A+ 1101 PM  A 67 -  90

A+ 1101 PM A 67 - 90

12th Grade

23 Qs

quiz-placeholder

Similar activities

CIW Lesson 1

CIW Lesson 1

9th - 12th Grade

20 Qs

A+ 1101 PM A 27 - 46

A+ 1101 PM A 27 - 46

12th Grade

20 Qs

Intro to coding arduino unit

Intro to coding arduino unit

9th - 12th Grade

20 Qs

Infrastructure Architects and Network administrators Quiz

Infrastructure Architects and Network administrators Quiz

11th Grade - Professional Development

18 Qs

Quiz1_12&11_2t_20214

Quiz1_12&11_2t_20214

12th Grade

20 Qs

A+ 1101 PM C 49-69

A+ 1101 PM C 49-69

12th Grade

21 Qs

CompTIA A+ 1001 Question Set B (PassCompTIA)

CompTIA A+ 1001 Question Set B (PassCompTIA)

9th Grade - Professional Development

24 Qs

Unit 2 Review Game

Unit 2 Review Game

9th - 12th Grade

20 Qs

A+ 1101 PM  A 67 -  90

A+ 1101 PM A 67 - 90

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Carolyn Harrigan

Used 1+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A system administrator has received a report of customers receiving  email messages from the company, but upon further analysis the administrator finds the messages were not actually sent by the corporation. Which of the following should be implemented to  prevent these spoofed email messages?

Add multi-factor authentication to all email logins

Change the passwords on all email accounts

Configure an SPF record in the DNS

Modify the firewall rules to prevent outgoing emails

Answer explanation

The Answer: C. Configure an SPF record in the DNS

An SPF (Sender Policy Framework) record in the DNS (Domain Name System) server provides a list of all servers authorized to send emails for a domain. Any emails not originating from an authorized source can be dismissed as unauthorized or invalid.

The incorrect answers:

A.  Add multi-factor authentication to all email logins

The spoofed email messages did not originate from the corporate network, so modifying the authentication process would not prevent customers from receiving spoofed email messages.

B.  Change the passwords on all email accounts

Since the email messages did not originate from a corporate account, changing the passwords would not prevent the spoofed emails.

D. Modify the firewall rules to prevent outgoing emails

The spoofed email messages were sent from a different network, so modifying the corporate firewall would not block any email spoofing.

More information:

220-1101, Objective 2.6 - DNS Configuration https://professormesser.link/1101020601

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A system administrator has configured a VM for dual processors, 16 GB of RAM, and 120 GB of disk space. Which of the following is required to start this VM?

Shared network address

Hypervisor

Virtual switch

Video display

Answer explanation

The Answer: B. Hypervisor

A hypervisor, or virtual machine manager, is the software that manages the virtual platform and guest operating systems.

The incorrect answers:

A. Shared network address

There are many options for a virtual machine, including shared, bridged, and private network addresses. A shared network address is not required to start a virtual machine.

C.  Virtual switch

Like physical switches, virtual switches can be used to provide connectivity and segmentation for virtual machines. A virtual switch is not a

requirement to start or use a virtual machine

D.  Video display

Many servers operate without a video display, mouse, or keyboard. These systems are "headless," and a video display is not required to start a virtual machine.

More information:

220-1101, Objective 4.2 - Client-side Virtualization https://professormesser.link/1101040201

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A site manager has noticed her smartphone has a short battery life when used at work, and the battery life is normal when working from home. The work location has limited mobile service reception, but most office services are provided over the local 802.11 Wi-Fi network. The site manager does not enable Bluetooth on her smartphone. Which of the following would be the BEST way to extend the battery life of her  mobile device?

Disable 802.11 Wi-Fi

Disable the cellular radio at work

Replace the battery

Enable Bluetooth on the mobile device

Answer explanation

The Answer: B. Disable the cellular radio at work

When a mobile provider's network isn't available, a phone will constantly try to find and reconnect to a cellular network. This reconnection process constantly uses the radio, and subsequently more of the battery is used in the process. To conserve battery life, it would be useful to disable the cellular network connection when outside of a coverage area.

The incorrect answers:

A. Disable 802.11 Wi-Fi

The Wi-Fi network is used at work for office services, so disabling Wi-Fi is not a good option. Since Wi-Fi does not require a constant connection, it's unlikely that the battery usage is associated with the Wi-Fi radio.

C.   Replace the battery

It's possible that the battery in the mobile device could need replacing, but the battery problem doesn't appear to happen while at home. If the battery was the primary issue, the battery would work just as poorly at home as the office.

D.   Enable Bluetooth on the mobile device

Enabling a feature like the Bluetooth radio would increase battery usage. If the battery is the biggest concern and no Bluetooth features are in use, it's a better idea to keep Bluetooth disabled.

More information:

220-1101, Objective 5.5 - Troubleshooting Mobile Devices https://professormesser.link/1101050501

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A desktop computer has just abruptly shut off, and pressing the power button doesn’t restart the system. There are no fans spinning, no lights are on, and no messages appear on the display. Which of these would be the MOST likely cause of this issue?

The BIOS is configured with a startup password

The LCD display backlight has failed

The power supply is faulty

The master boot record is corrupted

The boot sector is missing

Answer explanation

The Answer: C. The power supply is faulty

A faulty power supply could cause a loss of power across all computer systems, and the lack of fans, lights, and output on the display would be the most likely cause given the available options.

The incorrect answers:

A. The BIOS is configured with a startup password

A startup password would not cause the system to power down, and the password prompt would be presented if the computer was powering on.

B. The LCD display backlight has failed

A failure of the LCD backlight would make it appear the screen is not working, but the fans and lights would still be working normally.

D. The master boot record is corrupted

A corrupted master boot record may prevent a system from booting, but the fans, lights, and screen output would still be working properly.

E. The boot sector is missing

A missing boot sector would not prevent the fans and lights from working properly. The screen would commonly show an error explaining that an operating system was not able to properly start.

More information:

220-1101, Objective 5.2

Troubleshooting Common Hardware Problems https://professormesser.link/1101050201

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What kind of device is commonly used to filter traffic based on a predefined set of rules?

PoE switch

Repeater

DSL modem

Firewall

Answer explanation

The Answer: D. Firewall

A firewall is designed to evaluate inbound traffic, compare that traffic to predefined security policies, and allow or block that traffic from passing through the firewall. Firewalls are common security appliances between an organization's internal network and the Internet.

The incorrect answers:

A.  PoE Switch

PoE (Power over Ethernet) switches are used to provide power to Ethernet-connected devices. This allows devices such as access points, security cameras, and VoIP phones to connect with a single Ethernet link for both data connectivity and device power.

B.  Repeater

Repeaters are relatively simple devices. Repeaters receive a signal, regenerate that signal, and then resend that signal to another network connection. Repeaters do not make any forwarding decisions and they don't filter based on a set of rules.

C.  DSL modem

DSL (Digital Subscriber Line) is a common Internet connection technology provided over the same twisted pair copper used by analog telephone services. A DSL modem allows the end-user to connect their existing network to the DSL network, but the DSL modem does not filter traffic based on a set of access rules.

More information:

220-1101, Objective 2.2 - Network Devices https://professormesser.link/1101020201

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of these connection types use coax to provide Internet data, voice, and video over the same wire?

DSL

Cable broadband

ONT

PoE

Answer explanation

The Answer: B. Cable broadband

Cable television brought video into everyone's home, and now voice and Internet services are included on the same coax cable.

The incorrect answers:

A. DSL

DSL (Digital Subscriber Line) uses a pair of copper wires to provide Internet access over the same connection as a traditional telephone service.

C.   ONT

An ONT (Optical Network Terminal) is a demarcation point commonly used for fiber to the premises. Although the ONT may include a coax connection for television, it does not commonly combine voice, video, and Internet over coax.

D.   PoE

PoE (Power over Ethernet) is a convenient way to provide a power source for a device without connecting to a power outlet. PoE does not provide any consolidation of services over coax cable, however.

More information:

220-1101, Objective 2.7 - Internet Connection Types https://professormesser.link/1101020701

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A desktop administrator has been asked to troubleshoot a laptop  computer that beeps during the power on process while the laptop screen remains dark. Which of the following would be the best NEXT troubleshooting step?

Implement a solution

Document findings

Establish a theory

Evaluate results

Answer explanation

The Answer: C. Establish a theory

Once an issue has been identified, it's important to consider all of the possible reasons the problem may have occurred. It's useful to list all possible causes, even those that might not be obvious.

The incorrect answers:

A.  Implement a solution

The implementation of a solution would occur after possible theories have been determined and tested. Once a plan of action is created, the solution can be implemented.

B.  Document findings

Once the problem has been resolved, the last step of the troubleshooting process is to document the issue, the resolution, and any other important steps during the process.

D. Evaluate results

When testing theories for possible fixes, the results of each test should be evaluated to determine if the fix was successful.

More information:

220-1101, Objective 5.1 - How to Troubleshoot https://professormesser.link/1101050101

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?