1.
You have just installed a second and third hard drive into a Windows 8.1 workstation. Each drive is 500 GB. The user wants to combine her space into one 1 TB volume. What should you create to accomplish this and also give the user a disk read and write performance boost?
Correct Answer
C. A new striped volume
Explanation
To combine both hard drives into one volume, you need to create a spanned, striped, or mirrored volume. A mirrored volume, like a RAID-1 array, will make one of the disks redundant, so in this case it would not give the user 1 TB of storage. A striped volume is like RAID-0 and will give you a slight performance boost.
2.
For IPv6, which of the following statements are not true? (Choose two.)
Correct Answer(s)
A. Each IPv6 interface can have only one address.
C. Pv6 addresses are incompatible with IPv4 networks.
Explanation
Each IPv6 interface can and often does have multiple addresses assigned to it. IPv6 is backward compatible with IPv4.
3.
You are installing two new RAM modules into a single channel of a dual-channel motherboard. Which of the following is true?
Correct Answer
A. Both RAM modules need to have the same parameters.
Explanation
When installing dual-channel RAM, be sure that the RAM modules both have the same parameters. In some cases, you might even need to make sure they come from the same manufacturer.
4.
You have a network installation that requires transmission speeds of 10 Gbps at a distance of 85 meters. Among the UTP standards listed, which one is the oldest one that meets the requirements for this network?
Correct Answer
D. CAT7
Explanation
CAT7 UTP can handle 10 Gbps transmissions over 100 meters. CAT6 will transmit at 10 Gbps, but only for 55 meters, while CAT6A can handle the same transmission speed up to 100 meters. CAT5 has a maximum speed of 100 Mbps, and CAT5e has a maximum of 1 Gbps.
5.
Identify the cable connector in the picture.
Correct Answer
A. F-connector
Explanation
F-connectors are threaded and screw into place. The BNC connector locks by twisting one-quarter turn. SC and ST connectors are for fiber-optic cable.
6.
A user reports the wireless Internet connection will randomly shut down in the afternoon. You check the Internet router by the window to find it still has power. What is the most likely cause of this problem?
Correct Answer
C. Wireless router overheating
Explanation
The most likely explanation is that the wireless router is overheating. If it randomly shuts down in the afternoon, being in the sun may contribute to overheating.
7.
Data transfers for which wireless connection type will be interrupted if someone walks between the sending and receiving devices?
Correct Answer
D. IR
Explanation
Infrared is a short-distance, line-of-sight wireless communication method. If line of sight is broken, the communication will end.
8.
Which TCP/IP protocol is used to provide shared access to files and printers on the network?
Correct Answer
C. SMB
Explanation
Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. In a way, it functions a bit like FTP, only with a few more options, such as the ability to connect to printers and more management commands.
9.
What server is accessed each time it's necessary to challenge and validate a user's credentials in order for the user to access a network resource?
Correct Answer
D. Authentication server
Explanation
The authentication server facilitates the challenge/response service for validating someone's credentials.
10.
You have just installed a new HP LaserJet printer on your network. You've plugged it directly into a CAT6a network cable. You try to install the printer on a client using the printer's IP address, but you are unable to connect. The printer is in Ready state. What should you do next?
Correct Answer
A. Double-check the printer's IP configuration information.
Explanation
For network-enabled laser printers, no connectivity can be a sign of improperly configured IP settings such as the IP address. While each printer is somewhat different, you can manually configure most laser printers’ IP settings through the LCD control panel.
11.
You are troubleshooting a computer with a RAID-10 array using four disks. One of the disks fails. What can you do to recover the array?
Correct Answer
D. Replace the failed disk and rebuild the array.
Explanation
RAID-10 is a mirrored striped set. As long as one drive in each mirrored pair is functional (just as in RAID-1), you shouldn't lose any data. Simply replace the failed disk and rebuild the array.
12.
One of your friends complains that when he plays action games on his computer, the screen is slow to refresh and the motion is often jerky. What should he do to resolve this problem?
Correct Answer
C. Increase video memory.
Explanation
Certain unacceptable video-quality issues (such as jerky refresh speeds or lags) can be remedied by adding memory to a video card. Doing so generally results in an increase in both quality and performance. If you can't add memory to the video card, you can upgrade to a new one.
13.
Your client is now looking at improving control over all the user devices. Particularly, the client wants resource access controlled based on policy and the users meeting a few criteria. What device would you suggest?
Correct Answer
A. End-point management server
Explanation
The end-point management server can be a policy-based or directory-based technique toward controlling access to network resources.
14.
Which type of laptop monitor technology uses a current of electricity to stimulate a sealed panel of inert gas?
Correct Answer
C. Plasma
Explanation
Plasma displays place electrodes in front of and behind sealed chambers full of inert gas (such as neon) and vaporized mercury. Current is run through the gas to ionize it and cause it to light up.
15.
Which TCP/IP protocol is responsible for dynamically assigning IP addresses to client computers?
Correct Answer
B. DHCP
Explanation
Dynamic Host Configuration Protocol (DHCP) dynamically assigns IP addresses and other IP configuration information to network clients.
16.
A user complains that sometimes his computer will not open files, and it happens in different programs. Which component is most likely to cause this problem?
Correct Answer
C. HDD
Explanation
Failure to open files means that the computer can't properly read those files. In most cases, this indicates an issue with the hard drive.
17.
A user calls the help desk to report that she has no network connectivity. She had connectivity yesterday, but when she booted up her desktop computer this morning, she could not connect. She does not use the wireless network. No other users have reported issues. What is the first thing you should do?
Correct Answer
D. Check to ensure that the network cable is plugged in.
Explanation
Rule #1 of troubleshooting is to always check your connections first. The most common issue that prevents network connectivity on a wired network is a bad or unplugged patch cable.
18.
What serial connection standard was first developed in 1960 and had been the standard for microsystems for a few decades?
Correct Answer
B. RS-232
Explanation
RS-232 was introduced in 1960 and was very common in 25-pin format for connecting printers and other peripherals as well as the 9-pin for connecting to network devices.
19.
Which Wi-Fi encryption standard was the first to include the use of a 128-bit dynamic per-packet encryption key?
Correct Answer
B. WPA
Explanation
Wi-Fi Protected Access (WPA) was the first Wi-Fi encryption standard to implement the use of the Temporal Key Integrity Protocol (TKIP). Whereas WEP used a static 40- or 128-bit key, TKIP uses a 128-bit dynamic per-packet key. It generates a new key for each packet sent.
20.
Which TCP/IP protocol, designed to download email, allows for multiple clients to be simultaneously connected to the same mailbox?
Correct Answer
C. IMAP
Explanation
Internet Message Access Protocol (IMAP) is a secure protocol designed to download email. It has several advantages over the older Post Office Protocol 3 (POP3). First, IMAP4 works in connected and disconnected modes. Second, it lets you store the email on the server, as opposed to POP3, which requires you to download it. Third, IMAP4 allows multiple clients to be simultaneously connected to the same inbox.
21.
Your Windows 7 workstation is having intermittent video issues. The manufacturer's website suggests you install the latest driver. Which utility should you use to check the driver version installed on your computer?
Correct Answer
B. Device Manager
Explanation
Device Manager has been present in every version of Windows since Windows 95. It allows you to manage all of your hardware devices, including updating drivers and disabling the device. It is found within the Computer Management console.
22.
You have a user who needs recommendations for installing a home server PC. She wants her family to be able to share files and videos on their home network. She also wants her data to be protected in the event of a hard drive failure. Which two components do you recommend she include?
Correct Answer(s)
B. RAID array
C. Gigabit NIC
Explanation
A home server PC should be able to handle media streaming as well as file and printer sharing. A dedicated print server is not likely needed, though, as the operating system can function as a print server. A gigabit NIC will be helpful to manage the network traffic, and a RAID array can help protect against hard drive failure.
23.
Which of the following wireless communication types has a maximum distance of about 4″?
Correct Answer
A. NFC
Explanation
The Near-field communication (NFC) is a wireless technology that uses radio frequency (RF) signals with limited range, about 4" (10 cm).
24.
You have installed an internal RAID controller and configured a RAID-5 array on it with four hard disks. It has been operating normally. Today when you boot up, you receive an error message saying, “RAID not found.” Which component is likely causing this issue?
Correct Answer
B. The RAID controller
Explanation
If the system had been operating normally but now tells you RAID not found, it's likely something is wrong with the RAID controller. Double-check to ensure that the RAID controller BIOS is configured properly and everything is connected as it should be.
25.
What type of network is most commonly associated with Bluetooth devices and covers a small area?
Correct Answer
C. PAN
Explanation
A personal area network (PAN) is a small-scale network designed around one person within a limited boundary area. The term generally refers to networks that use Bluetooth technology.
26.
A senior administrator calls you and tells you that she is working from home and trying to use RDP, but it won't connect. What port do you need to ensure is open on the firewall to grant her access?
Correct Answer
D. 3389
Explanation
The Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. It uses port 3389.
27.
What 9-pin connector type was commonly used for keyboards, mice, or game controllers before USB became popular?
Correct Answer
C. DB9
Explanation
DB9 was the “D” format, 9-pin connector type that was the standard format for keyboards, mice, and other small peripherals.
28.
Which Wi-Fi encryption standard uses a static key, which is commonly 10, 26, or 58 characters long?
Correct Answer
D. WEP
Explanation
Wired Equivalent Privacy (WEP) was one of the first security standards for wireless devices. It uses a static key; the keys are commonly 10, 26, or 58 hexadecimal characters long.
29.
You have been asked to design a new network that requires 10 Gbps transmission speeds. Which cable types will meet the minimum specifications? (Choose two.)
Correct Answer(s)
A. MMF
D. CAT7
Explanation
Multimode fiber (MMF) and UTP CAT6 and newer support 10 Gbps transmission speeds.
30.
You are connecting a laptop to a printer on the network using Wi-Fi. The user will need to use the printer frequently when they are in the office. What type of wireless connection will you establish with the printer?
Correct Answer
D. Infrastructure
Explanation
Wi-Fi (802.11a, b, g, n, or ac) and Bluetooth can be used to connect a printer temporarily to a single computer (or mobile device), and the connection does not have permanent status. This type of configuration is known as an ad hoc network connection. When Wi-Fi is used to connect printers to a network on a more permanent basis, it is known as infrastructure mode.
31.
Several Bluetooth devices are connected in an ad hoc network. Which acronym best describes this type of network?
Correct Answer
C. PAN
Explanation
A personal area network (PAN) is a small-scale network designed around one person within a limited boundary area. The term generally refers to networks that use Bluetooth technology.
32.
Which TCP/IP Internet layer protocol is responsible for resolving physical MAC addresses to logical IP addresses?
Correct Answer
D. RARP
Explanation
At the Internet layer of TCP/IP, Address Resolution Protocol (ARP) resolves logical IP addresses to physical MAC addresses built into network cards. Reverse ARP (RARP) resolves MAC addresses to IP addresses.
33.
Which type of DIMM has 184 pins?
Correct Answer
A. DDR
Explanation
DDR has 184 pins, DDR2 and DDR3 have 240 pins, and SODIMMs can have 72, 100, 144, 200, or 204 pins. DDR4 has 288 pins while DDR4 SODIMMs have 260 pins. Last, MicroDIMMs and MiniDIMMs at 240 pins.
34.
A technician is recommending that his company use removable memory cards. Which of the following should he tell his manager?
Correct Answer
A. MiniSD and microSD cards can work in a standard SD card slot.
Explanation
MiniSD and microSD cards are smaller than standard SD memory cards. Adapters are available to allow them to work in standard SD slots.
35.
Which type of flash memory is capable of being embedded on the circuit board of mobile devices?
Correct Answer
D. EMMC
Explanation
Embedded MultiMediaCard (eMMC) can be permanently embedded on the circuit board of a cheaper or smaller mobile device. All of the other flash memory standards, such as CompactFlash, xD, miniMMC, and microMMC, are designed to be removable.
36.
A client needs to connect to the Internet using telephone lines. What type of expansion card should you configure in his computer?
Correct Answer
C. Modem
Explanation
A modem allows computers to connect to a remote network (such as an ISP) via telephone lines. Modems were the most common Internet connection method in the 1990s but are uncommon today. NICs are expansion cards for network connections. USB and cellular are not expansion cards. Other types of expansion cards include video cards, sound cards, storage cards, TV tuner cards, and riser cards.
37.
Which network device comes in two types: active, which is powered, and passive, which is not?
Correct Answer
D. Hub
Explanation
Hubs can be either active or passive. Passive hubs connect all ports electrically but do not have their own power source. Active hubs use electronics to amplify and clean up the signal before it is broadcast to the other ports.
38.
You are configuring hosts on a network running IPv4. Which elements are required for the computer to connect to the network?
Correct Answer
B. IP address and subnet mask
Explanation
To communicate on an IPv4 network, a host must be configured with a valid IP address and a subnet mask. A default gateway is needed only if the host will connect to a remote network. DNS servers are optional but useful, because they resolve hostnames to IP addresses.
39.
Which of the following wireless communication methods are the least susceptible to hacking? (Choose two.)
Correct Answer(s)
B. IR
D. NFC
Explanation
Of the wireless communication methods, infrared (IR) and near-field communication (NFC) are the hardest to hack. IR communication is limited to about 1 meter, with a viewing angle of about 30 degrees. You would know if someone was trying to intercept the signal. NFC is limited to about 4" (10 cm). It would be pretty obvious if someone were trying to intercept that signal.
40.
What type of server can host files for easy access and fetching, similar to how a web server serves web pages?
Correct Answer
A. FTP server
Explanation
The File Transfer Protocol (FTP) server hosts files for easy access, allowing users who are able to browse it to transfer and upload the files.
41.
On an IPv6 network, if you want to send a single message to a group of computers at the same time, what type of address class do you need to use?
Correct Answer
A. Multicast
Explanation
There are three types of addresses in IPv6: unicast, anycast, and multicast. A unicast address identifies a single node on the network. An anycast address refers to one that has been assigned to multiple nodes. A multicast address is one used by multiple hosts. IPv6 does not use broadcasts.
42.
Which type of coaxial cable connector locks by twisting the connector one-quarter turn?
Correct Answer
B. BNC
Explanation
The BNC connector locks by twisting one-quarter turn. F-connectors are threaded and screw into place. SC and ST connectors are for fiber-optic cable.
43.
Which TCP/IP host-to-host protocol makes its best effort to deliver data but does not guarantee it?
Correct Answer
C. UDP
Explanation
The two host-to-host protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and UDP does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.
44.
Which of the following IPv6 addresses is equivalent to 127.0.0.1 in IPv4?
Correct Answer
B. ::1
Explanation
127.0.0.1 is the loopback address, used to ping the local network interface. The IPv6 equivalent is ::1.
45.
You have a desktop computer with three PCI expansion slots. What will happen when you mix cards of different speeds on the same motherboard?
Correct Answer
D. The cards will all operate at the slower speed.
Explanation
PCI is a shared-bus topology, so mixing 33 MHz and 66 MHz adapters in a 66 MHz system will slow all adapters to 33 MHz.
46.
You have reason to believe that several network users are actively browsing prohibited content on unsecured sites on the Internet. Which port can you disable on the firewall to immediately stop access to these websites?
Correct Answer
C. 80
Explanation
Normal (unsecured) websites are accessed on port 80, which is the port that Hypertext Transfer Protocol (HTTP) uses. Shut it down, and no one will be able to access websites, except secure sites that use HTTPS, which is on port 443.
47.
The AES security algorithm was introduced with which Wi-Fi encryption standard?
Correct Answer
C. WPA2
Explanation
Wi-Fi Protected Access 2 (WPA2) is a huge improvement over WEP and WPA. It uses Counter Mode CBC-MAC Protocol (CCMP), which is a protocol based on the Advanced Encryption Standard (AES) security algorithm. CCMP-AES was created to address the shortcomings of TKIP, so consequently it's much stronger than TKIP.
48.
What is the maximum data rate for a USB 2.0 connection?
Correct Answer
B. 480 Mbps
Explanation
USB 1.0 supports 12 Mbps. In following standards, USB 2.0 supports 480 Mbps, USB 3.0 supports 5 Gbps and USB 3.1 Gen 2 supports 10 Gbps.
49.
You are troubleshooting a laptop with an integrated wireless networking card. The user reports that the laptop will not connect to the Internet. When you look at the network card, the connection and activity lights alternate blinking, in a steady pattern. What is the most likely cause of the problem?
Correct Answer
A. No network connection
Explanation
Some wireless cards will have their connection and activity lights alternatively blink if there is no network connection. If the card had failed, there likely would be no lights on it at all.
50.
Which of the following network connectivity devices operate at Layer 2 of the OSI model? (Choose two.)
Correct Answer(s)
B. Switch
C. Bridge
Explanation
Switches and bridges work at Layer 2. Switches are multi-port bridges.