Topic 3: Exam Pool C
A technician needs to install RAM into a rackmount server that will be used as a VM host. Which of the following would be BEST to install?
A. SODIMM
B. VRAM
C. DDR4
D. ECC
Explanation: When installing RAM into a server that will be used as a VM host, it is recommended to install ECC (Error-Correcting Code) RAM to help prevent errors that can cause virtual machines to crash. References: https://www.servermonkey.com/blog/ecc-vsnon- ecc-ram-what-are-the-differences.html
A technician is conducting the following tests on a laptop with a wireless NIC:
•ping of the default gateway
•ping of the localhost
•tracert of the IP address of the default gateway
Which of the following will the technician find by running these tests? (Select two).
A. DNS suffix
B. Connection latency
C. Firewall status
D. Wireless signal strength
E. Subnet mask of thenetwork
F. MAC address of the wireless NIC
Explanation: By running the specified tests (ping of the default gateway, ping of the localhost, and tracert of the IP address of the default gateway), the technician can find connection latency and the subnet mask of the network.
✑ Connection latency: The time it takes for a ping or tracert command to send and
receive a response helps in determining the latency in the network connection. Higher latency values can indicate delays in communication over the network.
✑ Subnet mask of the network: The ipconfig command, which the technician would
initially run to perform these tests, provides various details about the network configuration, including the subnet mask. The subnet mask is essential in determining the network and host portions of an IP address, which is crucial for networking and troubleshooting connectivity issues.
A field technician for an airport receives a support ticket that states customers are having issues viewing a screen that displays information about departing flights. While checking the case history, the technician sees that all flight information screens were recently moved when the terminal gates were remodeled. Which of the following actions should the technician perform after verifying the screen has power?
A. Ensure the input connections to the screen are secure
B. Swap cables with a screen that works
C. Check to see if the device outputting the data is turned on
D. Determine if the screen is compatible with the output device
Explanation: The technician should ensure the input connections to the screen are secure 1. The screen may not be receiving the signal from the device outputting the data if the input connections are not secure1. Swapping cables with a screen that works is not likely to be the correct option1.
A technician is configuring a desktop computer, and the hard drive must be encrypted. Which of the following will the technician need to verify is enabled to complete this configuration?
A. ATX
B. NIC
C. TPM
D. ARM
Explanation: TPM stands for Trusted Platform Module, which is a hardware component that securely stores encryption keys and other sensitive data12. TPM can be used to enable hard drive encryption, which is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions34. Hard drive encryption protects the data from unauthorized access in case the hard drive is lost, stolen, or tampered with.
Which of the following wireless technologies is used by mobile devices to process payments at kiosks?
A. Wi-Fi 6
B. Bluetooth
C. NFC
D. RFID
Explanation: NFC stands for near-field communication, which is a wireless technology that allows two devices to exchange data when they are in close proximity (usually within a few centimeters). NFC is commonly used by mobile devices to process payments at kiosks, such as Apple Pay or Google Pay. Wi-Fi 6 is a wireless standard that provides faster speed and lower latency than previous versions of Wi-Fi. Bluetooth is a wireless technology that allows devices to communicate over short distances (usually within 10 meters). RFID stands for radio-frequency identification, which is a wireless technology that uses radio waves to identify and track objects that have RFID tags attached to them.
A user is testing a new operating system that is contained on a USB drive. The user wants the new OS to load automatically when the computer is powered on. Which of the following should the user configure?
A. BIOS password
B. Trusted Platform Module
C. USB permissions
D. Boot options
Which of the following video cables can carry an audio signal?
A. HDMI
B. S-Video
C. VGA
D. DVI
Explanation: This is because HDMI (High-Definition Multimedia Interface) is a digital video cable that can also carry audio signals1. HDMI cables are commonly used to connect devices like Blu-ray players, game consoles, and streaming boxes to HDTVs and monitors. The other options are not capable of carrying audio signals. VGA (Video Graphics Array) is an analog video cable that only carries RGBHV signals12. S-Video (Super Video) is another analog video cable that carries separate luminance and chrominance signals1 . DVI (Digital Visual Interface) is a digital video cable that can carry either analog or digital signals, but not audio1.
A user plugs in a laptop to the corporate network and the laptop is automatically assigned an IP address. Which of the following server types was used to assign the IP address?
A. DNS
B. AAA
C. DHCP
D. Web
Explanation: When a device such as a laptop is connected to a network and automatically assigned an IP address, it is typically done through DHCP (Dynamic Host Configuration Protocol). DHCP servers are responsible for dynamically assigning IP addresses to devices on a network, ensuring that each device has a unique IP address and can communicate on the network without IP conflicts.
Which of the following cloud-computing concepts describes an application that is hosted on the internet but can be used and configured as needed internally per organization?
A. Hybrid cloud
B. Public cloud
C. laaS
D. SaaS
E. PaaS
Explanation: Platform as a service (PaaS) is a cloud-computing concept that describes an application that is hosted on the internet but can be used and configured as needed internally per organization. PaaS provides a platform for developing, testing, deploying, and managing applications without having to maintain the underlying infrastructure or software. Hybrid cloud is a combination of public and private cloud services that share data and resources. Public cloud is a cloud computing model that provides services and resources to anyone over the internet. Infrastructure as a service (IaaS) is a cloud computing model that provides servers, storage, networking, and software over the internet.
A user's device needs more memory, so a technician installs extra RAM with the following specifications
2 x8Gb DDR3-1066(PC3-S500) 1 x 16Gb DDR3-1333 (PC3-10600)
Which of the following speeds would maximize reliability?
A. 1,066
B. 1 333
C. 8.500
D. 10,600
A laptop does not have any audio output from the built-in speakers. The Windows Device Manager shows a down arrow for the audio device. Which of the following will correct this audio issue?
A. Replacing the speakers
B. Increasing the volume
C. Enabling the audio device
D. Updating the driver
Explanation: Enabling the audio device is the correct action to correct an audio issue where a laptop does not have any audio output from the built-in speakers and Windows Device Manager shows a down arrow for the audio device. A down arrow indicates that the audio device is disabled and needs to be enabled by right-clicking on it and selecting Enable device. Replacing the speakers, increasing the volume, or updating the driver are unlikely to solve the issue if the audio device is disabled.
Which of the following is a benefit of using a VLAN?
A. It minimizes collision domains.
B. It provides private access to cloud resources.
C. It increases network address space.
D. It enables secure network segmentation.
Explanation:
A VLAN (Virtual Local Area Network) segments a physical network into separate logical networks, enhancing security by isolating traffic.
✑ Why Not A (Minimizes collision domains): VLANs manage broadcast domains, not
collision domains.
✑ Why Not B (Provides private access to cloud resources): VLANs operate within a local network, not cloud-specific.
✑ Why Not C (Increases network address space): VLANs do not affect address space.
CompTIA A+ Exam Reference: Core 1 (220-1101), Section 2.6, VLAN concepts.
| Page 34 out of 71 Pages |
| 23242526272829303132333435363738394041424344 |
| 220-1101 Practice Test Home |
Real-World Scenario Mastery: Our 220-1101 practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.
Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before CompTIA A+ Certification Exam: Core 1 exam day arrives.
Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive 220-1101 practice exam questions pool covering all topics, the real exam feels like just another practice session.