The CompTIA A+ certification is for IT professionals that can support modern technologies like security, cloud, data management and more. CompTIA A+ is the industry standard for starting a career in the Information Technology sector. The 220-1101 exam is the first in the CompTIA A+ 1100 series (followed by 220-1102). CompTIA A+ 220-1101 covers mobile devices, networking technology, hardware, virtualization and cloud computing.
True or False: A benefit of using a cloud backup service is that data from a mobile device can be easily recovered if a mobile device is lost or stolen.
The statement is true and describes one the most common use cases of mobile cloud service providers. Using a cloud service like iCloud or Google Drive ensures a lost, stolen or broken mobile device can have it's data recovered and transferred onto a replace device. Depending on the service and device configuration this could include Contacts, Apps, Emails, Pictures and nearly any other file type.
Cloud storage is a model of computer data storage in which the digital data is stored in logical pools, said to be on "the cloud". The physical storage spans multiple servers (sometimes in multiple locations), and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available and accessible, and the physical environment secured, protected, and running. People and organizations buy or lease storage capacity from the providers to store user, organization, or application data. Cloud storage services may be accessed through a colocated cloud computing service, a web service application programming interface (API) or by applications that use the API, such as cloud desktop storage, a cloud storage gateway or Web-based content management systems.
Cloud_storage - Wikipedia, the free encyclopediaCategory 6a (Augmented) cabling supports 10,000 Megabits per second (Mbps) which is the same as 10 Gigabits per second (Gbps) at distances up to 100 meters.
Category 6 cable (Cat 6) is a standardized twisted pair cable for Ethernet and other network physical layers that is backward compatible with the Category 5/5e and Category 3 cable standards. Cat 6 must meet more stringent specifications for crosstalk and system noise than Cat 5 and Cat 5e. The cable standard specifies performance of up to 250 MHz, compared to 100 MHz for Cat 5 and Cat 5e.Whereas Category 6 cable has a reduced maximum length of 55 metres (180 ft) when used for 10GBASE-T, Category 6A cable is characterized to 500 MHz and has improved alien crosstalk characteristics, allowing 10GBASE-T to be run for the same 100-metre (330 ft) maximum distance as previous Ethernet variants.
Category_6_cable - Wikipedia, the free encyclopediaYou are trying to use RDP to control a Windows computer from your office to an accountant's computer in the corporate office building. What port should be opened in the firewalls between the two locations?
Remote Desktop Protocol (RDP) uses port 3389 to communicate.
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software. Clients exist for most versions of Microsoft Windows (including Windows Mobile), Linux (for example Remmina), Unix, macOS, iOS, Android, and other operating systems. RDP servers are built into Windows operating systems; an RDP server for Unix and OS X also exists (for example xrdp). By default, the server listens on TCP port 3389 and UDP port 3389.Microsoft currently refers to their official RDP client software as Remote Desktop Connection, formerly "Terminal Services Client". The protocol is an extension of the ITU-T T.128 application sharing protocol. Microsoft makes some specifications public on their website.
Remote_Desktop_Protocol - Wikipedia, the free encyclopediaA user receives the following message when they log in "Windows has detected an IP address conflict". What is MOST LIKELY the issue?
Windows will show this alert when it detects its assigned IP is being used somewhere else on the network. This can happen when a static IP is assigned and it conflicts with a DHCP server or when two workstations are given the same static IP.
Which cloud computing acronym best describes a solution that replaces hardware, infrastructure and software used for creating, testing and deploying applications and services?
A Platform as a Service (PaaS) is a cloud platform that provides end users with a development environment and tooling without them having to setup the networking, servers and install all the software components themselves. Out of the box a PaaS can include a lot of components including the OS, Middleware, Databases and Database Managements systems and much more.
Cloud Infrastructure, like all infrastructure, still requires special care to ensure it's security. Some of the benefits of Cloud Infrastructure are the pay-as-you-go model (usually per second or per minute billing), flexibility to create and delete servers on demand or automatically and the ease of provisioning complex services like database clusters without highly specialized experts.
Cloud computing is the on-demand availability of computer system resources, especially data storage (cloud storage) and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each of which is a data center. Cloud computing relies on sharing of resources to achieve coherence and typically uses a pay-as-you-go model, which can help in reducing capital expenses but may also lead to unexpected operating expenses for users.
Cloud_computing - Wikipedia, the free encyclopediaPlenum is a special material used to jacket a cable, this jacket is fire retardant and will reduce the amount of hazardous fumes in the air if the cable is subject to a fire.
Plenum cable is electrical cable that is laid in the plenum spaces of buildings. In the United States, plastics used in the construction of plenum cable are regulated under the National Fire Protection Association standard NFPA 90A: Standard for the Installation of Air Conditioning and Ventilating Systems. All materials intended for use on wire and cables to be placed in plenum spaces are designed to meet rigorous fire safety test standards in accordance with NFPA 262 and outlined in NFPA 90A. Plenum cable is required because, if nonplenum cable catches fire, it can release toxic fumes. If those fumes are released in a plenum space, they can spread throughout the building through the air circulation system.Plenum cable is jacketed with a fire-retardant plastic jacket of either a low-smoke polyvinyl chloride (PVC) or a fluorinated ethylene polymer (FEP). Polyolefin formulations, specifically based on polyethylene compounding had been developed by at least two companies in the early to mid-1990s; however, these were never commercialized, and development efforts continue in these yet-untapped product potentials. Development efforts on a non-halogen plenum compound were announced in 2007 citing new flame-retardant synergist packages that may provide an answer for a yet-underdeveloped plenum cable market outside the United States. In 2006, significant concern developed over the potential toxicity of FEP and related fluorochemicals including the process aid perfluorooctanoic acid (PFOA) or C8 such that California has proposed some of these materials as potential human carcinogens. The NFPA Technical Committee on Air Conditioning, in response to
Plenum_cable - Wikipedia, the free encyclopediaPower over Ethernet (PoE) allows devices to use an ethernet connection as a power source, most commonly found in IP phones. The ethernet cable provides the power for the device to operate as well as network connectivity.
Power over Ethernet, or PoE, describes any of several standards or ad hoc systems that pass electric power along with data on twisted-pair Ethernet cabling. This allows a single cable to provide both a data connection and enough electricity to power devices such as wireless access points (WAPs), Internet Protocol (IP) cameras and voice over Internet Protocol (VoIP) phones. There are several common techniques for transmitting power over Ethernet cabling. Three of them have been standardized by Institute of Electrical and Electronics Engineers (IEEE) standard IEEE 802.3 since 2003. These standards are known as alternative A, alternative B, and 4PPoE. For 10BASE-T and 100BASE-TX, only two of the four signal pairs in typical Cat 5 cable are used. Alternative B separates the data and the power conductors, making troubleshooting easier. It also makes full use of all four twisted pairs in a typical Cat 5 cable. The positive voltage is applied to pins 4 and 5, and the negative to pins 7 and 8. Alternative A transports power on the same wires as data for 10 and 100 Mbit/s Ethernet variants. This is similar to the phantom power technique commonly used for powering condenser microphones. Power is transmitted on the data conductors by applying a common voltage to each pair. Because twisted-pair Ethernet uses differential signaling, this does not interfere with data transmission. The common-mode voltage is easily extracted using the center tap of the standard Ethernet pulse transformer. For Gigabit Ethernet and faster, both alternatives A and B transport power
Power_over_Ethernet - Wikipedia, the free encyclopediaIntegrated GPU (Graphics Processing Unit) or Integrated Graphics is a technology that allows a motherboard to handle graphics generation without a dedicated expansion card with a GPU. Generally this requires that some of your system memory (RAM) be assigned to the GPU instead of the CPU and results in slower performance.
A graphics processing unit (GPU) is a specialized electronic circuit designed to manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device. GPUs are used in embedded systems, mobile phones, personal computers, workstations, and game consoles. Modern GPUs are efficient at manipulating computer graphics and image processing. Their parallel structure makes them more efficient than general-purpose central processing units (CPUs) for algorithms that process large blocks of data in parallel. In a personal computer, a GPU can be present on a video card or embedded on the motherboard. In some CPUs, they are embedded on the CPU die.In the 1970s, the term "GPU" originally stood for graphics processor unit and described a programmable processing unit independently working from the CPU and responsible for graphics manipulation and output. Later, in 1994, Sony used the term (now standing for graphics processing unit) in reference to the PlayStation console's Toshiba-designed Sony GPU in 1994. The term was popularized by Nvidia in 1999, who marketed the GeForce 256 as "the world's first GPU". It was presented as a "single-chip processor with integrated transform, lighting, triangle setup/clipping, and rendering engines". Rival ATI Technologies coined the term "visual processing unit" or VPU with the release of the Radeon 9700 in 2002.
Graphics_processing_unit - Wikipedia, the free encyclopediaWhich of the following device types would have a feature for permitting or blocking TCP and UDP traffic on a particular port?
A firewall is a device that can be configured to permit or block traffic to help secure a computer network.
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
Firewall_(computing) - Wikipedia, the free encyclopediaThe CompTIA troubleshooting methodology:
You are the only IT employee for a small startup. You need to provide email address to all employees at the startup as soon as possible and with minimal effort. What type of cloud model is best suited to this situation?
Software as a Service (SaaS) is a cloud model focused on provide a specific functionality to it's users without those customers needing to worry about infrastructure, networking, configuring servers, etc. Most internet based services fall into the SaaS category. Examples of email SaaS providers are Google Gmail, Yahoo Mail, Hotmail.com and Outlook.com.
Software as a service (SaaS ) is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. SaaS is also known as on-demand software, web-based software, or web-hosted software.SaaS is considered to be part of cloud computing, along with infrastructure as a service (IaaS), platform as a service (PaaS), desktop as a service (DaaS), managed software as a service (MSaaS), mobile backend as a service (MBaaS), data center as a service (DCaaS), integration platform as a service (iPaaS), and information technology management as a service (ITMaaS).SaaS apps are typically accessed by users of a web browser (a thin client). SaaS became a common delivery model for many business applications, including office software, messaging software, payroll processing software, DBMS software, management software, CAD software, development software, gamification, virtualization, accounting, collaboration, customer relationship management (CRM), management information systems (MIS), enterprise resource planning (ERP), invoicing, field service management, human resource management (HRM), talent acquisition, learning management systems, content management (CM), geographic information systems (GIS), and service desk management. SaaS has been incorporated into the strategies of nearly all enterprise software companies.
Software_as_a_service - Wikipedia, the free encyclopediaA user reports that their printouts contain a shadow of the previous image. Which of the following is MOST likely the cause?
After a printer applies toner to paper the fuser assembly rolls over the paper and applies heat to fuse the toner to the paper. Occasionally, the toner can stick to the fuser assembly and will be applied to the next sheet of paper passed through the printer.
Laser printing is an electrostatic digital printing process. It produces high-quality text and graphics (and moderate-quality photographs) by repeatedly passing a laser beam back and forth over a negatively-charged cylinder called a "drum" to define a differentially-charged image. The drum then selectively collects electrically-charged powdered ink (toner), and transfers the image to paper, which is then heated to permanently fuse the text, imagery, or both, to the paper. As with digital photocopiers, laser printers employ a xerographic printing process. Laser printing differs from traditional xerography as implemented in analog photocopiers in that in the latter, the image is formed by reflecting light off an existing document onto the exposed drum. Invented at Xerox PARC in the 1970s, laser printers were introduced for the office and then home markets in subsequent years by IBM, Canon, Xerox, Apple, Hewlett-Packard and many others. Over the decades, quality and speed have increased as prices have decreased, and the once cutting-edge printing devices are now ubiquitous.
Laser_printing - Wikipedia, the free encyclopediaCrossover cables can support direct communication between two computers without the need for an intermediate device. Keep in mind this just refers to the cable, the computers still need to be correctly configured for this to work. Many modern Network Interface Cards (NICs) can support automatic cable type detection allowing a Crossover and Straight-through cable to work. A Rollover cable is used to connect a computer to network devices for configuration purposes only and is sometimes called a console cable. RJ-11 and RJ-45 are connector types not cable types.
An Ethernet crossover cable is a crossover cable for Ethernet used to connect computing devices together directly. It is most often used to connect two devices of the same type, e.g. two computers (via their network interface controllers) or two switches to each other. By contrast, straight through patch cables are used to connect devices of different types, such as a computer to a network switch. Intentionally crossed wiring in the crossover cable connects the transmit signals at one end to the receive signals at the other end. Many network devices today support auto MDI-X (aka "auto crossover") capability, wherein a patch cable can be used in place of a crossover cable, or vice versa, and the receive and transmit signals are reconfigured automatically within the device to yield a working connection.
Ethernet_crossover_cable - Wikipedia, the free encyclopediaWhile interviewing for an IT position at a large enterprise you are asked if you are familiar with VDI environments. What technology is the interviewing referencing?
Virtual Desktop Infrastructure (VDI) is a technology that allows desktops to live virtually on shared infrastructure like a server farm or in the cloud. Software and/or small hardware clients can be used by end-users to connect to their desktop environment ad-hoc. VDIs can be used for their flexibility, easier management of desktop operating systems (e.g. security updates) and as a cost-savings measure. The option mentioning VMWare and VirtualBox is close but it specifically states servers not desktops which makes it incorrect.
Desktop virtualization is a software technology that separates the desktop environment and associated application software from the physical client device that is used to access it. Desktop virtualization can be used in conjunction with application virtualization and user profile management systems, now termed user virtualization, to provide a comprehensive desktop environment management system. In this mode, all the components of the desktop are virtualized, which allows for a highly flexible and much more secure desktop delivery model. In addition, this approach supports a more complete desktop disaster recovery strategy as all components are essentially saved in the data center and backed up through traditional redundant maintenance systems. If a user's device or hardware is lost, the restore is straightforward and simple, because the components will be present at login from another device. In addition, because no data are saved to the user's device, if that device is lost, there is much less chance that any critical data can be retrieved and compromised.
Desktop_virtualization - Wikipedia, the free encyclopediaThermal paste (or Thermal grease) is designed to conduct heat traveling between two elements. In this case, Thermal paste allows heat to efficiently leave the processor and travel to the heat sink.
Thermal paste (also called thermal compound, thermal grease, thermal interface material (TIM), thermal gel, heat paste, heat sink compound, heat sink paste or CPU grease) is a thermally conductive (but usually electrically insulating) chemical compound, which is commonly used as an interface between heat sinks and heat sources such as high-power semiconductor devices The main role of thermal paste is to eliminate air gaps or spaces (which act as thermal insulation) from the interface area in order to maximize heat transfer and dissipation Thermal paste is an example of a thermal interface material As opposed to thermal adhesive, thermal paste does not add mechanical strength to the bond between heat source and heat sink
Thermal_grease - Wikipedia, the free encyclopediaThe Post Office Protocol 3 (POP3) is a protocol used by clients to download emails from a server. Another possible answer is the Internet Message Access Protocol (IMAP) which is not listed as an option. The Simple Mail Transfer Protocol (SMTP) is not correct as it is only used by clients to send email and by servers to transfer emails from one server to another. SMTP is not used to download email from a server to a client device like a mobile phone.
In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. POP version 3 (POP3) is the version in common use, and along with IMAP the most common protocols for email retrieval.
Post_Office_Protocol - Wikipedia, the free encyclopediaUSB, VGA and yes, even SATA are all hot swap able. You should never hot swap a device that is internal to your PC, but if kept externally a SATA device can be hot swapped with a supported driver. A PATA device should never be hot swapped.
You are setting up a new workstation and decided to use a twisted-pair copper cable to connect the PC to your switch. Which connector would best suit your needs?
RJ-45 is the common name for the 8-pin connector (8P8C) used for various Ethernet cables (CAT5, CAT5e, CAT6, etc), which come with twisted pairs for cross-talk (interference) resistance.
Ethernet () is a family of wired computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN). It was commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3. Ethernet has since been refined to support higher bit rates, a greater number of nodes, and longer link distances, but retains much backward compatibility. Over time, Ethernet has largely replaced competing wired LAN technologies such as Token Ring, FDDI and ARCNET. The original 10BASE5 Ethernet uses coaxial cable as a shared medium, while the newer Ethernet variants use twisted pair and fiber optic links in conjunction with switches. Over the course of its history, Ethernet data transfer rates have been increased from the original 2.94 Mbit/s to the latest 400 Gbit/s, with rates up to 1.6 Tbit/s under development. The Ethernet standards include several wiring and signaling variants of the OSI physical layer. Systems communicating over Ethernet divide a stream of data into shorter pieces called frames. Each frame contains source and destination addresses, and error-checking data so that damaged frames can be detected and discarded; most often, higher-layer protocols trigger retransmission of lost frames. Per the OSI model, Ethernet provides services up to and including the data link layer. The 48-bit MAC address was adopted by other IEEE 802 networking standards, including IEEE 802.11 (Wi-Fi), as well as by FDDI. EtherType values are also used in Subnetwork Access Protocol (SNAP) headers. Ethernet is widely used in homes and industry, and interworks well with wireless
Ethernet - Wikipedia, the free encyclopediaAn employee has contacted the End User Support Help Desk where you work and is complaining they are unable to view an image sent to them by a 3rd party partner. Instead of the image they see a black square with a small icon in the corner where the image should be. The user reports that her boss sent an email with an image which displayed correctly. What is most likely causing this issue?
A common configuration setting in email clients is to block attachments and embedded images or files. In this case it is most likely configured to block images when sent by an untrusted 3rd party, such as a Gmail address or SMTP servers from another company. Updating this setting to allow images and attachments from the 3rd party partner could resolve this issue.
Looks like thats it! You can go back and review your answers or click the button below to grade your test.