DRF WGU CORE 1 D316 FOUNDATIONS complete questions with expert solutions + rationales

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/560

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

561 Terms

1
New cards

Code division multiple access (CDMA) means that the handset is directly managed by the provider and there is no removable SIM card.

Code division multiple access (CDMA) means that the handset is directly managed by the provider and there is no removable SIM card.

2
New cards

ECC RAM

A server system uses a method where each transfer performs a hash calculation on the data value and stores it as an 8-bit checksum. This can detect and correct single-bit errors and allow the PC to continue functioning normally. What is this method called?

A technician uses error correction code (ECC) RAM for workstations and servers that require high reliability.

Virtual RAM, also called virtual memory, is not just used to supplement RAM with swap space.

Small outline DIMM (SODIMM) is the smaller form factor packaged for laptop RAM. The memory typically fits into slots that pop up at a 45-degree angle to allow the chips to be inserted or removed.

Dual-channel memory controllers effectively have two 64-bit pathways through the bus to the CPU, meaning that they can send 128 bits of data per transfer rather than 64 bits.

3
New cards

SOHO

A contractor working for a managed services company works fully remote from their residence. They have multiple desktops, printers, and even some Wi-Fi access points set up. What type of network is this considered?

A small office home office (SOHO) LAN is a business-oriented network, potentially using a centralized server in addition to client devices and printers, but often using a single networking appliance to provide LAN and Internet connectivity.

A wide area network (WAN) spans multiple geographic locations. One example of a WAN is the internet, a global network of networks.

A wireless local area network (WLAN) uses radios and antennas for data transmission and reception. Though there are some Wi-Fi access points, not all devices are wireless.

A metropolitan area network (MAN) can mean a specific network type covering an area equivalent to a city or other municipality.

4
New cards

HDD

What kind of storage media can have grinding and clicking as a diagnostic tool?

A hard disk drive (HDD) has moving platters and arms. These mechanical parts can start making grinding or clicking noises as they fail.

A solid-state device (SSD) does not have moving parts. Instead, SSD uses flash memory technology to implement persistent mass storage. As a result, risks from failure due to mechanical shock and fear are generally lower.

Random access memory (RAM) does not have moving parts to fail. RAM is the nonpersistent memory used for running programs and open data files.

Non-volatile read access memory (NVRAM) does not have moving parts to fail.

5
New cards

A support technician replaces a Wi-Fi card in a laptop. The following day, the laptop user states that the company's Wi-Fi network signal is weaker than it was before. What does the technician find to be the likely problem?

The antenna is not connected.

When replacing a Wi-Fi card, it is important to remember to connect the antenna. The connection is usually a wire with a terminating end that snaps onto the card.

A Wi-Fi card is seated into a laptop and is usually a peripheral component interconnect express (PCIe) type connector. Having the card seated incorrectly would render the Wi-Fi card unrecognizable and not function at all.

Devices within a computer require software drivers to function. Since the system identified the card properly, then the support technician installed the correct drivers.

There are varying specifications for Wi-Fi. Since the Wi-Fi is receiving a signal, the Wi-Fi card is compatible with the company's Wi-Fi system.

6
New cards

Virtual LAN

A growing company is looking to move away from an outside vendor for payment processing and would like to do it in-house. As a part of securing the data on these computers, what foundational infrastructure solution should the company implement to keep this data separate from the rest of the company's internal network?

A virtual LAN (VLAN) is a logical network segment using a feature of managed switches to segregate network traffic. This would be the first step to separating network traffic for the given scenario.

A virtual private network (VPN) enables mostly remote hosts to connect to the LAN without being physically installed at the site.

In the Domain Name System (DNS), an A record resolves a host name to an IPv4 address. This would not provide any added security.

A dynamic host configuration protocol (DHCP) scope is a range of consecutive IP addresses in the same subnet that a DHCP server can lease to clients. The company may not use this if all the hosts have static addresses.

7
New cards

Toner Probe

After discovering an unlabeled wall port in an office, a technician would like to label it appropriately. Not knowing where the permanent link patches into specifically, they know which IT closet it would run to, as all the other permanent links in the same area run to the same closet. When connecting a laptop, there appears to be a successful connection. Which tool would be most helpful for the technician to use?

A toner probe detects the signal and follows the cable over ceilings and through ducts, or identifies it from the rest of the bundle. A technician uses this along with a tone generator, applying a continuous audio signal on the cable.

A punchdown tool fixes each conductor into an insulation displacement connector (IDC).

A cable stripper scores the outer jacket just enough to remove it.

A cable tester is a pair of devices designed to attach to each end of a cable. It tests a patch cord or is connected via patch cords to a wall port and patch panel port to test the permanent link.

8
New cards

Sandboxes can be used to analyze viruses, worms, and Trojans. Sandboxes also provide an isolated environment for what other important function?

Testing and development

Test development often uses virtual desktop platforms based on some guest OS hypervisor.

Resource requirements are important to consider and meet when setting up a virtualized system and network for virtualized systems to use. If the system is not designed with resource requirements in mind, it will be overwhelmed and dysfunctional.

Cross-platform utilization tests software applications under different OSs and resource constraints and is important to ensure the application is compatible across several different environments.

Legacy software applications and operating systems may not perform well if a user's system has been upgraded.

9
New cards

A company building is under construction and a technician is getting ready to install communication wires. What can a technician use to make the installation simpler?

Plenum

Plenum is a space that is a void in a building designed to carry heating, ventilation, and air conditioning (HVAC) systems. Plenum space is usually a false ceiling or raised floor.

Straight tip (ST) is a type of core fiber optic connector that is a bayonet-style connector and uses a push-and-twist locking mechanism for mostly multi-mode networks.

A lucent connector (LC) is a type of core fiber optic connector that is a small form factor connector with a tabbed push/pull design. LC is similar to subscriber connector (SC), but the smaller size allows for higher port density.

Fiber cable contains a protective jacket and terminates by a connector. Fiber optic cables fall into two broad categories; single-mode and multi-mode.

10
New cards

What type of printer uses a heating element to create the image on the paper?

Thermal

A thermal printer is a general term for any device that uses a heating element to create paper images. Thermal printers have a heat-sensitive print that the paper is friction-fed through the print mechanism when in the feed assembly.

Laser printers are the most popular printer technologies for office applications because they are inexpensive, quiet, and fast.

Inkjet printers typically create good-quality color output, such as photo printing. Inkjet is cheap to buy but expensive to run.

Impact printer strikes an inked ribbon against the paper to leave marks. The most common type is the dot matrix printer.

11
New cards

What voltage range do appliances such as dryers, heavy-duty power tools, and oven ranges require?

220V

220V is a requirement for appliances because of the high-power range needed to supply them. The power requirement for 200V would be 900 watts of power. This range is typically in commercial applications for large motors and other equipment.

110V is present mainly in portable electronics and small appliances. 110V is typically safer to work with because of the fewer volts.

115V is similar to 110V and rated on a low range that would not support the appliances.

120V is in the same low range as 110V and 115V. 110V, 115V, and 120V have tests to operate at a lower voltage.

12
New cards

A software development company uses a system to allow developers to log into any computer throughout the building and load their unique desktop environment. The IT department decided to manage these servers in the data center located in the basement of the company's office building. What system is the software development company leveraging?

Virtual desktop infrastructure (VDI) on premises

Virtual desktop infrastructure (VDI) on-premises is correct because the developers log into virtual machines that load the users' computer images. The servers are hosted on the same network as the clients.

VDI in the cloud is incorrect because the servers hosting the virtual machines in the cloud mean that the servers are not hosted on the same network as the clients.

Platform as a service (PaaS) is incorrect because PaaS is typically a solution that would deploy hardware and applications platforms for the clients to use.

Infrastructure as a service (IaaS) is incorrect because IaaS is deploying IT hardware through a service provider.

13
New cards

A technician responds to a computer intermittently shutting down and finds that the tower has a personal heater blowing on it. What is a likely problem?

Overheating

The computer is overheating. Even with all the fans working properly, computers cannot have personal space heaters blowing directly on them. Redirecting the heater should resolve the problem.

Intermittent shutdowns can be an indicator of malware, but the physical details in this example do not point to malware as the problem.

A power supply unit (PSU) that is not delivering stable power can cause intermittent shutdowns, but this does not seem to be the problem here. Instead, the space heater is the apparent problem.

Hard drive failure can result in intermittent shutdowns and is diagnosed with OS tools, such as the chkdsk command. However, this is unlikely to be the problem in this case.

14
New cards

Users at an organization prefer that any mobile devices deployed for company use have location services disabled. IT administrators agree and configure which option?

Global Positioning System

Global Positioning System (GPS) is a means of determining the device's latitude and longitude based on information received from orbital satellites via a GPS sensor.

Global System for Mobile Communication (GSM) allows subscribers to use a removable subscriber identity module (SIM) card to use an unlocked handset with their chosen network provider.

Information that a cellular radio needs to connect to a network is provided as a preferred roaming list (PRL).

Mobile data options allow a user to enable or disable Wi-Fi, cellular service, Bluetooth, and all services together (known as airplane mode).

15
New cards

This protocol transfers email messages across a network and uses TCP port 25.

SMTP

Simple Mail Transfer Protocol (SMTP) transfers email messages across a network and uses TCP port 25.

File Transfer Protocol (FTP) makes files available for download across a network. It utilizes two ports. TCP Port 21 establishes the connection between two computers (control connection), and TCP port 20 is the port the file(s) are transferred across (data connection).

Telnet makes an unsecured connection to the command-line interface of a remote server and uses TCP port 23.

Secure Shell (SSH) makes a secure connection to the command-line interface of a remote server and uses TCP port 22.

16
New cards

A technician needs to upgrade components in a laptop. Which component can the technician install without the use of tools?

Battery

Laptop computers use removable, rechargeable Lithium-ion (Li-ion) battery packs. Some batteries require the use of tools to access, while many batteries are easily removable with a spring lock mechanism on the back of the laptop.

A solid-state disk drive (SSD) is internal and would require tools to replace. Memory is under a removable panel or by removing the entire back cover.

Memory is internal and would require tools to access. Memory is under a removable panel, removing the entire back cover or by removing the keyboard.

A wireless card is an internal add-on card accessible by a removable panel on the bottom of the laptop or by removing the entire back cover of a laptop.

17
New cards

An artist looks to achieve greater precision when creating digital drawings. Which input device will help achieve this goal?

Touch pen

Most drawing pads and some touch screens can be used with a touch pen or stylus rather than fingers. A stylus allows for more precise control and can be used for handwriting and drawing.

A trackpad acts as an input device and is a larger-format device attached as a peripheral rather than built into a laptop.

A touch screen is also referred to as a digitizer because of the way it converts analog touch input to digital software instructions. A digitizer sits above a display panel.

A touchpad is a navigation device that is built into laptops and acts as a mouse.

18
New cards

A managed service company works with a client to enumerate and gather all the detailed events, errors, and notifications produced from various network devices. What solution would the company suggest in this particular case?

Syslog appliance

Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de-facto standard for logging events from distributed systems. A Syslog collector usually listens on UDP port 514.

Remote Desktop Protocol (RDP) is Microsoft's protocol for operating remote GUI connections to a Windows machine. RDP uses TCP port 3389.

An authentication, authorization, and accounting (AAA) server is the authentication server positioned within the local network. With AAA, the network access appliances do not store any authentication credentials.

A load balancer distributes client requests across server nodes in a farm or pool. A technician can use it when multiple servers provide the same function.

19
New cards

IT systems administrators for a company have been busy configuring a fleet of new smartphones for users. Instructions that the administrators follow to configure the devices include using a host address and entering a domain as an optional parameter. Which corporate email service does the company use?

Microsoft Exchange

To manually configure a Microsoft Exchange account, parameters such as a host address as well as the choice of whether to use transport layer security (TLS) are required. There is often also an optional field for a domain, but this is usually left blank.

A Microsoft digital identity is used to access cloud subscriptions for the Office productivity software suite and the OneDrive cloud storage service which are known as Microsoft 365. The configuration only uses a username and password.

With Google Workspace, a Google account grants access to Google's Workspace productivity software and other Google services. Configuration does not use a domain.

A Gmail account is a free account used with the Google Workspace landscape. Configuration does not use a domain.

20
New cards

A computer has multiple hard drives installed, but the second hard drive does not show up in Windows Explorer. What is a possible problem?

Cable or connector fault

Suppose the system boots, but a second fixed disk or removable drive does not appear in File Explorer. The technician should first check that the system has initialized and formatted with a partition structure and file system. If the system does not detect the disk by a configuration tool, such as Windows Disk Management, the technician will suspect that there is a hardware or cable/connector fault.

21
New cards

A tablet user connects a Bluetooth keyboard. What would be expected in the pairing process?

Enter a PIN.

When connecting devices with Bluetooth, a security measure of entering a PIN code is usually part of the process.

22
New cards

What would cause a central processing unit (CPU) to make only minor changes to the CPU internals that significantly improve performance and increase speed?

Multicore

Multicore is a design that allows each core to communicate with the others, allowing the processing tasks to be divided and assigned properly. The multicore acts as a single unit. This allows for it to be more efficient

23
New cards

A new internet service provider wants to deliver wireless connectivity to a large rural area. They also want to have very minimal interference with the service provided to their customers. What would be the suggested type of connection to deliver?

Licensed long-range fixed wireless

Licensed means that the operator purchases the exclusive right to use a frequency band within a given geographical area from the regulator, which is the Federal Communications Commission (FCC).

24
New cards

The software-defined networking (SDN) model consists of multiple layers for networking functions that can be accessed and managed via scripting and automation. Which of the following are layers within the SDN model? (Select all that apply.)

Control layer

Application layer

Infrastructure layer

The application layer applies business logic to decide how to prioritize and secure traffic and where to switch the traffic.

The control layer is the principal innovation of SDN as it interfaces between the application and infrastructure layers and acts as a controller for the automation of networking functions via APIs.

The infrastructure layer contains the devices (physical or virtual) that handle the actual forwarding (switching and routing) of traffic.

25
New cards

A company has a structured cable system installed by a technician. The technician uses a permanent cable that terminates to wall ports and patch panels. What is this mechanism called?

Punchdown block

A punchdown block is a mechanism used to terminate wires. A technician can use RJ45 to terminate twisted pair cabling for Ethernet.

26
New cards

A technician works on a faulty unit and needs to remove and replace a power supply unit (PSU) without opening the case and without the server losing power. What is this configuration?

Redundant power supply

A redundant power supply requires a compatible motherboard. This configuration is more common in server systems than on desktop PCs. Typically, each PSU plugs into a backplane on a server and is hot-swappable.

27
New cards

A user has intermittent problems with a program, and the technician has determined two courses of action. The first solution would take several hours of work and may resolve the problem. The second solution is to reimage the computer. What is the best solution?

After backing up the data, reimage the computer.

Business considerations need to be taken into account when resolving IT problems. However, if reimaging the computer has a high likelihood of fixing the problem, then this is the simplest, most time-effective solution.

28
New cards

A network engineer completes a site survey in an office for wireless connectivity. Given that the signal needs to get through several walls, what wireless frequency band would best suit the engineers' needs?

2.4 GHz

The 2.4 GHz standard is better at propagating through solid surfaces, thus giving it the most extended signal range.

The 5 GHz standard is less effective at penetrating solid surfaces and therefore does not support the maximum ranges achieved with 2.4 GHz standards.

29
New cards

A startup company does not have the funds or the time to buy and configure their computer resources, so they pay a service provider to deploy IT resources such as servers, load balancers, and storage components. What service is the startup company paying for?

Infrastructure as a service (IaaS)

servers, load balancers, and storage components

Infrastructure as a service (IaaS) is correct. IaaS is a means of provisioning IT hardware and the internet links they require, as needed from a service provider's data center.

30
New cards

A remote support technician is speaking with a new rural business client who has issues with their internet connection. As the remote technician gathers information for a local technician to visit the site, the user mentions that the local tech referred to their connection as the "local loop" and the "last mile." What device would the remote technician conclude that they use to connect to the internet?

DSL modem

A digital subscriber line (DSL) uses higher frequencies in copper telephone lines from the "last mile" or "local loop" of plain old telephone systems (POTS) as a communications channel. A DSL modem interfaces between telephone lines and local networking devices, providing routing and internet connection.

31
New cards

A large store chain is eager to reduce the cost of maintaining their servers but is unsure what the best method would be for their use case. The major requirements for the chosen solution are that the store chain needs to own its cloud infrastructure (without sharing with another organization) to maintain maximum privacy and security of the data. Which cloud computing option best meets the store chain's major requirements?

Private cloud

The private cloud meets the store chain's two major requirements because it gives organizations greater control over the privacy and security of their data stored in the cloud.

The public cloud is incorrect because there are risks regarding performance and security. The public cloud is a shared resource with other organizations, and a cloud service provider (CSP) runs it.

A hybrid cloud is incorrect because some cloud functions can be done via a public cloud, creating potential vulnerabilities to privacy and security.

Community cloud is incorrect because it requires the store chain to share a hosted private or a fully private cloud with other organizations.

32
New cards

A technician installs a type of computer memory into a laptop built using integrated circuits. What is this called?

SODIMM

Small outline DIMM (SODIMM) is the smaller form factor packaged for laptop RAM. The memory typically fits into slots that pop up at a 45-degree angle to allow the chips to be inserted or removed.

33
New cards

Cloud provisioning models have unique characteristics that make them better or worse than on-premises models depending on an organization's needs. Which characteristic refers to the per-use billing for resources consumed by the cloud?

Metered utilization

Metered utilization is the per-use billing for resources consumed by the cloud, making cloud offerings cheaper or more expensive for an organization, depending on their resource consumption.

34
New cards

What component can be used in a camera to hold digital image storage?

Memory card

Memory card is a form factor used in consumer digital imaging products, such as digital still and video cameras, and to expand smartphone and tablet storage.

35
New cards

What hardware on a client's computer allows a device and printer to connect over a network?

Print server

A print server is a hardware and firmware that allows client computers to connect directly over the network without going via a server computer.

36
New cards

While diagnosing a computer that is not powering on, the technician has established that the wall socket is working correctly since there is a fully plugged power cord. What would be a reasonable next step?

Use another power cable.

After the troubleshooting steps listed, the next reasonable step would be to replace the power cord with a known good cord. If there is a problem with the cord, and the computer boots with a known good cord, then that was the issue.

37
New cards

A company receives a new printer that needs assembly. What factors should the company consider when assembling it? (Select all that apply.)

Set up location

Correctly unboxing

Set up location should be used when deploying a new printer. The printer must have a power outlet and potentially a network data port. The printer needs to be accessible to its users.

Correctly unboxing should be used when setting up the printer. Many printers are heavy and may require two persons to lift safely. A printer should normally be left acclimate after removing the packaging materials.

38
New cards

A support desk technician must make a custom-length Ethernet patch cable for a user's desk setup. What tool do they need to create this cable? (Select all that apply.)

Snips

Crimper

Cable stripper

A crimper is a tool used to fix a male jack to a patch cord. The support technician would do this to both ends of the custom cable.

A cable stripper is a tool that would score the outer jacket just enough to remove it.

Snips are needed to cut the custom length cable to size and trim the ripcord and the start filler inside the cable. Sometimes snips are integrated on cable stripper tools and can be singular in function.

39
New cards

A large real estate agency has acquired a new service from their cloud provider called desktop as a service (DaaS). The service will enable the real estate agents to use virtual machines to load their desktops. Which option best describes the service the real estate agency has begun using?

VDI in the cloud

Virtual desktop infrastructure (VDI) in the cloud is often referred to as desktop as a service (DaaS) and enables users to load their desktops from a virtual machine hosted in the cloud.

40
New cards

A user complains that their monitor dims every day at 5:30pm. What could fix this problem?

Turn off the auto-dim feature.

Modern operating systems have settings for adaptive brightness, auto-brightness, or eye-saving features that reduce brightness and contrast. These can be turned on at a certain time of the day and can also be turned off if the user prefers.

41
New cards

A user's laptop screen is very dim. However, the image becomes bright when the technician attaches an external monitor. What is the problem?

Backlight

When a backlight fails, the screen will be very dim. The technician has verified that the graphics card is working by connecting the external monitor. Replacing a laptop backlight is generally a warranty repair.

42
New cards

A government organization wants to develop their own application to process information, but they do not want to be responsible for maintaining the hardware or the database platform that the application runs on. Additionally, the organization does not want to be burdened with maintaining the integrity and availability of the database platform because they will be very busy with other responsibilities. Which service would be best for the government organization to pursue?

Platform as a service (PaaS)

Platform as a service (PaaS) is correct. PaaS would provide IT hardware and the database platform on top of the hardware, but the customer must develop their app to run on top of the platform. The service provider will maintain the integrity and the availability of the platform for the customer.

43
New cards

What is a sign that the RTC battery is failing?

Inaccurate date/time

The real time clock (RTC) is part of the chipset that keeps track of the calendar date and time and runs on battery power. If the system date or time is wrong, it can indicate that the battery is failing.

44
New cards

What is the most important output voltage since it is the most heavily used?

12V

12V offers the maximum load of 33 and the maximum output of 396. The distribution refers to how much power generates over each rail. A rail is a wire providing current at a particular voltage.

45
New cards

5V offers the maximum load of 20 and the maximum output of 130. The output for 5V and 3.3V has a combined limit.

5V offers the maximum load of 20 and the maximum output of 130. The output for 5V and 3.3V has a combined limit.

46
New cards

2.2V is not an option but 3.3V offers the maximum load of 20 and the maximum output of 130. The 3.3V has the same output as 5V.

2.2V is not an option but 3.3V offers the maximum load of 20 and the maximum output of 130. The 3.3V has the same output as 5V.

47
New cards

5V (standby) has a maximum load of 2.5 and a maximum output of 12.5.

5V (standby) has a maximum load of 2.5 and a maximum output of 12.5.

48
New cards

What does the Microsoft Windows "Programs and Features" applet allow the user to manage?

Legacy software/OS

Legacy software applications can be managed through the Microsoft Windows "Programs and Features" applet.

49
New cards

An employee uses a device that gives them authentication to release the print job. What is this device?

Badging

Badging means the print device has a smart card reader. An employee must present an ID badge to the reader to start the print job.

50
New cards

A print server is a hardware and firmware that allows client computers to connect directly over the network without going via a server computer.

51
New cards

An audit log can identify printed documents that have gone missing or identify the unauthorized release of information.

52
New cards

A company can configure user authentication on a print share. User authentication means that the printer sharing server or print device will only accept print jobs from authorized user accounts.

53
New cards

What problem does a screensaver help prevent?

Display burn-in

When the same static image displays for an extended period, it can damage the monitor's picture elements, causing a ghost image to "burn" permanently onto the display. An animated screensaver can help prevent this problem.

54
New cards

If the output resolution does not match the display device's native resolution, then the image will appear fuzzy.

55
New cards

Incorrect settings or a failed backlight can cause a dim image. Adjusting the brightness and contrast of a display can help fix a dim image.

56
New cards

A flat-panel monitor defect may cause individual pixels to be "stuck" or "dead." If a digital display panel has stuck pixels, and the panel is not replaceable under warranty, then software utilities are available to reactivate pixels.

57
New cards

What measures the PSU to meet the combined power requirements of the PC's components?

Wattage rating

The wattage rating measures the power supply unit's (PSU's) output capability. Depending on the model, CPUs can range from 17 W to over 100 W. The power output is not the same as the PSU's power from grid power.

58
New cards

Modular power supply

A modular power supply has power connector cables that are detachable from the unit.

59
New cards

Heat sink

A heat sink is a block of copper aluminum with fins. The fins expose a larger surface area to the air around the component to achieve a cooling effect by convection.

60
New cards

Redundant power supply

A redundant power supply requires a compatible motherboard. This configuration is more common in server systems than on desktop PCs. Typically, each PSU plugs into a backplane on a server and is hot-swappable.

61
New cards

A company looks into security controls for an entryway into a building. The chosen solution will use a chip for data transmission and another chip for receiving data over the air. Which solution uses this technique?

Near-field

Near-field communication (NFC) technology allows very short-range data transmission (less than 1 foot) to activate a receiver chip in the contactless reader. For example, a smart proximity card uses NFC.

62
New cards

Biometrics

Biometrics refers to authentication while using a person's traits. Biometrics include fingerprint readers and voice recognition.

63
New cards

Keypad

A keypad is a hardware device that uses a combination of digits and a passcode for entry access.

64
New cards

Retina scanner

A retina scanner is a biometric authentication device that uses a scan of an individual's eye to allow access to a location or system. The individual's retina pattern must match the biometric authentication device to gain access to a location or system.

65
New cards

Least to Most Volitile drives

mSATA

2.5" HDD

USB Stick

RAM

CPU Cache

66
New cards

The company uses Google Workspace for employee accounts. The user would select Google to add an account to the company cell phone.

The company uses Google Workspace for employee accounts. The user would select Google to add an account to the company cell phone.

67
New cards

Google account for employees is similar to their personal email for ease of use, and in this case, it would bejdoe@company123abc.com

Google account for employees is similar to their personal email for ease of use, and in this case, it would bejdoe@company123abc.com

68
New cards

Google Workspace can utilize the company's domain name for personalized email addressing.

Google Workspace can utilize the company's domain name for personalized email addressing.

69
New cards

Multi-Factor Authentication (MFA) is when multiple credentials are required to authenticate.

Multi-Factor Authentication (MFA) is when multiple credentials are required to authenticate.

70
New cards

Multi-Factor Authentication (MFA) is when multiple credentials are required to authenticate.

Multi-Factor Authentication (MFA) is when multiple credentials are required to authenticate.

71
New cards

Each cloud platform has its own services that can synchronize with the company's cell phone. In this case, the applicable synchronization options

related to Google are Calendar, Contacts, Drive, and Gmail

Each cloud platform has its own services that can synchronize with the company's cell phone. In this case, the applicable synchronization options

related to Google are Calendar, Contacts, Drive, and Gmail

72
New cards

Although Google Fit Data is a Google option, it is an option not required for the employee's role.

Although Google Fit Data is a Google option, it is an option not required for the employee's role.

73
New cards

The location mode of the Android cell phone should be set to high accuracy as it will accurately locate the company cell phone for business and

security purposes.

The location mode of the Android cell phone should be set to high accuracy as it will accurately locate the company cell phone for business and

security purposes.

74
New cards

When setting up the Wi-Fi hotspot for this cell phone, the only option required is to enable the "Mobile Wi-Fi Hotspot" option. The company laptop

can connect to the cell phone hotspot like a wireless network router and does not need to use a USB connection. However, Bluetooth support will

help transfer photos from cell phone to laptop wirelessly

When setting up the Wi-Fi hotspot for this cell phone, the only option required is to enable the "Mobile Wi-Fi Hotspot" option. The company laptop

can connect to the cell phone hotspot like a wireless network router and does not need to use a USB connection. However, Bluetooth support will

help transfer photos from cell phone to laptop wirelessly

75
New cards

Per security best practices, select Wi-Fi Protected Access 2—Pre-Shared-Key (WPA2-PSK)

Per security best practices, select Wi-Fi Protected Access 2—Pre-Shared-Key (WPA2-PSK)

76
New cards

for the highest security option and use a complex password, such as T078ah#!$5d3P5LA.

for the highest security option and use a complex password, such as T078ah#!$5d3P5LA.

77
New cards

Image appears very dim

Adjust brightness control

78
New cards

Color glitches. Purple or green horizontal lines

Check or replace cabling

79
New cards

Stuck or dead pixels

Try to reactivate via touch or software

80
New cards

Image burn-in creating ghosted elements

Use automatic screensavers

81
New cards

Artwork color output different than displays

Calibrate color to output device.

82
New cards

No image is displayed

Verify source in OSD menu

83
New cards

RJ45 NIC Card

PCI

84
New cards

PCIe x16 (v1.x)

Video Card

85
New cards

Wireless NIC Card

PCIe x1 (v1.x)

86
New cards

Sound Card

PCI

87
New cards

COMPONENTS NOT INTEGRATED INTO THE MOTHERBOARD

SOLID STATE DRIVE SSD

GUI

88
New cards

The RJ45 card in this scenario is connected to the traditional PCI slot.

This can be identified by segments in the connector pins on the bottom side of the card.

A PCI slot has a small section, a break, and then a large section on it's connector pins. The PCI has a slightly larger initial segment before the long portion on the connector pin compared to a PCIe x16

The video card (or graphics adapter), which uses a PCIe x16 (v1.x) expansion card, generates a signal to drive a motor or projector.

The PCIe 16 is differentiated by the SMALLEST INITIAL SEGMENT OF CONNECTOR PINS, followed by a break, THE THE LONG PORTION OF THE 16-LANE CONFIGURATION.

PCIe x16 can be identified by the SLIGHTLY SMALLER INITIAL SECTION compared to the traditional PCI card

89
New cards

WIRELESS NIC CARD

PCIe x1 (v1.) expansion card.

has a Wi-Fi adapter added instead of RJ45 ports and connects to a wireless network.

The PCIe x1 connector pins can be identified as having A SMALL SEGMENT OF CONNECTOR PINS, followed by a break, and EVEN SMALLER SET OF CONNETOR PINS following.

90
New cards

Audo Playback via speakers or headphones connected to a sound card via an audio jack.

pci expansion connector pins on the bottom.

Like the RJ45 expansion card, there is A SMALL SEGMENT, FOLLOWED BY A BREAK, and then a large portion of connector pins.

SIZE OF THE CONNECTO PINS BEFORE THE BREAK

PCI cards have slightly larger set of connector pins before the break than a pcie card.

91
New cards

INTEGRATED MOTHERBOARD

CPU SOCKET

CMOS

NORTHBRIDGE

FIRMWARE

- NOT -

SOLID STATE DRIVE

GUI

92
New cards

The TIA/EIA-568-C Commercial Building Telecommunications Cabling Standards have specific recommendations for health care facilities with Power over Ethernet (PoE) 802.3bt installations, and for running distribution system cable to wireless access points. Which Cat does this refer to?

Cat 6A

Cat 6A is recommended for health care facilities since it supports 10 Gbps over 100m, but the cable is bulkier and heavier than Cat 5e and Cat 6. The installation requirements are more stringent.

93
New cards

cat 5

Cat 5 cable supports the older 100 Mbps fast Ethernet standard. It is no longer commercially available, so a technician will need to rewire the network cable with Cat 5 to support Gigabit Ethernet.

94
New cards

CAT 5e

Cat 5e cable supports Gigabit Ethernet links for client computers but can now opt to install Cat 6 cable.

95
New cards

Cat 6

Cat 6 cable is more reliable than Cat 5e and supports 10 Gbps but over reduced range.

96
New cards

A network administrator is looking at a user's box which seems to have intermittent connectivity issues. Which of the following should they do first?

Check the physical cords.

The first step in resolving a no or intermittent connectivity issue is to check that the patch cords are properly terminated and connected to the network ports.

97
New cards

What tool can help diagnose extended read/write times?

SMART

The fixed disk self-diagnostic program called Self-Monitoring, Analysis, and Reporting Technology (SMART) can detect if a drive is close to failure.

98
New cards

This protocol provisions secure websites and services and uses port 443.

HyperText Transfer Protocol Secure

HyperText Transfer Protocol Secure (HTTPS) delivers secure websites and services and uses TCP port 443. Data encrypts over this connection between the client and server.

99
New cards

A user reports that their PC can not access the internet and internal network resources. The user also reports that the internet is intermittent throughout the day. A technician confirmed that the Ethernet cable is connected securely to the PC and the wall port. What tool should an engineer bring with them to investigate this further?

Cable tester

A cable tester is a pair of devices that attach to each end of a cable. It tests a patch cord or connects via patch cords to a wall port and patch panel port to test the permanent link.

100
New cards

A network technician installs wireless access points (APs) in an office and would like to use the power over Ethernet (PoE) features available. The specific model of APs available requires a draw of 20W with a minimum current of 450 mA. Which Institute of Electrical and Electronics Engineers (IEEE) PoE standard best suits this requirement?

802.3at

802.3at (PoE+) allows powered devices to draw up to about

25 W,

with a maximum current of

600 mA.