Which of the following ports are used by the NetBIOS protocol to share files and printers on a Windows network?

NetBIOS is a protocol used for File and Print Sharing under all current versions of Windows. While this in itself is not a problem, the way that the protocol is implemented can be. There are a number of vulnerabilities associated with leaving this port open.

NetBios services:
NETBIOS Name Service (TCP/UDP: 137)
NETBIOS Datagram Service (TCP/UDP: 138)
NETBIOS Session Service (TCP/UDP: 139)

By default, when File and Print Sharing is enabled it binds to everything, including TCP/IP (The Internet Protocol), rather than just the local network, meaning your shared resources are available over the entire Internet for reading and deletion, unless configured properly. Any machine with NetBIOS enabled and not configured properly should be considered at risk. The best protection is to turn off File and Print Sharing, or block ports 135-139 completely. If you must enable it, use the following guidelines:

1. Use strong passwords, containing non-alphanumeric characters.
2. Attach "$" at the end of your share names (the casual snooper using net view might not see them).
3. Unbind File and Print Sharing from TCP/IP and use NetBEUI instead (it's a non-routable protocol).
4. Block ports 135-139 in your router/firewall.

Keep in mind that you might still be leaking out information about your system that can be used against you (such as your computer and workgroup names) to the entire Internet, unless ports are filtered by a firewall.

There is also a Critical Windows RPC vulnerability affecting ports 135,139 and 445, as detailed here: MS Technet Security Bulletin [MS03-026]

The following trojans/backdoors also use these ports:
Chode, God Message worm, Msinit, Netlog, Network, Qaz

W32.HLLW.Moega [Symantec-2003-080813-3234-99]

W32.Reidana.A [Symantec-2005-032515-4042-99] (2005.03.27) - worm that spreads using the MS DCOM RPC vulnerability (MS Security Bulletin [MS03-026]) on port 139. The worm attempts to download and execute a remote file via FTP. Opens TCP port 4444.

W32.Klez worm [Symantec-2002-031910-1028-99] - a class of worms that collects email addresses from an infected computer's Windows address book and propagates using its own SMTP server. As of April 26, 2002, there are nine variants of the Klez worm that all exploit the "Microsoft Internet Explorer Incorrect MIME header" vulnerability, which causes an email attachment to be automatically executed when an HTML email is previewed by a Microsoft Outlook or Outlook Express user. The worm can arrive as an email attachment with one of the following file extensions: asp, bak, c, cpp, doc, htm, html, jpg, mp3, mpg, mpeg, pas, rtf, wab, or xls.

W32.Sircam.Worm [Symantec-2001-071720-1640-99] - a computer worm that propagates by e-mail from Microsoft Windows systems. It also spreads via open shares on a network. Sircam scans the network for computers with shared drives and copy itself to a machine with an open (non-password protected) drive or directory.

Buffer overflow in a certain driver in Cisco Security Agent 4.5.1 before 4.5.1.672, 5.0 before 5.0.0.225, 5.1 before 5.1.0.106, and 5.2 before 5.2.0.238 on Windows allows remote attackers to execute arbitrary code via a crafted SMB packet in a TCP session on port (1) 139 or (2) 445.
References: [CVE-2007-5580] [BID-26723] [SECUNIA-27947] [OSVDB-39521]

Server Message Block (SMB) also uses this port. It is used by Microsoft Windows file and print services, such as Windows Sharing in Mac OS X.

What is the port for outbound email traffic

25 SMTP

Which of the following ports is used by the service location protocol when organizing and locating printers databases and other resources in a network?

427

Which type of wireless network utilizes the 5 GHz frequency band and reaches speeds of up to 54 Mbps?

802.11a

Which type of wireless network utilizes the 2.4 GHz frequency band and reaches up to 11 Mbps speeds?

802.11b

You are building a new server and want to ensure that its memory can allow the server to continue working even if there is an issue that corrupts data held within the memory modules. Which of the following types of memory should you select for the server?

ECC (Error correcting code memory)

Which of the following network configurations on a virtual machine are used to prevent the VM from accessing the internet, but still allows it to communicate with other VMs on the host and the host itself?

External
Internal (Answer)
Private
Localhost

You want to create a website for your new technical support business. You decide to purchase an on-demand cloud-based server and install Linux, Apache, and WordPress on it to run your website. Which of the following best describes which type of service you have just purchased?

Daas
Paas
Iaas (Answer)
Saas

What are the 6 steps to CompTIA Troubleshooting Method

Identify the problem
Establish a theory of probable cause
test the theory to determine the cause
establish a plan of action to resolve the problem and implement the solution
verify full system func. and if applicable implement preventative measure
document findings actions and outcomes

Jennifer just moved from France to the United States. She unpacks her computer and plugs it into the wall using a power adapter to ensure the plug connects properly. When she tries to power on the computer, the screen remains blank, she doesn't hear the fans spinning, and nothing appears to be happening. What is MOST likely the problem?

The psu output is set to 115V
the psu input is set to 220v (Answer)
the psu output is set to 220v
the psu input is set to 115v

A computer technician is trying to set up a shared printer on the corporate network. The users must send print jobs directly to the printer, and the printer will be used by multiple operating systems, including Windows, macOS, and Linux. Which of the following should the technician configure to meet these requirements best?

Virtual printer
bonjour
airprint
TCP/IP print server (answer) transmission control protocol

Which of the following is the MOST dangerous type of threat when using virtualization?

VM escape (Answer)
VM sprawl
Rogue VM
Virtual NIC duplication

During a disaster recovery, which of the following statements is true?

A vm has more downtime than a physical server
A vm has less downtime than a physical server(Answer)
Both a vm and a physical server have same downtime
A vm cannot be used for redundancy or load balancing

If you can connect to a website using the name and it doesn't work but the IP address for that same website does work what command should be used to fix the issue?

ipconfig/all
ipconfig/release
ipconfig/renew
ipconfig/flushdns (Answer)

Josie from Human Resources was just issued a new laptop from the company. When she plugs the laptop into the network's wall jack and turns it on, she receives an error message. She calls the service desk to report that the error message being displayed states, "There is an IP address conflict with another system on the network." You are working as a field service technician and have been asked to resolve this error. What should you do?

Replace the wired network adapter on the laptop

Disable the wired network adapter and require the laptop to use the wireless network adapter instead

Choose a new IP address and assign it to laptop

Configure the laptops network connection to use DHCP instead of a static IP (Answer)

A customer is complaining that they cannot connect to the local network share drive. You run the command 'ipconfig /all' from their workstation, and it returns an IP of 169.254.34.12. Which of the following is the problem with this workstation?

The workstation couldnt reach the gateway
The workstation couldnt reach the proxy server
The workstation couldnt reach DHCP server (Answer)
The workstation couldnt reach the DNS server

The Chief Financial Officer has asked Maria for a recommendation on how the company could reduce its software licensing costs while still maintaining the ability to access its application server remotely. Which of the following should Maria recommend?

Use a remote desktop protocol (RDP) application on a windows 10 desktop
Use a virtual network client (VNC) on a windows 2016 server
Install and deploy thin clients without an operating system for each user (Answer)
Install and deploy Windows 10 home edition on each users thick client

Which of the following hard drive form factors would be connected to your laptop internally using a Micro SATA connection?

1.8 (Answer)
2.5
M.2
3.5

Which of the following laptop displays requires an inverter?

LED
Plasma
OLED
LCD (answer)

You are configuring a SOHO network that will contain 7 devices, but you only have a single public IP address. Which of the following concepts should be configured to allow the 7 devices to share that single IP when connecting to the internet?

DMZ
UPnP
DCHP
NAT (answer) (AKA Network address translation)

Which of the following devices should be installed as an intermediary between your clients and the web servers they want to connect to make an HTTP request from the client, check it, and then forward it to its destination?

DNS server
DHCP server
File server
Proxy server (Answer)

Which of the following ports should you unblock at the firewall if your workstation cannot access http://www.diontraining.com but can access https://www.diontraining.com?

445
443
80 (Answer)
53

You believe that one of the ports on a switch is defective. To prove your hypothesis, which of the following tools should you use?

Crimper
Punchdown tool
Cable tester
Loopback plug (Answer)

Which of the following technologies combines the functionality of a firewall, malware scanner, and other security appliances into one device?

Syslog
IDS
UTM (Answer) AKA Unified threat management
IPS

Which type of internet connection allows for high-speed bi-directional data communication over a hybrid fiber-coaxial (HFC) connection?

ISDN
DSL
Fiber
Cable (Answer)

When using an impact printer, what is used to transfer the ink to a piece of paper?

Toner
Thermal paste
Ribbon (Answer)
Inkjet cartridge

What describes how many times the image on the monitor changes per second?

Refresh rate (Answer)
Yaw rate
Frame rate
Aspect ratio

John connected his MacBook to the corporate network and is trying to print to the office's large network printer. John notices that the print job is failing to print. The other employees in the office are having no issues printing from their Windows workstations. Which of the following should be done to resolve John's issue?

Restart the print spooler on the print server

Install the print drivers for OS X on the print server (Answer)

Enable bonjour on johns macbook

Install and enable the OS X printing option on the network printer

Which port is used to connect to an IMAP server?

25
110
143 (Answer)
443

Which of the following types of laptop displays would utilize a fluorescent backlight to illuminate the image?

LED
OLED
LCD (Answer)
Plasma

Your email client has been acting strangely recently. Every time you open an email with an image embedded within it, the image is not displayed on your screen. Which of the following is the MOST likely cause of this issue?

Incorrect email settings in the anti virus software

Incorrect settings in the host-based firewall

Incorrect settings in your web browsers trusted site configuration

Incorrect settings in your email proxy server

Incorrect security settings in the email client (Answer)

Which of the following ports should you unblock at the firewall if your workstation cannot access https://www.diontraining.com but can access http://www.diontraining.com?

53
445
80
443 (Answer) AKA https

You are trying to select the best device to install to proactively stop outside attackers from reaching your internal network. Which of the following devices would be the BEST for you to select?

IDS
Proxy server
IPS (answer aka intrusion prevention system)
Syslog server

You are setting up a hotel ballroom for a training workshop. Which of the following devices would BEST allow the conference attendees to connect their laptops to the hotel's network when inside the conference areas?

Switch
Router
Hub
Access point (Answer)

Which of the following ports is used by SNMP by default?

25
139
53
161 (Answer)

Which network technology is used to prioritize certain types of network traffic over others?

Qos (Answer) aka quality of service
Whitelist
ACL
MAC filtering

What is the name of a computer system that is designed to perform a specific and dedicated function?

UTM system
Embedded system (Answer)
Legacy system
patch system

Which of the following ports is used by the native file and printer sharing protocol for Mac computers and supports many unique Mac attributes that are not supported by other protocols?

427
548 (Answer)
67
445

Which of the following protocols operates over port 3389 by default?

POP3
SSH
RDP (Answer) AKA remote desktop protocol
Telnet

Which of the following devices could be used to extend transmissions of a signal over longer distances by receiving and retransmitting a given signal?

Switch
Repeater (Answer)
Gateway
Firewall

Which of the following ports should you block at the firewall if you want to prevent a remote login to a server from occurring?

23 (Answer)
25
110
443

You see some fading across your papers when you are printing things using your office's laser printer. It appears that the black is more faded than the colors on your documents. What is the BEST solution to this problem?

Change the feed rate of the paper
Replace the toner cartridge in the printer (Answer)
Clean the printers transfer roller
Increase the temperature of the fuser element

You see streaks of toner across your papers when you print things using your office's laser printer. What is the MOST likely cause of this problem?

Change the feed rate of the paper
Replace the toner cartridge in the printer
Clean the printers transfer roller (Answer)
Increase the temp. of the fuser element

Your office has a legacy wide format printer that must be connected to your network. The connection on the printer is an older DB-9 serial connection. What is the BEST option for connecting this legacy device to your corporate network?

Purchase a RS-232 to RJ-45 adapter so that you can connect it to the network (Answer)

Purchase a wireless print server and connect it to the printer via usb

Purchase an inexpensive RS-232 to USB adapter to connect it to the network

Configure a reverse proxy on the printer as a DNS workaround

How do you get to the boot order menu?

F2
F11
F12 (Answer)
F8

You have been asked to install a network cable in the crawl space between the ceiling in your office and the roof. You need to choose the right type of cable to ensure you do not violate the local fire codes. Which of the following cable types should you choose?

Fiber
Plenum (Answer)
Coaxial
Shielded

An auto mechanic needs to purchase a new printer for their shop. The printer will be used to create estimates and invoices for their customers. The printer must support the ability to create duplicate invoices using multiple sheets of paper separated by carbon paper using tractor-fed paper. Which of the following types of printers should be used?

Laser
Inkjet
Thermal
Impact (Answer)

A computer technician is building a server that will run multiple virtual machines simultaneously. Which CPU technology should be selected so that the processor can utilize two logical cores?

32-bit CPU
dedicated GPU
Multi core processor
Hyperthreading (Answer)

What type of cable is most commonly used to terminate a serial connection to a modem?

RJ-45
RJ-11
RG-59
DB-9 (Answer)

Your desktop computer is currently running out of internal storage space. You want to upgrade the workstation with more internal storage to store additional videos, photos, and backups. Which of the following is the BEST storage solution to avoid having to expand again next year while still meeting your need to store more data?

1 TB SSD
50 TB SAN
5TB NAS
3 TB HDD (Answer) all others r network storage solutions

Which option would you MOST likely use to configure PXE (Preboot Execution Environment) to set up remote imaging on a computer during a deployment?

BIOS boot option (Answer)
Windows boot menu
Secure boot configuration
Power management configuration

Which of the following requires the use of a physical printer to print a document?

Print to image
Print to XPS
print to PDF
Print to Network (Answer)

Which of the following virtualization concepts refers to a VM's ability to have memory allocated for its use?

Synchronization
Virtual application streaming
Resource pooling (Answer)
Measured service

A user wants to run Windows 10 on their new Macbook without dual booting with Boot Camp. What software would allow the user to run Windows inside of OS X by using a Type 2 hypervisor?

Virtual box (Answer)
Vmware ESXi
Red hat enterprise virtualization (RHEV)
Hyper-V

Which of the following cloud computing resources are MOST important when determining a cloud file-storage synchronization application's performance?

CPU utilization
Disk speed
RAM utilization
I/O bandwidth (Answer)

What type of services can allow you to get more storage and more resources added to the cloud as fast as possible?

Rapid elasticity (Answer)
Measured services
Metered services
Resource pooling

You are building a virtualization environment to host public-facing servers that must connect to the internet. This will require that you install several secured Linux distributions as VMs. The VMs need to have access to a virtualized network and communicate with the host operating system and the internet. Which of the following types of network connections should you configure for each VM?

Internal
Private
External (Answer)
Localhost

OBJ-4.2: If you select external, the VMs would have internet access. If you select internal, each VM can communicate between the host and the other VMs. The private network connection type will create a switch that is usable only by the VMs. The VMs cannot use the switch to communicate with the host. If you select localhost, each VM could only communicate with itself.

Which type of technology imitates hardware without relying on the CPU being able to run the software code directly?

Hypervisor
Simulator
Emulator (Answer)
Virtual machine

Which of the following is used when a CDMA smartphone attempts to connect to the cellular network while traveling? (Select ANY that apply)

PRI (Answer)
PRL (Answer)
Baseband
Firmware

Which port is used to connect to a POP3 server?

110 (Answer)
143
443
25

Which port is used to connect to an SMTP server?

110
143
443
25 (Answer)

Which of the following types of networks would be created if a wireless access point, a microwave link, and a satellite link were combined in a mesh?

PAN
WMN (Answer) AKA wireless mesh network
WAN
LAN

Which cellular technology is compromised of LTE and LTE-A to provide higher data speeds than previous cellular data protocols?

3g
4g (Answer)
5g
WMN

You have just set up an FTP server to allow users to download the new open-source application your company is releasing. Which port should be opened to allow users to connect to this server?

21 (Answer) AKA FTP port (file transfer protocol)
22
23
25

Which cellular technology utilizes new frequency bands to reach proposed speeds of up to 70 Gbps?

3g
4g
5g (Answer)
LTE

What port is port 110?

DNS
IMAP
SMB
POP3 (answer)

Which cellular technology is compromised of HSPA+ and EV-DO to provide higher data speeds than previous cellular data protocols?

3g (Answer)
4g
5g
LTE

Which type of wireless network utilizes the 2.4 GHz frequency band and reaches speeds of up to 54 Mbps?

802.11a
802.11b
802.11n
802.11ac
802.11g (Answer)

Which type of wireless network utilizes the 5 GHz frequency band and reaches speeds of up to 1.7 Gbps?

802.11a
802.11b
802.11g
802.11n
802.11ac (Answer)

You are configuring a SOHO network for a small coffee shop. They have found that certain customers will buy a single coffee cup and then sit at the coffee shop all day to use the WiFi. The owner has asked you to block this customer's laptop from connecting by placing it on a blacklist. Which of the following configurations would you use to blacklist this customer's device based on its unique hardware identifier?

Enforce a WPA2 PW
Port forwarding
MAC Filtering (Answer) aka media access control
Port filtering

You are installing some new hard drives in a legacy Novell NetWare server in a closed IPX network. The hard drive has a 4-bit set of jumpers that must be configured to represent the device's ID number (0-15) in the storage device chain. Which of the following types of connectors would you use for data transfer with these hard drives?

SCSI (Answer) The ONLY hdds that use ID numbers
USB
SATA
PATA

The large multi-function printer in your office is shared between 12 people. Unfortunately, it has stopped working, and the technicians have determined it must be replaced. A new printer has been ordered, but it will be 2 weeks until it arrives. The only other printer available in your office is the manager's printer, but it is connected via USB to their workstation. One of the technicians would like to share the manager's printer with the other 12 employees for the next 2 weeks as a temporary workaround. Unfortunately, there are no spare wired network jacks available in the office to connect the printer to the network directly, but there is a wireless access point nearby. Which of the following is the BEST way for the technician to allow the 12 employees to access the manager's printer

Provide a USB thumb drive to each employee so that they can transfer their files to the manager's computer for direct printing

Purchase a portable wireless print server and connect the printer to it using USB (Answer)

Configure a new printer on each users workstation and point it to the managers IP address

Share the printer directly from the managers computer by creating a share and giving the other employees access rights to the share

What type of network cable should be used to prevent crosstalk?

UTP
Plenum
RJ-11
STP (Answer) shielded twisted pair cable

You are building a virtualization environment to host several secured Linux distributions as VMs. The VMs need to have access to the local corporate network and communicate with the host operating system, the other VMs, and the internal network clients. Still, they should not have access to the internet. Which of the following types of network connections should you configure for each VM?

External
Localhost
Internal (Answer) lets the VM connect between host and other VMs
Private

When using a Type 1 hypervisor virtualized environment, which of the following hardware types is necessary to connect the VMs to the corporate network?

VNC
Virtual NIC (answer) Network Interface Controller
VDI
VPN

Which of the following operating systems cannot be installed as a guest inside of a virtual machine on a Windows 10 laptop running Virtual Box?

Kali Linux
macOS (Answer) Its in a windows machine so only windows os
Red hat linux
windows 8

Which cloud computing concept is BEST described as focusing on replacing the hardware and software required when creating and testing new applications and programs from a customer's environment with cloud-based resources?

PaaS (Answer)
SaaS
IaaS
SECaaS

Tom is running some new CAT 5e cabling in an office building to connect a few offices. The ceiling is constructed as a drop' ceiling with fluorescent lights and does not have any cable trays. Due to the proximity of the fluorescent lights to the cable being run, what type of CAT 5e cable should be run?

UTP
STP (Answer) shielded twisted pair
Coaxial
Fiber

A user called the help desk to complain about an issue with their laptop's keyboard. Every time they type a word like "help" or "none," it is displaying as something cryptic like "he3p" or "n6ne". Which of the following is the MOST likely cause of this issue with the laptop keyboard?

The keyboard is faulty
the keyboard has crumbs
NumLock needs to be turned off (Answer)
Keyboard needs drivers

You are troubleshooting a Windows 10 workstation for a customer. You have identified the problem and performed a quick backup of the system. What is the NEXT step in the troubleshooting methodology?

establish a theory of probable cause

You have just finished building a Windows server, installing its operating system, updating its security patches, formatting a dedicated data partition, and creating accounts for all of the company's employees. What is the next thing that must be configured to provide users with the ability to access large multifunction devices across the network?

Print server (Answer)
RAID storage
File sharing
audit logging

You want to replace an old CRT display with the type of screen that produces less voltage and is more energy-efficient. Additionally, the screen should not contain a backlight. What type of display technology should you select?

LED
LCD
OLED(Answer)
Plasma

You have been asked to set up the corporate email on several mobile devices for Dion Training's employees. The employees will use their mobile devices to check their email when out of the office, but they will also need to check their email from their desktop computers. Which of the following mail protocols should you configure to allow the employees to receive their mail?

POP3
IMAP(Answer)
HTTPS
SMTP

Which of the following devices commonly use an ARM-based processor? (Select TWO)

Tablet (answer)
smartphone (answer)
desktop
laptop

Your son has a gaming laptop in his bedroom. He loves his laptop since it allows him to take it over to his friend's houses when desired, but his laptop only has 1 USB port. When he gets home, though, he prefers to use a USB mouse, keyboard, and webcam when he is playing games on his laptop. He only has $20 saved up but wants to buy a device that would allow him to connect all 3 of these peripherals with one USB connector. Which of the following do you recommend he purchase?

Port replicator
docking station
thunderbolt
USB 4 port hub (answer)

Which of the following technologies is commonly used to inventory the organization's equipment by attaching a tag to the device containing a chip programmed with the assets data, allowing one-way communication to occur from the tag to the reader?

NFC
RFID (Answer) radio frequency identification
Z wave
Zigbee

You are configuring a print server on the network. Which type of IP address should you configure it with?

Static(answer) easy to locate
dynamic
apipa
link local

Your network is running extremely slow. You have troubleshot the issue and determined that there are too many collisions on the network. Your network currently has 20 computers, all connected to a single 24-port hub on the network. Which of the following devices should you install to decrease the number of collisions?

Repeater
Switch (answer) hubs arent as smart as switches
Gateway
Firewall

Which of the following ports should you block at the firewall if you want to prevent a remote login to a server from occurring?

21
22(Answer) SSH secure shell protocol
80
143

Which of the following protocols operates over port 143 by default?

POP3
IMAP (ANSWER)
RDP
HTTPS

Which of the following wireless technologies allows a wireless device to automatically be configured for a SOHO wireless network with the push of a button?

WPA
WEP
WPS(ANSWER)
WPA2

Which of the following is an open-source wireless communication protocol operating in the 2.4 GHz frequency band and is primarily used for home automation?

Zigbee (Answer)
z wave
RFID
NFC

Which of the following ports is NOT used by the NetBIOS protocol to share files and printers on a Windows network?

137
139
138
21(answer)

Which of the following types of data should you transmit over UDP?

Stream videos on netflix (Answer) Uswer datagram protocol. Tracks data
attaching photos to email
paying cc bill
updating fb status

Which of the following ports is used for the request and distribution of DHCP configuration information?

53
67 (Answer)
80
162

Which of the following ports is used by the Server Message Block (SMB) protocol to share files and printers on a Windows network?

445 (answer)
443
21
143

Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function?

DMZ
UPnP(ANSWER) Universal plug and play
NAT
DHCP

Your company's printer is displaying an error of "Replace cartridge 1. Filament is empty." Based on this error, what kind of printer is your company using?

thermal
3d(answer)
inkjet
laser
impact

How many volts of electrical charge is applied to the drum of a laser printer?

-1200 volts
-9000 v
-600 v (answer)
-300

What are the dimensions of a MicroATX motherboard?

11x9.6
9.6x9.6 (answer)
6.7x6.7
3.6x2.9

You are attempting to install a full-sized PCIe network interface card into a 1U server, but it is too tall to fit into the machine. Which of the following do you need to install first to install the full-sized PCIe network interface card into the server?

AGP card
Riser card (answer)
SCSI Card
PCIe x16 card

Which motherboard form factor measures 6.7" x 6.7" (17 cm x 17cm) in size?

mAtx
mITX (answer) mini itx
ATX
ITX

A technician needs to upgrade the RAM in a database server. The server's memory must support maintaining the highest levels of integrity. Which of the following type of RAM should the technician install?

ECC (Error correction code) ANSWER
Parity
Non-parity
SODIMM

A user wants to print 2 copies of a 3-page report at once. The user would like the pages to come out of the printer in the order of pages 1, 2, 3, 1, 2, 3 instead of pages 1, 1, 2, 2, 3, 3. What printer setting should the user enable for this print job to achieve this result?

Duplex
Orientation
Collate(ANSWER)
Transparency

What type of wiring standard is used with POTS?

RJ-11 (ANSWER) pots is plain old telephone system
RG-6
RJ-45
RG-59

You want to build a virtualization workstation that will be used to run four different server operating systems simultaneously to create a test lab environment. Each guest operating system only requires 20 GB of storage on the host workstation. Which of the following is the MOST important piece of hardware needed for this system to run efficiently?

ATX mobo
5400 RPM hdd
Multi core processor (ANSWER)
dedicated gpu

What is SHADOW considered?

DaaS(answer)
PaaS
Iaas
SaaS

Your child's school issues an Office 365 account to each student to use for their school projects. Your child needs to install the proper software on their Windows 10 laptop for their school work folder to remain synced between the laptop and the cloud service. Which software should you install?

Google drive
onedrive (answer)
AWS S3
Dropbox

Which of the following refers to using virtual machines as a method of provisioning workstations for corporate users?

SaaS
VDI (answer) aka virtual desktop infrastructure
PaaS
IaaS

Which type of cloud service provides users with an end to end application solution for a recurring monthly or yearly fee?

SaaS(answer)
IaaS
PaaS
DaaS

Which of the following is the virtualization technology supported by most modern Intel processors?

HT
AMD-V
Intel-V
VT(ANSWER) Virtualization technology

Which of the following resources is used by virtual machines to communicate with other virtual machines on the same network but prevents them from communicating with resources on the internet?

DNS
Virtual internal network (answer)
virtual external network
Network address translation

You are working as a laptop repair technician. You just received a laptop that was reported to have a glass of water spilled on it. You want to examine the components in the laptop to begin troubleshooting it. What are the first steps you should take as part of your troubleshooting process?

Put laptop in rice
watch youtube to see how to fix this model
consult fellow workers to ask for suggestions
Remove the case and document where the screws go(Answer)

A client states that their computer is experiencing slow performance when reading or writing to the hard drive. You have already verified that it is not a system (software) performance issue, and the system is not overheating. Which of the following would be the BEST action to take in attempting to fix this problem?

Upgrade the memory
Run the disk repair tool (Answer) due to the issue being a file system problem
Clean the cooling fans
Backup the HDD

You have been assigned a trouble ticket for a workstation that is unable to boot. When you arrive at the workstation, you recognize an error message on the screen that reads, "Error loading operating system, BOOTMGR is missing, Press Ctrl+Alt+Del to restart." Which of the following actions should you take first?

Reboot the computer and allow it to load back into windows

Reboot the computer into the BIOS to see if the boot order is set to HDD

Reboot the computer press F8 and enter "Bootrec/fixmbr" from the command prompt (Answer) This boots into safe mode and the commands will fix the HDD

Reboot the computer into recovery mode and initiate the disk restoral process

A penetration tester wants to build a workstation that will be used to brute force hash digests. Which of the following is the BEST option to ensure sufficient power and speed to crack them?

Multi core CPU
7200 RPM HDD
Integrated GPU
Dedicated GPU (Answer)
Gpus can handle complex math equations extremely quick so if you are hacking for pw or algorithms this is the best item

Which of the following is NOT a common voltage produced by the power supply of a computer?

3.3 VDC
5VDC
6VDC (ANSWER)
12VDC

Which of the following storage types utilize a NAND chipset mounted directly onto the motherboard instead of a mechanical spinning drive to store data?

SSD
SATA
NVMe(ANSWER) Read carefully
HDD

You have been asked to install a network cable inside a conduit that will be placed underground and connected to two buildings located about 1 KM apart. Which of the following cable types should you choose?

Fiber(answer) these cables contain glass fiber and are made for long distance and high performance data. Anything over a few 100 meters u should use this
Shielded
Plenum
Coaxial

A computer technician is configuring a NAS for a company to store their corporate data. The technician has installed four 10 TB hard drives operating at 5400 RPM in a RAID 10 configuration. How much usable storage space is contained in this NAS?

10 TB
20TB (ANSWER) you only get to use half
30TB
40TB

What type of cloud service would provide you with a complete development and deployment environment in the cloud for you to create customized cloud-based apps?

PaaS(answer)
SaaS
IaaS
DaaS
explanation:
you are paying for an environment in the cloud not actual software so its not SaaS

You are building a virtualization server that runs on Windows Server 2016. The server will host multiple virtual machines, each with a different operating system. Which type of hypervisor should you select for this environment?

Type 2(answer)
Type 1
IaaS
Bare metal
Explanation: A Type 2 hypervisor is one that will run on top of an existing operating system. In this case, the scenario states that the virtualization server is already running Windows 2016, so you must install your hypervisor on Windows 2016.

Jason teaches a CompTIA A+ course at a large company, but they do not allow non-employees to connect to their network. Since Jason needs the Internet for an in-class demonstration, he connects his laptop to his iPhone using a USB cable. He essentially connects to the Internet using the smartphone as a modem. Which of the following terms best describes this configuration?

Hotspot
Tunneling
Tethering (Answer)
Baseband update

The speed at which the cursor moves across the screen can sometimes make it difficult to control. Which setting could be used to slow down the cursor when using a Windows 10 laptop with a touchpad?

Settings devices touchpad touchpad sensitivity
settings devices mouse speed
settings devices touchpad speed (Answer)
settings devices mouse touchpad sensitivity

Your company just installed a new webserver within your DMZ. You have been asked to open up the port for secure web browsing on the firewall. Which port should you set as open to allow users to access this new server?

21
80
143
443 (Answer) Controls HTTPS

You have been asked to configure your neighbor's SOHO network. Your neighbor wants to build a Minecraft server so that all their friends can play together over the internet. When configuring their firewall, where should you place the server?

WAN
LAN
MAN
DMZ(ANSWER)

Demilitarized zone used so no intrusions can get in

A technician is troubleshooting an issue with a workstation. The workstation can ping 8.8.8.8 successfully, but it is unable to access Facebook.com. Which internal network server is MOST likely causing these issues?

DNS(ANSWER) Domain name service in charge of converting ping
DHCP
SMTP
FTP

Which of the following describes the IP address of a router to which packets destined for a remote network should be sent by default?

Subnet mask
Static IP
Dynamic IP
Gateway (Answer)

Which of the following devices is installed in a communication closet to connect network wall jacks to a network switch using pre-wired RJ-45 ports?

Access point
Bridge
Router
Patch Panel (Answer)

Which of the following is a digital circuit-switched technology that combines voice, video, and data over one connection?

Dial up
DSL
Cable
ISDN(ANSWER) integrated services digital network

Which of the following ports should you unblock at the firewall if your workstation cannot access diontraining.com but can access the website by its IP address?

80
443
53(ANSWER) DNS server
67

Which of the following ports is used by LDAP by default?

389 (Answer)
427
3389
53

You have been asked to verify that a server rack has been properly installed and grounded. Which tool should you utilize to verify that the server rack is properly grounded?

Voltmeter
Multimeter (Answer)
Toner Probe
Loopback plug

You are trying to select the best device to install to detect an outside attacker trying to reach into your internal network. The device should log the event, but it should not take any action to stop it. Which of the following devices would be the BEST for you to select?

Proxy server
Authentication server
IPS
IDS(answer) intrusion detection system just detects doesnt act on it

What is a tool that would allow you to easily identify a network cable that was not labeled in the wiring closet during its installation?

Cable tester
Tone generator and probe(answer)
Punchdown tool
multimeter

A customer tried to install a PCIe x8 expansion card into a PCIe x16 slot on the motherboard. While the expansion card fits into the slot without any issues, it does not perform as the customer expected. How fast will a PCIe x8 expansion card run if installed in a PCIe x16 slot?

It will run at x16 speed
It will run at x8 speed
it will run at x1 speed (answer) its reduced to x1 to insure reliability. safety protocol
it will run at x4 speed

A computer technician is configuring a NAS for a company to store their corporate data. The technician has installed three 6 TB hard drives operating at 7200 RPM in a RAID 5 configuration. How much usable storage space is contained in this NAS?

3tb
6tb
12tb (answer) If its odd and raid 5 then add them if its even divide them in half
18tb

You have been asked to install a network cable to run a television signal between two buildings. Which of the following cable types should you choose?

Fiber
Plenum
Coaxial(answer)
Shielded

Your company received a large bill for file storage from your online cloud provider this month. Upon investigation, you noticed that one of your employees has uploaded over 1 TB of data to the service. What type of plan is your company utilizing?

An on demand plan
a flat fee plan
a non metered plan
a metered plan (Answer)

Which of the following requirements should you consider when selecting the type of processors, storage, and RAM to utilize in a virtualization environment?

Network requirements
emulator requirements
security requirements
resource requirements (Answer)
: Before you purchase a system to use as a virtualization environment, you should look at the minimum requirements for all operating systems you intend to host as guest VMs. This will ensure you can balance the performance needed and maintain a smooth-running environment without numerous conflicts or issues.

What type of cloud service provides instant access to servers and switches, quickly provisioned, and available for management over the internet?

PaaS
IaaS (Answer)
SaaS
DaaS

Which cloud computing concept allows users to store files on a cloud-based server when necessary and copy that data from the cloud, and put it back on the device when space once again becomes available on the device?

Resource pooling
On-demand(answer)
Shared resources
Synchronization application

You are building a virtualization environment to practice your penetration testing skills. This will require that you install several vulnerable Linux distributions as VMs. The VMs need to have access to a virtualized network but should not communicate with the host operating system or the internet. Which of the following types of network connections should you configure for each VM?

External
Internal
Private(answer)
Localhost
The private network connection type will create a switch that is usable only by the VMs. The VMs cannot use the switch to communicate with the host. If you select internal, it can communicate between the host and the VMs. If you select external, the VMs would have internet access. If you select localhost, each VM could only communicate with itself.

A customer is trying to configure an 802.11b wireless card in an old laptop to connect to an 802.11g wireless router. When the customer scans for the wireless network's SSID (Dion-Corp), it is not displayed within Windows. What is the MOST likely reason that the SSID is not being displayed?

802.11g and b use different frequencies
The wireless router is not configure for DHCP support
The broadcast is disabled on the router (answer)
The router is configured with WPA2 encryption

Write down 73 test 6

...

What ports are used by NetBIOS?

NetBIOS over TCP traditionally uses the following ports:.
NBName: 137/UDP..
NBName: 137/TCP..
NBDatagram: 138/UDP..
NBSession: 139/TCP..

What are ports 139 and 445 used for?

Port 139: SMB originally ran on top of NetBIOS using port 139. NetBIOS is an older transport layer that allows Windows computers to talk to each other on the same network. Port 445: Later versions of SMB (after Windows 2000) began to use port 445 on top of a TCP stack. Using TCP allows SMB to work over the internet.

What are ports 137 and 138 used for?

Microsoft Windows Networking Services UDP ports 137 and 138 are used for local NetBIOS browser, naming, and lookup functions.

What is port 139 commonly used for?

Port 139 is utilized by NetBIOS Session service. Enabling NetBIOS services provide access to shared resources like files and printers not only to your network computers but also to anyone across the internet.