Which of the following network devices would an administrator use to distribute traffic evenly throughout multiple nodes?
A. Load balancer
B. Bridge
C. Proxy server
D. Switch
E. Firewall
Correct Answer: A
A load balancer is a network device that distributes network or application traffic across multiple servers to ensure that no single server bears too much of the load. Load balancing helps to improve application availability, increase scalability,
and optimize resource utilization.
A bridge is used to connect two different networks, often to divide a larger network into smaller segments. A proxy server is used to forward client requests to other servers, and can also be used to cache frequently requested data. A switch is
used to connect multiple devices within a network and to control the flow of network traffic. A firewall is used to secure a network by controlling incoming and outgoing traffic based on defined security rules.
Reference: CompTIA A+ Core 1 uide, page 244.
Question 132:
A software developer used client-side virtualization on a server to configure a web application. Although the application is working locally on the software developer's PC, other users on the LAN are not able to access the application.
Which of the following would allow other users to access the application?
A. Bridge networking
B. Application virtualization
C. Virtual desktop
D. Site-to-site VPN
Correct Answer: A
Client-side virtualization is used to run an application or process on a separate virtual machine, isolated from the main operating system. To allow other users on the LAN to access the application, the software developer should configure a bridge networking connection between the virtual machine and the LAN. This will allow the virtual machine to communicate with other computers on the network. Application virtualization, virtual desktop, and site-to-site VPN are not necessary steps for allowing other users to access the application.
Question 133:
The IT department issued a corporate smartphone to a user, but the user returned the device stating it had connectivity Issues. The user claimed the device functioned on WI-FI but all connectivity to cloud services was lost as soon as the device was taken off site. Which of the following issues was MOST likely affecting the device?
A. MDM was never properly set up on the device.
B. S/MIME certificates were corrupted and needed to be reloaded.
C. Bluetooth on the device was disabled by mistake.
D. The device never had a proper SIM card installed.
Correct Answer: D
A SIM card is needed for the device to use cellular network services, so without it, the device will be unable to connect to the cloud services when taken off site. MDM (Mobile Device Management) can be used to manage settings and access on a device, but it is not necessary for the device to be able to use cloud services. S/MIME (Secure/Multipurpose Internet Mail Extensions) certificates are used to encrypt and digitally sign emails, and are not related to device connectivity. Bluetooth can be used to connect devices together, but it is not necessary for the device to be able to use cloud services.
Question 134:
Which of the following connectors can be plugged into a Thunderbolt 3 port on a laptop?
A. miniUSB
B. microUS3
C. USB-A
D. USB-C
Correct Answer: D
Question 135:
A user's track pad has stopped working. Which of the following should the user do to resolve the track pad's functionality?
A. Reinstall the mouse drivers
B. Use the Function key.
C. Calibrate the digitizer
D. Configure the mouse settings. ?
Correct Answer: A
If your touchpad isn't working, it may be a result of a missing or out-of-date driver. Updating or reinstalling your touchpad drivers in Device Manager may help solve the problem. To open Device Manager, enter device manager in Search on the taskbar, then select Device Manager.
Question 136:
A technician is adding one more line at the demarcation point. Which of the following tools would be MOST useful to accomplish this task?
A. Toner
B. Punchdown
C. Network tap
D. Crimper
Correct Answer: B
Punchdown tools are used to connect wires to keystone jacks, patch panels and other communication hardware. When adding a new line at the demarcation point, a technician would use a punchdown tool to punch the wire into the keystone jack or patch panel, completing the connection.
Question 137:
The owner of a restaurant reports that wireless network connections are lost intermittently throughout the day.
Which of the following steps should a technician take to troubleshoot the issue? (Select TWO).
A. Identify the location of devices that utilize 2.4GHz.
B. Check to see if the phones are IJTP or STP lines.
C. Test to see if the copper electrical Wires are causing interference.
D. Map all of the wireless signals in the restaurant.
E. Verify T568B is being used in the wiring closet patch panel.
F. Schedule timed router reboots throughout the day.
Correct Answer: AD
The correct answers are A. Identify the location of devices that utilize 2.4GHz and D. Map all of the wireless signals in the restaurant. In order to troubleshoot the issue, the technician should first identify the location of devices that utilize the 2.4GHz frequency, as this can cause interference with the wireless signal. Additionally, the technician should map all of the wireless signals in the restaurant in order to identify any potential sources of interference. Checking to see if the phones are IJTP or STP lines, testing to see if the copper electrical wires are causing interference, verifying T568B is being used in the wiring closet patch panel, and scheduling timed router reboots throughout the day are not necessary steps for troubleshooting this issue.
Question 138:
A tier one technician has spent the past thirty minutes troubleshooting an Issue With an end user's network connection After a solution was implemented, the end user rebooted the system, tested the Issue, and confirmed the Issue was resolved.
Which of the following should the technician do NEXT?
A. Document the findings, actions, and solution in the company knowledge base
B. Advise the user to try the solution before contacting the help desk if the Issue happens again
C. Establish a theory of probable cause
D. Escalate the Issue to the tier two support team for resolution.
Correct Answer: A
According to the Official CompTIA A+ Core 1 Study Guide (220-1101) 1, the correct answer is A. Document the findings, actions, and solution in the company knowledge base. The explanation is that after resolving an issue, a technician should always document what was done and how it was fixed. This helps to create a record of the problem and its solution for future reference and also to share knowledge with other technicians. https://www.comptia.org/training/books/acore-1-220-1101-study-guide By documenting the findings, actions, and solution in the company knowledge base, it will help to ensure that if the Issue happens again, the technician or a different technician will be able to quickly and easily find the solution and resolve the Issue. Additionally, it is important to document the solution so that the same Issue does not need to be troubleshot multiple times in the future.
Question 139:
A technician is setting up a laptop with an encrypted hard drive. The laptop will securely store a PIN that the user will input at log-on. Which of the following must be installed to set up this configuration?
A. TPM
B. HSM
C. UEFI
D. ARM
Correct Answer: A
TPM stands for Trusted Platform Module, and it is a special chip installed on a computer's motherboard that stores encryption keys, passwords, and digital certificates. It can also securely store a user's PIN, allowing them to access the laptop without having to enter the PIN every time they log on. TPM is a secure way to store and protect sensitive data, making it ideal for use in laptops that need to securely store a PIN.
Question 140:
To control costs a company provides a limited number or users with company phones One of these users opens a support ticket because the phone no longer allows internet Drowsing over a cellular connection The user acknowledges that the phone worked before the user's child streamed several movies using the device
Which of the following describes why the phone cannot browse the Internet?
A. The child accidentally connected to a neighbor's WLAN
B. The company's group policy disabled the device
C. The device has a data cap and has reached that limit
D. The device's plan has been unpaid
Correct Answer: C
It is common for companies to place a data cap on the devices they provide to their employees, to control costs. If a user has exceeded the data cap, the phone may no longer allow internet browsing over a cellular connection. This is usually because the cellular data usage has exceeded the allotted amount for the particular plan the device is on, and the service provider has temporarily suspended the data connection. It is unlikely that the child accidentally connected to a neighbor's WLAN because this would not affect the cellular data connection. Similarly, it is unlikely that the company's group policy has disabled the device, as this would likely affect all devices under the same policy. If the device's plan has been unpaid, the service provider would likely temporarily suspend all services, not just the cellular data connection. Reference: CompTIA A+ Core 1 uide, page 329.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1101 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.