Topic 5: Exam Pool E (NEW)
A company wants to get the fastest network speeds possible between nearby locations. If all technologies are available, which of the following connection types should the company use?
A. Fiber
B. DSL
C. Satellite
D. Coaxial
Explanation: Fiber-optic connections offer the highest speeds and bandwidth, making it the best choice for fast data transmission between nearby locations.
A company gives users microSD cards to install on smartphones so users can store pictures that will be used on the website. After installing the cards, users report only being able to save a small number of pictures on the microSD cards before running out of space. Which of the following is the most likely issue?
A. ThemicroSD cards were not properly formatted before being installed.
B. ThemicroSD cards are not compatible with the smartphones.
C. ThemicroSD cards are not capable of UHD storage.
D. ThemicroSD cards were not selected for camera storage.
Explanation: If users are only able to save a small number of pictures on the microSD cards before running out of space, it suggests a formatting issue. Improper or incomplete formatting can lead to the card not utilizing its full storage capacity, resulting in significantly less available space for storing pictures. Formatting the microSD cards correctly would ensure the file system on the cards is set up properly, allowing the devices to use the full capacity of the cards for storage. Compatibility, UHD storage capability, and camera storage settings are less likely to be the issue in this scenario.
References: The necessity of proper formatting for storage devices is a fundamental aspect of managing digital storage, as outlined in the basic principles of digital storage and file systems.
A user is reporting that a computer has been very slow in recent days. The technician looks into the problem and finds pop-ups are randomly appearing on the screen. Which of the following is the next step the technician must take?
A. Establish a knowledge base.
B. Establish a theory of probable cause.
C. Establish a new theory and consider escalating.
D. Establish a plan of action.
Explanation: The technician has identified the symptoms (slow performance and random pop-ups) and must now establish a theory of probable cause, such as malware or spyware infection. This step aligns with the CompTIA troubleshooting methodology.
✑ Why Not A (Establish a knowledge base): This is irrelevant at this stage;
knowledge bases are used for reference and documentation.
✑ Why Not C (Establish a new theory and consider escalating): The technician has not yet created or tested a theory, making escalation premature.
✑ Why Not D (Establish a plan of action): Planning an action occurs after determining the cause of the problem.
CompTIA A+ Exam Reference: Core 2 (220-1102), Section 3.1, troubleshooting methodology.
A company has a dot matrix printer that uses carbon paper. The company reports that the first page is printing too light, although the following pages are still legible. Which of the following MOST likely needs to be fixed?
A. The print drum is worn and loose causing the printing to be light in places
B. The ribbon is low on ink or missing and must be replaced to get proper output
C. The heating element has failed, and a new one needs to be installed for proper transfer
D. The wrong type of filement is loaded, preventing it from sticking correctly
E. The fuser assembly is not calibrated properly, causing it to impact the paper too hard
Explanation: Dot Matrix printers do not use heat, they use a pin striking an inked ribbon
(for the first copy, the subsequent copies are handled by the carbon paper)
The ribbon is low on ink or missing and must be replaced to get proper output in a dot
matrix printer that uses carbon paper.
References: CompTIA A+ Certification Exam Guide,
Exam 220-1001, Page 361
Which of the following is an email authentication method designed to detect email spoofing by attaching a digital signature to outgoing email?
A. SPF
B. DKIM
C. DNS pointer
D. MX records
Explanation: DKIM (DomainKeys Identified Mail) is an email authentication method that attaches a digital signature to outgoing emails to verify the email’s authenticity and detect email spoofing.
✑ SPF (Sender Policy Framework): Specifies which mail servers are authorized to
send emails for a domain but does not involve digital signatures.
✑ DNS Pointer (PTR): Used for reverse DNS lookups, not email authentication.
✑ MX Records: Specify mail servers for email delivery but do not authenticate emails.
CompTIA A+ Exam Reference: Core 2 (220-1102), Section 2.4, email security and authentication.
Client-side virtualization guest machines have security requirements similar to physical machines, but they also need to ensure separation from other guest machines. Which of the following BEST describes this client-side guest security requirement?
A. Isolation
B. Authentication
C. Hardening
D. Authorization
Explanation: Client-side virtualization guest machines require isolation from other guest
machines to maintain their security. Isolation ensures that each virtual machine is
separated from others and runs its own operating system and applications, making it less
vulnerable to attacks from other guest machines.
References: CompTIA A+ Certification
Exam Objectives 220-1002 - Virtualization and cloud computing - 4.1
A customer is having an issue printing documents. The customer can print a text document without any issue. However, when the customer prints a PDF containing images, the job fails and no other jobs will run until the computer is rebooted. Which of the following is the most likely cause of the issue?
A. The firmware is EOL.
B. The printer is using a PostScript driver.
C. The user is sending too many documents.
D. The print queue is moving too slowly.
Explanation: Printers that use PostScript drivers are designed to handle complex printing tasks, including detailed graphics and images in PDF files. However, if the printer's PostScript driver is outdated, incompatible, or improperly configured, it may struggle to process and print PDF files containing images. Updating or reinstalling the PostScript driver, or choosing a different driver compatible with the printer and document type, can resolve this issue.
A user reported that a laptop would no longer turn on after the battery was depleted, even though the laptop was charged the night before. An on-site technician was dispatched with a spare laptop and verified that the AC adapter and power cord were functional. Which of the following was the most likely cause of the issue?
A. Swollen battery
B. Calibration corruption
C. Excessive wattage
D. Damaged port
Explanation: A swollen battery can prevent a laptop from powering on as it disrupts connectivity or damages internal components. Identifying physical signs such as swelling or bulging is key, which aligns with the CompTIA A+ Core 1 objective on mobile device troubleshooting, specifically battery issues.
A user in a home office is unable to connect to the internet. A technician asks the user to run the ipconfig command. Which of the following first octets immediately suggests an issue with the IP address?
A. 10
B. 169
C. 172
D. 192
A technician replaced a motherboard on a server, and now the 64-bit hypervisor is not loading correctly. Which of the following needs to be enabled for the hypervisor to run?
A. Hardware prefetcher
B. Hyperthreading
C. vPro
D. VT-d
Explanation: https://techlibrary.hpe.com/docs/iss/proliant-gen10-uefi/s_enabling_VTd.
html
Enabling VT-d (Virtualization Technology for Directed I/O) in the server's BIOS settings is
required for the hypervisor to run properly.
References: CompTIA A+ Certification Exam
Guide, Ninth Edition, Chapter 11
A technician installed four hard drives in a RAID 5 configuration. After creating the array, the technician is unable to copy files to the array within Windows. Which of the following should the technician do next?
A. Decrease the number of drives to three.
B. Partition and format the volume.
C. Rebuild the array.
D. Check the hot spare status.
Explanation: After setting up a RAID 5 array, the next step is to make the storage space usable by the operating system. This involves partitioning the array to define how the storage space is organized and then formatting it with a file system that the operating system can understand, thus making it possible to copy files to the array. Decreasing the number of drives, rebuilding the array, or checking the hot spare status would not address the issue of the array not being ready to store files.
CompTIA 220-1101 : Practice Test Which of the following involves installing an application on a server so several users can run the application concurrently without the need for local installation?
A. Client virtualization
B. Software as a service
C. Sandboxing
D. Embedded software
Explanation: Client virtualization involves installing an application on a server and enabling multiple users to run the application simultaneously via virtualized sessions. This eliminates the need for individual installations on local machines.
✑ Why Not B (Software as a Service): SaaS delivers software over the internet and
does not require local installations but is managed by a third party, not the organization itself.
✑ Why Not C (Sandboxing): Sandboxing is for isolating applications for security
testing, not for concurrent user access.
✑ Why Not D (Embedded software): Embedded software is installed on hardware devices, not shared across multiple users.
CompTIA A+ Exam Reference: Core 1 (220-1101), Section 4.2, virtualization concepts.
Page 3 out of 71 Pages |
Previous |