cit final

¡Supera tus tareas y exámenes ahora con Quizwiz!

which of the following protocols is used by an email client to retrieve messages from an email server and givers users the option to keep mail messages on the server?

IMAP

which network type uses a coaxial cable to receive its signal

cable

what is the term for software that anyone can use or modify for free?

open source software

Transmits packets in a continuous stream but doesn't verify packets

UDP

which of the following statements is true regarding a VPN?

a VPN masks a user's IP address in order to make their actions untraceable

which of the following certifications would you pursue to help you land a job as a network administrator

cisco CCNA

employee complain to the company IT division that they are spending considerable time and effort discarding unwanted junk mail which of the following should be implemented?

email filtering

Which network type uses light pulses to transmit data?

fiber optic

which of the following internet technologies provides the FASTEST speeds?

fiber optic

Which installation method is most likely to put your computer at risk of downloading a virus?

internet installation

which of the following is the system administrator's most important task

monitoring and maintaining system security

which of the following IT jobs includes installing and configuring network media?

network administrator

which of the following tools would you use to check connectivity between two computers?

ping

which cellular network type was the first kind of network to use encryption?

2G

encrypts and transfers hypertext pages on the world wide web

HTTPS

the TCP/IP suite has three protocols that deal with sending and receiving email. what are these protocols?

IMAP SMTP POP3

a security analyst does which of the following

Inspects the company's network for security breaches and recommends measures to prevent future attacks.

which of the following allows for access to the internet without either a wifi or a wired connection?

Mobile Data

A user read their work email from their home computer and when they returned to work the next day and accessed the email server, all of their email was missing. Which of the following protocols removes mail from a mail server?

POP3

verifies that each packet as been transmitted and received correctly

TCP

what is the name of the protocol suite used on the internet?

TCP/IP

which of the following is a good general rule to go by when deciding what to wear to an interview

dress one step above what the position requires

which of the following future trends in information technology refers to an organization automating as many tasks as possible

hyper-automation

which of the following refers to digital content that is delivered over the internet?

the web

which application makes sure your computer has the most recent versions of its system software?

windows update

which cellular network type was the first to have gigabit per second speeds?

4G

which of the following would be the best option to help you narrow down choices when identifying a career in IT

career assessment tests

you have entered a URL into a browser and received a 404 error. which type of error did you receive?

client error

which of the following would you do as a computer forensics expert

recover digital evidence, some of which may have been damaged or deleted from storage devices?

which of the following should you do before going to an interview

research the company history and culture

you live in a rural area and don't have a nearby wired network to connect to. what could you use to connect to the inernet?

satellite

Speaking in front of a mirror can help to improve which of the following traits?

social skills

Dana has performed a transaction online. The transaction is recorded in a public database. Which future IT trend was MOST LIKELY used?

blockchain technology

Forensics experts need to be thoroughly familiar with which of the following?

data encryption methods, operating systems, and programming languages

which of the following is a way for programmers and others to make sense of complex business flows?

data modeling

which of the following utilities can you use to monitor, update, and manage all your hardware devices on a windows computer?

device manager

which of the following best describes a system administrator

he or she is typically responsible for securing networks and responding to intrusions in smaller organizations

which of the following personality traits means that you possess high moral character regardless of whether you are being watched or not?

integrity

Divides files into packets and routes them through the Internet to their destination

internet protocol IP

which of the following BEST describes the ipconfig utility

it is a utility that displays all current TCP/IP network configuration values

which of the following best describes the ping utility?

it sends a single packet to a specified network address and then waits for a reply

You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose?

local installation

which of the following IT jobs typically do not require as much education or on the job experience?

network technician

Making real and authentic connections with people is known as which of the following?

networking

which of the following application architecture model tiers describes office productivity software?

one tier

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality. What is the name of this model?

open source

which of the following future IT trends will require many data analysts who can collect data, decide which data is relevant, and make good decisions based on that data?

predictive healthcare

which of the following is found in one or more columns of data and contains a unique identifier for the row?

primary key

what is the term for software that is exclusively controlled by a company and cannot be used or modified without permission?

proprietary software

Formatted summary of information from a database.

report

Once you've identified a specific IT career you'd like to pursue, which of the following can BEST help you create a career plan? (Select two.)

set clearly defined goals compare your current experience with job qualifications

Software that requires a monthly subscription fee is often called _______________.

software as a service

what is the biggest benefit to using a DHCP server in a large network?

they save time for the network administrator

which of the following statements is true regarding a network technician?

they troubleshoot reported problems and assist users in resolving network connection issues

Bob, a network professional, wants to find out where packets are getting stuck on the path to their destination. Which of the following utilities should he use?

tracert

which of the following utilities would you use to find the path between two computers?

tracert

which of the following is the most common type of resume

chronological

which of the following is not an example of wireless networking communications?

DSL

how long should a good elevator pitch be

30 seconds

how many ping packets are sent by default in a successful ping request?

4

Transfers hypertext pages on the World Wide Web

HTTP

which of the following utilities would you use to automatically assign IP addresses on a network?

DHCP

Matches unique IP addresses with easy-to-read URLs

DNS

If your network does not have a DHCP server, what must you do to access the internet?

manually change TCP/IP properties to match your network's settings

You need to troubleshoot a Windows computer that isn't connecting to a network. Which utility should you use?

network and internet

which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters?

network architects

Stores raw data in a relational database.

table

which of the following schools allows students to receive dedicated training for a specific career

technical college

mary is interested in moving into a career as a penetration manager which of the following IT certifications should she pursue

CEH

What protocol is used to send e-mail messages from a mail client to a mail server?

SMTP

a healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the internet. which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite


Conjuntos de estudio relacionados

El vocabulario de la cancion Ojala que cafe

View Set

Customers, Segmentation, and Target Marketing

View Set

EXERCISE 15.8: Interpreting Unconformities on a Block Diagram

View Set

The Invisible Man Summer Questions

View Set

COSC 1436_Programming Fundamentals-Quiz1 Chapter1

View Set