A technician has a desktop with two hard drives. The technician would like to configure a RAID array such that one drive can fail, but data can still be accessed. Which of the following RAID types should the technician install?
A. 0
B. 1
C. 5
D. 6
CompTIA exam questions
A technician has a desktop with two hard drives. The technician would like to configure a RAID array such that one drive can fail, but data can still be accessed. Which of the following RAID types should the technician install?
A. 0
B. 1
C. 5
D. 6
Which of the following wireless encryption types is vulnerable to weak IVS attacks?
A. WEP
B. WPA
C. WPA2
D. AES
Which of the following has a MAXIMUM transmission speed of 10 Mbps?
A. CAT3
B. CAT5
C. CAT5e
D. CAT6
A user has 350 Gigabytes worth of videos they would like to back up. At the very MINIMUM, which of the following could backup these pictures to a single medium?
A. Zip Drive
B. DVD Burner
C. LTO Drive
D. Blu-Ray Burner
Which of the following is the MAXIMUM number of unique addresses in a Class C network?
A. 64
B. 128
C. 254
D. 255
Peter, a user, requests that a new printer be installed for his SOHO environment. Peter wants to be able to print to the device from any location within the SOHO. Which of the following should be used?
A. Infrared (IR)
B. Serial
C. 802.11
D. Bluetooth
A user has downloaded an image file and needs to install an application from the image. When trying to execute or open the file, an error is displayed. Which of the following should the user perform?
A. Download a different file from the website
B. Rename the extension of the file to a known extension
C. Verify the MD5 hash of the downloaded file
D. Mount the file as an emulated DVD
A user reports a number of inappropriate files appearing and disappearing from their computer. The technician identifies a program running that would appear to be the source of the rogue data. Which of the following should the technician do NEXT?
A. Discover where the files originate
B. Report the activity to management
C. Preserve the inappropriate files
D. Document the result of the service call
Which of the following RAM types can continue working if there is corrupt data?
A. Non-parity
B. Dual channel
C. Buffered
D. ECC
Which of the following describes a Class A IP address?
A. The last octet is between 1 and 128 with a subnet mask of 255.0.0.0
B. The first octet is between 1 and 128 with a subnet mask of 255.255.255.0
C. The first octet is between 1 and 128 with a subnet mask of 255.0.0.0
D. The last octet is between 1 and 128 with a subnet mask of 255.255.255.0