Which of the following connection types has the LONGEST transmission limitation in terms of distance?
A. USB 3.0
B. CAT6
C. Fiber
D. CAT5
CompTIA exam questions
Which of the following connection types has the LONGEST transmission limitation in terms of distance?
A. USB 3.0
B. CAT6
C. Fiber
D. CAT5
New cabling has to be installed in a hospital with a very strict fire code. Which of the following materials would MOST likely be related to this requirement?
A. Fiber Optic
B. PVC
C. Shielded Twisted Pair
D. Plenum
Which of the following types of connectors would be found to connect printers and scanners to a device that did not have any network connections?
A. RJ-45
B. Parallel
C. RJ-11
D. BNC
Which of the following cable types should be installed to minimize toxic fumes in the event of a fire?
A. Fiber
B. STP CAT6
C. Plenum
D. Coaxial
A DVI-D cable is generally used for which of the following computer functions?
A. Delivering audio only
B. Delivering audio & video
C. Delivering video only
D. Delivering an analog signal
A customer states that since the new firewall has been installed, the customer has not been able to send email. Which of the following ports on the firewall should be checked?
A. 21
B. 25
C. 110
D. 443
A technician upgrades an older computer to Windows 8. The computer is running unusually slow, but the hardware has no problems and is adequate for the OS. Which of the following is the MOST likely solution?
A. Change the boot sequence
B. Switch the BIOS to UEFI
C. Defragment the hard drive
D. Enable virtualization
The technician is troubleshooting a connection issue between the switch and the wall jack. The user is plugged into the jack; however, there is no connection. The technician goes into the switch room to see if the cable is plugged into the switch, but none of the cables are labeled. Which of the following tools would the technician MOST likely use to find this cable?
A. WiFi analyzer
B. Loopback plug
C. Multimeter
D. Tone generator
A user received an email from their bank asking them to login and verify their personal information. The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?
A. Spam
B. Phishing
C. Adware
D. A Trojan
Which of the following are the MOST important considerations when configuring a PC that will be used for a CAD / CAM workstation? (Select TWO).
A. Gigabit NIC
B. HDMI output
C. Maximum RAM
D. Powerful processor
E. High end audio output