2023 with complete solution
What should be your first step when troubleshooting a network connection that
uses a cable
modem?
A. Ping the proxy server.
B. Ping the default gateway.
C. Ping local devices using their DNS names.
D. Ping local devices using their IP addresses.
D. Ping local devices using their IP addresses
Which of the following is generally a component of a BYOD policy?
A. Scope of control
B. Insurance on devices
C. Maintenance provision
D. Device replacement or upgrade
A. Scope of control
Which term describes a compact personal computer that relies on a touch screen
for input,
generally uses a solid-state drive instead of a traditional hard disk, and relies on
wireless or mobile
networks for connectivity?
A. Tablet
B. Laptop
C. Netbook
D. Portable media player
A. Tablet
What does the following represent?
2E22:4F00:000E:00D0:A267:97FF:FE6B:FE34
A. A MAC address
B. AnIPv4address
C. An IPv6 address
D. An IP diagnostic loopback address
C. An IPv6 address
A friend has called you about a possible computer problem because her
computer is acting
strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard-
drive light flashes
constantly, the computer sometimes reboots itself without warning. When you
inspect your friend's
system, you notice that several ports are open. Which of the following is most
likely the cause of
these symptoms?
,A. The computer has been infected with a polymorphic virus.
B. The computer is experiencing a denial-of-service attack.
C. The computer has been infected with an illicit server.
D. The computer has been infected by a worm.
C. The computer has been infected with an illicit server
The Windows Device Manager is a tool that enables you to perform a variety of
tasks, including
A. Map to a printer.
B. Ping anIPaddress.
C. Defragment a hard drive.
D. Change a resource assignment.
D. Change a resource assignment.
Which type of attack involves the installation of malicious code on personal
computers or servers
that redirects Internet traffic from a legitimate Web site to an identical-looking but
malicious
imposter Web site?
A. Pharming
B. Spoofing
C. Phishing
D. Replay
A. Pharming
The capabilities of cellular networks have improved greatly since their original
development for
analog voice phone calls. Most recently, fourth-generation (4G) wireless supports
a variety of
data-intensive needs.
A benefit of 4G networks is that they:
A. Use spread-spectrum technology to ensure high transmission rates.
B. Provide fast transmission rates equivalent to DSL or broadband-cable.
C. Provide fast transmission rates equivalent to high-speed dial-up connections.
D. Enable bandwidth throttling, allowing the user access to unrestricted
download speeds.
B. Provide fast transmission rates equivalent to DSL or broadband-cable.
Selena has run out of memory on her phone's SD card. She has decided to store
the files she has
accumulated on a third-party cloud service provider's drives. Which of the
following is a typical
issue that she may encounter?
A. The files become corrupted due to an attack from a hacker botnet.
B. The files become unavailable whenever Internet connectivity is lost.
, C. The files become unavailable because they are being shared with other users.
D. The files become corrupted because the provider uses a proprietary
compression algorithm
during transit.
B. The files become unavailable whenever Internet connectivity is lost.
Which of the following computer system maintenance tasks can help improve file
access
performance?
A. Use a SCSI drive instead of a SATA drive
B. Use a SATA drive instead of an EIDE drive
C. Defragment the drive using the following command: fdisk -d -w c:/
D. Defragment the drive using the following command: defrag c: -w
D. Defragment the drive using the following command: defrag c: -w
Which of the following is a security threat commonly associated with cloud-based
services?
A. Malware
B. Phishing
C. Hypervisor vulnerabilities
D. Operating system vulnerabilities
C. Hypervisor vulnerabilities
Sam is a professor at a small college. Due to a scheduling conflict, he was unable
to obtain
access to the computer lab to give the final exam. As an alternative, he asked
students to bring
their own devices (BYOD) and connect to the college's Wi-Fi for network access.
What security
risk is associated with this implementation?
A. Inability for students to share files
B. Inability for students to back up user files
C. Student devices sending unsecured data
D. Student devices being more susceptible to malware
C. Student devices sending unsecured data
What is the biggest security concern with wireless networks?
A. Firewall software is not available for access points.
B. Wireless encryption algorithms must be implemented.
C. Wireless networks do not support intrusion detection.
D. Wireless networks do not support encryption via an access point.
B. Wireless encryption algorithms must be implemented.
Gwen works for a small company where she has been asked to find a cost-
effective option for
providing comprehensive customer service. The finance, technical support, sales
and customer