Topic 5: Exam Pool E (NEW)
A company wants to get the fastest network speeds possible between nearby locations. If all technologies are available, which of the following connection types should the company use?
A. Fiber
B. DSL
C. Satellite
D. Coaxial
A company gives users microSD cards to install on smartphones so users can store pictures that will be used on the website. After installing the cards, users report only being able to save a small number of pictures on the microSD cards before running out of space. Which of the following is the most likely issue?
A. ThemicroSD cards were not properly formatted before being installed.
B. ThemicroSD cards are not compatible with the smartphones.
C. ThemicroSD cards are not capable of UHD storage.
D. ThemicroSD cards were not selected for camera storage.
A user is reporting that a computer has been very slow in recent days. The technician looks into the problem and finds pop-ups are randomly appearing on the screen. Which of the following is the next step the technician must take?
A. Establish a knowledge base.
B. Establish a theory of probable cause.
C. Establish a new theory and consider escalating.
D. Establish a plan of action.
A company has a dot matrix printer that uses carbon paper. The company reports that the first page is printing too light, although the following pages are still legible. Which of the following MOST likely needs to be fixed?
A. The print drum is worn and loose causing the printing to be light in places
B. The ribbon is low on ink or missing and must be replaced to get proper output
C. The heating element has failed, and a new one needs to be installed for proper transfer
D. The wrong type of filement is loaded, preventing it from sticking correctly
E. The fuser assembly is not calibrated properly, causing it to impact the paper too hard
Which of the following is an email authentication method designed to detect email spoofing by attaching a digital signature to outgoing email?
A. SPF
B. DKIM
C. DNS pointer
D. MX records
Client-side virtualization guest machines have security requirements similar to physical machines, but they also need to ensure separation from other guest machines. Which of the following BEST describes this client-side guest security requirement?
A. Isolation
B. Authentication
C. Hardening
D. Authorization
A customer is having an issue printing documents. The customer can print a text document without any issue. However, when the customer prints a PDF containing images, the job fails and no other jobs will run until the computer is rebooted. Which of the following is the most likely cause of the issue?
A. The firmware is EOL.
B. The printer is using a PostScript driver.
C. The user is sending too many documents.
D. The print queue is moving too slowly.
A user reported that a laptop would no longer turn on after the battery was depleted, even though the laptop was charged the night before. An on-site technician was dispatched with a spare laptop and verified that the AC adapter and power cord were functional. Which of the following was the most likely cause of the issue?
A. Swollen battery
B. Calibration corruption
C. Excessive wattage
D. Damaged port
A user in a home office is unable to connect to the internet. A technician asks the user to run the ipconfig command. Which of the following first octets immediately suggests an issue with the IP address?
A. 10
B. 169
C. 172
D. 192
A technician replaced a motherboard on a server, and now the 64-bit hypervisor is not loading correctly. Which of the following needs to be enabled for the hypervisor to run?
A. Hardware prefetcher
B. Hyperthreading
C. vPro
D. VT-d
A technician installed four hard drives in a RAID 5 configuration. After creating the array, the technician is unable to copy files to the array within Windows. Which of the following should the technician do next?
A. Decrease the number of drives to three.
B. Partition and format the volume.
C. Rebuild the array.
D. Check the hot spare status.
CompTIA 220-1101 : Practice Test Which of the following involves installing an application on a server so several users can run the application concurrently without the need for local installation?
A. Client virtualization
B. Software as a service
C. Sandboxing
D. Embedded software
Page 3 out of 66 Pages |
Previous |