Networking
Troubleshooting
Component
Networking Devices
?
100

What is the proper CIDR prefix notation for a subnet mask of 255.0.0.0?

  • /8
  • /16
  • /32
  • /24
  • /8
100

What should a technician do before beginning any troubleshooting steps on a customer computer?

  • Document the findings.
  • Establish a plan of action.
  • Identify the problem.
  • Perform a data backup.
  • Perform a data backup.
100


What component is most suspect if a burning electronics smell is evident?

  • CPU
  • power supply
  • hard drive
  • RAM module
  • power supply
100


Which laptop component is commonly found in the laptop lid?

  • motherboard
  • power connector
  • Wi-Fi antenna
  • SODIMM
  • Wi-Fi antenna
100

After having talked to the customer, a network technician suspects that an invalid IP address is the most likely cause of a network issue. Which step of the troubleshooting process does this represent?

  • Identify the problem.
  • Test the theory to determine the cause.
  • Establish a theory of probable cause.
  • Establish a plan of action to resolve the problem and implement the solution.

Establish a theory of probable cause

200

The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?

  • DIPS
  • ICMP
  • DHCP
  • APIPA
  • DHCP
200

A customer comes into a computer parts and service store. The customer is looking for a device to allow secure access to the main doors of the company by swiping an ID card. What device should the store owner recommend to accomplish the required task?

  • AR headset
  • magstripe reader
  • joystick or gamepad
  • projector
  • magstripe reader
200

What is a characteristic of laptop motherboards?

  • Laptop motherboards are proprietary.
  • Laptop motherboard components are compatible with desktop motherboards.
  • Laptop motherboards use the same form factors as desktop motherboards.
  • Laptop motherboards use standard form factors.
  • Laptop motherboards are proprietary.
200

Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?

  • repeater
  • hub
  • switch
  • router
  • switch
200

When troubleshooting a computer, where can a technician find updated information about errors caused by the system, the user, or the software?

  • Device Manager
  • the BIOS
  • vendor diagnostic tools
  • Event Viewer
  • Event Viewer
300

Which protocol can be used to transfer messages from an email server to an email client?

  • SMTP
  • POP3
  • HTTP
  • SNMP
  • POP3
300

If a technician is unable to create a backup of data on a customer computer, what three pieces of information should the technician include on the liability release form signed by the customer before beginning work? (Choose three.)

  • the components used in the repair
  • a description of the problem
  • a release from liability if data is lost or corrupted
  • a description of the work to be performed
  • the steps required to resolve the problem
  • permission to work on the computer without a current backup available
  • a release from liability if data is lost or corrupted
  • a description of the work to be performed
  • permission to work on the computer without a current backup available
300

What are three common input devices found on laptops? (Choose three.)

  • PS/2 keyboard
  • AC power connector
  • external monitor
  • fingerprint reader
  • web camera
  • touchpad
  • fingerprint reader
  • web camera
  • touchpad
300

Which filtering method uses the physical address to specify exactly which device is allowed or blocked from sending data on a network?

  • MAC address filtering
  • port triggering
  • port forwarding
  • whitelisting
  • MAC address filtering
300


What is the main function of a hypervisor?

  • It is software used to coordinate and prepare data for analysis.
  • It is a device that synchronizes a group of sensors.
  • It is a device that filters and checks security credentials.
  • It is used to create and manage multiple VM instances on a host machine.
  • It is used by ISPs to monitor cloud computing resources.
  • It is used to create and manage multiple VM instances on a host machine.
400

Which filtering method uses the physical address to specify exactly which device is allowed or blocked from sending data on a network?

  • MAC address filtering
  • port triggering
  • port forwarding
  • whitelisting
  • MAC address filtering
400

A specific computer has an issue that could not be resolved by the help desk technician. The on-site technician finds that Windows updates have been disabled. The technician re-enables the update service, configures the computer for automatic updates, downloads and installs all missing updates, ensures the computer boots successfully, and verifies with the customer that the issue has been resolved. Which step, if any, is next?

  • Document the findings, actions, and outcomes.
  • Test the theory to determine the cause.
  • Establish a plan of action to resolve the problem and implement the solution
  • Verify full system functionality and, if applicable, implement preventive measures.
  • No further action is needed.
  • Document the findings, actions, and outcomes.
400


What is the advantage of having a redundant power supply?

  • It can be used to power high-performance graphic cards.
  • It provides a Field Replacement Unit for immediate replacement in the event of a power supply failure.
  • It can be linked to increase the wattage required for the newer processors.
  • It allows for the replacement of the faulty power supply without loss of power to the server.
  • It allows for the replacement of the faulty power supply without loss of power to the server.
400

What is a characteristic of a WAN?

  • It requires a wireless access point to connect users to the network.
  • It connects multiple networks that are geographically separated.
  • It spans across a campus or city to enable sharing of regional resources.
  • It is typically owned and managed by a single home or business.
  • It connects multiple networks that are geographically separated.
400

How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?

  • Operate the web browser in private browser mode.
  • Use only an encrypted connection to access websites.
  • Move any downloaded files to the recycle bin.
  • Reboot the computer after closing the web browser.
  • Operate the web browser in private browser mode.
500

Which IEEE standard is used for PoE?

  • 802.11af
  • 802.1q
  • 802.15
  • 802.3af
  • 802.3af
500

A user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?

  • The file system is corrupted.
  • The file system has been encrypted.
  • The display driver is corrupted.
  • The laptop is infected by a virus.
  • The laptop is infected by a virus.
500


In laser printing, what is the name of the process of applying toner to the latent image on the drum?

  • charging
  • fusing
  • developing
  • transferring
  • developing
500

How many devices can a Bluetooth device connect to simultaneously?

  • 7
  • 5
  • 10
  • 127
  • 24
  • 7
500

What is the purpose of the Additional Drivers button in the Sharing tab of the Printer Properties?

  • to add additional drivers for other operating systems
  • to add additional drivers for other printers connected to the computer
  • to add additional drivers for other printers in the network
  • to add additional drivers for duplex printing
  • to add additional drivers for other operating systems
600

Which two devices are commonly powered by PoE? (Choose two.)

  • access point
  • core switch
  • modular switch
  • router
  • IP phone
  • access point
  • IP phone
600

After applying a solution to a printer problem, a technician restarts the printer and prints a test page. Which step of the troubleshooting process is the technician applying?

  • testing a theory to determine the cause of the problem
  • documenting findings, actions, and outcomes
  • identifying the problem
  • verifying the solution and system functionality
  • verifying the solution and system functionality
600

Which type of RAM modules are designed for the space limitations of laptops?

  • DIMMs
  • SIMMs
  • SRAM
  • SODIMMs
  • SODIMMs
600

What is a common function of a proxy server?

  • to provide access to a shared pool of configurable computing resources
  • to store frequently accessed web pages on the internal network
  • to control who is permitted to access the internal network
  • to detect malicious signatures by monitoring traffic that is entering the internal network
  • to store frequently accessed web pages on the internal network
600

A customer brings a laptop into a computer repair shop. The technician can tell that the laptop is powered on by the power light, but nothing displays on the screen. What are two possible issues that could cause this symptom? (Choose two.)

  • The video cable is loose.
  • The screen cutoff switch needs cleaning or is damaged.
  • The backlight needs adjusting.
  • The laptop has gone into sleep mode.
  • The display properties need adjusting.

The screen cutoff switch needs cleaning or is damaged

  • The laptop has gone into sleep mode.
700

What is the correct order of the layers of the TCP/IP model from the top layer to the bottom?

  • network access, transport, internet, application
  • application, internet, network access, transport
  • application, session, network, data link, physical
  • application, transport, internet, network access
  • application, transport, internet, network access
700

What is a reason to escalate a problem from a level one technician to a level two technician?

  • when drivers, applications, or operating systems need to be installed
  • when the screen resolution of a customer PC needs to be adjusted
  • when the equipment needs to be rebooted
  • when a peripheral device needs to be replaced
  • when drivers, applications, or operating systems need to be installed
700

Which laptop component would be considered an FRU?

  • display
  • battery
  • external card reader
  • SODIMM
  • display
700

What two default wireless router settings can affect network security? (Choose two.)


  • WEP encryption is enabled.
  • The wireless channel is automatically selected.
  • MAC address filtering is enabled.
  • A well-known administrator password is set.
  • The SSID is broadcast.
  • WEP encryption is enabled.
  • A well-known administrator password is set.
700

What electrical unit refers to the number of electrons moving through a circuit per second?

  • power
  • voltage
  • current
  • resistance
  • current
M
e
n
u