet services on the same coax cable. The incorrect answers: A. DSL DSL (Digital Subscriber Line) uses a pair of copper wires to provide Internet access over the same lines as a traditional telephone service. C. ISDN ISDN (Integrated Services Digital Network) was the precursor to DSL, and also used a pair of copper wires to provide high-speed dialup Internet service. D. Dialup Dialup lines traditionally used the same network as the telephone service, and you would only need a modem on each end of the phone line to provide digital communication.
68
A73. A desktop administrator has been asked to troubleshoot a laptop computer that beeps during the power on process while the laptop screen remains dark. Which of the following would be the best NEXT troubleshooting step?
The Answer: C. Establish a theory Once an issue has been identified, it's important to consider all of the possible reasons the problem may have occurred. It's useful to list all possible causes, even those that might not be obvious. The incorrect answers: A. Implement a solution The implementation of a solution would occur after possible theories have been determined and tested. Once a plan of action is created, the solution can be implemented. B. Document findings Once the problem has been resolved, the last step of the troubleshooting process is to document the issue, the resolution, and any other important steps during the process. D. Evaluate results When testing theories for possible fixes, the results of each test should be evaluated to determine if the fix was successful.
69
A74. A manager is complaining of short battery life on their laptop when traveling. Which of the following should be disabled to provide the BEST battery conservation?
The Answer: D. Bluetooth Bluetooth, and any radio-based communication, constantly uses some of the power, and those systems can quickly deplete the battery. If you're not going to be using wireless devices, then it's useful to place the device in airplane mode or disable Bluetooth, 802.11, and cellular radios. The incorrect answers: A. Internal speakers Unless the speakers are currently in use, there's little to no battery used to keep the speakers enabled. Even when the speakers are used, they don't tend to deplete the battery faster than wireless network radios. B. Webcam A webcam may be used intermittently when traveling, but even then there's relatively little battery use when compared to wireless networking. C. Smart card interface A smart card interface in a laptop allows a smart card to be used as an authentication factor. A smart card interface does not constantly use battery power, and it certainly wouldn't use more than Bluetooth or other wireless network communication methods. E. Touchpad A touchpad uses very little power, and it's almost required for use with laptops when traveling.
70
A75. A company is deploying cloud-hosted virtual desktops for training room classes. The VMs have already been configured in the cloud. Which of the following is required to access these VMs using thin clients in the training room?
The Answer: C. Mouse, keyboard, and monitor Cloud-hosted virtual desktops are a type of VDI (Virtual Desktop Infrastructure). Access to the desktop is provided over a remote accessstyle client, and access can be provided from almost any operating system using a low-bandwidth network connection. The client device is usually a thin-client that has a minimum set of resources, a mouse, keyboard, and a monitor. The incorrect answers: A. High-end video cards Cloud-based virtual desktops are being processed on servers in the cloud, so the local thin clients do not require any advanced graphics capabilities. B. Separate Internet connection The communication to the virtual desktops is sending video, keyboard, and mouse updates, and all of this can operate with a minimum of network bandwidth. A separate or dedicated Internet connection is not required. D. Category 6A cabling Category 6A cabling would commonly be associated with very high-speed 10 gigabit per second Ethernet networking. A thin client communicating to a cloud-hosted virtual desktop can operate at relatively low bandwidths.
71
A76. A technician has connected a laptop to an LCD display. The LCD display is presenting the correct information, but all of the content appears to be compressed vertically. Which of the following is the MOST likely reason for this issue?
The Answer: C. The laptop resolution is incorrect An LCD (Liquid Crystal Display) has an optimal resolution that is based on the physical dimensions of the display. If the resolution settings in the operating system don't match the physical display, then the information on the screen may appear blurry or skewed. Configuring the correct resolution in the operating system will commonly resolve this issue. The incorrect answers: A. The LCD display is faulty If the LCD display is showing information (however skewed), then it may not be a hardware failure. Adjusting the operating system's video settings to match the LCD display hardware will often resolve any odd visual display quirks. B. The laptop display adapter is incompatible with the LCD display Most display adapters will include a video output format that would be compatible with most LCD displays. It would be unusual to find an LCD display that would not operate with a specific video adapter. D. The LCD display cable is faulty A bad cable will commonly show flashes of information or intermittent periods of a black screen. A bad cable would not commonly display information in a fuzzy or skewed format.
72
A77. An engineering firm is upgrading their storage array to include additional drive space for documents and designs. The primary goal is to provide high performance and uptime, even if two drives were to fail. Which of the following would be the BEST choice for this firm?
The Answer: D. RAID 10 RAID (Redundant Array of Independent Disks) is a method of combining storage drives together to add speed and/or redundancy. A RAID 10 array is a nested RAID configuration that creates a mirrored set of RAID 0 drives. As long as only one drive fails in each RAID 0 mirror, the redundancy will remain valid and the user's data will continue to be available. The incorrect answers: A. RAID 1 RAID 1 is also called mirroring, because file blocks are duplicated between two or more physical drives. Losing a single drive in a RAID 1 array will still allow access to the data on the other mirrored drive, but losing two drives would cause the data to be inaccessible. B. RAID 5 RAID 5 is striping with parity, where file blocks are striped across multiple storage drives and one storage drive maintains parity data. Data would still be available after a single drive failure in RAID 5, but two failed drives would cause data loss. C. RAID 0 RAID 0 is also called striping, where file blocks are split across multiple physical drives. However, RAID 0 does not include any redundancy features. A single drive failure in RAID 0 results in data loss.
73
A78. A network administrator is installing a wireless access point in a new conference room. Which of these settings would provide the BEST security for this installation?
The Answer: A. WPA2 encryption Configuring WPA2 (Wi-Fi Protected Access II) encryption would prevent unauthorized users from accessing the wireless network and would encrypt the data sent over the wireless network. The incorrect answers: B. SSID suppression Preventing the SSID (Service Set Identifier) from appearing in lists of available wireless networks would not provide any significant security feature. If someone knows the name of the network, they would still be able to connect. C. Static IP addressing Static IP (Internet Protocol) addressing is useful for unique environments that require specific IP address assignments, but assigning IP addresses statically doesn't add any significant security to the network. D. UPnP UPnP (Universal Plug and Play) allows network devices to automatically locate and configure other network devices. Generally speaking, the automatic configuration feature of UPnP makes the network LESS secure. E. MAC filtering Filtering traffic by MAC (Media Access Control) address can be easily circumvented with a packet capture application, so MAC filtering would not be considered a security feature.
74
A79. A university library needs to purchase a new printer for an open study area. The primary requirement of this printer is to be as quiet as possible. Which of these printer types would be the best fit for this requirement?
The Answer: D. Thermal Of the available options, thermal printers are the quietest. The only moving parts in a thermal printer are the motors that push the paper through the printer, and those motors are small and run almost silently. The incorrect answers: A. Dot-matrix Dot matrix printers are probably the loudest option in this list. The metal pins in a dot matrix print head are impacting the page, and that printing process makes a significant amount of noise. B. Inkjet An inkjet printer's printing process is a bit quieter than a dot matrix printer, but it's not as quiet as thermal printing. The sound of the carriage moving the print heads across the page and the printing process itself would not provide the quietest printing option given the available options. C. Laser A laser printer uses many moving parts, high voltages, and a large motor to print a single page. This process makes a bit of noise, so it wouldn't fit the requirements for the library.
75
80. Which of the following would be the BEST choice for reading textbooks in bright sunlight?
The Answer: D. e-Reader e-Readers are standalone book and magazine reading devices that are often designed with electronic paper or electronic ink technology. The electronic ink screens on the e-Readers are specifically designed for reading text-based content in bright sunlight. The incorrect answers: A. Tablet Although tablets are quite useful for reading books and magazines, the LCD screens in most tablets are not very visible when working in direct sunlight. B. Augmented reality Augmented reality works with phones or glasses to overlay a virtual augmentation over the physical world. Augmented reality can be used to add games to the physical world, annotate travel information, or overlay healthcare information, but it doesn't make an ideal book reader. C. Wearable technology Wearable technologies are usually worn all day and are relatively small devices. A wearable device would not commonly be used for reading books or magazines.
76
A81. A company has designed an application platform to scale up when the application use increases during the day, and scale back down at night. Which of the following BEST describes this characteristic of cloud computing?
The Answer: D. Rapid elasticity Scaling up and down as needed is a significant characteristic of cloud computing. This allows organizations to manage and pay for resources when busy, but save time and money when the resources are no longer needed. The incorrect answers: A. Resource pooling To provide rapid elasticity, there needs to be plenty of resources available when needed. Resource pooling puts all of the computing power in one place, and portions of the pool can be distributed as-needed. B. Measured service Tracking costs and utilization is useful for tracking and billing, and a measured service provides a way to monitor and view the use of cloudbased resources. C. Hybrid A hybrid cloud model combines both public and private clouds together. The hybrid cloud does not describe the scalability of these cloud deployment models.
77
A82. A user’s tablet has stopped responding to any type of finger input on the screen. The clock and other tablet functions appear to be working. Which of the following would be the BEST way to correct this issue?
The Answer: D. Restart the tablet Before making any changes to hardware or software, it's useful to restart the tablet to see if a software glitch may have been the underlying issue. The incorrect answers: A. Replace the screen Without running additional tests, it's impossible to know if the screen is actually the issue. Before switching out any hardware, it's useful to restart the system and run some hardware diagnostics. B. Reset the wireless network The wireless network would not have any impact on the screen digitizer. If the tablet was experiencing network issues, then resetting the wireless network may resolve any problems. C. Connect to a power source A tablet will continue to provide input to the digitizer, even in situations of low battery life. Connecting to a power source would not be a common solution for this issue.
78
A83. A user would like to connect a tablet to their laptop computer using 802.11, but they are in a location without a wireless access point. Which of the following would be the BEST way to make this connection?
The Answer: D. Use ad hoc mode Ad hoc mode allows two devices to directly communicate over an 802.11 wireless link without using an access point. The incorrect answers: A. Enable Bluetooth discovery on the tablet Enabling Bluetooth discovery would allow the tablet to use Bluetooth peripherals, but it would not enable 802.11 networking between the tablet and the laptop. B. Configure infrastructure mode on both devices Infrastructure mode is the 802.11 configuration used with an access point. In this question, the two devices need to communicate without using an access point. C. Create shared folders on the laptop computer Creating shared folders would potentially allow access from another device, but the network would need to be available to provide the connectivity.
79
A84. A server administrator is upgrading the memory in a web server from 16 GB of non-ECC RAM to 64 GB of ECC RAM. After starting the system with the new memory, the computer beeps and nothing is displayed on the screen. Changing the number and location of new RAM modules results in the same beeping sounds and blank screen. After replacing the original 16 GB modules, the system starts normally. Which of the following is the MOST likely reason for this issue?
The Answer: A. The new memory is not compatible with the motherboard ECC (Error Correcting Code) memory is designed to detect errors and correct them on the fly. Not all systems use ECC memory, and it's important that the memory matches the motherboard requirements. If non-ECC RAM (Random Access Memory) is replaced with ECC RAM and the system fails to start, then the issue is most likely associated with the change from non-ECC to ECC RAM. The incorrect answers: B. The new memory is faulty Although it's possible that the new RAM is faulty, the more likely and obvious issue is the switch from non-ECC to ECC memory. Before blaming the RAM, it would be useful to know what type of memory the motherboard is expecting. C. The BIOS needs to be updated Although a BIOS upgrade may be a rare upgrade requirement, the more obvious issue with this upgrade is related to the memory type. D. The system is overheating during the startup process It takes a bit of time to heat up the components inside of a computer, so a failure that occurs at startup is most likely not related to thermal or heat issues inside of the computer.
80
A85. A workstation has been assigned an APIPA address. Which of the following would be the MOST likely reason for this configuration?
The Answer: D. The DHCP server is down APIPA (Automatic Private IP Addressing) is an IPv4 (Internet Protocol version 4) link-local addressing scheme. If a device does not have a static IP address and an address is not available from a DHCP server, the local device will assign itself an APIPA address so that communication to other APIPA devices on the same subnet will be available. The incorrect answers: A. The workstation is not connected to the wireless network APIPA addresses are used for any IP connected device, regardless of the type of network in use. B. The DNS server is misconfigured APIPA addresses are related to the local IP address and the availability of a DHCP server. The DNS server is not involved in the assigning of an APIPA address. C. The network is using public Internet addresses Assigned APIPA addresses include the range between 169.254.1.0 and 169.254.254.255. These addresses are considered "link-local" addresses and can only communicate within the same local IP subnet. APIPA addresses are not routable and devices with an APIPA address cannot send or receive traffic to the Internet. APIPA addresses are not public Internet addresses.
81
A86. Which of the following is used to forward traffic based on a destination MAC address?
The Answer: A. Unmanaged switch Switches determine how traffic is forwarded based on the destination MAC (Media Access Control) address in the frame. The qualification of managed or unmanaged is not important in this case, since both types of switches make forwarding decisions the same way. The difference between a managed and unmanaged switch are based on other features not associated with the forwarding process.
82
A87. A system administrator made some BIOS changes to a desktop computer running Windows 10, and now this message appears when starting the computer: “This drive can only boot in UEFI mode.” Which of the following would be the BEST next troubleshooting step?
The Answer: B. Enable Secure Boot Secure Boot is part of the UEFI (Unified Extensible Firmware Interface) standard for a computer BIOS (Basic Input Output System). Secure Boot ensures that the underlying operating system has not been modified by malware or any other process. The incorrect answers: A. Modify the boot drive sequence Changing the boot drive sequence in the BIOS would not resolve the UEFI or Security Boot process. C. Remove the BIOS password UEFI mode and Secure Boot do not require a boot or management password, and removing any of those passwords will not resolve the error message. D. Boot the system with the Windows setup media Booting with separate media would not resolve this issue when booting to the primary storage drive. UEFI mode with Secure Boot is required for this system.
83
A88. A user has spilled coffee on their laptop keyboard, and now the system will not start. The laptop contains a presentation for an upcoming conference. Which of the following would be the BEST way to gain access to this presentation?
The Answer: D. Remove the storage drive and place it into an external enclosure The current laptop will not boot due to the liquid damage, so the only option would be to remove the storage device from this laptop and use a different computer to access the required presentation files. The incorrect answers: A. Boot the system with a drive image utility Since this laptop will not start, attempting to boot with a drive imaging utility would not be a useful troubleshooting step. B. Connect an external monitor and boot from a USB drive Although this would bypass the laptop's storage drive, the primary issue in this system is the liquid damage to the motherboard. Unfortunately, the system will not allow booting to any drive on the laptop. C. Boot to the Windows Recovery Environment The Windows Recovery Environment would allow access to the file system if the computer was working, but the liquid damage prevents any software from starting on this laptop.
84
A89. A technician is installing a DSL modem at a SOHO facility. Which of the following connectors would be used to connect the DSL modem to the Internet provider line?
The Answer: B. RJ11 The RJ11 connector (Registered Jack 11) is the modular connector commonly associated with analog POTS (Plain Old Telephone System) lines. Since DSL (Digital Subscriber Line) uses the existing telephone lines, the DSL connection from an Internet Service Provider will also use those same lines with RJ11 connectors. These connectors will be the same for both residential, large-scale commercial, and SOHO (Small Office / Home Office) use. The incorrect answers: A. RS-232 RS-232 (Recommended Standard 232) is associated with the transmission of serial data across a link. These are slower speed connections that are commonly used today to connect and manage infrastructure devices such as switches, routers, and firewalls. RS-232 is not used for DSL or any high-speed Internet connection. C. BNC BNC (Bayonet Neill–Concelman) connectors are commonly used for coaxial connections used in larger enterprise environments. BNC is not used for SOHO DSL connections. D. F-connector The F-connector is the screw-on connector commonly used to attach cable television or cable modem coax connections. F-connectors are not used with twisted-pair copper DSL installations.
85
A90. Which of the following would be the BEST choice for capturing an image from a printed page and saving it on a computer?
The Answer: C. Flatbed scanner A flatbed scanner is designed to capture images from paper and convert them into digital form. The incorrect answers: A. QR code reader A Quick Response code is the square image at the end of each detailed answer in this book, and the QR code for this question can be found at the bottom of this page. QR codes are used to abbreviate or summarize information into a code that can be easily converted using a QR code scanner or camera. B. Optical drive Optical drives, such as DVD-ROM (Digital Versatile Disc - Read Only Memory) readers can store digital information onto an optical disc that can be read by laser beams on the appropriate DVD reader. D. Webcam Webcams are designed to capture moving images and not printed pages.