TestOut LabSim - Domain 2 Infrastructure
TestOut LabSim - Domain 2 Infrastructure
TestOut LabSim - Domain 2 Infrastructure
Your Performance
Objective Analysis
2.0 Hardware
Compare and contrast the features of different external storage 100% 5 of 5
devices, including hard disk drives, optical drives, flash storage,
and solid state drives.
Describe the most common internal components of a typical 100% 2 of 2
computer system, including processor, RAM, motherboard,
power supply, GPU, NIC, and cooling system.
Distinguish between the two main types of consumer-level 100% 1 of 1
CPUs.
Identify common ports and connectors by sight. 100% 2 of 2
2.0 Infrastructure
Basic protocols 100% 2 of 2
Best practices 100% 4 of 4
CPU 100% 2 of 2
Devices 100% 1 of 1
DSL 100% 1 of 1
Firmware/BIOS 100% 1 of 1
Local storage types 100% 4 of 4
Networking 100% 1 of 1
Peripheral device 100% 2 of 2
Servers 100% 1 of 1
Volatile vs. non-volatile 100% 1 of 1
5.0 Networking
Compare and contrast different Internet Service options. 100% 2 of 2
Compare and contrast wireless network standards. 100% 2 of 2
Describe basic Internet protocols. 100% 3 of 3
Explain the role of clients and servers on a network. 100% 1 of 1
8.0 Security
Describe best practices for using secure passwords. 100% 1 of 1
Describe the most important safeguards in protecting yourself 100% 1 of 1
from Internet security risks.
Individual Responses
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 1/15
2/18/2021 TestOut LabSim
Question 1:
Correct
Which of the following is the FIRST thing the technician should do to secure the router?
Explanation
The first security configuration on the router should be to change the router's default password.
Disabling the SSID broadcast may be desirable for added security but is not the first thing to do.
Adjusting the radio power levels will limit the broadcast area and may be desirable for added security
but is not the first thing to do.
Pressing the WPS button temporarily broadcasts the SSID and passphrase which will degrade
security.
References
[q_itf_securing_facts_04.question.fex]
Question 2:
Correct
A user read their work email from their home computer and when they returned to work the next day
and accessed the email server, all of their email was missing. Which of the following protocols
removes mail from a mail server?
HTTPS
SMTP
POP3
IMAP
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 2/15
2/18/2021 TestOut LabSim
Explanation
Post Office Protocol 3 (POP3) is a protocol used to receive email. With POP3, email is deleted from a
server after it is downloaded to a client.
IMAP is a protocol used to receive email. With IMAP, email is saved on a server even after it is
downloaded to a client.
HTTPS is a protocol that combines HTTP with the Secure Sockets Layer (SSL) protocol to securely
transfer web content between computers.
References
[q_itf_protocols_internet_facts_08.question.fex]
Question 3:
Correct
USB
RJ-45
LC/SC
NEMA 5-15R
Explanation
References
[q_itf_externaldevices_facts_01.question.fex]
Question 4:
Correct
Flash drive
Compact disc
Hard disk
RAM
Explanation
Random-Access Memory (RAM) holds data in short-term memory. Hard disks, compact discs, and
flash storage are all long-term memory solutions.
References
[q_itf_storagetypes_facts_02.question.fex]
Question 5:
Correct
Capacitor
Surge protector
Power supply
Voltage regulator
Explanation
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 4/15
2/18/2021 TestOut LabSim
A computer's power supply converts alternating current (AC) from the wall outlet to direct current
(DC) used by the computer's internal components.
A voltage regulator is an electronic device that supplies the appropriate voltage to a processor. It does
not convert the power input from one form to another; it only ensures that the voltage remains at the
appropriate level for the device. A surge protector protects a system from power spikes. A UPS
(uninterruptable power supply) provides backup AC power using a reserve battery.
References
[q_itf_intcomponents_facts_03.question.fex]
Question 6:
Correct
Which of the following has the ability to store user data even if the power to the computer is off?
System memory
Firmware/BIOS
Hard drive
Cache memory
Explanation
System memory and cache memory require a power source to store data.
Firmware/BIOS provide persistent storage while the computer is powered off, but for system settings
and not user data.
References
[q_itf_storagetypes_facts_11.question.fex]
Question 7:
Correct
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 5/15
2/18/2021 TestOut LabSim
XLR
TRS
RCA
USB
Explanation
USB, or Universal Serial Bus, is used for mice, keyboards, flash drives, and many other common
peripherals.
References
[q_itf_iohardware_facts_04.question.fex]
Question 8:
Correct
RAM
Flash drive
Compact disc
Hard disk
Explanation
Compact discs and hard disks are persistent, but they do not use memory chips.
References
[q_itf_storagetypes_facts_03.question.fex]
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 6/15
2/18/2021 TestOut LabSim
Question 9:
Correct
A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be
opened.
Which of the following email protocols is being used?
IMAP
IMEI
S/MIME
POP3
Explanation
POP3 (Post Office Protocol 3) is an email protocol that will download and delete emails from a mail
server.
IMAP (Internet Message Access Protocol) is an email protocol that can be used to synchronize email
between multiple email clients on multiple devices.
IMEI (International Mobile Equipment Identity) is a number (usually unique) that is assigned by a
manufacturer to a mobile device.
References
[q_itf_encryption_facts_03.question.fex]
Question 10:
Correct
Verifies that each packet has been transmitted and received correctly
TCP
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 7/15
2/18/2021 TestOut LabSim
HTTPS
DNS
HTTP
Divides files into packets and routes them through the Internet to their destination
Internet Protocol
UDP
Explanation
IP (Internet Protocol) divides files into packets and routes them through the Internet to their
destination.
TCP (Transmission Control Protocol) verifies that each packet has been transmitted and received
correctly and retransmits packets that become lost or corrupted.
UDP (User Datagram Protocol) transmits packets in a continuous stream but doesn't verify whether
packets are received correctly.
DNS (Domain Name System) matches unique IP addresses with easy-to-read URLs.
HTTP (Hypertext Transfer Protocol) transfers hypertext pages on the World Wide Web.
HTTPS (HTTP + Secure Sockets Layer) encrypts and transfers hypertext pages on the World Wide
Web.
References
[q_itf_protocols_internet_facts_01.question.fex]
Question 11:
Correct
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 8/15
2/18/2021 TestOut LabSim
You have recently issued new mobile phones to the sales team in your company. Each phone has the
ability to store and transmit encrypted information for such things as making payments at a checkout
counter.
VPN
Bluetooth transmitters
Infrared transmitters
NFC chips
Explanation
Near field communications (NFC) chips are a wireless mobile technology that can be embedded in
credit cards and smartphones for transmitting financial information when making payments. For
example, many point of sale devices can read information from NFC chips. NFC chips can also be
used in passports to contain identity information.
References
[q_itf_netdevices_interface_facts_03.question.fex]
Question 12:
Correct
RAM
CPU
SSD
HDD
Explanation
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 9/15
2/18/2021 TestOut LabSim
References
[q_itf_intcomponents_facts_02.question.fex]
Question 13:
Correct
Which of the following stores data using microscopic light and dark spots?
RAM
Flash drive
Compact disc
Hard disk
Explanation
The computer uses a laser to read the microscopic light and dark spots on CDs, which are then
digitized into 1s and 0s.
References
[q_itf_storagetypes_facts_04.question.fex]
Question 14:
Correct
You have found a file named FunAppx86.exe on your hard drive. Which system(s) would this
executable file MOST likely run on?
Explanation
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 10/15
2/18/2021 TestOut LabSim
An executable file with "x86" in the name was most likely created for 32-bit systems. However, since
64-bit systems are typically backwards compatible with 32-bit applications, this file will most likely
run on both 32-bit and 64-bit systems.
References
[q_itf_diginfo_facts_08.question.fex]
Question 15:
Correct
Which of the following features is supplied by WPA2 on a wireless network? (Select two.)
Explanation
Wi-Fi Protected Access 2 (WPA2) provides encryption and authentication for wireless networks.
MAC address filtering allows or rejects client connections based on the hardware address. The SSID
is the network name or identifier. A wireless access point (called an AP or WAP) is the central
connection point for wireless clients. A firewall allows or rejects packets based on packet
characteristics (such as address, port, or protocol type).
References
[q_itf_standards_facts_06.question.fex]
Question 16:
Correct
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 11/15
2/18/2021 TestOut LabSim
Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to
convert the signal received on the coax cable to data that can be understood by a computer?
Router
Server
Modem
Switch
Explanation
Cable internet providers require the client to have a modem to receive the signal from a coax cable
and convert the signal for use with a data network, typically over copper Ethernet cables.
A router is a network device that moves traffic between two different IP networks.
References
[q_itf_netdevices_interface_facts_16.question.fex]
Question 17:
Correct
A small business wants to make sure their wireless network is using the strongest encryption to
prevent unauthorized access. Which of the following wireless encryption standards should be used?
WPA
WPS
WPA2
WEP
Explanation
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 12/15
2/18/2021 TestOut LabSim
Wi-Fi Protected Setup (WPS) is a wireless setup technique used to make it easier to connect a device
to a wireless router.
References
[q_itf_encryption_facts_09.question.fex]
Question 18:
Correct
A small business has doubled in size over the past year. The IT consultant for the company is
recommending the addition of a computing device that will provide central access to business
resources. Which of the following describes the type of device needed?
Explanation
A network server is a host or computer on the network that provides services to clients or
workstations.
Tablets and laptops would provide a distributed client and not central access to business resources.
References
[q_itf_netdevices_interface_facts_15.question.fex]
Question 19:
Correct
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 13/15
2/18/2021 TestOut LabSim
802.11n
Infrared
DSL
Bluetooth
Explanation
DSL or Digital Subscriber Line, is not a form of wireless networking communications. Rather, it is a
form of high-speed WAN connection used to connect remote systems to the Internet. Wireless
communications are those types of networking technologies that do not rely upon wires or cables to
connect computers together in a networking relationship. 802.11n is the primary wireless standard
used. 802.11-compliant networks employ communication signals of 2.4GHz or 5.7 GHz radio waves.
Infrared and Bluetooth are other forms of wireless networking communications.
References
[q_itf_isp_facts_02.question.fex]
Question 20:
Correct
Match the storage device types on the left with the description and benefits on the right.
A thick magnetic disk made of aluminum platters. Uses read/write heads to access
data stored on the platters.
Uses lasers to read and write information stored in the form of pits in their reflective
coating.
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 14/15
2/18/2021 TestOut LabSim
Optical disc drive
Faster than other devices. No moving parts. Last longer than other storage devices.
Ideal for music and video. Portable and cheap with a long shelf life.
Explanation
Hard disk drives (HDD) are thick magnetic disks made of aluminum platters. They use read/write
heads to access data stored on the platters. They have up to several TB in storage capacity and their
cost per MB is cheap.
Solid state drive (SSD) is a flash device with storage capacity similar to a small hard drive. They are
faster than other devices. They have no moving parts and last longer than other storage devices.
Optical discs use lasers to read and write information that is stored in the form of pits in their
reflective coating. They are ideal for storing and playing music and video. They are portable and
cheap and have a long shelf life.
References
[q_itf_storagetypes_facts_06.question.fex]
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 15/15