Mobile Devices
Hardware
Virtualization
Hardware Troubleshooting
Networking
100

Ann, a user, needs to attend several day-long conferences and wants to ensure her mobile device will have enough power for these events. She is concerned about wall outlet availability at the conferences and needs to continuously use her device for important updates.

Which of the following should a technician recommend to BEST accommodate Ann’s needs?


A. Wireless charging pad

B. Built-in battery case

C. Extra charging cords

D. Airplane mode


B. Built-in battery case

100

Which of the following colors is used to designate a USB 3.0 connector?

A. Blue

B. Black

C. Green

D. White


A. Blue

100

A virtual environment in which an application uses memory and a processor from a provider based on a leased rate that depends on the amount of resources used per month is referred to as:

A. virtual application streaming service

B. metered service

C. resource pooling

D. SaaS


B. metered service

100

Which of the following peripherals would a company use to take inventory quickly and update price tags for products? (Choose two.)


A. Barcode scanner

B. Label printer

C. Magnetic reader

D. KVM switch

E. NFC device

F. Flatbed scanner 

A. Barcode scanner
C. Magnetic reader

100

A user’s laptop is not connecting to the company’s file server. The user provides the following network information from the laptop:

Which of the following is MOST likely causing the issue?

A. DHCP error

B. IPv4 conflict

C. No WiFi connection

D. MAC filtering


A. DHCP error

200

Which of the following charging and data ports has a non-directional connector?

A. Micro-USB

B. Mini-USB

C. USB-A

D. USB-C


D. USB-C

200

Which of the following can be used to extend a wired network using an adapter and electrical outlet?

A. Layer 3 switch

B. Patch panel

C. Ethernet over power

D. Repeater

C. Ethernet over power

200

Which of the following cloud computing concepts is used to describe online providers that serve multiple clients with scalable services, such as access to a large number of CPUs and memory from multiple resources?

A. Rapid elasticity

B. Measured service

C. Cloud file-storage service

D. Resource pooling


D. Resource pooling

200

A business owner wants to provide security to laptop users with the ability to charge their devices, access corporate LAN resources, and allow for a variety of other removable hardware.  

Which of the following devices would BEST meet the owner’s needs?

A. Docking station

B. Port replicator

C. Thunderbolt

D. USB hub


A. Docking station

200

Which of the following wireless standards provides the HIGHEST bandwidth?

A. 802.11a

B. 802.11ac

C. 802.11b

D. 802.11g


B. 802.11ac

300

A user brings in a smartphone for repair. The device is unable to send/receive calls or connect to WiFi. All applications on the device are working unless they require connectivity.  

Which of the following is MOST likely causing the problem?

A. Airplane mode

B. Tethering

C. Disabled hotspot

D. VPN


A. Airplane mode

300

A technician discovered a spare cable at a user’s desk. The ends of the cable terminate in a plastic connector with four pins, only two of which contain conductors. Which of the following connector types did the technician find?

A. RG-6

B. RJ11

C. RJ45

D. RG-59


B. RJ11

300

A technician needs to set up a desktop so a programmer can write applications for mobile operating systems. This will require

the installation of:

A. a CPU that supports hyperthreading,

B. a Trusted Platform Module.

C. mobile device management.

D. emulator software


D. emulator software

300

When a user types on a laptop, the cursor randomly moves around and clicks elsewhere in the document, causing the user to

have to edit and retype portions of the document. Which of the following should the technician disable to resolve the issue?

A. Wireless

B. Airplane mode

C. Touchpad

D. External monitor


C. Touchpad

300

A technician needs to connect a user to a network share on the server. Which of the following ports should the technician

allow through the firewall?

A. 67

B. 137

C. 143

D. 445

E. 3389


B. 137

400

A user is looking for software that can overlay information on objects seen through the camera of a mobile device. This is an

example of.

A. augmented reality.

B. virtual reality.

C. geotagging.

D. artificial intelligence.

E. object character recognition.


A. augmented reality.

400

An administrator notices the RAID 5 array is reporting a degraded health message. It contains three HDDs. A technician replaces the faulty HDD with a new one, but users then report access to the fileshare is not as fast as it used to be. Which of the following is MOST likely preventing the RAID array from operating optimally?

A. The mirrored set is broken.

B. Write caching has been turned on.

C. The wrong drive was replaced.

D. The RAID array is rebuilding.


C. The wrong drive was replaced.

400

Which of the following explains how a cloud computing provider is able to provide scalable services to several different clients?

A. Synchronization

B. Measured service

C. Resource pooling

D. On demand


C. Resource pooling

400

Which of the following servers provides access to user data over a LAN?

A. Proxy server

B. DHCP server

C. Web server

D. File server

D. File server

400

A technician recently installed a new router. Since the installation was completed, a user’s PC loses network connectivity when another user’s PC comes online. Which of the following commands are BEST for the technician to run to resolve this issue? (Choose two.)

A. ipconfig / renew

B. ipconfig / all

C. ipconfig / flushdns

D. ipconfig / registerdns

E. ipconfig / release

F. ipconfig / displaydns


A. ipconfig / renew
E. ipconfig / release

500

Name three mobile OS

Chrome OS, iOS, Android

500

The endings that terminate a telephone line, a ethernet cable, and a coaxial cable respectively.

RJ-11, RJ-45, F-Connector

500

Name 3 examples of resource pooling

Iaas, Saas, Paas

500

The 6 steps for troubleshooting

  1. Identify the problem.
  2. Establish a theory of probable cause.
  3. Test the theory to determine cause.
  4. Establish a plan of action to resolve the problem and implement the solution.
  5. Verify full system functionality and if applicable implement preventative measures.
  6. Document findings, actions, and outcomes.
500

The port for secured and unsecured POP3, and secured and unsecure SMTP


995,110,

587, 25

M
e
n
u