1.
You have a desktop computer that is behaving erratically on the network. The wired connection will often disconnect without warning. Which tool should you use to troubleshoot the network adapter?
Correct Answer
C. Loopback plug
Explanation
A loopback plug is for testing the ability of a network adapter to send and receive. The plug gets plugged into the NIC, and then a loopback test is performed using troubleshooting software. You can then tell whether the card is working properly.
2.
You have a desktop computer that is about five years old, with a single-channel memory architecture. You want to upgrade the memory. After checking the documentation, you purchase a higher-capacity RAM module that runs at the required bus speed. After you install it, the new RAM is not recognized, but the old RAM is. The computer store tests the RAM and it's fine. What should you try next?
Correct Answer
A. Flash the BIOS
Explanation
You Answered Correctly!
That capacity of module might not have been in existence when the motherboard's chipset was released. Sometimes flashing the BIOS is all that is required.
3.
Which of the following statements accurately explains what happens during the exposing step in the laser printer printing process?
Correct Answer
B. A laser reduces areas of the drum from a strong negative charge to a slight negative charge.
Explanation
In the exposing step, the image is written to the photosensitive imaging drum. Wherever the laser beam touches, the photosensitive drum's charge is severely reduced from –600 VDC to a slight negative charge (around –100 VDC). As the drum rotates, a pattern of exposed areas is formed, representing the image to be printed.
4.
You have a laser printer that is displaying the message “Perform user maintenance.” What should you do to resolve this situation?
Correct Answer
A. Apply a maintenance kit and clear the message.
Explanation
When a laser printer requests maintenance, it's because it has reached a certain page count. Apply a proper maintenance kit (one recommended by the manufacturer) and then clear the service message.
5.
When setting up a small office, home office (SOHO) network, how do the end-user devices known how to connect?
Correct Answer
C. NIC set with static address or be DHCP-served.
Explanation
The end-user devices are configured to at least request a DHCP-assigned IP address or be preconfigured with a static IP, gateway and DNS information.
6.
Your business employs four graphic designers who need new computers. These designers create graphical content such as advertisements, posters, and full-color brochures. Which of the following components is the least important to enhance in their custom-configured machines?
Correct Answer
A. Hard drive
Explanation
Graphic design (or CAD/CAM) workstations require solid CPU power, RAM, and a high-end video card. Hard drive storage is the least important upgrade for these types of users.
7.
A technician needs to purchase a new laptop for a manager. The manager has had several laptops fail and wants her new one to have as few components as possible to reduce the risk of failure. Which type of light source technology does not require an inverter and therefore is a better choice?
Correct Answer
D. LED
Explanation
There is no need for laptops with LED displays to convert the DC power coming into the laptop to the AC needed to power traditional fluorescent backlights because LEDs operate on DC power just like the rest of the laptop. Therefore, systems with LED backlights have no inverter board.
8.
You are consulting with a small field office that needs a dedicated, digital point-to-point network connection to its parent office. Which Internet connection type will meet this requirement?
Correct Answer
D. ISDN
Explanation
Integrated Services Digital Network (ISDN) is a digital, point-to-point network capable of maximum transmission speeds of about 2 Mbps, although speeds of 128 Kbps are more common.
9.
A technician is looking to buy a new LCD monitor. Which type of LCD monitor has faster response times and is less expensive than others?
Correct Answer
A. TN
Explanation
The TN will have the fastest response time for this list. The IPS is quick enough for someone interested in gaming, but the LED and plasma monitors would show significant blur or lag when pushed to their limits by fast-moving gameplay.
10.
You are installing UTP network cable for a client. The client's policies require that network cables do not produce poisonous gas when burned. What type of cable do you need to install?
Correct Answer
A. Plenum
Explanation
Most network cables are coated with a plastic PVC coating, which produces toxic gas when burned. Plenum-rated cables are coated with a Teflon-like material that is not poisonous when burned.
11.
What type of server can host files for easy access and fetching, similar to how a web server serves web pages?
Correct Answer
A. FTP server
Explanation
The File Transfer Protocol (FTP) server hosts files for easy access, allowing users who are able to browse it to transfer and upload the files.
12.
What type of front- or top-panel connector uses a standard 3.5 mm jack to make connections?
Correct Answer
B. Audio
Explanation
The audio connector on the front or top panel will use a round, 3.5 mm connector. You can plug speakers into it. Alternatively, you could plug a headset with a boom microphone into it for additional privacy.
13.
You are installing network cable that will support digital cable television signals. What type of cable should you install?
Correct Answer
A. RG-6
Explanation
Cable television installations typically use either RG-6 or RG-59 cable. RG-6 is slightly thicker, can run longer distances, and supports digital signals. RG-59 is suited only for analog TV signals.
14.
You are setting up a small network in your neighbor's house. She is concerned about wireless security, so she doesn't want to use wireless networking at all. She needs to connect two computers to each other, but it will be impossible to run a network cable between them. Which technology can help her network these computers?
Correct Answer
A. Ethernet over power
Explanation
Ethernet over power can make Ethernet connections by using electrical outlets. For it to work, both devices must be on the same electrical circuit.
15.
You are configuring a wireless 802.11n router for a small network. When setting it up, which security option should you choose?
Correct Answer
A. WPA2
Explanation
Of the wireless encryption methods listed, WPA2 is the newest and most secure. Some routers offer WPA2 Enterprise, which is a great choice as well.
16.
Which CPU technology allows for the assignment of two logical cores for every physical core present?
Correct Answer
D. Hyperthreading
Explanation
Hyperthreading-capable processors appear to the operating system to be two processors. As a result, the operating system can schedule two processes at the same time on each physical core.
17.
Which type of printing technology uses a heating element to make images on waxy paper?
Correct Answer
C. Thermal
Explanation
Thermal printers use a heating element. It heats up spots on special waxy, heat-sensitive paper to form the image.
18.
Which of the following statements regarding IPv4 configuration is true?
Correct Answer
A. All hosts on a network must have a unique subnet mask.
Explanation
All hosts on a network must have a unique IP address. The subnet mask should be the same for all computers on a local network. The network ID can't be set to all 1s; otherwise, it replicates the subnet mask. Default gateways, or router addresses, are needed only if hosts will communicate with hosts outside their local network.
19.
Which of the following IP addresses is not a private address and therefore is routable on the Internet?
Correct Answer
C. 172.168.38.155
Explanation
The private IP address ranges are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. The address 172.168.38.155 is outside the private IP address range and is a public address.
20.
Which of the following connectors transmit analog signals? (Choose two.)
Correct Answer(s)
A. VGA
C. RJ-11
Explanation
VGA is an analog video connector, and RJ-11 connectors are used with modems. Modems receive a digital signal from the computer but then modulate that signal to analog to transmit over common phone lines.
21.
Which of the following printer types are considered impact printers? (Choose two.)
Correct Answer(s)
B. Daisy-wheel
C. Dot-matrix
Explanation
Daisy-wheel and dot-matrix printers use print heads that strike an ink ribbon, which presses up against the paper to make an image. Therefore, they are impact printers. Laser printers use a drum to create the image, and thermal printers use heat.
22.
Which step immediately follows the fusing step in the laser printer imaging process?
Correct Answer
D. Cleaning
Explanation
The order of steps is processing, charging, exposing, developing, transferring, fusing, and cleaning.
23.
What server is accessed each time it's necessary to challenge and validate a user's credentials in order for the user to access a network resource?
Correct Answer
D. Authentication server
Explanation
The authentication server facilitates the challenge/response service for validating someone's credentials.
24.
Which of the following TCP/IP protocols is connection oriented and attempts to guarantee packet delivery?
Correct Answer
B. TCP
Explanation
Transmission Control Protocol (TCP) guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and User Datagram Protocol (UDP) does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.
25.
What form factor for solid-state hard drives has dimensions that mirror the older, platter-type drives?
Correct Answer
D. 2.5"
Explanation
Solid-state drives (SSDs) come in multiple form factors, such as, for example, a “stick” resembling a memory module or a 2.5″ box housed in metal. SSDs also come in 3.5″ form factor.
26.
Which type of storage device is composed of a conventional hard drive and a substantial amount of solid-state storage?
Correct Answer
D. Hybrid
Explanation
A hybrid hard drive is a combination of a conventional magnetic hard disk drive and solid-state storage. The goal is to increase access speed for commonly accessed data while still providing larger capacity similar to a conventional HDD.
27.
Which TCP/IP port will an email client use to push email to its email server?
Correct Answer
B. 25
Explanation
Email is pushed from clients to servers using the Simple Mail Transfer Protocol (SMTP). SMTP uses port 25.
28.
Which motherboard form factor measures 6.7″ × 6.7″?
Correct Answer
A. Mini-ITX
Explanation
A mini-ITX motherboard is a 6.7″ square. Nano-ITX motherboards are 4.7″ square, pico-ITX motherboards are 3.9″ × 2.8″, and mobile-ITX motherboards are 2.4″ square.
29.
Identify the connectors shown here, from left to right.
Correct Answer
D. RJ-11 and RJ-45
Explanation
The connectors are a four-pin RJ-11, typically used for telephone installations, and an eight-pin RJ-45 connector, used on UTP and STP for network transmissions.
30.
Which TCP/IP protocol is designed to help resolve hostnames to IP addresses?
Correct Answer
D. DNS
Explanation
The Domain Name System (DNS) is responsible for resolving hostnames to IP addresses. This is used millions of times daily on the Internet; when someone types in a website name, such as www.sybex.com, DNS will resolve that to an IP address to enable communication.
31.
You need to configure a wireless router for an office network. The office manager wants new devices to be able to automatically join the network and announce their presence to other networked devices. Which service should you enable to allow this?
Correct Answer
D. UPnP
Explanation
Universal Plug and Play (UPnP) is a standard designed to simplify the process of connecting devices to a network and to enable those devices to automatically announce their presence to other devices on the network.
32.
You are installing network cabling in a drop ceiling of an office space. The ceiling area is used to circulate breathable air. What type of cable do you need to install?
Correct Answer
D. Plenum
Explanation
The cable can be any of the three major types, coaxial, twisted pair, or fiber, but it needs to be plenum rated. Normal cables have a PVC coating, which produces a poisonous gas when burned. Plenum-rated cables have a Teflon coating, which is not toxic when burned.
33.
If you are connecting to a website that encrypts its connection using TLS, what port does that traffic travel on?
Correct Answer
D. 443
Explanation
To encrypt traffic between a web server and client securely, Hypertext Transfer Protocol Secure (HTTPS) can be used. HTTPS connections are secured using either Secure Sockets Layer (SSL) or Transport Layer Security (TLS). HTTPS uses port 443.
34.
What 9-pin connector type was commonly used for keyboards, mice, or game controllers before USB became popular?
Correct Answer
C. DB9
Explanation
DB9 was the “D” format, 9-pin connector type that was the standard format for keyboards, mice, and other small peripherals.
35.
Which of the following statements are not true regarding CPUs and operating systems? (Choose two.)
Correct Answer(s)
A. A 32-bit OS can run only on a 32-bit CPU.
C. A 64-bit OS can run on a 32-bit CPU or a 64-bit CPU.
Explanation
A 32-bit OS can run on either a 32-bit or 64-bit processor, although you will not be able to fully utilize the 64-bit processor's capabilities with a 32-bit OS. A 64-bit OS will run only on a 64-bit processor.
36.
A senior administrator calls you and tells you that she is working from home and trying to use RDP, but it won't connect. What port do you need to ensure is open on the firewall to grant her access?
Correct Answer
D. 3389
Explanation
The Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. It uses port 3389.
37.
What is the role of the server responsible for publishing information about the company's values, purpose, and available products or services to the public?
Correct Answer
D. Web server
Explanation
The web server hosts and serves information available to the public (or internally as an intranet web server). Originally, files on the web server would be primarily HTML files, but today's web servers would also serve style sheets, scripts, and various media files.
38.
What is the maximum data rate for a USB 2.0 connection?
Correct Answer
B. 480 Mbps
Explanation
USB 1.0 supports 12 Mbps. In following standards, USB 2.0 supports 480 Mbps, USB 3.0 supports 5 Gbps and USB 3.1 Gen 2 supports 10 Gbps.
39.
Which networking device is capable of reading IP addresses and forwarding packets based on the destination IP address?
Correct Answer
D. Router
Explanation
Routers operate at the Network layer (Layer 3) of the OSI model. Because of this, they make their decisions on what to do with traffic based on logical addresses, such as an IP address.
40.
Identify the type of cable connector shown here.
Correct Answer
B. BNC
Explanation
The connector pictured is a BNC connector. They are identifiable by their groove-and-notch fastening mechanism that locks by twisting one-quarter turn. F-connectors are easily identifiable because they are threaded. SC and ST connectors are for fiber-optic cable.
41.
Which CPU architecture term describes a CPU with multiple physical processor dies in the same package?
Correct Answer
A. Multicore
Explanation
A processor that exhibits a multicore architecture has multiple completely separate processor dies in the same package. The operating system and applications see multiple processors in the same way that they see multiple processors in separate sockets.
42.
Your manager is excited because he just purchased a fast USB 3.0 external hard drive for his work team. He wants to set it in the middle of the cubicles and let everyone have access to it. Some of the cubicles are about 15 feet away from each other. What is the recommended maximum cable length for this type of device?
Correct Answer
A. 3 meters
Explanation
USB 3.0 has a cable length limitation of 3 meters. USB 2.0 cables can be up to 5 meters in length.
43.
When printing, which component is responsible for converting the data being printed into the format that the printer can understand?
Correct Answer
B. Printer driver
Explanation
The printer driver uses a page-description language (PDL) to convert the data being printed into the format that the printer can understand. The driver also ensures that the printer is ready to print.
44.
Which component in a laser printer is responsible for heating up and melting the toner into the paper to create a permanent image?
Correct Answer
D. Fuser assembly
Explanation
Laser printers incorporate a fuser assembly, which uses two rollers that apply pressure and heat to fuse the plastic toner particles to the paper.
45.
What connectivity technique can ensure that your network traffic is encrypted from endpoint to endpoint?
Correct Answer
A. VPN
Explanation
A virtual private network (VPN) can encrypt your network traffic, keeping your data confidential along the wire.
46.
You are installing network cabling in a highly secure facility. The cables need to be immune to electronic eavesdropping. What type of cable should you use?
Correct Answer
A. Fiber-optic
Explanation
Fiber-optic cabling uses pulses of light instead of electric voltages to transmit data, so it is immune to electrical interference and to wiretapping.
47.
Which TCP/IP host-to-host protocol makes its best effort to deliver data but does not guarantee it?
Correct Answer
C. UDP
Explanation
The two host-to-host protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and UDP does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.
48.
You wish to protect your system from someone not authorized to start the OS. What is your best option?
Correct Answer
B. Password protect in the BIOS/UEFI settings.
Explanation
The system BIOS/UEFI settings include password protection to not allow system bootup unless someone enters a password. This would prohibit the OS from loading upon boot.
49.
Which of the following network devices receives network traffic and makes a decision on whether to send it on based on the destination hardware address?
Correct Answer
B. Bridge
Explanation
Because bridges work at the Data Link layer, they are aware of only hardware (MAC) addresses. They are not aware of and do not deal with IP addresses. Bridges are more intelligent than repeaters, but they are unable to move data across multiple networks simultaneously.
50.
A technician installed a UTP splitter on one of your network segments that has CAT6e cable. What is the maximum speed supported by this connection?
Correct Answer
B. 100 Mbps
Explanation
An Ethernet splitter will take the incoming signal on two pairs and then split it, so on the output end it produces two sets of signals using two pairs each. Because of this, Ethernet splitters are limited to 100 Mbps connections. It is not recommended that you use Ethernet splitters on a network. If you need to connect multiple computers using UTP, use a hub or a switch.