00:00

QUESTION 121

- (Topic 4)
Which of the following is the primary function of a DNS service?

Correct Answer: B

QUESTION 122

- (Topic 2)
A user creates a support ticket to report a conference room projector that does not work. The user says that even though the provided cables are being used, the projector screen shows the following error message:
No signal input
Which of the following describes the FIRST action that should be taken?

Correct Answer: D
The most common reasons you may be seeing the "No Signal" message: The projector and the source device are not connected correctly.
The first action should be to check the video cable and replace it if necessary, as the error message suggests that the projector is not receiving a signal from the laptop. Verifying that the projector is turned on and checking the bulb would come after verifying the video cable.

QUESTION 123

- (Topic 4)
Which of the following is considered a connectionless protocol?

Correct Answer: D
The correct answer is D. UDP.
UDP (User Datagram Protocol) is a connectionless protocol that does not establish a connection before sending or receiving data. UDP simply sends datagrams to the destination without checking if the receiver is ready or not. UDP does not guarantee reliable delivery, error correction, or in-order arrival of the data. UDP is faster and more efficient than connection-oriented protocols for applications that do not require reliability, such as streaming audio or video1
* A. SSH (Secure Shell) is not a correct answer. SSH is a connection-oriented protocol that uses TCP (Transmission Control Protocol) as its transport layer. SSH establishes a secure and encrypted connection between two network endpoints before exchanging data. SSH provides authentication, confidentiality, and integrity for remote login and command execution2
* B. TCP (Transmission Control Protocol) is not a correct answer. TCP is a connection- oriented protocol that establishes a connection before sending or receiving data. TCP ensures reliable delivery, error correction, and in-order arrival of the data. TCP is slower and more complex than connectionless protocols, but it provides more reliability and quality of service for applications that require it, such as web browsing or email1
* C. HTTPS (Hypertext Transfer Protocol Secure) is not a correct answer. HTTPS is a connection-oriented protocol that uses TCP as its transport layer and SSL/TLS as its security layer. HTTPS establishes a secure and encrypted connection between a web browser and a web server before exchanging data. HTTPS provides authentication, confidentiality, and integrity for web transactions, such as online banking or shopping1

QUESTION 124

- (Topic 4)
A server administrator is building a new application server. Which of the following, RAID levels provides MAXIMUM performance and redundancy?

Correct Answer: D
RAID 10 is a combination of RAID 1 and RAID 0, which provides both performance and redundancy. RAID 1 mirrors data across two or more disks, while RAID 0 stripes data across two or more disks. RAID 10 combines these two methods to create a mirrored stripe set, which can tolerate multiple disk failures as long as they are not in the same mirror. RAID 10 requires at least four disks and offers better performance than RAID 5, which uses parity to provide redundancy. References: https://www.comptia.org/blog/what-is-raid-0-1-5-6-10

QUESTION 125

- (Topic 4)
Which of the following is most likely used to control door access?

Correct Answer: C
RFID stands for Radio Frequency Identification, and it is a technology that uses electromagnetic fields to identify and track objects that have RFID tags attached to them. RFID tags are small devices that store information and can be read by RFID readers. RFID is most likely used to control door access because it allows for contactless and convenient authentication of authorized personnel. For example, an employee can use an RFID card or key fob to unlock a door by holding it near an RFID reader installed on the door. The reader will scan the tag and verify its ID number with the access control system, which will grant or deny access based on the predefined rules and permissions. RFID is a common and widely used type of door access control system, as it offers security, efficiency, and flexibility.
References:
Some additional references for the answer are: IP Door Access Control - Kintronics
Door Access Control: A Complete Guide | Swiftlane
Best Door Access Control System: How It Works & Features - ButterflyMX