TestOut LabSim - Domain 2 Infrastructure

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15
At a glance
Powered by AI
The document discusses exam results and scores for various IT certification domains and objectives. It also provides examples of exam questions and answers.

SMTP is used for sending email, while either POP3 or IMAP can be used for receiving email. POP3 deletes emails from the server after downloading, while IMAP keeps emails on the server.

The connector pictured is a male USB A connector.

2/18/2021 TestOut LabSim

Exam Report - A.2.2 CompTIA ITF Domain 2: Infrastructure

Date: 2/18/2021 5:07:11 pm Candidate: Carey, John


Time spent: 12 minutes 31 seconds Login: Dreddlypso

Your Performance

Your Score: 100%


Passing Score: 80%

Objective Analysis

2.0 Hardware
Compare and contrast the features of different external storage 100% 5 of 5
devices, including hard disk drives, optical drives, flash storage,
and solid state drives.
Describe the most common internal components of a typical 100% 2 of 2
computer system, including processor, RAM, motherboard,
power supply, GPU, NIC, and cooling system.
Distinguish between the two main types of consumer-level 100% 1 of 1
CPUs.
Identify common ports and connectors by sight. 100% 2 of 2
2.0 Infrastructure
Basic protocols 100% 2 of 2
Best practices 100% 4 of 4
CPU 100% 2 of 2
Devices 100% 1 of 1
DSL 100% 1 of 1
Firmware/BIOS 100% 1 of 1
Local storage types 100% 4 of 4
Networking 100% 1 of 1
Peripheral device 100% 2 of 2
Servers 100% 1 of 1
Volatile vs. non-volatile 100% 1 of 1
5.0 Networking
Compare and contrast different Internet Service options. 100% 2 of 2
Compare and contrast wireless network standards. 100% 2 of 2
Describe basic Internet protocols. 100% 3 of 3
Explain the role of clients and servers on a network. 100% 1 of 1
8.0 Security
Describe best practices for using secure passwords. 100% 1 of 1
Describe the most important safeguards in protecting yourself 100% 1 of 1
from Internet security risks.

Individual Responses
https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 1/15
2/18/2021 TestOut LabSim

Question 1:
Correct

A technician is installing a new SOHO wireless router.

Which of the following is the FIRST thing the technician should do to secure the router?

Disable SSID broadcast


Adjust the radio power levels
Press the WPS button
Change the router's default password

Explanation

The first security configuration on the router should be to change the router's default password.

Disabling the SSID broadcast may be desirable for added security but is not the first thing to do.

Adjusting the radio power levels will limit the broadcast area and may be desirable for added security
but is not the first thing to do.

Pressing the WPS button temporarily broadcasts the SSID and passphrase which will degrade
security.

References

TestOut IT Fundamentals Pro - 4.5 Personal Data and Device Security

[q_itf_securing_facts_04.question.fex]

Question 2:
Correct

A user read their work email from their home computer and when they returned to work the next day
and accessed the email server, all of their email was missing. Which of the following protocols
removes mail from a mail server?

HTTPS
SMTP
POP3
IMAP

https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 2/15
2/18/2021 TestOut LabSim

Explanation

Post Office Protocol 3 (POP3) is a protocol used to receive email. With POP3, email is deleted from a
server after it is downloaded to a client.

IMAP is a protocol used to receive email. With IMAP, email is saved on a server even after it is
downloaded to a client.

SMTP is a protocol used to send email.

HTTPS is a protocol that combines HTTP with the Secure Sockets Layer (SSL) protocol to securely
transfer web content between computers.

References

TestOut IT Fundamentals Pro - 2.4 Networking Standards and Protocols

[q_itf_protocols_internet_facts_08.question.fex]

Question 3:
Correct

Which kind of connector is pictured here?

USB
RJ-45
LC/SC
NEMA 5-15R

Explanation

The connector pictured is a male USB A connector.

References

TestOut IT Fundamentals Pro - 1.3 Peripheral Devices


https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 3/15
2/18/2021 TestOut LabSim

[q_itf_externaldevices_facts_01.question.fex]

Question 4:
Correct

Which of the following is NOT a long-term storage device?

Flash drive
Compact disc
Hard disk
RAM

Explanation

Random-Access Memory (RAM) holds data in short-term memory. Hard disks, compact discs, and
flash storage are all long-term memory solutions.

References

TestOut IT Fundamentals Pro - 1.4 Processing and Storage Hardware

[q_itf_storagetypes_facts_02.question.fex]

Question 5:
Correct

Which of the following components converts AC to DC?

Capacitor
Surge protector
Power supply
Voltage regulator

Explanation

https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 4/15
2/18/2021 TestOut LabSim

A computer's power supply converts alternating current (AC) from the wall outlet to direct current
(DC) used by the computer's internal components.

A voltage regulator is an electronic device that supplies the appropriate voltage to a processor. It does
not convert the power input from one form to another; it only ensures that the voltage remains at the
appropriate level for the device. A surge protector protects a system from power spikes. A UPS
(uninterruptable power supply) provides backup AC power using a reserve battery.

References

TestOut IT Fundamentals Pro - 1.4 Processing and Storage Hardware

[q_itf_intcomponents_facts_03.question.fex]

Question 6:
Correct

Which of the following has the ability to store user data even if the power to the computer is off?

System memory
Firmware/BIOS
Hard drive
Cache memory

Explanation

Hard drives provide persistent storage for user data.

System memory and cache memory require a power source to store data.

Firmware/BIOS provide persistent storage while the computer is powered off, but for system settings
and not user data.

References

TestOut IT Fundamentals Pro - 1.4 Processing and Storage Hardware

[q_itf_storagetypes_facts_11.question.fex]

Question 7:
Correct

Which type of connector is commonly used for keyboards and mice?

https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 5/15
2/18/2021 TestOut LabSim

XLR
TRS
RCA
USB

Explanation

USB, or Universal Serial Bus, is used for mice, keyboards, flash drives, and many other common
peripherals.

References

TestOut IT Fundamentals Pro - 1.3 Peripheral Devices

[q_itf_iohardware_facts_04.question.fex]

Question 8:
Correct

Which of the following uses persistent memory chips to store data?

RAM
Flash drive
Compact disc
Hard disk

Explanation

Flash drives use persistent memory chips to store data.

RAM uses memory chips, but they are not persistent.

Compact discs and hard disks are persistent, but they do not use memory chips.

References

TestOut IT Fundamentals Pro - 1.4 Processing and Storage Hardware

[q_itf_storagetypes_facts_03.question.fex]

https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 6/15
2/18/2021 TestOut LabSim

Question 9:
Correct

A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be
opened.
Which of the following email protocols is being used?

IMAP
IMEI
S/MIME
POP3

Explanation

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocol used to encrypt emails. It


allows the sender to digitally sign and encrypt emails. An encrypted email server will encrypt email
communications between the server and an email client but will store the email in an unencrypted
form. A proper certificate must be used to encrypt and decrypt S/MIME emails.

POP3 (Post Office Protocol 3) is an email protocol that will download and delete emails from a mail
server.

IMAP (Internet Message Access Protocol) is an email protocol that can be used to synchronize email
between multiple email clients on multiple devices.

IMEI (International Mobile Equipment Identity) is a number (usually unique) that is assigned by a
manufacturer to a mobile device.

References

TestOut IT Fundamentals Pro - 4.4 Security Concepts

[q_itf_encryption_facts_03.question.fex]

Question 10:
Correct

Match each protocol on the left to its description on the right.

Verifies that each packet has been transmitted and received correctly

TCP

Encrypts and transfers hypertext pages on the World Wide Web

https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 7/15
2/18/2021 TestOut LabSim

HTTPS

Matches unique IP addresses with easy-to-read URLs

DNS

Transfers hypertext pages on the World Wide Web

HTTP

Divides files into packets and routes them through the Internet to their destination

Internet Protocol

Transmits packets in a continuous stream but doesn’t verify packets

UDP

Explanation

IP (Internet Protocol) divides files into packets and routes them through the Internet to their
destination.

TCP (Transmission Control Protocol) verifies that each packet has been transmitted and received
correctly and retransmits packets that become lost or corrupted.

UDP (User Datagram Protocol) transmits packets in a continuous stream but doesn't verify whether
packets are received correctly.

DNS (Domain Name System) matches unique IP addresses with easy-to-read URLs.

HTTP (Hypertext Transfer Protocol) transfers hypertext pages on the World Wide Web.

HTTPS (HTTP + Secure Sockets Layer) encrypts and transfers hypertext pages on the World Wide
Web.

References

TestOut IT Fundamentals Pro - 2.4 Networking Standards and Protocols

[q_itf_protocols_internet_facts_01.question.fex]

Question 11:
Correct

https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 8/15
2/18/2021 TestOut LabSim

You have recently issued new mobile phones to the sales team in your company. Each phone has the
ability to store and transmit encrypted information for such things as making payments at a checkout
counter.

Which of the following is the technology being used in these phones?

VPN
Bluetooth transmitters
Infrared transmitters
NFC chips

Explanation

Near field communications (NFC) chips are a wireless mobile technology that can be embedded in
credit cards and smartphones for transmitting financial information when making payments. For
example, many point of sale devices can read information from NFC chips. NFC chips can also be
used in passports to contain identity information.

References

TestOut IT Fundamentals Pro - 2.3 Networking Basics

[q_itf_netdevices_interface_facts_03.question.fex]

Question 12:
Correct

Which hardware component processes data?

RAM
CPU
SSD
HDD

Explanation

The CPU, or Central Processing Unit, processes data.

RAM stores values in short-term memory.

HDD and SDD are two types of long-term memory storage.

https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 9/15
2/18/2021 TestOut LabSim

References

TestOut IT Fundamentals Pro - 1.4 Processing and Storage Hardware

[q_itf_intcomponents_facts_02.question.fex]

Question 13:
Correct

Which of the following stores data using microscopic light and dark spots?

RAM
Flash drive
Compact disc
Hard disk

Explanation

The computer uses a laser to read the microscopic light and dark spots on CDs, which are then
digitized into 1s and 0s.

References

TestOut IT Fundamentals Pro - 1.4 Processing and Storage Hardware

[q_itf_storagetypes_facts_04.question.fex]

Question 14:
Correct

You have found a file named FunAppx86.exe on your hard drive. Which system(s) would this
executable file MOST likely run on?

Both 32-bit and 64-bit systems


Only 32-bit systems
Only 64-bit systems
Only 16-bit and 32-bit systems

Explanation

https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 10/15
2/18/2021 TestOut LabSim

An executable file with "x86" in the name was most likely created for 32-bit systems. However, since
64-bit systems are typically backwards compatible with 32-bit applications, this file will most likely
run on both 32-bit and 64-bit systems.

References

TestOut IT Fundamentals Pro - 1.2 How Computers Work

[q_itf_diginfo_facts_08.question.fex]

Question 15:
Correct

Which of the following features is supplied by WPA2 on a wireless network? (Select two.)

Refusal of client connections based on MAC address


Identification of the network
Filtering of traffic based on packet characteristics
Centralized access for clients
Encryption
Authentication

Explanation

Wi-Fi Protected Access 2 (WPA2) provides encryption and authentication for wireless networks.

MAC address filtering allows or rejects client connections based on the hardware address. The SSID
is the network name or identifier. A wireless access point (called an AP or WAP) is the central
connection point for wireless clients. A firewall allows or rejects packets based on packet
characteristics (such as address, port, or protocol type).

References

TestOut IT Fundamentals Pro - 2.4 Networking Standards and Protocols

[q_itf_standards_facts_06.question.fex]

Question 16:
Correct

https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 11/15
2/18/2021 TestOut LabSim

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to
convert the signal received on the coax cable to data that can be understood by a computer?

Router
Server
Modem
Switch

Explanation

Cable internet providers require the client to have a modem to receive the signal from a coax cable
and convert the signal for use with a data network, typically over copper Ethernet cables.

A router is a network device that moves traffic between two different IP networks.

A switch is a network device that moves traffic within an IP network.

A server is a computer that provides services to clients on a network.

References

TestOut IT Fundamentals Pro - 2.3 Networking Basics

[q_itf_netdevices_interface_facts_16.question.fex]

Question 17:
Correct

A small business wants to make sure their wireless network is using the strongest encryption to
prevent unauthorized access. Which of the following wireless encryption standards should be used?

WPA
WPS
WPA2
WEP

Explanation

https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 12/15
2/18/2021 TestOut LabSim

WPA2 provides the highest level of encryption for WiFi.

WPA2 has replaced WPA and WEP.

Wi-Fi Protected Setup (WPS) is a wireless setup technique used to make it easier to connect a device
to a wireless router.

References

TestOut IT Fundamentals Pro - 4.4 Security Concepts

[q_itf_encryption_facts_09.question.fex]

Question 18:
Correct

A small business has doubled in size over the past year. The IT consultant for the company is
recommending the addition of a computing device that will provide central access to business
resources. Which of the following describes the type of device needed?

Laptops for each employee


Tablets for each employee
Network Server
Business-class workstations

Explanation

A network server is a host or computer on the network that provides services to clients or
workstations.

Business-class workstations are clients that connect to network servers.

Tablets and laptops would provide a distributed client and not central access to business resources.

References

TestOut IT Fundamentals Pro - 2.3 Networking Basics

[q_itf_netdevices_interface_facts_15.question.fex]

Question 19:
Correct

https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 13/15
2/18/2021 TestOut LabSim

Which of the following is not an example of wireless networking communications?

802.11n
Infrared
DSL
Bluetooth

Explanation

DSL or Digital Subscriber Line, is not a form of wireless networking communications. Rather, it is a
form of high-speed WAN connection used to connect remote systems to the Internet. Wireless
communications are those types of networking technologies that do not rely upon wires or cables to
connect computers together in a networking relationship. 802.11n is the primary wireless standard
used. 802.11-compliant networks employ communication signals of 2.4GHz or 5.7 GHz radio waves.
Infrared and Bluetooth are other forms of wireless networking communications.

References

TestOut IT Fundamentals Pro - 2.3 Networking Basics

[q_itf_isp_facts_02.question.fex]

Question 20:
Correct

Match the storage device types on the left with the description and benefits on the right.

A thick magnetic disk made of aluminum platters. Uses read/write heads to access
data stored on the platters.

Hard disk drive (HDD)

A flash device with storage capacity similar to a small hard drive.

Solid state drive (SSD)

Uses lasers to read and write information stored in the form of pits in their reflective
coating.

https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 14/15
2/18/2021 TestOut LabSim
Optical disc drive

Up to several TB in storage capacity and cost per MB is cheap.

Hard disk drive (HDD)

Faster than other devices. No moving parts. Last longer than other storage devices.

Solid state drive (SSD)

Ideal for music and video. Portable and cheap with a long shelf life.

Optical disc drive

Explanation

Hard disk drives (HDD) are thick magnetic disks made of aluminum platters. They use read/write
heads to access data stored on the platters. They have up to several TB in storage capacity and their
cost per MB is cheap.

Solid state drive (SSD) is a flash device with storage capacity similar to a small hard drive. They are
faster than other devices. They have no moving parts and last longer than other storage devices.

Optical discs use lasers to read and write information that is stored in the form of pits in their
reflective coating. They are ideal for storing and playing music and video. They are portable and
cheap and have a long shelf life.

References

TestOut IT Fundamentals Pro - 1.4 Processing and Storage Hardware

[q_itf_storagetypes_facts_06.question.fex]

Copyright © 2021 TestOut Corporation All rights reserved.

https://labsimapp.testout.com/v6_0_433/index.html/productviewer/1172/A.2.2 15/15

You might also like