Full practice questions for Core 1
SODIMM
Small Outline Dual In-Line Memory Module
SODIMM
2.5” SSD
Magnetic Disk Drive (L) and M.2 SSD (R)
2 options for migrating from HDD to SSD
Install an OS on the SSD and moved documents between the drives.
Image/clone the HDD. Moves everything
What does Mini PCI(E) do?
Enables 802.11 LAN or PAN for Bluetooth.
NFC is _ cm or less and used for x and y
4, data transfers, authentication
fingerprint sensor
The outlet for electricity is x power and the laptop jack is y power.
AC, DC
DDR
Double Data Rate
SODIMM DDR3 has how many pins
204
Are different versions of SODIMM compatible?
NO
Laptop storage drives include X, Y, and Z. They have either a X or Y inch form factor.
SSD, magnetic disk, hybrid. 2.5, 1.8
What is the module format for a stick of SODIMM DDR4 RAM
DDR4 SODIMM modules have 260 pins. DDR3 is 204-pin. 1.8-inch is the size associated with smaller storage drives used in some laptops. 2.5-inch is the standard size for SSD storage drives.
You just added a second memory module to a laptop. However, after rebooting the system, the OS reports the same amount of memory as before. What should you do next?
The next step you should take is to reseat the memory. SODIMMs can be a bit tricky to install. They must be firmly installed, but you don’t want to press too hard and damage any components. If the laptop worked fine before the upgrade, you shouldn’t have to replace the modules or the motherboard.
What are ways that a laptop can communicate with other computers?
Some of the methods that laptops use to communicate with other computers include Bluetooth, WLAN, and cellular WAN wireless connections, plus wired connections like Ethernet (RJ45) and, for older laptops, dial-up (RJ11). The DC jack is the input on the laptop that accepts power from the AC adapter.
A user doesn’t see anything on his laptop’s screen. He tries to use AC power and thinks that the laptop is not receiving any. Which of the following are two possible reasons for this?
An incorrect adapter will usually not power a laptop. The adapter used must be exact. And, of course, if the laptop is not properly plugged in to the adapter, it won’t get power. Windows doesn’t play into this scenario. And if the battery were dead, it could cause the laptop to fail to power up, but only if the AC adapter were also disconnected; the scenario states that the user is trying to use AC power.
What are possible reasons that a laptop’s keyboard might fail completely?
A laptop’s keyboard could fail due to a disconnected or loose keyboard ribbon cable. It could also fail if a user spilled coffee on the laptop, dropped it on the ground, and so on. One stuck key will not cause the entire keyboard to fail, and on most laptops, the keyboard cannot be disabled in the Device Manager. It can be uninstalled but not disabled.
One of your customers reports that she walked away from her laptop for 30 minutes, and when she returned, the display was very dim. She increased the brightness setting and moved the mouse but to no effect. What should you do first?
It could be that the laptop is now on battery power and is set to a dimmer display and shorter sleep configuration while on battery. The laptop may not be getting AC power from the AC outlet for some reason. The battery power setting is the first thing you should check; afterward, start troubleshooting the AC adapter, cable, AC outlet, and so on. It’s too early to try replacing the display; try not to replace something until you have ruled out all other possibilities. A dim screen is not caused by OS corruption. There’s no need to plug in an external monitor; you know the video adapter is working, it’s just dim.
You are helping a customer with a laptop issue. The customer says that two days ago the laptop was accidentally dropped while it was charging. You observe that the laptop will not turn on and that it is connected to the correct power adapter. Which of the following is the most likely cause?
The DC jack was probably damaged when the laptop was dropped. It may have been plugged in (charging) and fallen on the plug that connects to the DC jack (which is easily damaged on many laptops). The customer probably used the laptop until the battery became discharged before noticing that the laptop wouldn’t take a charge anymore—and now it won’t turn on at all. So the battery is probably not the issue. A power adapter can be damaged, but the DC-in jack is more easily damaged. The storage drive and the BIOS/UEFI normally will not affect whether the laptop will turn on
You want to reduce the risk of your laptop being stolen. Which of the following is the best option?
To best reduce the chance of theft, use a cable lock. This is a physical cable that can be wrapped around a sturdy object and locked to the laptop, keeping it relatively secure from theft. Incorporating biometrics means implementing a thumbprint scan or other physical characteristic scan into the authentication process. Disabling NFC means that near-field communications will be turned off, and data can’t be “beamed” to other devices. Enabling MFA means that you are implementing multi-factor authentication —for example, combining a password and biometrics.
A user cannot make contactless payments using NFC, connect to the Internet, or send/receive calls from their mobile device. The user is able to boot the device and sign on. Which of the following is most likely the cause of the problem?
Turning on airplane mode (the most likely cause of the problem) will disable wireless transmissions, including NFC. This is great for security purposes, but it can also disable the ability to connect to Wi-Fi networks or send/receive calls. A failed power state would render the entire device unusable; however, the question says the user was able to boot and sign on to the device. Biometric authentication is most likely not the cause of the problem in this scenario because the user is not having problems signing on to the device. Electrostatic discharge (ESD) can occur when two objects with different voltages come into contact with each other. ESD can wreak havoc with electronic components, but it is not the most likely problem here because the device appears to be working normally in all other regards—plus it’s somewhat uncommon for mobile devices. The real issue here is user error: The user did not remember that the device was in airplane mode. When you troubleshoot problems, remember that they are often user related!
A screen inverter’s job is to convert x from the x into x to be sent to the x
DC voltage, motherboard, AC voltage, backlight
Before handling an inverter you must:
turn off and unplug the laptop. remove the battery
Which kind of video technology do most laptop LCDs use?
TFT active-matrix displays are the most common in laptops that use LCDs. Passive-matrix screens have been discontinued, but you might see an older laptop that utilizes this technology. OLED technology is a newer and different technology that is not based on TFT displays but instead uses emissive display technology, meaning that each dot on the screen is illuminated by a separate diode. OLED displays can, however, be passive-matrix or active-matrix controlled. The MAC ID is the hexadecimal address associated with a network adapter, such as a Wi-Fi adapter or network card.
Which of the following uses an organic compound that emits light?
A. TFT active matrix
B. IPS
C. OLED
D. LCD
E. LED
C. OLED (organic light-emitting diode) displays use an organic compound or film that emits light. TFT active matrix implies LCD, and neither TFT nor LCD uses organic compounds the way OLED does. In-plane switching (IPS) is a type of LCD technology that increases the available viewing angle compared to older technologies, such as twisted nematic (TN) matrix LCDs. However, IPS is generally considered inferior to OLED screens when it comes to brightness and contrast ratio when viewed from an angle. LED screens use a film and diode, but not organically in the way that OLED does, and not at such a small size.
Which of the following are possible reasons a laptop’s LCD suddenly went blank with no user intervention? (Select the two best answers.)
A. Damaged inverter
B. Damaged LCD
C. Burned-out backlight
D. Incorrect resolution setting
A and C. A damaged inverter or burned-out bulb could cause a laptop’s display to go blank. You can verify whether the LCD is still getting a signal by shining a flashlight at the screen. A damaged LCD usually works to a certain extent and will either be cracked, have areas of the Windows interface missing, or show other signs of damage. An incorrect resolution setting can indeed make the screen suddenly go blank (or look garbled), but that scenario will most likely occur only if the user has changed the resolution setting—and this question specifies “with no user intervention.”
Which of the following allows you to access a WLAN?
A. LED
B. Webcam
C. Digitizer
D. Stylus
E. Wi-Fi card
E. A Wi-Fi card, also known as a Wi-Fi network adapter, allows you to connect to a WLAN (wireless local area network), which is essentially another name for a Wi-Fi network. LED is a type of display. A webcam is used to communicate visually and audibly with others or to record oneself. A digitizer is a device that converts tapped or written impulses on a screen into digital information that the operating system can use. A stylus is a writing device used with a digitizer or touchscreen.
You have been tasked with replacing a Wi-Fi/Bluetooth card in a laptop. You open the laptop and find a card that uses the 2230 standard. What type of card is this?
A. Mini PCIe
B. M.2
C. Digitizer
D. RJ45
B. The 2230 standard is a kind of M.2 size measuring 22x30 mm. It is common in laptops for use with Wi-Fi and Bluetooth. In comparison, a PC often uses a 2280 M.2 card. Mini PCle is an older type of card slot that might be used for Wi-Fi cards, but it does not use measurements such as 2230 or 2280 the way that M.2 does. A digitizer is not a port at all but a device that converts tapped impulses into digital information. An RJ45 port is a networking port that allows a laptop to communicate with the rest of the network in a wired fashion—that is, if the laptop has such a port!
Android devices generally use x (older ones using x), iOS devices use x or y
USB-C, Micro-USB, USB-C, lightning
A laptop is placed, or “x,” into a docking station. In contrast, a port replicator is connected to a laptop simply to x.
docked, provide additional ports
Which type of charging connector would you find on an iPad?
A. Micro-USB
B. Lightning
C. Thunderbolt
D. IP68
B. The Lightning connector is one of Apple’s proprietary charging and synchronization connectors used by iPads and iPhones, although Apple also uses USB-C. Micro-USB is used by older Android-based mobile devices, and USB-C is more common on newer Android-based devices. Thunderbolt is a high-speed hardware interface used in desktop computers. IP68 deals with ingress protection against dust and water.
You are required to add long-term storage to a smartphone. Which type would you most likely add?
A. DDR4
B. microSD
C. LPDDR4
D. SSD
E. SIM
B. You would most likely add a microSD card (if the smartphone has a slot available for add-ons or upgrading). This is the most common method for adding long-term storage. DDR4 is a type of RAM; it is not used for adding long-term memory storage. Some smartphones use LPDDR4 as their main memory, but this is part of the system on a chip (SoC) and not accessible to the typical user. An SSD is a solid-state drive, which generally means a hard drive that is installed to a PC or laptop, connected either as SATA or M.2. SSDs are too large for smartphones and tablets. A SIM is a subscriber identity module, usually represented as a small card (mini-SIM) used in smartphones that securely stores authentication information about the user and device, such as the International Mobile Subscriber Identity (IMSI).
The organization you work for allows employees to work using their own mobile devices in a BYOD manner. You have been tasked with setting up the devices so that they can “beam” information back and forth between each other. What is this known as?
A. Mobile hotspot
B. IoT
C. CYOD
D. IR
E. NFC
E. “Beaming” the information back and forth can be accomplished in a couple of ways, primarily by using near-field communication (NFC). This can only be done if the devices are in close proximity to each other. NFC is commonly used for contactless payment systems. Another potential option would be Apple’s AirDrop, but this relies on Bluetooth (for finding devices) and Wi-Fi (for transmitting data), and of course relies on using Apple-based devices. A mobile hotspot enables a smartphone or tablet to act as an Internet gateway for other mobile devices and computers. IoT stands for the Internet of Things. The question says that employees can use their mobile devices in a BYOD manner, but CYOD is a bit different. This means that employees can choose a device to use for work purposes (most likely whichever type they are more familiar with). Whether the employees can use those devices for personal purposes usually depends on company policy. IR stands for infrared, which is not commonly found on smartphones.
Which of the following can be useful in areas where a smartphone has cellular access but a PC (or laptop) cannot connect to the Internet?
A. Proprietary vendor-specific connector
B. Accessories
C. IP codes
D. Tethering
D. Tethering can allow a desktop computer or laptop to share the mobile device’s Internet connection. Tethering functionality can be very useful in areas where a smartphone has cellular access but a PC/laptop cannot connect to the Internet. Mobile device accessories such as headsets, speakers, game pads, extra battery packs, and protective covers are useful, but they are not used to connect to the Internet. IP codes (for example, IP68) are used to classify and rate the degree of protection against dust and water.
A user has asked you to provide her with a more accurate way of manipulating her smartphone screen. She is part of a mobile sales force and needs to be able to work quickly and efficiently. Which of the following is the easiest and best solution?
A. Connect an external monitor so that the images on the screen will be bigger.
B. Configure a drawing pad to work with the smartphone.
C. Set up a touch pen to access the screen directly.
D. Add an external touchpad to the device.
C. The best option is to set up a touch pen to access the smartphone’s screen directly. A smartphone may come with a touch pen (also known as a stylus pen or simply a stylus); or it may be able to have a touch pen added later. A touch pen enables a person to input information to the screen more accurately. The other devices listed will make mobility more difficult (if not impossible). The next best answer would be an external touchpad, but it isn’t the easiest solution. If the user finds that she needs the touchpad more often, then a better, more permanent solution might be to use a tablet computer instead of a smartphone.
5G can transmit at x Gbps
20
PRL updates help you get x by keeping your device on x
better coverage, preferred networks
x is software that is used to update and secure mobile devices from a central location
MDM
x focuses on managing specific corporate mobile applications
MAM
Which of the following connections require a username, password, and SMTP server? (Select the two best answers.)
A. Bluetooth connection
B. Wi-Fi connection
C. POP3 connection
D. Exchange connection
E. IMAP connection
C and E. POP3 and IMAP email connections require an incoming mail server (either POP3 or IMAP) and an outgoing mail server (SMTP). Bluetooth and Wi-Fi connections do not require a username or SMTP server. Bluetooth might require a PIN, and WiFi will almost always require a passcode. Exchange connections require a username and password but no SMTP server. Exchange Server acts as the incoming and outgoing mail server.
When manually configuring a Wi-Fi connection, which step occurs after successfully entering the SSID?
A. Select POP3.
B. Check whether the device is within range of the WAP.
C. Enter a passcode for the network.
D. Scan for networks
C. After you enter the correct SSID, you enter the passcode (or passphrase) for the network. POP3 has to do with configuring an email account. If you have already entered the SSID, then you should be within range of the wireless access point (WAP). Scanning for networks is the first thing you do when setting up a Wi-Fi connection
Which of the following allows other mobile devices to wirelessly share a mobile device’s Internet connection?
A. NFC
B. Airplane mode
C. IMAP
D. Mobile hotspot
D. Mobile hotspot technology (sometimes referred to as Wi-Fi tethering) allows a mobile device to share its Internet connection with other Wi-Fi-capable devices. Another possibility would be USB tethering, but that is done in a wired fashion. NFC, which stands for near-field communication, is a technology that allows two mobile devices to send information to each other when they are in close proximity. Airplane mode disables all wireless connectivity, including (but not limited to) cellular, Wi-Fi, and Bluetooth. IMAP is another email protocol similar to POP3.
Which of the following identifies the user of a device?
A. IMSI ID
B. IMEI ID
C. S/MIME
D. VPN
A. International Mobile Subscriber Identity (IMSI) or an IMSI ID is used to identify the user of a device. IMEI, which stands for International Mobile Equipment Identity, identifies the phone used. In other words, the IMEI ID identifies the device itself. STIMIME (Secure/Multipurpose Internet Mail Extensions) is used for authentication and message integrity and is built into some email clients. In other words, it is used to encrypt email. Virtual private network (VPN) technology is used to make secure connections by tunneling through the provider’s radio network.
Which of the following is used to synchronize contacts from an iPad to a PC? (Select the best answer.)
A. Gmail
B. Google Play
C. iTunes
D. Sync Center
C. PC users need iTunes to synchronize contacts and other data from an iPad to a PC. While Gmail can work to synchronize contacts, it is completely based on web storage; nothing is actually stored on the iPad. Google Play is a place to get applications and other items for Android. Sync Center is a Control Panel utility that enables synchronization across Windows devices.
You oversee a midsized enterprise and are supporting 300 smartphones. Which of the following would best allow you to configure them from a centralized location?
A. GPS
B. MDM
C. Location services
D. PRL
B. Mobile device management (MDM) allows a person to centrally administer many mobile devices from a single workstation. Global Positioning System (GPS) is a satellite-based navigation system that allows a mobile device to help you find your way to wherever it is you want to go. Location services is a more generic term that means any and all services that help to locate a mobile device and provide mapping information to apps. Preferred roaming list (PRL) is a database (used by CDMA-based phones) that contains telecommunication provider data.
What should you do after you have found a Bluetooth device for pairing? (Select two.)
A. Enter the appropriate PIN code
B. Enable Bluetooth
C. Disable pairing
D. Test connectivity
A and D. CompTIA lists the Bluetooth connection process in the following order: Enable Bluetooth, enable pairing, find a device for pairing, enter the appropriate PIN code, and finally, test connectivity.
What is the secure port for POP3 email connections that make use of SSL/TLS?
A. 110
B. 465 or 587
C.993
D. 995
D. The secure port for POP3 email connections that make use of SSL/TLS is 995. Port 110 is the POP3 default non-encrypted port. Ports 465 and 587 are the secure port numbers for SMTP. Port 993 is the secure port number for IMAP.
Network sessions on an IP network are normally either x or y sessions
TCP, UDP
TCP
Transmission Control Protocol
TCP sessions are x-oriented
connection. This means that every packet that is sent is checked for delivery
Step 1: of the TCP three-way handshake:
SYN: The client computer attempts to initiate a session to a server with a synchronize packet of information. (This is known as a SYN packet.)
Step 2: of the TCP three-way handshake:
SYN + ACK: The server responds to the client request by sending a synchronization/acknowledgment packet. (This is known as a SYNACK packet.)
Step 3: of the TCP three-way handshake:
ACK: The client sends an acknowledgment packet to the server. (This is known as an ACK packet.)
TCP socket connection:
Once the server receives that ACK packet, it acknowledges the session, and the network connection is established.
With TCP, the synchronization, acknowledgment, and sequencing of packets guarantees x
delivery
TCP uses a method known as x, which prevents a sender from overwhelming a server by sending too many packets too quickly.
flow control
UDP
User Datagram Protocol
User Datagram Protocol (UDP) sessions are known as x sessions.
connectionless
One example of UDP usage is with x. With UDP, if a packet is dropped, it is x
streaming media sessions, not asked for again.
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol Secure
The outbound server for email is generally x and the inbound server will use either x or y
SMTP, POP3, IMAP
SMTP
Simple Mail Transfer Protocol (Send Mail To People). Sends email. Email client > SMTP server > destination
POP3
Post Office Protocol Version 3. Used by email clients to retrieve incoming mail from a mail server
IMAP
Internet Message Access Protocol. Enables messages to remain on the email server so they can be retrieved from any location.
FTP
File Transfer Protocol. Allows computers to transfer files back and forth. Connect to an FTP server on port 21, then a client uses port 20 for the data transfer.
SSH
Secure Shell. Enables the remote control of computers and enables data to be exchanged between computers on a secured channel. More secure than FTP and Telnet. Port 22 must be open to access an SSH server.
Telnet
Telecommunication network. Provides remote access to other hosts using the command-line interface (CLI). Uses port 23 but is insecure.
DHCP
Dynamic Host Configuration Protocol. Automatically assigns IP addresses to hosts. Uses port 67 and 68. Connectionless since it uses UDP.
DNS
Domain Name System. Group of servers on the internet that translates domain names to IP addresses. Has inbound port 53 open by default.
LDAP
Lightweight Directory Access Protocol. Accesses and maintains distributed directories of information.
RDP
Remote Desktop Connection.
SMB
Server Message Block. Provides access to shared items such as files and printers.
SNMP.
Simple Network Management Protocol. Used as the standard for managing and monitoring devices on a network.
Which of these would be used for streaming media?
A. TCP
B. RDP
C. UDP
D. DHCP
C. User Datagram Protocol (UDP) is used for streaming media. It is connectionless, whereas TCP is connection oriented and not a good choice for streaming media. RDP, which stands for Remote Desktop Protocol, is used to make connections to other computers. DHCP, which stands for Dynamic Host Configuration Protocol, is used to assign IP addresses to clients automatically. Don’t forget: DHCP is connectionless and uses UDP, too!
A user can receive email but cannot send any. Which protocol is not configured properly?
A. POP3
B. FTP
C. SMTP
D. SNMP
C. Simple Mail Transfer Protocol (SMTP) is probably not configured properly. It deals with sending mail. POP3 receives mail. FTP sends files to remote computers. SNMP is used to manage networks.
FTP PORT
20/21
SSH PORT
22
TELNET PORT
23
SMTP PORT
25
DNS PORT
53
DHCP PORT
67/68
HTTP PORT
80
POP3 PORT
110
NETBIOS PORT
137/139
IMAP PORT
143
SNMP PORT
161/162
LDAP PORT
389
HTTPS PORT
443
SMB/CIFS PORT
445
RDP PORT
3389
A x is a central connecting device that computers connect to in a wired fashion
switch
MAC
Media Access Control
A switch is responsible for transmitting data from x. It often works at data transfer rates of x-y
two or more wired computers. 1000 Mbps or 10 Gbps
Each computer is connected to its own x on a switch
physical port