NTA Final Review Complete With Answer
NTA Final Review What should be your first step when troubleshooting a network connection that uses a cable modem? - Answer- Ping local devices using their IP addresses. Which of the following is generally a component of a BYOD policy? - Answer- Scope of control Which term describes a compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk,and relies on wireless or mobile networks for connectivity? - Answer- Tablet What does the following represent? 2E22:4F00:000E:00D0:A267:97FF:FE6B:FE34 - Answer- An IPv6 address A friend has called you about a possible computer problem because her computer is acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the computer sometimes reboots itself without warning. When you inspect your friend's system, you notice that several ports are open. Which of the following is most likely the cause of these symptoms? - Answer- The computer has been infected with an illicit server. The Windows Device Manager is a tool that enables you to perform a variety of tasks, including: - Answer- Change a resource assignment. Which type of attack involves the installation of malicious code on personal computers or servers that redirects Internet Traffic from a legitimate Web site to an identical-looking but malicious imposter Web site? - Answer- Pharming The capabilities of cellular networks have improved greatly since their original development for analog voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive needs. A benefit of 4G networks is that they: - Answer- Provide fast transmission rates equivalent to DSL or broadband-cable. Selena has run out of memory on her phone's SD card. She has decided to store the files she has accumulated on a third-party cloud service provider's drives. Which of the following is a typical issue that she may encounter? - Answer- The files become unavailable whenever Internet connectivity is lost. Which of the following computer system maintenance tasks can help improve file access performance? - Answer- Defragment the drive using the following command: defrag c: -w Which of the following is a security threat commonly associated with cloud-based services? - Answer- Hypervisor vulnerabilities Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this implementation? - Answer- Student devices sending unsecured data What is the biggest security concern with wireless networks? - Answer- Wireless encryption algorithms must be implemented. Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution? - Answer- She can contract with a cloud service provider to host the CRM that her company's employees can access. Sally is a network technician at Acme Corporation. She has been directed to configure the network adapter for a company laptop so that it can be used to connect to the company network and the Internet. What is one of the required TCP/IP settings that she will need to configure? - Answer- Default gateway Which term describes the practice of actively collecting wireless networking data from companies and individuals? - Answer- War driving Jose is experiencing performance problems with his notebook computer that he purchased a year ago. Upon discussing this issue with him, you learn that he has never deleted any temporary files since owning the device. What can Jose do to fix this problem most efficiently? - Answer- Use the Windows Disk Cleanup utility. Which of the following is a drawback to using Wired Equivalent Privacy (WEP)? - Answer- Symmetric-key encryption is susceptible to cracking. When using cloud-based services to host company data, a company's disaster recovery plan should include strategies for: - Answer- Creating redundancy and using multiple cloud service providers. Which of the following statements about virtualization is true? - Answer- Virtualization enables you to run multiple operating systems and applications on a single computer. When a PC computer device wants to communicate with the processor, which system resource does it use? - Answer- IRQ
Geschreven voor
- Instelling
- NTA
- Vak
- NTA
Documentinformatie
- Geüpload op
- 20 oktober 2023
- Aantal pagina's
- 6
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
nta final review
-
nta final
-
nta