knowt logo

1

1. In which situation would an ESD strike potentially cause harm to the PC?

Powered By VDO.AI

  • when replacing a mechanical hard drive with an M.2 SSD

  • when installing an additional display in a workplace cubicle

  • when using a grounded mat and working on a computer on an ungrounded workbench

  • when installing a dual-voltage power supply

Other case

  • when installing an additional display in a workplace cubicle

  • when replacing high voltage laser printer parts

  • while attaching speakers to a surround sound card

  • when installing a UPS

  • when installing RAM

Explanation: Minimize the risk of electrostatic discharge. Whenever 2 things touch, there is always an exchange of electrons at the atomic level. Most of the time, this exchange is so negligible that you don’t notice it, but even tiny bolts of static electricity can fry your RAM modules. In fact, any electrical component in your computer has a chance to be damaged by static electricity.

2. A person has started a new technical job. In which situation would ESD be an issue?

  • when installing a processor

  • when using a grounded mat and working on a computer on an ungrounded workbench

  • when installing a dual-voltage power supply

  • while exchanging one laptop AC adapter with one that is not from the original equipment manufacturer

Other case

  • when installing RAM

  • when installing an additional display in a workplace cubicle

  • when replacing high voltage laser printer parts

  • while attaching speakers to a surround sound card

3. A technician is about to begin preventive maintenance on a company PC. In which situation would ESD be an issue?

  • when replacing a motherboard

  • while attaching speakers to a surround sound card

  • when using a grounded mat and working on a computer on an ungrounded workbench

  • when installing a dual-voltage power supply

4. An instructor has given a student an assignment to assemble a PC. In which situation should the student be aware that ESD is an issue?

  • when installing RAM

  • when working in a corporate environment that has carpet installed under tower PCs

  • when using a grounded mat and working on a computer on an ungrounded workbench

  • when installing a dual-voltage power supply

Other case:

  • when walking across a carpeted area and then touching a keyboard that is attached to a tower PC

  • when installing a UPS

  • when working in a corporate environment that has carpet installed under tower PCs

  • when replacing a mechanical hard drive with an M.2 SSD

5. What two motherboard components control the system boot operations? (Choose two.)

  • BIOS chip

  • UEFI chip

  • Northbridge chip

  • Southbridge chip

  • CPU

Explanation: System boot services are provided by the motherboard BIOS and UEFI chips.

6. A technician is upgrading an ATX motherboard with another ATX motherboard. Which component might be affected by this and need to be upgraded and bought as an additional purchase?

  • BIOS

  • chipset

  • CMOS battery

  • CPU

  • PCIe adapter

Explanation: The motherboard, CPU, and power supply must be compatible.

7. A customer has requested that a PC be built that will support eSATA. Which component should be checked to be sure that this feature is supported?

  • CPU

  • chipset

  • hard disk

  • RAM module

Explanation: The chipset on a motherboard consists of integrated circuits that control how system hardware interacts with the CPU and motherboard. It also provides the capability and features needed, such as the maximum memory supported on the motherboard, multiple USB ports, eSATA connections, surround sound, and video.

8. Which memory module used to hold instructions for booting a PC and loading the OS, but is still used on adapters even though the memory contents cannot be changed?

  • RAM

  • ROM

  • cache

  • main memory

Explanation: ROM stands for read-only memory.

9. What is a characteristic of DDR SDRAM?

  • It transfers data twice per clock cycle compared to once per clock cycle for SDRAM.

  • DDR SDRAM modules have double the number of pins of SDRAM memory modules.

  • It is dynamic memory whereas SDRAM is static memory.

  • It operates at double the voltage of SDRAM memory.

Explanation: DDR SDRAM transfers data twice per clock cycle, whereas SDRAM transfers data once each clock cycle. Both DDR SDRAM and SDRAM are forms of dynamic memory. The difference in data transfer rate between DDR SDRAM and SDRAM is not determined by the number of pins, nor the operating voltage.

10. What are two safety hazards when dealing with laser printers? (Choose two.)

  • high voltage

  • hot components

  • heavy metals

  • proprietary power bricks

  • unwieldy card cages

Explanation: Laser printers require high voltage when initially powered on and to charge the drum in preparation for writing data to the drum. This high voltage requirement is why most laser printers are not normally connected to a UPS. A laser printer also has a fuser assembly used to apply heat and pressure to the toner to permanently attach it to the paper. The laser printer must be unplugged and the fuser assembly must be allowed to cool before working inside the printer.

11. Which component requires a technician to install screws externally through the PC case?

  • RAM

  • CPU

  • motherboard

  • power supply

Explanation: The power supply commonly has four screws that attach from outside the case through case holes into screw holes on the power supply.

12. A technician is installing an internal HDD. To which motherboard connector will the technician connect the data cable?

  • ATX

  • PCI

  • PWR_SW

  • SATA

Explanation: Internal hard drives are commonly SATA drives that have a data cable that extends from the drive to a motherboard SATA connector..

13. Refer to the exhibit. A technician has been asked to install a video card. Which section of the motherboard will the technician use to install the card?

  • section A

  • section B

  • section C

  • section D

Explanation: Graphics cards, also known as video cards, are installed into a PCIe x16 expansion slot. The expansion slots on a motherboard are located near the motherboard ports.

14. When a PC is being assembled, what component is connected to the motherboard with a SATA cable?

  • the optical drive

  • the network interface card

  • the video card

  • the power supply

Explanation: SATA cables, or serial ATA cables, are used to carry data from drives to the motherboard.

15. A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?

  • The computer automatically boots into Safe Mode and displays a warning on the screen.

  • The screen flashes with a red background and displays a warning message.

  • The computer emits a pattern of beeps indicating the failing device.

  • The computer returns an error message that indicates the I/O address of the failing device.

Explanation: Beep codes are a result of POST and these vary between computer vendors based on what BIOS is installed.

16. Which three features can be configured in the BIOS settings to secure a computer? (Choose three.)

  • MAC filtering

  • drive encryption

  • TPM

  • file encryption

  • TKIP key

  • passwords

Explanation: Passwords, drive encryption, and TPM are BIOS configurable security features. File encryption, TKIP key, and MAC filtering are security features not configured within BIOS.

17. What is the purpose of RAID adapters?

  • to allow older PCI technology expansion slots to be used

  • to provide enhanced audio and graphic capabilities

  • to connect multiple storage devices for redundancy or speed

  • to connect peripheral devices to a PC to improve performance

Explanation: RAID 0 allows “striping” or writing data across two hard drives, but provides no redundancy. The other RAID versions provide redundancy.

18. When a new motherboard is being installed, between which two components must thermal compound be applied? (Choose two.)

  • CPU

  • RAM

  • chassis

  • heat sink

  • chipset

  • motherboard

Explanation: You must apply thermal compound between the new CPU and the heat sink/fan assembly to avoid overheating the CPU. The thermal paste helps to conduct heat from the CPU to the heat sink.

19. What is the purpose of a Safety Data Sheet?

  • to specify procedures for dealing with potentially hazardous materials

  • to specify procedures in designing and building common computer systems

  • to specify procedures for the operation of sensitive components and prevention of electrostatic discharge

  • to specify procedures in the use of humidity control and prevention of moisture damage

Explanation: A Safety Data Sheet is a fact sheet that summarizes information about material identification, including hazardous ingredients that can affect personal health, fire hazards, and first-aid requirements. The SDS explains how to dispose of potentially hazardous materials in the safest manner.

20. Which negative environmental factor does cleaning the inside of a computer reduce?

  • dust

  • EMI

  • rust

  • ESD

Explanation: Accumulated dust inside the computer can prevent the flow of air and can hinder cooling.

21. What is a recommended procedure to follow when cleaning computer components?

  • Remove the CPU before cleaning.

  • Blow compressed air on cooling fans so that they will spin when dust is being removed.

  • Use window cleaner on LCD screens.

  • Hold cans of compressed air upright while spraying.

Explanation: When using compressed air, keep the can upright to prevent the fluid from leaking onto computer components.

22. On the production floor, a furniture plant has laptops for process monitoring and reporting. The production floor environment is around 80 degrees Fahrenheit (27 degrees Celsius). The humidity level is fairly high around 70 percent. Fans are mounted in the ceiling for air circulation. Wood dust is prevalent. Which condition is most likely to adversely affect a laptop that is used in this environment?

  • the temperature

  • the humidity

  • the air flow

  • the dust

Explanation: Most laptops are created to be tolerant of a wide range of humidity levels and room temperatures. Dust, however, can cause overheating and failures.

23. After a technician tests a theory of probable causes, what two actions should the technician take if the testing did not identify an exact cause? (Choose two.)

  • Establish a new theory of probable causes.

  • Randomly replace components one at a time until the problem is solved.

  • Document each test tried that did not correct the problem.

  • Verify full system functionality.

  • Test all remaining possible causes starting with the most complex.

Explanation: If the exact cause of the problem has not been determined after you have tested all your theories, establish a new theory of probable causes and test it.

24. What would happen if a PC that contains a power supply that does not automatically adjust for input voltage is set to 230 volts and attaches to an outlet in the United States?

  • The power supply would explode.

  • The PC would not turn on.

  • The PC would display an error code.

  • The PC would emit a series of beeps.

Explanation: In the United States, the wall outlet electrical power is standardized at 120 volts AC.

25. Which type of network spans a single building or campus and provides services and applications to people within a common organizational structure?

  • PAN

  • WAN

  • LAN

  • MAN

Explanation: A LAN is smaller or more contained than a WAN, which can span several cities. A MAN is usually contained in one city. A PAN is a very small network of devices that are located in close proximity to one another, usually within range of a single person.

26. What are two types of wired high-speed Internet connections? (Choose two.)

  • cable

  • satellite

  • cellular

  • DSL

  • dial-up

Explanation: Cable and DSL Internet technologies both use physical cabling to provide an Internet connection to a residence or a small business. Although dial-up is a wired technology, it does not provide a high-speed Internet connection. Satellite and cellular connections provide a wireless Internet connection.

27. In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.)

  • when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated

  • when a faster delivery mechanism is needed

  • when delivery overhead is not an issue

  • when applications do not need to guarantee delivery of the data

  • when destination port numbers are dynamic

Explanation: UDP is a very simple transport layer protocol that does not guarantee delivery. Devices on both ends of the conversation are not required to keep track of the conversation. UDP is used as the transport protocol for applications that need a speedy, best-effort delivery.

28. The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?

  • APIPA

  • DHCP

  • DNS

  • ICMP

Explanation: In networks with more than a few hosts, DHCP simplifies the addressing process. A DHCP server automatically assigns host IP addresses.

29. A company is looking for a next-generation firewall that provides VPN functionality, IDS/IPS functionality, and DoS/DDoS protection. Which device would be best suited for this task?

  • multipurpose device

  • router

  • endpoint management server

  • UTM

  • TPM

Explanation: A universal threat management (UTM) device is a security device that can provide firewall, IDS/IPS, and proxy server functionality as well as email filtering and DoS/DDoS protection.

30. A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?

  • static IP addressing with incomplete information

  • interference from surrounding devices

  • reduced computer power supply output

  • unreachable DHCP server

Explanation: When a PC does not have a static IP address or cannot pick one up from a DHCP server, Windows will automatically assign the PC an IP address using APIPA, that uses the range of addresses 169.254.0.0 to 169.254.255.255.

31. What three values must be added to the IPv4 properties of a NIC in order for a computer to have basic connectivity with the network? (Choose three.)

  • subnet mask

  • DHCP server address

  • domain name

  • default gateway

  • speed and duplex

  • IP address

Explanation: The IP address, subnet mask, and default gateway address values should be added to the NIC properties in order for the computer to have basic network connectivity. This can be done either statically or dynamically with DHCP. An additional value that should be present if the computer is to be used to connect to the Internet is the DNS server value. A computer automatically attempts to locate a DHCP server if configured to do so. A DHCP server address is not used. Finally, NAT is configured on a router, not on a computer host, and speed and duplex settings are NIC hardware settings and not IPv4 properties of the NIC.

32. A device has an IPv6 address of 2001:0DB8:75a3:0214:0607aa10:ba01 /64. What is the host identifier of the device?

  • 2001:0DB8:75a3

  • 0607aa10:ba01

  • 2001:0DB8

  • ba01

Explanation: An IPv6 address is made up of 128 bits that are represented as eight blocks of four hexadecimal digits that are called hextets. Because each hexadecimal digit represents four bits, each hextet represents 16 bits. The /64 network prefix indicates that the first 64 bits, or first four hextets, represent the network portion of the address. Because there are 128 bits in an IPv6 address, this leaves the last 64 bits, or last four hextets, to represent the host identifier. The value for the last four hextets is 0607aa10:ba01.

33. How can a user prevent specific applications from accessing a Windows computer over a network?

  • Enable MAC address filtering.

  • Disable automatic IP address assignment.

  • Block specific TCP or UDP ports in Windows Firewall.

  • Change default usernames and passwords.

Explanation: Network applications have specific TCP or UDP ports that can be left open or blocked in Windows Firewall. Disabling automatic IP address assignment may result in the computer not being able to connect to the network at all. Enabling MAC address filtering is not possible in Windows and would only block specific network hosts, not applications. Changing default usernames and passwords will secure the computer from unauthorized users, not from applications.

34. Place the six stages of the troubleshooting process in the correct order.

35. A technician has been asked to configure Wi-Fi calling on a corporate mobile device. In which situation would this feature be most advantageous?

  • in an emergency situation and no minutes are left on the phone

  • when sending WEA updates

  • when in an area with poor cellular coverage

  • in a store transaction making a payment using the mobile device

Explanation: Wi-Fi calling is not supported on all mobile devices, but when enabled, it uses a Wi-Fi network to make voice calls. It is very useful in areas with poor cellular coverage.

36. Which statement is true about laptops?

  • Most of the internal components that are designed for laptops cannot be used for desktops.

  • Laptop motherboards have standard form factors.

  • Laptops use fewer components than desktops use.

  • Laptop CPUs do not use cooling devices.

Explanation: Laptop internal components are designed with a small form factor and are proprietary. Although a laptop CPU uses less power, it needs a cooling device (heat sink and fan).

37. Which standard provides a bridge between laptop hardware and the operating system and a way for technicians to configure power management schemes to get the best performance?

  • ACPI

  • PCIe

  • Bluetooth

  • 802.11

Explanation: The Advanced Configuration and Power Interface (ACPI) standard has specific sleep states that can be assigned to a device in order to conserve power. PCIe is a motherboard interface. Bluetooth and 802.11 are wireless standards.

38. Which two laptop components are considered replaceable by the customer. (Choose two.)

  • battery

  • integrated card reader

  • mini-PCIe module

  • RAM

  • display

Explanation: Customer-replaceable units (CRUs) do not typically require a lot of technical skill to replace. RAM and a battery are two examples of a CRU. In contrast, a field-replaceable unit (FRU), such as a display, motherboard, keyboard, or touchpad, commonly requires a technician to install.

39. A user wants to synchronize some apps, movies, music, and ebooks between mobile devices. What are the two types of connections used to synchronize this type of data? (Choose two.)

  • cellular

  • Wi-Fi

  • USB

  • Bluetooth

  • NFC

Explanation: Because of the amount of data transferred during video synchronization, synchronization occurs through either a Wi-Fi connection or a wired USB connection.

40. A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)

  • Inkjet printers are less expensive as an initial purchase than laser printers.

  • A laser printer is significantly slower than an inkjet printer.

  • Both laser and inkjet printers produce poor quality images.

  • The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.

  • Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.

Explanation: Inkjet printers are easy to use and usually less expensive than laser printers. Some advantages of an inkjet printer are initial low cost, high resolution, and they are quick to warm up. Some disadvantages of an inkjet printer are that the nozzles are prone to clogging, ink cartridges can be expensive, and the ink is wet for a few seconds after printing.

A laser printer is a high-quality, fast printer that uses a laser beam to create an image. Some advantages of a laser printer are low cost per page, high ppm, high capacity, and prints come out dry. Some disadvantages of a laser printer are high cost of startup, and that toner cartridges can be expensive.

41. A user chooses the collate option and prints two copies of a three-page document. What is the order in which the pages are printed?

  • pages 1, 1, 2, 2, 3, 3

  • pages 1, 2, 3, 1, 2, 3

  • pages 3, 3, 2, 2, 1, 1

  • pages 3, 2, 1, 3, 2, 1

Explanation: The collate feature enables a printer to sort multiple copies of a document with the proper page order for each copy.

42. A color laser printer is used to print documents with graphics and photographs. Users are complaining that printing takes too long. Which component of the printer should be upgraded in order to improve printing performance?

  • CPU

  • RAM

  • hard drive

  • toner cartridges

Explanation: Because documents with graphics and photographs generate much larger print jobs, the printing process will run more efficiently if the printer memory is adequate to store the entire job before the job starts.

43. What service is available for Windows to provide software print server services to MAC OS clients?

  • Bonjour Print Server

  • Print to XPS

  • Apple AirPort Extreme

  • Apple AirPrint

Explanation: Bonjour Printer Server from Apple comes with MAC OS X and is a free download for Windows users to be used as a software print server. Airport Extreme, a dedicated print server, and a PC with a printer attached serving as a print server are all hardware print sharing solutions.

44. Which three components are typically found in laser printer maintenance kits? (Choose three.)

  • fuser assembly

  • primary corona

  • pickup rollers

  • transfer rollers

  • secondary corona

  • paper trays

Explanation: Laser printer maintenance kits typically contain components that wear and can be installed with minimal disassembly of the printer. Corona wires are internal components that would require a trained technician to replace. Paper trays are components that are not typically replaced during maintenance, but would be replaced any time if damaged.

45. A technician is installing a new printer in a cool, damp environment. After the printer cabling is done, and the software and print driver are installed, the printer test page jams. What is the most likely cause of the print failure?

  • incorrect printer driver

  • too much humidity

  • not enough printer memory

  • loose printer cables

Explanation: Paper jams are commonly caused when the paper being used is dirty, affected by humidity, or is the wrong type of paper for the printer.

46. A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?

  • BYOD

  • virtualization

  • maintaining communication integrity

  • online collaboration

Explanation: Virtualization technology can run several different operating systems in parallel on a single CPU.

47. How does virtualization help with disaster recovery within a data center?

  • Power is always provided.

  • Less energy is consumed.

  • Server provisioning is faster.

  • Hardware does not have to be identical.

Explanation: Disaster recovery is how a company goes about accessing applications, data, and the hardware that might be affected during a disaster. Virtualization provides hardware independence which means the disaster recovery site does not have to have the exact equipment as the equipment in production. Server provisioning is relevant when a server is built for the first time. Although data centers do have backup generators, the entire data center is designed for disaster recovery. One particular data center could never guarantee that the data center itself would never be without power.

48. Which two hypervisors are suitable to support virtual machines in a data center? (Choose two.)

  • Virtual PC

  • VMware Fusion

  • VMware ESX/ESXi

  • Oracle VM VirtualBox

  • Microsoft Hyper-V 2012

Explanation: VMware ESX/ESXi and Microsoft Hyper-V 2012 are Type 1 hypervisors that have direct access to the hardware resources. Type 1 hypervisors are more efficient than hosted architectures, and enable greater scalability, performance, and robustness. They are used to support enterprise VMs in data centers. Oracle VM VirtualBox, VMware Fusion, and Microsoft Virtual PC are host based Type 2 hypervisors.

49. A web designer accesses a company Windows 10 computer remotely. The designer often needs to simultaneously open multiple applications, such as a web page editor and a graphics editor. Rather than opening them in multiple windows, the designer opens them in different virtual desktops. What technology is being used by the designer?

  • virtual reality

  • Windows Virtual Desktop

  • cloud-based applications

  • virtual desktop infrastructure

Explanation: Windows 10 has a feature called Windows Virtual Desktop (WVD). A user can create multiple virtual desktops and navigate among them easily. This feature reduces the clutter on a desktop of Windows caused by opening multiple applications. With WVD, a user can have each application open in a separate desktop.

50. Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?

  • PaaS

  • IaaS

  • SaaS

  • ITaaS

1

1. In which situation would an ESD strike potentially cause harm to the PC?

Powered By VDO.AI

  • when replacing a mechanical hard drive with an M.2 SSD

  • when installing an additional display in a workplace cubicle

  • when using a grounded mat and working on a computer on an ungrounded workbench

  • when installing a dual-voltage power supply

Other case

  • when installing an additional display in a workplace cubicle

  • when replacing high voltage laser printer parts

  • while attaching speakers to a surround sound card

  • when installing a UPS

  • when installing RAM

Explanation: Minimize the risk of electrostatic discharge. Whenever 2 things touch, there is always an exchange of electrons at the atomic level. Most of the time, this exchange is so negligible that you don’t notice it, but even tiny bolts of static electricity can fry your RAM modules. In fact, any electrical component in your computer has a chance to be damaged by static electricity.

2. A person has started a new technical job. In which situation would ESD be an issue?

  • when installing a processor

  • when using a grounded mat and working on a computer on an ungrounded workbench

  • when installing a dual-voltage power supply

  • while exchanging one laptop AC adapter with one that is not from the original equipment manufacturer

Other case

  • when installing RAM

  • when installing an additional display in a workplace cubicle

  • when replacing high voltage laser printer parts

  • while attaching speakers to a surround sound card

3. A technician is about to begin preventive maintenance on a company PC. In which situation would ESD be an issue?

  • when replacing a motherboard

  • while attaching speakers to a surround sound card

  • when using a grounded mat and working on a computer on an ungrounded workbench

  • when installing a dual-voltage power supply

4. An instructor has given a student an assignment to assemble a PC. In which situation should the student be aware that ESD is an issue?

  • when installing RAM

  • when working in a corporate environment that has carpet installed under tower PCs

  • when using a grounded mat and working on a computer on an ungrounded workbench

  • when installing a dual-voltage power supply

Other case:

  • when walking across a carpeted area and then touching a keyboard that is attached to a tower PC

  • when installing a UPS

  • when working in a corporate environment that has carpet installed under tower PCs

  • when replacing a mechanical hard drive with an M.2 SSD

5. What two motherboard components control the system boot operations? (Choose two.)

  • BIOS chip

  • UEFI chip

  • Northbridge chip

  • Southbridge chip

  • CPU

Explanation: System boot services are provided by the motherboard BIOS and UEFI chips.

6. A technician is upgrading an ATX motherboard with another ATX motherboard. Which component might be affected by this and need to be upgraded and bought as an additional purchase?

  • BIOS

  • chipset

  • CMOS battery

  • CPU

  • PCIe adapter

Explanation: The motherboard, CPU, and power supply must be compatible.

7. A customer has requested that a PC be built that will support eSATA. Which component should be checked to be sure that this feature is supported?

  • CPU

  • chipset

  • hard disk

  • RAM module

Explanation: The chipset on a motherboard consists of integrated circuits that control how system hardware interacts with the CPU and motherboard. It also provides the capability and features needed, such as the maximum memory supported on the motherboard, multiple USB ports, eSATA connections, surround sound, and video.

8. Which memory module used to hold instructions for booting a PC and loading the OS, but is still used on adapters even though the memory contents cannot be changed?

  • RAM

  • ROM

  • cache

  • main memory

Explanation: ROM stands for read-only memory.

9. What is a characteristic of DDR SDRAM?

  • It transfers data twice per clock cycle compared to once per clock cycle for SDRAM.

  • DDR SDRAM modules have double the number of pins of SDRAM memory modules.

  • It is dynamic memory whereas SDRAM is static memory.

  • It operates at double the voltage of SDRAM memory.

Explanation: DDR SDRAM transfers data twice per clock cycle, whereas SDRAM transfers data once each clock cycle. Both DDR SDRAM and SDRAM are forms of dynamic memory. The difference in data transfer rate between DDR SDRAM and SDRAM is not determined by the number of pins, nor the operating voltage.

10. What are two safety hazards when dealing with laser printers? (Choose two.)

  • high voltage

  • hot components

  • heavy metals

  • proprietary power bricks

  • unwieldy card cages

Explanation: Laser printers require high voltage when initially powered on and to charge the drum in preparation for writing data to the drum. This high voltage requirement is why most laser printers are not normally connected to a UPS. A laser printer also has a fuser assembly used to apply heat and pressure to the toner to permanently attach it to the paper. The laser printer must be unplugged and the fuser assembly must be allowed to cool before working inside the printer.

11. Which component requires a technician to install screws externally through the PC case?

  • RAM

  • CPU

  • motherboard

  • power supply

Explanation: The power supply commonly has four screws that attach from outside the case through case holes into screw holes on the power supply.

12. A technician is installing an internal HDD. To which motherboard connector will the technician connect the data cable?

  • ATX

  • PCI

  • PWR_SW

  • SATA

Explanation: Internal hard drives are commonly SATA drives that have a data cable that extends from the drive to a motherboard SATA connector..

13. Refer to the exhibit. A technician has been asked to install a video card. Which section of the motherboard will the technician use to install the card?

  • section A

  • section B

  • section C

  • section D

Explanation: Graphics cards, also known as video cards, are installed into a PCIe x16 expansion slot. The expansion slots on a motherboard are located near the motherboard ports.

14. When a PC is being assembled, what component is connected to the motherboard with a SATA cable?

  • the optical drive

  • the network interface card

  • the video card

  • the power supply

Explanation: SATA cables, or serial ATA cables, are used to carry data from drives to the motherboard.

15. A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?

  • The computer automatically boots into Safe Mode and displays a warning on the screen.

  • The screen flashes with a red background and displays a warning message.

  • The computer emits a pattern of beeps indicating the failing device.

  • The computer returns an error message that indicates the I/O address of the failing device.

Explanation: Beep codes are a result of POST and these vary between computer vendors based on what BIOS is installed.

16. Which three features can be configured in the BIOS settings to secure a computer? (Choose three.)

  • MAC filtering

  • drive encryption

  • TPM

  • file encryption

  • TKIP key

  • passwords

Explanation: Passwords, drive encryption, and TPM are BIOS configurable security features. File encryption, TKIP key, and MAC filtering are security features not configured within BIOS.

17. What is the purpose of RAID adapters?

  • to allow older PCI technology expansion slots to be used

  • to provide enhanced audio and graphic capabilities

  • to connect multiple storage devices for redundancy or speed

  • to connect peripheral devices to a PC to improve performance

Explanation: RAID 0 allows “striping” or writing data across two hard drives, but provides no redundancy. The other RAID versions provide redundancy.

18. When a new motherboard is being installed, between which two components must thermal compound be applied? (Choose two.)

  • CPU

  • RAM

  • chassis

  • heat sink

  • chipset

  • motherboard

Explanation: You must apply thermal compound between the new CPU and the heat sink/fan assembly to avoid overheating the CPU. The thermal paste helps to conduct heat from the CPU to the heat sink.

19. What is the purpose of a Safety Data Sheet?

  • to specify procedures for dealing with potentially hazardous materials

  • to specify procedures in designing and building common computer systems

  • to specify procedures for the operation of sensitive components and prevention of electrostatic discharge

  • to specify procedures in the use of humidity control and prevention of moisture damage

Explanation: A Safety Data Sheet is a fact sheet that summarizes information about material identification, including hazardous ingredients that can affect personal health, fire hazards, and first-aid requirements. The SDS explains how to dispose of potentially hazardous materials in the safest manner.

20. Which negative environmental factor does cleaning the inside of a computer reduce?

  • dust

  • EMI

  • rust

  • ESD

Explanation: Accumulated dust inside the computer can prevent the flow of air and can hinder cooling.

21. What is a recommended procedure to follow when cleaning computer components?

  • Remove the CPU before cleaning.

  • Blow compressed air on cooling fans so that they will spin when dust is being removed.

  • Use window cleaner on LCD screens.

  • Hold cans of compressed air upright while spraying.

Explanation: When using compressed air, keep the can upright to prevent the fluid from leaking onto computer components.

22. On the production floor, a furniture plant has laptops for process monitoring and reporting. The production floor environment is around 80 degrees Fahrenheit (27 degrees Celsius). The humidity level is fairly high around 70 percent. Fans are mounted in the ceiling for air circulation. Wood dust is prevalent. Which condition is most likely to adversely affect a laptop that is used in this environment?

  • the temperature

  • the humidity

  • the air flow

  • the dust

Explanation: Most laptops are created to be tolerant of a wide range of humidity levels and room temperatures. Dust, however, can cause overheating and failures.

23. After a technician tests a theory of probable causes, what two actions should the technician take if the testing did not identify an exact cause? (Choose two.)

  • Establish a new theory of probable causes.

  • Randomly replace components one at a time until the problem is solved.

  • Document each test tried that did not correct the problem.

  • Verify full system functionality.

  • Test all remaining possible causes starting with the most complex.

Explanation: If the exact cause of the problem has not been determined after you have tested all your theories, establish a new theory of probable causes and test it.

24. What would happen if a PC that contains a power supply that does not automatically adjust for input voltage is set to 230 volts and attaches to an outlet in the United States?

  • The power supply would explode.

  • The PC would not turn on.

  • The PC would display an error code.

  • The PC would emit a series of beeps.

Explanation: In the United States, the wall outlet electrical power is standardized at 120 volts AC.

25. Which type of network spans a single building or campus and provides services and applications to people within a common organizational structure?

  • PAN

  • WAN

  • LAN

  • MAN

Explanation: A LAN is smaller or more contained than a WAN, which can span several cities. A MAN is usually contained in one city. A PAN is a very small network of devices that are located in close proximity to one another, usually within range of a single person.

26. What are two types of wired high-speed Internet connections? (Choose two.)

  • cable

  • satellite

  • cellular

  • DSL

  • dial-up

Explanation: Cable and DSL Internet technologies both use physical cabling to provide an Internet connection to a residence or a small business. Although dial-up is a wired technology, it does not provide a high-speed Internet connection. Satellite and cellular connections provide a wireless Internet connection.

27. In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.)

  • when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated

  • when a faster delivery mechanism is needed

  • when delivery overhead is not an issue

  • when applications do not need to guarantee delivery of the data

  • when destination port numbers are dynamic

Explanation: UDP is a very simple transport layer protocol that does not guarantee delivery. Devices on both ends of the conversation are not required to keep track of the conversation. UDP is used as the transport protocol for applications that need a speedy, best-effort delivery.

28. The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?

  • APIPA

  • DHCP

  • DNS

  • ICMP

Explanation: In networks with more than a few hosts, DHCP simplifies the addressing process. A DHCP server automatically assigns host IP addresses.

29. A company is looking for a next-generation firewall that provides VPN functionality, IDS/IPS functionality, and DoS/DDoS protection. Which device would be best suited for this task?

  • multipurpose device

  • router

  • endpoint management server

  • UTM

  • TPM

Explanation: A universal threat management (UTM) device is a security device that can provide firewall, IDS/IPS, and proxy server functionality as well as email filtering and DoS/DDoS protection.

30. A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?

  • static IP addressing with incomplete information

  • interference from surrounding devices

  • reduced computer power supply output

  • unreachable DHCP server

Explanation: When a PC does not have a static IP address or cannot pick one up from a DHCP server, Windows will automatically assign the PC an IP address using APIPA, that uses the range of addresses 169.254.0.0 to 169.254.255.255.

31. What three values must be added to the IPv4 properties of a NIC in order for a computer to have basic connectivity with the network? (Choose three.)

  • subnet mask

  • DHCP server address

  • domain name

  • default gateway

  • speed and duplex

  • IP address

Explanation: The IP address, subnet mask, and default gateway address values should be added to the NIC properties in order for the computer to have basic network connectivity. This can be done either statically or dynamically with DHCP. An additional value that should be present if the computer is to be used to connect to the Internet is the DNS server value. A computer automatically attempts to locate a DHCP server if configured to do so. A DHCP server address is not used. Finally, NAT is configured on a router, not on a computer host, and speed and duplex settings are NIC hardware settings and not IPv4 properties of the NIC.

32. A device has an IPv6 address of 2001:0DB8:75a3:0214:0607aa10:ba01 /64. What is the host identifier of the device?

  • 2001:0DB8:75a3

  • 0607aa10:ba01

  • 2001:0DB8

  • ba01

Explanation: An IPv6 address is made up of 128 bits that are represented as eight blocks of four hexadecimal digits that are called hextets. Because each hexadecimal digit represents four bits, each hextet represents 16 bits. The /64 network prefix indicates that the first 64 bits, or first four hextets, represent the network portion of the address. Because there are 128 bits in an IPv6 address, this leaves the last 64 bits, or last four hextets, to represent the host identifier. The value for the last four hextets is 0607aa10:ba01.

33. How can a user prevent specific applications from accessing a Windows computer over a network?

  • Enable MAC address filtering.

  • Disable automatic IP address assignment.

  • Block specific TCP or UDP ports in Windows Firewall.

  • Change default usernames and passwords.

Explanation: Network applications have specific TCP or UDP ports that can be left open or blocked in Windows Firewall. Disabling automatic IP address assignment may result in the computer not being able to connect to the network at all. Enabling MAC address filtering is not possible in Windows and would only block specific network hosts, not applications. Changing default usernames and passwords will secure the computer from unauthorized users, not from applications.

34. Place the six stages of the troubleshooting process in the correct order.

35. A technician has been asked to configure Wi-Fi calling on a corporate mobile device. In which situation would this feature be most advantageous?

  • in an emergency situation and no minutes are left on the phone

  • when sending WEA updates

  • when in an area with poor cellular coverage

  • in a store transaction making a payment using the mobile device

Explanation: Wi-Fi calling is not supported on all mobile devices, but when enabled, it uses a Wi-Fi network to make voice calls. It is very useful in areas with poor cellular coverage.

36. Which statement is true about laptops?

  • Most of the internal components that are designed for laptops cannot be used for desktops.

  • Laptop motherboards have standard form factors.

  • Laptops use fewer components than desktops use.

  • Laptop CPUs do not use cooling devices.

Explanation: Laptop internal components are designed with a small form factor and are proprietary. Although a laptop CPU uses less power, it needs a cooling device (heat sink and fan).

37. Which standard provides a bridge between laptop hardware and the operating system and a way for technicians to configure power management schemes to get the best performance?

  • ACPI

  • PCIe

  • Bluetooth

  • 802.11

Explanation: The Advanced Configuration and Power Interface (ACPI) standard has specific sleep states that can be assigned to a device in order to conserve power. PCIe is a motherboard interface. Bluetooth and 802.11 are wireless standards.

38. Which two laptop components are considered replaceable by the customer. (Choose two.)

  • battery

  • integrated card reader

  • mini-PCIe module

  • RAM

  • display

Explanation: Customer-replaceable units (CRUs) do not typically require a lot of technical skill to replace. RAM and a battery are two examples of a CRU. In contrast, a field-replaceable unit (FRU), such as a display, motherboard, keyboard, or touchpad, commonly requires a technician to install.

39. A user wants to synchronize some apps, movies, music, and ebooks between mobile devices. What are the two types of connections used to synchronize this type of data? (Choose two.)

  • cellular

  • Wi-Fi

  • USB

  • Bluetooth

  • NFC

Explanation: Because of the amount of data transferred during video synchronization, synchronization occurs through either a Wi-Fi connection or a wired USB connection.

40. A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)

  • Inkjet printers are less expensive as an initial purchase than laser printers.

  • A laser printer is significantly slower than an inkjet printer.

  • Both laser and inkjet printers produce poor quality images.

  • The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.

  • Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.

Explanation: Inkjet printers are easy to use and usually less expensive than laser printers. Some advantages of an inkjet printer are initial low cost, high resolution, and they are quick to warm up. Some disadvantages of an inkjet printer are that the nozzles are prone to clogging, ink cartridges can be expensive, and the ink is wet for a few seconds after printing.

A laser printer is a high-quality, fast printer that uses a laser beam to create an image. Some advantages of a laser printer are low cost per page, high ppm, high capacity, and prints come out dry. Some disadvantages of a laser printer are high cost of startup, and that toner cartridges can be expensive.

41. A user chooses the collate option and prints two copies of a three-page document. What is the order in which the pages are printed?

  • pages 1, 1, 2, 2, 3, 3

  • pages 1, 2, 3, 1, 2, 3

  • pages 3, 3, 2, 2, 1, 1

  • pages 3, 2, 1, 3, 2, 1

Explanation: The collate feature enables a printer to sort multiple copies of a document with the proper page order for each copy.

42. A color laser printer is used to print documents with graphics and photographs. Users are complaining that printing takes too long. Which component of the printer should be upgraded in order to improve printing performance?

  • CPU

  • RAM

  • hard drive

  • toner cartridges

Explanation: Because documents with graphics and photographs generate much larger print jobs, the printing process will run more efficiently if the printer memory is adequate to store the entire job before the job starts.

43. What service is available for Windows to provide software print server services to MAC OS clients?

  • Bonjour Print Server

  • Print to XPS

  • Apple AirPort Extreme

  • Apple AirPrint

Explanation: Bonjour Printer Server from Apple comes with MAC OS X and is a free download for Windows users to be used as a software print server. Airport Extreme, a dedicated print server, and a PC with a printer attached serving as a print server are all hardware print sharing solutions.

44. Which three components are typically found in laser printer maintenance kits? (Choose three.)

  • fuser assembly

  • primary corona

  • pickup rollers

  • transfer rollers

  • secondary corona

  • paper trays

Explanation: Laser printer maintenance kits typically contain components that wear and can be installed with minimal disassembly of the printer. Corona wires are internal components that would require a trained technician to replace. Paper trays are components that are not typically replaced during maintenance, but would be replaced any time if damaged.

45. A technician is installing a new printer in a cool, damp environment. After the printer cabling is done, and the software and print driver are installed, the printer test page jams. What is the most likely cause of the print failure?

  • incorrect printer driver

  • too much humidity

  • not enough printer memory

  • loose printer cables

Explanation: Paper jams are commonly caused when the paper being used is dirty, affected by humidity, or is the wrong type of paper for the printer.

46. A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?

  • BYOD

  • virtualization

  • maintaining communication integrity

  • online collaboration

Explanation: Virtualization technology can run several different operating systems in parallel on a single CPU.

47. How does virtualization help with disaster recovery within a data center?

  • Power is always provided.

  • Less energy is consumed.

  • Server provisioning is faster.

  • Hardware does not have to be identical.

Explanation: Disaster recovery is how a company goes about accessing applications, data, and the hardware that might be affected during a disaster. Virtualization provides hardware independence which means the disaster recovery site does not have to have the exact equipment as the equipment in production. Server provisioning is relevant when a server is built for the first time. Although data centers do have backup generators, the entire data center is designed for disaster recovery. One particular data center could never guarantee that the data center itself would never be without power.

48. Which two hypervisors are suitable to support virtual machines in a data center? (Choose two.)

  • Virtual PC

  • VMware Fusion

  • VMware ESX/ESXi

  • Oracle VM VirtualBox

  • Microsoft Hyper-V 2012

Explanation: VMware ESX/ESXi and Microsoft Hyper-V 2012 are Type 1 hypervisors that have direct access to the hardware resources. Type 1 hypervisors are more efficient than hosted architectures, and enable greater scalability, performance, and robustness. They are used to support enterprise VMs in data centers. Oracle VM VirtualBox, VMware Fusion, and Microsoft Virtual PC are host based Type 2 hypervisors.

49. A web designer accesses a company Windows 10 computer remotely. The designer often needs to simultaneously open multiple applications, such as a web page editor and a graphics editor. Rather than opening them in multiple windows, the designer opens them in different virtual desktops. What technology is being used by the designer?

  • virtual reality

  • Windows Virtual Desktop

  • cloud-based applications

  • virtual desktop infrastructure

Explanation: Windows 10 has a feature called Windows Virtual Desktop (WVD). A user can create multiple virtual desktops and navigate among them easily. This feature reduces the clutter on a desktop of Windows caused by opening multiple applications. With WVD, a user can have each application open in a separate desktop.

50. Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?

  • PaaS

  • IaaS

  • SaaS

  • ITaaS