1) What is the most common memory module form factor type used in laptops? a) ECC RAM b) DIMM c) SODIMM d) CRIMM 2) A very short-range communication method where a wireless signal is sent between two devices that are touching or nearly touching each other is a characteristic feature of: a) RFID b) NFC c) Infrared(IR) d) Bluetooth 3) A device designed to filter and transfer data packets between dissimilar types of computer networks is called: a) Hub b) Load balancer c) Router d) Switch 4) Which of the answers listed below refers to a data-link layer device designed to forward frames between network segments? a) Hub b) Firewall c) Switch d) Router 5) Which of the following answers refers to a dedicated device designed for supplying power over Ethernet cabling? a) Inverter b) Tap c) Media converter d) Injector 6) Please identify this connector: a) F-Connector b) RJ-11 c) LC d) BNC 7) Dion Training recently hired a new graphic designer. You have been asked to install a new, high-end PCIe x16 graphics card into one of the standard corporate workstations so the new designer can get to work. After installing the card, you attempt to power on the computer. The computer makes some odd noises when you press the power button, but the monitor displays the words, 'no source.' What is MOST likely the issue? a) The workstation's power supply isn't powerful enough to support the card b) The graphics card installed in the workstation was defective c) The workstation is overheating due to the graphics card d) The processor in the workstation isn't powerful enough to support the card 8) Susan, an executive at Dion Training, will be traveling to Italy for a conference next week. She is worried about remaining connected to the internet while overseas and plans to use the WiFi in her hotel room and the local coffee shop with her laptop. Which of the following should she purchase and configure before leaving for Italy to ensure her communications remain secure regardless of where she is connecting from? a) International data roaming plan on her cellphone b) Local SIM card for her smartphone c) VPN d) Local mobile hotspot 9) Dion Training wants to install a new accounting system and is considering moving to a cloud-based solution to reduce cost, reduce the information technology overhead costs, improve reliability, and improve availability. Your Chief Information Officer is supportive of this move since it will be more fiscally responsible. Still, the Chief Risk Officer is concerned with housing all of the company’s confidential financial data in a cloud provider’s network that might be shared with other companies. Since the Chief Information Officer is determined to move to the cloud, what type of cloud-based solution would you recommend to account for the Chief Risk Officer’s concerns? a) SaaS in a public cloud b) SaaS in a private cloud c) PaaS in a hybrid cloud d) PaaS in a community cloud 10) Which type of wireless network utilizes the 2.4 GHz frequency band and reaches speeds of up to 54 Mbps? a) 802.11a b) 802.11ax c) 802.11n d) 802.11g 11) You want to buy a new computer that will allow you to run at least 3 virtual machines (VMs) at the same time to practice for your CompTIA exams. You also know in the future that you would like to set up a virtual ethical hacking lab with numerous VMs to study for the CompTIA PenTest+ exam. Which TWO of the following components is the MOST important to upgrade if you want to simultaneously run numerous VMs? a) RAM b) HDD c) SDD d) CPU e) GPU f) NIC 12) You are troubleshooting an older wireless network that is running Wireless G (802.11g). This network appears to have a lot of collisions and interference. You look up the configuration on two of the three access points in the areas and see they are using Channel 1 and Channel 11. To prevent interference and ensure non-overlapping of the channels, what channel should the third access point utilize? a) Channel 5 b) Channel 7 c) Channel 8 d) Channel 6 13) Which of the following technologies is often used indoors by companies to locate a shopper's position in a store and provide them time-sensitive offers or discounts? a) Bluetooth b) GPS c) Cellular d) RFID 14) Which of the following is used to connect Cat 5e or above networks in an MDF or IDF? a) RJ-11 b) F type c) 66 punchdown block d) 110 punchdown block 15) Which of the following network performance metrics is used to represent the round-trip time it takes for a packet to be sent by a device to a server and then a response received from that destination server? a) Bandwidth b) Latency c) Throughput d) Jitter 16) An employee at Dion Training complains that every time airplane mode is enabled on their laptop, their external mouse and headphones stop working. Which of the following technologies is being disabled by airplane mode and likely causing the issues experienced by this user? a) Bluetooth b) Wireless c) GPS d) Cellular 17) Using the image above, which of the following correctly indicates that port ? a) FireWire b) USB 3.0 c) DVI d) SATA 18) An employee's laptop has become warm to the touch and does not sit evenly on the table during use. You turn the laptop over and see the case bulging into a slightly rounded shape. What is the MOST likely cause of this issue? a) Keyboard is defective b) RAM is defective c) Wireless card is defective d) Battery is defective 19) A customer tried to install a PCIe x8 expansion card into a PCIe x16 slot on the motherboard. While the expansion card fits into the slot without any issues, it does not perform as the customer expected. How fast will a PCIe x8 expansion card run if installed in a PCIe x16 slot? a) The card will run at x8 speed b) The card will run at x16 speed c) The card will run at x1 speed d) The card will run at x4 speed 20) Dion Training's file server is using a RAID 5 with four disk drives as its data store. One of the drives in the array has just failed. The RAID 5 is still operating and no data loss has been experienced, but the array is no longer providing any resiliency or redundancy. Which of the following actions should you take to restore this drive to normal operations? a) Remove the failed disk and rebuild the array b) Replace the failed disk and perform a system restore c) Remove the failed disk and perform a system restore d) Replace failed disk and rebuild the array 21) A customer is complaining that they cannot connect to the local network share drive. You run the command 'ipconfig /all' from their workstation, and it returns an IP of 169.254.34.12. Which of the following is the problem with this workstation? a) The workstation couldn't reach the DHCP server b) The workstation couldn’t reach the proxy server c) The workstation couldn't reach the DNS server d) The workstation couldn't reach the gateway 22) Susan sees streaks of toner across her papers when printing documents using the laser printer in her office. What is the MOST likely solution for this problem? a) Change the feed rate of the paper b) Clean the printer's transfer roller c) Increase the temperature of the fuser element d) Replace the toner cartridge in the printer 23) A cybersecurity analyst wants to install a network appliance to conduct packet capturing of the network traffic between the router and the firewall on the network. The device should not be installed in line with the network, so it must receive a copy of all traffic flowing to or from the firewall. Which of the following tools is required to meet these requirements? a) Toner probe b) Loopback plug c) Network tap d) WiFi analyzer 24) A technician at Dion Training is troubleshooting an issue with a workstation. The technician believes that the CMOS battery needs to be replaced based on the symptoms they observed. Which of the following symptoms did the technician likely observe to lead them to this conclusion? a) Continuous reboot b) Distended capacitors c) Burning smell d) Incorrect date/time on the workstation 25) You have just set up an FTP server to allow users to download the new open-source application your company is releasing. Which port should be opened to allow users to connect to this server? a) 22 b) 21 c) 25 d) 23 26) A penetration tester wants to build a workstation that will be used to brute force hash digests. Which of the following is the BEST option to ensure sufficient power and speed to crack them? a) Dedicated GPU b) Integrated GPU c) 7200-RPM HDD d) Multi-core CPU 27) The video editor at Dion Training has submitted a trouble ticket stating her editing workstation makes a loud clicking noise whenever she is editing videos for an upcoming course. You initially thought the system fans were causing the noise. You have replaced the fans, but the noise continues to be heard when applications are loaded or the videos are being edited. Which of the following actions should you perform NEXT? a) Scan the system for viruses b) Replace the hard disk c) Perform a full backup of the hard disk d) Perform a System Restore 28) Which of the following types of network switches allows an administrator to configure advanced networking and security features? a) Unmanaged switch b) PoE switch c) Hub d) Managed switch 29) What type of connector is most commonly used to terminate a copper twisted-pair Ethernet cable? a) ST b) RJ-45 c) F type d) DB-9 30) Which of the following types of hard drives would be used in a gaming laptop to increase the system's boot-up performance while providing a large amount of storage at a lower overall cost? a) Magnetic drive b) Optical drive c) Hybrid drive d) SSD 31) Dion Training has just installed a new hub/control system to control the lights, HVAC, and power to the devices in their studio. The new hub/control system relies on Zigbee for wireless communication and networking between the different devices. Which of the following types of networked hosts best describes what was installed? a) Internet of Things b) Syslog server c) DHCP server d) Supervisory Control and Data Acquisition 32) Samantha works in the human resource department in an open floorplan office. She is concerned about the possibility of someone conducting shoulder surfing to read sensitive information from employee files while accessing them on her computer. Which of the following physical security measures should she implement to protect against this threat? a) Biometric lock b) Privacy screen c) Hardware token d) Badge reader 33) Dion Training just installed a new webserver within a screened subnet. You have been asked to open up the port for secure web browsing on the firewall. Which port should you set as open to allow users to access this new server? a) 80 b) 21 c) 143 d) 443 34) Dion Training is upgrading its wired network from an older CAT5e network to a CAT 7 network. The network technician has run out of patch cables and asks you to create a straight-through patch cable. Which of the following tools is used to connect an RJ-45 connector to a patch cable? a) Cable tester b) Cable stripper c) Punchdown tool d) Crimper 35) What is a tool that would allow you to easily identify a network cable that was not labeled in the wiring closet during its installation? a) Multimeter b) Tone generator and probe c) Cable tester d) Punchdown tool 36) Linda wants to reduce the number of monitors, keyboards, and mice required to control the multiple servers she manages in the data center. Which of the following devices should she install to allow a single keyboard or mouse to control multiple systems? a) KVM b) PS/2 splitter c) Video mirroring device d) USB splitter 37) What type of cable should be used to connect a laptop directly to another laptop to form an Ethernet network? a) Crossover cable b) Straight-through cable c) Serial cable d) Patch cable 38) Which of the following requires the use of a physical printer to print a document? a) Print to PDF b) Print to Image c) Print to XPS d) Print to Network 39) Which of the following types of networking hardware is used to deliver broadband internet access using a fiber connection to the user's home or office? a) Software-defined networking b) Optical network terminal c) Cable modem d) Digital subscriber line 40) A computer technician is trying to set up a shared printer on the corporate network. The users must send print jobs directly to the printer, and the printer will be used by multiple operating systems, including Windows, macOS, and Linux. Which of the following should the technician configure to meet these requirements best? a) Bonjour b) Virtual printer c) AirPrint d) TCP/IP print server 41) Which of the following statements about the 5.0 GHz wireless frequency used by Wi-Fi is correct? a) The 5.0 GHz frequency supports lower data rates than 2.4 GHz b) The 5.0 GHz frequency is more effective at penetrating solid surfaces than 2.4 GHz c) The 5.0 GHz frequency has more channels available than 2.4 GHz d) The 5.0 GHz frequency has a shorter wavelength that allows the signal to travel further than 2.4 GHz using the same power levels 42) Which of the following wiring standards should be used when installing ethernet cabling in an office or data center? a) T-568B b) RS-232 c) RJ-11 d) RG-6 43) Which of the following cloud services should an organization choose to develop a new iPhone app without having to configure and set up its own development environment? a) IaaS b) DaaS c) SaaS d) PaaS 44) You have just finished installing a virtual machine on a workstation. Your boss asks you to install a second virtual machine with the same settings. To save time, which of the following functions should you use? a) Shadow Copy b) Cloning c) Migration d) Secure Copy 45) Your boss asked you to generate a simple square code that can be easily scanned by a smartphone to access a preconfigured website address or link. Which of the following technologies would BEST meet this requirement? a) NFC chip b) Barcode c) QR code d) Smart card 46) Which of the following commands is used on a Linux system to delete all the files and directories in a Linux system's filesystem? a) rm -rf / b) rm *.* c) rm / d) rm -rf *.* 47) A network technician must allow HTTP traffic from the Internet over port 80 to an internal server running HTTP over port 81. Which of the following is this an example of? a) Dynamic DNS b) Static NAT c) Port forwarding d) Dynamic NAT 48) Which of the following remote access protocols should you use to connect to a Windows 2019 server and control it with your mouse and keyboard from your workstation? a) Telnet b) RDP c) VNC d) SSH 49) Your company is concerned about the possibility of power fluctuations that may occur and cause an immediate loss of power for several minutes to their server room. To prevent this condition, they are installing a large rack-mounted UPS to protect the server. Which type of condition are they trying to prevent using this UPS? a) Power failure b) Power surge c) Under-voltage event d) Power spikes 50) Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar's printer icon. Which of the following actions should Peter try FIRST to solve this issue? a) Cancel all documents and print them again b) Check the status of the print server queue c) Check that the printer is not offline d) Check to ensure the printer selected is the default printer 51) You are working as a forensic investigator for the police. The police have a search warrant to capture a suspect's workstation as evidence for an ongoing criminal investigation. As you enter the room with the policeman, he arrests the suspect and handcuffs him. What should you do FIRST? a) Implement the chain of custody b) Turn off the workstation c) Document the scene d) Secure the area 52) Which low power mode is used with Windows 10 laptops to save power, but it takes longer to turn back on and resume where the user left off? a) Balanced b) Sleep c) Power saver d) Hibernate 53) You are working for a government contractor who requires all users to use a PIV device when sending digitally signed and encrypted emails. Which of the following physical security measures is being implemented? a) Cable lock b) Smart card c) Key fob d) Biometric reader 54) What is the name of a program that monitors user activity and sends that information to someone else? a) Keylogger b) Virus c) Spyware d) Rootkit 55) Which of the following would NOT be included in a company's password policy? a) Password age b) Password style
0%
A Plus 1101
Share
Share
Share
by
Rogerolivierwei
Pre-K
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Quiz
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?