1
1. In which situation would an ESD strike potentially cause harm to the PC?
Powered By
when replacing a mechanical hard drive with an M.2 SSD
when installing an additional display in a workplace cubicle
when using a grounded mat and working on a computer on an ungrounded workbench
when installing a dual-voltage power supply
Other case
when installing an additional display in a workplace cubicle
when replacing high voltage laser printer parts
while attaching speakers to a surround sound card
when installing a UPS
when installing RAM
Explanation: Minimize the risk of electrostatic discharge. Whenever 2 things touch, there is always an exchange of electrons at the atomic level. Most of the time, this exchange is so negligible that you don’t notice it, but even tiny bolts of static electricity can fry your RAM modules. In fact, any electrical component in your computer has a chance to be damaged by static electricity.
2. A person has started a new technical job. In which situation would ESD be an issue?
when installing a processor
when using a grounded mat and working on a computer on an ungrounded workbench
when installing a dual-voltage power supply
while exchanging one laptop AC adapter with one that is not from the original equipment manufacturer
Other case
when installing RAM
when installing an additional display in a workplace cubicle
when replacing high voltage laser printer parts
while attaching speakers to a surround sound card
3. A technician is about to begin preventive maintenance on a company PC. In which situation would ESD be an issue?
when replacing a motherboard
while attaching speakers to a surround sound card
when using a grounded mat and working on a computer on an ungrounded workbench
when installing a dual-voltage power supply
4. An instructor has given a student an assignment to assemble a PC. In which situation should the student be aware that ESD is an issue?
when installing RAM
when working in a corporate environment that has carpet installed under tower PCs
when using a grounded mat and working on a computer on an ungrounded workbench
when installing a dual-voltage power supply
Other case:
when walking across a carpeted area and then touching a keyboard that is attached to a tower PC
when installing a UPS
when working in a corporate environment that has carpet installed under tower PCs
when replacing a mechanical hard drive with an M.2 SSD
5. What two motherboard components control the system boot operations? (Choose two.)
BIOS chip
UEFI chip
Northbridge chip
Southbridge chip
CPU
Explanation: System boot services are provided by the motherboard BIOS and UEFI chips.
6. A technician is upgrading an ATX motherboard with another ATX motherboard. Which component might be affected by this and need to be upgraded and bought as an additional purchase?
BIOS
chipset
CMOS battery
CPU
PCIe adapter
Explanation: The motherboard, CPU, and power supply must be compatible.
7. A customer has requested that a PC be built that will support eSATA. Which component should be checked to be sure that this feature is supported?
CPU
chipset
hard disk
RAM module
Explanation: The chipset on a motherboard consists of integrated circuits that control how system hardware interacts with the CPU and motherboard. It also provides the capability and features needed, such as the maximum memory supported on the motherboard, multiple USB ports, eSATA connections, surround sound, and video.
8. Which memory module used to hold instructions for booting a PC and loading the OS, but is still used on adapters even though the memory contents cannot be changed?
RAM
ROM
cache
main memory
Explanation: ROM stands for read-only memory.
9. What is a characteristic of DDR SDRAM?
It transfers data twice per clock cycle compared to once per clock cycle for SDRAM.
DDR SDRAM modules have double the number of pins of SDRAM memory modules.
It is dynamic memory whereas SDRAM is static memory.
It operates at double the voltage of SDRAM memory.
Explanation: DDR SDRAM transfers data twice per clock cycle, whereas SDRAM transfers data once each clock cycle. Both DDR SDRAM and SDRAM are forms of dynamic memory. The difference in data transfer rate between DDR SDRAM and SDRAM is not determined by the number of pins, nor the operating voltage.
10. What are two safety hazards when dealing with laser printers? (Choose two.)
high voltage
hot components
heavy metals
proprietary power bricks
unwieldy card cages
Explanation: Laser printers require high voltage when initially powered on and to charge the drum in preparation for writing data to the drum. This high voltage requirement is why most laser printers are not normally connected to a UPS. A laser printer also has a fuser assembly used to apply heat and pressure to the toner to permanently attach it to the paper. The laser printer must be unplugged and the fuser assembly must be allowed to cool before working inside the printer.
11. Which component requires a technician to install screws externally through the PC case?
RAM
CPU
motherboard
power supply
Explanation: The power supply commonly has four screws that attach from outside the case through case holes into screw holes on the power supply.
12. A technician is installing an internal HDD. To which motherboard connector will the technician connect the data cable?
ATX
PCI
PWR_SW
SATA
Explanation: Internal hard drives are commonly SATA drives that have a data cable that extends from the drive to a motherboard SATA connector..
13. Refer to the exhibit. A technician has been asked to install a video card. Which section of the motherboard will the technician use to install the card?
section A
section B
section C
section D
Explanation: Graphics cards, also known as video cards, are installed into a PCIe x16 expansion slot. The expansion slots on a motherboard are located near the motherboard ports.
14. When a PC is being assembled, what component is connected to the motherboard with a SATA cable?
the optical drive
the network interface card
the video card
the power supply
Explanation: SATA cables, or serial ATA cables, are used to carry data from drives to the motherboard.
15. A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?
The computer automatically boots into Safe Mode and displays a warning on the screen.
The screen flashes with a red background and displays a warning message.
The computer emits a pattern of beeps indicating the failing device.
The computer returns an error message that indicates the I/O address of the failing device.
Explanation: Beep codes are a result of POST and these vary between computer vendors based on what BIOS is installed.
16. Which three features can be configured in the BIOS settings to secure a computer? (Choose three.)
MAC filtering
drive encryption
TPM
file encryption
TKIP key
passwords
Explanation: Passwords, drive encryption, and TPM are BIOS configurable security features. File encryption, TKIP key, and MAC filtering are security features not configured within BIOS.
17. What is the purpose of RAID adapters?
to allow older PCI technology expansion slots to be used
to provide enhanced audio and graphic capabilities
to connect multiple storage devices for redundancy or speed
to connect peripheral devices to a PC to improve performance
Explanation: RAID 0 allows “striping” or writing data across two hard drives, but provides no redundancy. The other RAID versions provide redundancy.
18. When a new motherboard is being installed, between which two components must thermal compound be applied? (Choose two.)
CPU
RAM
chassis
heat sink
chipset
motherboard
Explanation: You must apply thermal compound between the new CPU and the heat sink/fan assembly to avoid overheating the CPU. The thermal paste helps to conduct heat from the CPU to the heat sink.
19. What is the purpose of a Safety Data Sheet?
to specify procedures for dealing with potentially hazardous materials
to specify procedures in designing and building common computer systems
to specify procedures for the operation of sensitive components and prevention of electrostatic discharge
to specify procedures in the use of humidity control and prevention of moisture damage
Explanation: A Safety Data Sheet is a fact sheet that summarizes information about material identification, including hazardous ingredients that can affect personal health, fire hazards, and first-aid requirements. The SDS explains how to dispose of potentially hazardous materials in the safest manner.
20. Which negative environmental factor does cleaning the inside of a computer reduce?
dust
EMI
rust
ESD
Explanation: Accumulated dust inside the computer can prevent the flow of air and can hinder cooling.
21. What is a recommended procedure to follow when cleaning computer components?
Remove the CPU before cleaning.
Blow compressed air on cooling fans so that they will spin when dust is being removed.
Use window cleaner on LCD screens.
Hold cans of compressed air upright while spraying.
Explanation: When using compressed air, keep the can upright to prevent the fluid from leaking onto computer components.
22. On the production floor, a furniture plant has laptops for process monitoring and reporting. The production floor environment is around 80 degrees Fahrenheit (27 degrees Celsius). The humidity level is fairly high around 70 percent. Fans are mounted in the ceiling for air circulation. Wood dust is prevalent. Which condition is most likely to adversely affect a laptop that is used in this environment?
the temperature
the humidity
the air flow
the dust
Explanation: Most laptops are created to be tolerant of a wide range of humidity levels and room temperatures. Dust, however, can cause overheating and failures.
23. After a technician tests a theory of probable causes, what two actions should the technician take if the testing did not identify an exact cause? (Choose two.)
Establish a new theory of probable causes.
Randomly replace components one at a time until the problem is solved.
Document each test tried that did not correct the problem.
Verify full system functionality.
Test all remaining possible causes starting with the most complex.
Explanation: If the exact cause of the problem has not been determined after you have tested all your theories, establish a new theory of probable causes and test it.
24. What would happen if a PC that contains a power supply that does not automatically adjust for input voltage is set to 230 volts and attaches to an outlet in the United States?
The power supply would explode.
The PC would not turn on.
The PC would display an error code.
The PC would emit a series of beeps.
Explanation: In the United States, the wall outlet electrical power is standardized at 120 volts AC.
25. Which type of network spans a single building or campus and provides services and applications to people within a common organizational structure?
PAN
WAN
LAN
MAN
Explanation: A LAN is smaller or more contained than a WAN, which can span several cities. A MAN is usually contained in one city. A PAN is a very small network of devices that are located in close proximity to one another, usually within range of a single person.
26. What are two types of wired high-speed Internet connections? (Choose two.)
cable
satellite
cellular
DSL
dial-up
Explanation: Cable and DSL Internet technologies both use physical cabling to provide an Internet connection to a residence or a small business. Although dial-up is a wired technology, it does not provide a high-speed Internet connection. Satellite and cellular connections provide a wireless Internet connection.
27. In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.)
when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated
when a faster delivery mechanism is needed
when delivery overhead is not an issue
when applications do not need to guarantee delivery of the data
when destination port numbers are dynamic
Explanation: UDP is a very simple transport layer protocol that does not guarantee delivery. Devices on both ends of the conversation are not required to keep track of the conversation. UDP is used as the transport protocol for applications that need a speedy, best-effort delivery.
28. The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?
APIPA
DHCP
DNS
ICMP
Explanation: In networks with more than a few hosts, DHCP simplifies the addressing process. A DHCP server automatically assigns host IP addresses.
29. A company is looking for a next-generation firewall that provides VPN functionality, IDS/IPS functionality, and DoS/DDoS protection. Which device would be best suited for this task?
multipurpose device
router
endpoint management server
UTM
TPM
Explanation: A universal threat management (UTM) device is a security device that can provide firewall, IDS/IPS, and proxy server functionality as well as email filtering and DoS/DDoS protection.
30. A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?
static IP addressing with incomplete information
interference from surrounding devices
reduced computer power supply output
unreachable DHCP server
Explanation: When a PC does not have a static IP address or cannot pick one up from a DHCP server, Windows will automatically assign the PC an IP address using APIPA, that uses the range of addresses 169.254.0.0 to 169.254.255.255.
31. What three values must be added to the IPv4 properties of a NIC in order for a computer to have basic connectivity with the network? (Choose three.)
subnet mask
DHCP server address
domain name
default gateway
speed and duplex
IP address
Explanation: The IP address, subnet mask, and default gateway address values should be added to the NIC properties in order for the computer to have basic network connectivity. This can be done either statically or dynamically with DHCP. An additional value that should be present if the computer is to be used to connect to the Internet is the DNS server value. A computer automatically attempts to locate a DHCP server if configured to do so. A DHCP server address is not used. Finally, NAT is configured on a router, not on a computer host, and speed and duplex settings are NIC hardware settings and not IPv4 properties of the NIC.
32. A device has an IPv6 address of 2001:0DB8:75a3:0214:0607aa10:ba01 /64. What is the host identifier of the device?
2001:0DB8:75a3
0607aa10:ba01
2001:0DB8
ba01
Explanation: An IPv6 address is made up of 128 bits that are represented as eight blocks of four hexadecimal digits that are called hextets. Because each hexadecimal digit represents four bits, each hextet represents 16 bits. The /64 network prefix indicates that the first 64 bits, or first four hextets, represent the network portion of the address. Because there are 128 bits in an IPv6 address, this leaves the last 64 bits, or last four hextets, to represent the host identifier. The value for the last four hextets is 0607aa10:ba01.
33. How can a user prevent specific applications from accessing a Windows computer over a network?
Enable MAC address filtering.
Disable automatic IP address assignment.
Block specific TCP or UDP ports in Windows Firewall.
Change default usernames and passwords.
Explanation: Network applications have specific TCP or UDP ports that can be left open or blocked in Windows Firewall. Disabling automatic IP address assignment may result in the computer not being able to connect to the network at all. Enabling MAC address filtering is not possible in Windows and would only block specific network hosts, not applications. Changing default usernames and passwords will secure the computer from unauthorized users, not from applications.
34. Place the six stages of the troubleshooting process in the correct order.
35. A technician has been asked to configure Wi-Fi calling on a corporate mobile device. In which situation would this feature be most advantageous?
in an emergency situation and no minutes are left on the phone
when sending WEA updates
when in an area with poor cellular coverage
in a store transaction making a payment using the mobile device
Explanation: Wi-Fi calling is not supported on all mobile devices, but when enabled, it uses a Wi-Fi network to make voice calls. It is very useful in areas with poor cellular coverage.
36. Which statement is true about laptops?
Most of the internal components that are designed for laptops cannot be used for desktops.
Laptop motherboards have standard form factors.
Laptops use fewer components than desktops use.
Laptop CPUs do not use cooling devices.
Explanation: Laptop internal components are designed with a small form factor and are proprietary. Although a laptop CPU uses less power, it needs a cooling device (heat sink and fan).
37. Which standard provides a bridge between laptop hardware and the operating system and a way for technicians to configure power management schemes to get the best performance?
ACPI
PCIe
Bluetooth
802.11
Explanation: The Advanced Configuration and Power Interface (ACPI) standard has specific sleep states that can be assigned to a device in order to conserve power. PCIe is a motherboard interface. Bluetooth and 802.11 are wireless standards.
38. Which two laptop components are considered replaceable by the customer. (Choose two.)
battery
integrated card reader
mini-PCIe module
RAM
display
Explanation: Customer-replaceable units (CRUs) do not typically require a lot of technical skill to replace. RAM and a battery are two examples of a CRU. In contrast, a field-replaceable unit (FRU), such as a display, motherboard, keyboard, or touchpad, commonly requires a technician to install.
39. A user wants to synchronize some apps, movies, music, and ebooks between mobile devices. What are the two types of connections used to synchronize this type of data? (Choose two.)
cellular
Wi-Fi
USB
Bluetooth
NFC
Explanation: Because of the amount of data transferred during video synchronization, synchronization occurs through either a Wi-Fi connection or a wired USB connection.
40. A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)
Inkjet printers are less expensive as an initial purchase than laser printers.
A laser printer is significantly slower than an inkjet printer.
Both laser and inkjet printers produce poor quality images.
The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.
Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.
Explanation: Inkjet printers are easy to use and usually less expensive than laser printers. Some advantages of an inkjet printer are initial low cost, high resolution, and they are quick to warm up. Some disadvantages of an inkjet printer are that the nozzles are prone to clogging, ink cartridges can be expensive, and the ink is wet for a few seconds after printing.
A laser printer is a high-quality, fast printer that uses a laser beam to create an image. Some advantages of a laser printer are low cost per page, high ppm, high capacity, and prints come out dry. Some disadvantages of a laser printer are high cost of startup, and that toner cartridges can be expensive.
41. A user chooses the collate option and prints two copies of a three-page document. What is the order in which the pages are printed?
pages 1, 1, 2, 2, 3, 3
pages 1, 2, 3, 1, 2, 3
pages 3, 3, 2, 2, 1, 1
pages 3, 2, 1, 3, 2, 1
Explanation: The collate feature enables a printer to sort multiple copies of a document with the proper page order for each copy.
42. A color laser printer is used to print documents with graphics and photographs. Users are complaining that printing takes too long. Which component of the printer should be upgraded in order to improve printing performance?
CPU
RAM
hard drive
toner cartridges
Explanation: Because documents with graphics and photographs generate much larger print jobs, the printing process will run more efficiently if the printer memory is adequate to store the entire job before the job starts.
43. What service is available for Windows to provide software print server services to MAC OS clients?
Bonjour Print Server
Print to XPS
Apple AirPort Extreme
Apple AirPrint
Explanation: Bonjour Printer Server from Apple comes with MAC OS X and is a free download for Windows users to be used as a software print server. Airport Extreme, a dedicated print server, and a PC with a printer attached serving as a print server are all hardware print sharing solutions.
44. Which three components are typically found in laser printer maintenance kits? (Choose three.)
fuser assembly
primary corona
pickup rollers
transfer rollers
secondary corona
paper trays
Explanation: Laser printer maintenance kits typically contain components that wear and can be installed with minimal disassembly of the printer. Corona wires are internal components that would require a trained technician to replace. Paper trays are components that are not typically replaced during maintenance, but would be replaced any time if damaged.
45. A technician is installing a new printer in a cool, damp environment. After the printer cabling is done, and the software and print driver are installed, the printer test page jams. What is the most likely cause of the print failure?
incorrect printer driver
too much humidity
not enough printer memory
loose printer cables
Explanation: Paper jams are commonly caused when the paper being used is dirty, affected by humidity, or is the wrong type of paper for the printer.
46. A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?
BYOD
virtualization
maintaining communication integrity
online collaboration
Explanation: Virtualization technology can run several different operating systems in parallel on a single CPU.
47. How does virtualization help with disaster recovery within a data center?
Power is always provided.
Less energy is consumed.
Server provisioning is faster.
Hardware does not have to be identical.
Explanation: Disaster recovery is how a company goes about accessing applications, data, and the hardware that might be affected during a disaster. Virtualization provides hardware independence which means the disaster recovery site does not have to have the exact equipment as the equipment in production. Server provisioning is relevant when a server is built for the first time. Although data centers do have backup generators, the entire data center is designed for disaster recovery. One particular data center could never guarantee that the data center itself would never be without power.
48. Which two hypervisors are suitable to support virtual machines in a data center? (Choose two.)
Virtual PC
VMware Fusion
VMware ESX/ESXi
Oracle VM VirtualBox
Microsoft Hyper-V 2012
Explanation: VMware ESX/ESXi and Microsoft Hyper-V 2012 are Type 1 hypervisors that have direct access to the hardware resources. Type 1 hypervisors are more efficient than hosted architectures, and enable greater scalability, performance, and robustness. They are used to support enterprise VMs in data centers. Oracle VM VirtualBox, VMware Fusion, and Microsoft Virtual PC are host based Type 2 hypervisors.
49. A web designer accesses a company Windows 10 computer remotely. The designer often needs to simultaneously open multiple applications, such as a web page editor and a graphics editor. Rather than opening them in multiple windows, the designer opens them in different virtual desktops. What technology is being used by the designer?
virtual reality
Windows Virtual Desktop
cloud-based applications
virtual desktop infrastructure
Explanation: Windows 10 has a feature called Windows Virtual Desktop (WVD). A user can create multiple virtual desktops and navigate among them easily. This feature reduces the clutter on a desktop of Windows caused by opening multiple applications. With WVD, a user can have each application open in a separate desktop.
50. Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?
PaaS
IaaS
SaaS
ITaaS
1. In which situation would an ESD strike potentially cause harm to the PC?
Powered By
when replacing a mechanical hard drive with an M.2 SSD
when installing an additional display in a workplace cubicle
when using a grounded mat and working on a computer on an ungrounded workbench
when installing a dual-voltage power supply
Other case
when installing an additional display in a workplace cubicle
when replacing high voltage laser printer parts
while attaching speakers to a surround sound card
when installing a UPS
when installing RAM
Explanation: Minimize the risk of electrostatic discharge. Whenever 2 things touch, there is always an exchange of electrons at the atomic level. Most of the time, this exchange is so negligible that you don’t notice it, but even tiny bolts of static electricity can fry your RAM modules. In fact, any electrical component in your computer has a chance to be damaged by static electricity.
2. A person has started a new technical job. In which situation would ESD be an issue?
when installing a processor
when using a grounded mat and working on a computer on an ungrounded workbench
when installing a dual-voltage power supply
while exchanging one laptop AC adapter with one that is not from the original equipment manufacturer
Other case
when installing RAM
when installing an additional display in a workplace cubicle
when replacing high voltage laser printer parts
while attaching speakers to a surround sound card
3. A technician is about to begin preventive maintenance on a company PC. In which situation would ESD be an issue?
when replacing a motherboard
while attaching speakers to a surround sound card
when using a grounded mat and working on a computer on an ungrounded workbench
when installing a dual-voltage power supply
4. An instructor has given a student an assignment to assemble a PC. In which situation should the student be aware that ESD is an issue?
when installing RAM
when working in a corporate environment that has carpet installed under tower PCs
when using a grounded mat and working on a computer on an ungrounded workbench
when installing a dual-voltage power supply
Other case:
when walking across a carpeted area and then touching a keyboard that is attached to a tower PC
when installing a UPS
when working in a corporate environment that has carpet installed under tower PCs
when replacing a mechanical hard drive with an M.2 SSD
5. What two motherboard components control the system boot operations? (Choose two.)
BIOS chip
UEFI chip
Northbridge chip
Southbridge chip
CPU
Explanation: System boot services are provided by the motherboard BIOS and UEFI chips.
6. A technician is upgrading an ATX motherboard with another ATX motherboard. Which component might be affected by this and need to be upgraded and bought as an additional purchase?
BIOS
chipset
CMOS battery
CPU
PCIe adapter
Explanation: The motherboard, CPU, and power supply must be compatible.
7. A customer has requested that a PC be built that will support eSATA. Which component should be checked to be sure that this feature is supported?
CPU
chipset
hard disk
RAM module
Explanation: The chipset on a motherboard consists of integrated circuits that control how system hardware interacts with the CPU and motherboard. It also provides the capability and features needed, such as the maximum memory supported on the motherboard, multiple USB ports, eSATA connections, surround sound, and video.
8. Which memory module used to hold instructions for booting a PC and loading the OS, but is still used on adapters even though the memory contents cannot be changed?
RAM
ROM
cache
main memory
Explanation: ROM stands for read-only memory.
9. What is a characteristic of DDR SDRAM?
It transfers data twice per clock cycle compared to once per clock cycle for SDRAM.
DDR SDRAM modules have double the number of pins of SDRAM memory modules.
It is dynamic memory whereas SDRAM is static memory.
It operates at double the voltage of SDRAM memory.
Explanation: DDR SDRAM transfers data twice per clock cycle, whereas SDRAM transfers data once each clock cycle. Both DDR SDRAM and SDRAM are forms of dynamic memory. The difference in data transfer rate between DDR SDRAM and SDRAM is not determined by the number of pins, nor the operating voltage.
10. What are two safety hazards when dealing with laser printers? (Choose two.)
high voltage
hot components
heavy metals
proprietary power bricks
unwieldy card cages
Explanation: Laser printers require high voltage when initially powered on and to charge the drum in preparation for writing data to the drum. This high voltage requirement is why most laser printers are not normally connected to a UPS. A laser printer also has a fuser assembly used to apply heat and pressure to the toner to permanently attach it to the paper. The laser printer must be unplugged and the fuser assembly must be allowed to cool before working inside the printer.
11. Which component requires a technician to install screws externally through the PC case?
RAM
CPU
motherboard
power supply
Explanation: The power supply commonly has four screws that attach from outside the case through case holes into screw holes on the power supply.
12. A technician is installing an internal HDD. To which motherboard connector will the technician connect the data cable?
ATX
PCI
PWR_SW
SATA
Explanation: Internal hard drives are commonly SATA drives that have a data cable that extends from the drive to a motherboard SATA connector..
13. Refer to the exhibit. A technician has been asked to install a video card. Which section of the motherboard will the technician use to install the card?
section A
section B
section C
section D
Explanation: Graphics cards, also known as video cards, are installed into a PCIe x16 expansion slot. The expansion slots on a motherboard are located near the motherboard ports.
14. When a PC is being assembled, what component is connected to the motherboard with a SATA cable?
the optical drive
the network interface card
the video card
the power supply
Explanation: SATA cables, or serial ATA cables, are used to carry data from drives to the motherboard.
15. A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?
The computer automatically boots into Safe Mode and displays a warning on the screen.
The screen flashes with a red background and displays a warning message.
The computer emits a pattern of beeps indicating the failing device.
The computer returns an error message that indicates the I/O address of the failing device.
Explanation: Beep codes are a result of POST and these vary between computer vendors based on what BIOS is installed.
16. Which three features can be configured in the BIOS settings to secure a computer? (Choose three.)
MAC filtering
drive encryption
TPM
file encryption
TKIP key
passwords
Explanation: Passwords, drive encryption, and TPM are BIOS configurable security features. File encryption, TKIP key, and MAC filtering are security features not configured within BIOS.
17. What is the purpose of RAID adapters?
to allow older PCI technology expansion slots to be used
to provide enhanced audio and graphic capabilities
to connect multiple storage devices for redundancy or speed
to connect peripheral devices to a PC to improve performance
Explanation: RAID 0 allows “striping” or writing data across two hard drives, but provides no redundancy. The other RAID versions provide redundancy.
18. When a new motherboard is being installed, between which two components must thermal compound be applied? (Choose two.)
CPU
RAM
chassis
heat sink
chipset
motherboard
Explanation: You must apply thermal compound between the new CPU and the heat sink/fan assembly to avoid overheating the CPU. The thermal paste helps to conduct heat from the CPU to the heat sink.
19. What is the purpose of a Safety Data Sheet?
to specify procedures for dealing with potentially hazardous materials
to specify procedures in designing and building common computer systems
to specify procedures for the operation of sensitive components and prevention of electrostatic discharge
to specify procedures in the use of humidity control and prevention of moisture damage
Explanation: A Safety Data Sheet is a fact sheet that summarizes information about material identification, including hazardous ingredients that can affect personal health, fire hazards, and first-aid requirements. The SDS explains how to dispose of potentially hazardous materials in the safest manner.
20. Which negative environmental factor does cleaning the inside of a computer reduce?
dust
EMI
rust
ESD
Explanation: Accumulated dust inside the computer can prevent the flow of air and can hinder cooling.
21. What is a recommended procedure to follow when cleaning computer components?
Remove the CPU before cleaning.
Blow compressed air on cooling fans so that they will spin when dust is being removed.
Use window cleaner on LCD screens.
Hold cans of compressed air upright while spraying.
Explanation: When using compressed air, keep the can upright to prevent the fluid from leaking onto computer components.
22. On the production floor, a furniture plant has laptops for process monitoring and reporting. The production floor environment is around 80 degrees Fahrenheit (27 degrees Celsius). The humidity level is fairly high around 70 percent. Fans are mounted in the ceiling for air circulation. Wood dust is prevalent. Which condition is most likely to adversely affect a laptop that is used in this environment?
the temperature
the humidity
the air flow
the dust
Explanation: Most laptops are created to be tolerant of a wide range of humidity levels and room temperatures. Dust, however, can cause overheating and failures.
23. After a technician tests a theory of probable causes, what two actions should the technician take if the testing did not identify an exact cause? (Choose two.)
Establish a new theory of probable causes.
Randomly replace components one at a time until the problem is solved.
Document each test tried that did not correct the problem.
Verify full system functionality.
Test all remaining possible causes starting with the most complex.
Explanation: If the exact cause of the problem has not been determined after you have tested all your theories, establish a new theory of probable causes and test it.
24. What would happen if a PC that contains a power supply that does not automatically adjust for input voltage is set to 230 volts and attaches to an outlet in the United States?
The power supply would explode.
The PC would not turn on.
The PC would display an error code.
The PC would emit a series of beeps.
Explanation: In the United States, the wall outlet electrical power is standardized at 120 volts AC.
25. Which type of network spans a single building or campus and provides services and applications to people within a common organizational structure?
PAN
WAN
LAN
MAN
Explanation: A LAN is smaller or more contained than a WAN, which can span several cities. A MAN is usually contained in one city. A PAN is a very small network of devices that are located in close proximity to one another, usually within range of a single person.
26. What are two types of wired high-speed Internet connections? (Choose two.)
cable
satellite
cellular
DSL
dial-up
Explanation: Cable and DSL Internet technologies both use physical cabling to provide an Internet connection to a residence or a small business. Although dial-up is a wired technology, it does not provide a high-speed Internet connection. Satellite and cellular connections provide a wireless Internet connection.
27. In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.)
when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated
when a faster delivery mechanism is needed
when delivery overhead is not an issue
when applications do not need to guarantee delivery of the data
when destination port numbers are dynamic
Explanation: UDP is a very simple transport layer protocol that does not guarantee delivery. Devices on both ends of the conversation are not required to keep track of the conversation. UDP is used as the transport protocol for applications that need a speedy, best-effort delivery.
28. The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?
APIPA
DHCP
DNS
ICMP
Explanation: In networks with more than a few hosts, DHCP simplifies the addressing process. A DHCP server automatically assigns host IP addresses.
29. A company is looking for a next-generation firewall that provides VPN functionality, IDS/IPS functionality, and DoS/DDoS protection. Which device would be best suited for this task?
multipurpose device
router
endpoint management server
UTM
TPM
Explanation: A universal threat management (UTM) device is a security device that can provide firewall, IDS/IPS, and proxy server functionality as well as email filtering and DoS/DDoS protection.
30. A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?
static IP addressing with incomplete information
interference from surrounding devices
reduced computer power supply output
unreachable DHCP server
Explanation: When a PC does not have a static IP address or cannot pick one up from a DHCP server, Windows will automatically assign the PC an IP address using APIPA, that uses the range of addresses 169.254.0.0 to 169.254.255.255.
31. What three values must be added to the IPv4 properties of a NIC in order for a computer to have basic connectivity with the network? (Choose three.)
subnet mask
DHCP server address
domain name
default gateway
speed and duplex
IP address
Explanation: The IP address, subnet mask, and default gateway address values should be added to the NIC properties in order for the computer to have basic network connectivity. This can be done either statically or dynamically with DHCP. An additional value that should be present if the computer is to be used to connect to the Internet is the DNS server value. A computer automatically attempts to locate a DHCP server if configured to do so. A DHCP server address is not used. Finally, NAT is configured on a router, not on a computer host, and speed and duplex settings are NIC hardware settings and not IPv4 properties of the NIC.
32. A device has an IPv6 address of 2001:0DB8:75a3:0214:0607aa10:ba01 /64. What is the host identifier of the device?
2001:0DB8:75a3
0607aa10:ba01
2001:0DB8
ba01
Explanation: An IPv6 address is made up of 128 bits that are represented as eight blocks of four hexadecimal digits that are called hextets. Because each hexadecimal digit represents four bits, each hextet represents 16 bits. The /64 network prefix indicates that the first 64 bits, or first four hextets, represent the network portion of the address. Because there are 128 bits in an IPv6 address, this leaves the last 64 bits, or last four hextets, to represent the host identifier. The value for the last four hextets is 0607aa10:ba01.
33. How can a user prevent specific applications from accessing a Windows computer over a network?
Enable MAC address filtering.
Disable automatic IP address assignment.
Block specific TCP or UDP ports in Windows Firewall.
Change default usernames and passwords.
Explanation: Network applications have specific TCP or UDP ports that can be left open or blocked in Windows Firewall. Disabling automatic IP address assignment may result in the computer not being able to connect to the network at all. Enabling MAC address filtering is not possible in Windows and would only block specific network hosts, not applications. Changing default usernames and passwords will secure the computer from unauthorized users, not from applications.
34. Place the six stages of the troubleshooting process in the correct order.
35. A technician has been asked to configure Wi-Fi calling on a corporate mobile device. In which situation would this feature be most advantageous?
in an emergency situation and no minutes are left on the phone
when sending WEA updates
when in an area with poor cellular coverage
in a store transaction making a payment using the mobile device
Explanation: Wi-Fi calling is not supported on all mobile devices, but when enabled, it uses a Wi-Fi network to make voice calls. It is very useful in areas with poor cellular coverage.
36. Which statement is true about laptops?
Most of the internal components that are designed for laptops cannot be used for desktops.
Laptop motherboards have standard form factors.
Laptops use fewer components than desktops use.
Laptop CPUs do not use cooling devices.
Explanation: Laptop internal components are designed with a small form factor and are proprietary. Although a laptop CPU uses less power, it needs a cooling device (heat sink and fan).
37. Which standard provides a bridge between laptop hardware and the operating system and a way for technicians to configure power management schemes to get the best performance?
ACPI
PCIe
Bluetooth
802.11
Explanation: The Advanced Configuration and Power Interface (ACPI) standard has specific sleep states that can be assigned to a device in order to conserve power. PCIe is a motherboard interface. Bluetooth and 802.11 are wireless standards.
38. Which two laptop components are considered replaceable by the customer. (Choose two.)
battery
integrated card reader
mini-PCIe module
RAM
display
Explanation: Customer-replaceable units (CRUs) do not typically require a lot of technical skill to replace. RAM and a battery are two examples of a CRU. In contrast, a field-replaceable unit (FRU), such as a display, motherboard, keyboard, or touchpad, commonly requires a technician to install.
39. A user wants to synchronize some apps, movies, music, and ebooks between mobile devices. What are the two types of connections used to synchronize this type of data? (Choose two.)
cellular
Wi-Fi
USB
Bluetooth
NFC
Explanation: Because of the amount of data transferred during video synchronization, synchronization occurs through either a Wi-Fi connection or a wired USB connection.
40. A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)
Inkjet printers are less expensive as an initial purchase than laser printers.
A laser printer is significantly slower than an inkjet printer.
Both laser and inkjet printers produce poor quality images.
The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.
Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.
Explanation: Inkjet printers are easy to use and usually less expensive than laser printers. Some advantages of an inkjet printer are initial low cost, high resolution, and they are quick to warm up. Some disadvantages of an inkjet printer are that the nozzles are prone to clogging, ink cartridges can be expensive, and the ink is wet for a few seconds after printing.
A laser printer is a high-quality, fast printer that uses a laser beam to create an image. Some advantages of a laser printer are low cost per page, high ppm, high capacity, and prints come out dry. Some disadvantages of a laser printer are high cost of startup, and that toner cartridges can be expensive.
41. A user chooses the collate option and prints two copies of a three-page document. What is the order in which the pages are printed?
pages 1, 1, 2, 2, 3, 3
pages 1, 2, 3, 1, 2, 3
pages 3, 3, 2, 2, 1, 1
pages 3, 2, 1, 3, 2, 1
Explanation: The collate feature enables a printer to sort multiple copies of a document with the proper page order for each copy.
42. A color laser printer is used to print documents with graphics and photographs. Users are complaining that printing takes too long. Which component of the printer should be upgraded in order to improve printing performance?
CPU
RAM
hard drive
toner cartridges
Explanation: Because documents with graphics and photographs generate much larger print jobs, the printing process will run more efficiently if the printer memory is adequate to store the entire job before the job starts.
43. What service is available for Windows to provide software print server services to MAC OS clients?
Bonjour Print Server
Print to XPS
Apple AirPort Extreme
Apple AirPrint
Explanation: Bonjour Printer Server from Apple comes with MAC OS X and is a free download for Windows users to be used as a software print server. Airport Extreme, a dedicated print server, and a PC with a printer attached serving as a print server are all hardware print sharing solutions.
44. Which three components are typically found in laser printer maintenance kits? (Choose three.)
fuser assembly
primary corona
pickup rollers
transfer rollers
secondary corona
paper trays
Explanation: Laser printer maintenance kits typically contain components that wear and can be installed with minimal disassembly of the printer. Corona wires are internal components that would require a trained technician to replace. Paper trays are components that are not typically replaced during maintenance, but would be replaced any time if damaged.
45. A technician is installing a new printer in a cool, damp environment. After the printer cabling is done, and the software and print driver are installed, the printer test page jams. What is the most likely cause of the print failure?
incorrect printer driver
too much humidity
not enough printer memory
loose printer cables
Explanation: Paper jams are commonly caused when the paper being used is dirty, affected by humidity, or is the wrong type of paper for the printer.
46. A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?
BYOD
virtualization
maintaining communication integrity
online collaboration
Explanation: Virtualization technology can run several different operating systems in parallel on a single CPU.
47. How does virtualization help with disaster recovery within a data center?
Power is always provided.
Less energy is consumed.
Server provisioning is faster.
Hardware does not have to be identical.
Explanation: Disaster recovery is how a company goes about accessing applications, data, and the hardware that might be affected during a disaster. Virtualization provides hardware independence which means the disaster recovery site does not have to have the exact equipment as the equipment in production. Server provisioning is relevant when a server is built for the first time. Although data centers do have backup generators, the entire data center is designed for disaster recovery. One particular data center could never guarantee that the data center itself would never be without power.
48. Which two hypervisors are suitable to support virtual machines in a data center? (Choose two.)
Virtual PC
VMware Fusion
VMware ESX/ESXi
Oracle VM VirtualBox
Microsoft Hyper-V 2012
Explanation: VMware ESX/ESXi and Microsoft Hyper-V 2012 are Type 1 hypervisors that have direct access to the hardware resources. Type 1 hypervisors are more efficient than hosted architectures, and enable greater scalability, performance, and robustness. They are used to support enterprise VMs in data centers. Oracle VM VirtualBox, VMware Fusion, and Microsoft Virtual PC are host based Type 2 hypervisors.
49. A web designer accesses a company Windows 10 computer remotely. The designer often needs to simultaneously open multiple applications, such as a web page editor and a graphics editor. Rather than opening them in multiple windows, the designer opens them in different virtual desktops. What technology is being used by the designer?
virtual reality
Windows Virtual Desktop
cloud-based applications
virtual desktop infrastructure
Explanation: Windows 10 has a feature called Windows Virtual Desktop (WVD). A user can create multiple virtual desktops and navigate among them easily. This feature reduces the clutter on a desktop of Windows caused by opening multiple applications. With WVD, a user can have each application open in a separate desktop.
50. Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?
PaaS
IaaS
SaaS
ITaaS