ITSP 134 CHP. 18-19

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Troubleshooting is of the process of applying logic and skills to quickly narrow down the solution to a particular issue or problem.Which of the following is a set of issues revolving around dropped or network connections due to a weak signal? BYOD Factory reset Baseband update Full device

Baseband update This is the process of updating the device's firmware to resolve issues of dropped calls or network connection due to a weak signal.

Bill is out camping with his family and is attempting to connect his phone to the radio, but for some reason he cannot find the correct frequency. What should he be looking for in order to get his favorite station playing? Channel Service Set Identifier (SSID) Blacklists Whitelists

Channel A channel is a specific radio frequency within a broader frequency.

Brandon is assisting an internal employee with their mobile device. Upon further diagnosing, Brandon can see that the mobile device is currently not opening one of the company's applications. To further assist Brandon will begin to do some troubleshooting. Which of the following choices is not a form of troubleshooting? Close, uninstall, and reinstall the application Restart the device Reboot the device Charging the device with 100% battery life

Charging the device with 100% battery life

Bill just sent himself an important document that includes his personal information. Unfortunately, he needs a secure device to receive this document on and all he can find is a public computer. What are the type of computers that aren't protected by a firewall or that have limited protection, that Bill should avoid? Wireless access point (WAP) Port forwarding Universal Plug and Play (UPnP), DMZ (Demilitarized Zone)

DMZ (Demilitarized Zone) A DMZ in networking refers to a computer or network that is not protected by a firewall or has limited protection.

With mobile devices being used so much in society, the difference between work and personal activities and devices can sometimes be difficult to completely distinguish. Protecting those devices becomes an important activity for any organization. What is a style of encryption that encrypts all of the data stored on a device? BYOD MDM EOL Full device

Full device Full device encryption is a tool offered by both iOS and Android for encrypting all the stored data on a device, thereby making it useless to a thief.

Diagnosis of various malware on a system is important because the sooner that the offending application can be identified, the more that any damage or continuing effects on an organization can be limited. Which of the following is a symptom of malware at work on a device? Quick load times Longer battery life High number of ads SDK

High number of ads

A user reports having issues with Internet Explorer on Windows 10. The service technician would like to further troubleshoot by checking the configuration in the control panel. This will allow the technician to check the current certificates and delete browsing history. What would the applet be called? Static IP address Keyword filtering Internet options IP filtering

Internet options Internet Options is an applet that configures Internet Explorer for Windows 10.

A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its requirements. Which of the following operating systems will be the best choice for the users? Windows 10 Enterprise Mac OS X Linux Windows 7 Professional

Linux

What are applications that can be installed in a browser to change the way the browser functions or to enhance the features of a single website? Password managers Plug-ins and extensions Pop-up blockers Trackers

Plug-ins and extensions Plug-ins and extensions are small programs that install in a browser to change the way the browser functions or enhances the features of a single website.

What network protocol allows devices to discover and communicate with each other on the network, without the need for manual configuration or user intervention? DHCP reservations Static IP addresses Universal Plug and Play QoS

Universal Plug and Play

A Mac user wants to update macOS and is searching Apple.com to locate update files. How are macOS updates typically obtained? Updates are found in the App Store. macOS does not require or utilize updates. Updates are downloaded through Time Machine. A manual update of macOS is not possible.

Updates are found in the App Store.

Understanding the capabilities of any device is an important component of an administrator's duties and knowledge base. When creating applications for any mobile device, testing them ahead of time is important. Which of the following is a tool for using a virtual device to test a mobile app? OS updates AirDrop Data syncing Emulator

Emulator This is a tool for testing apps on a virtual device which is a virtual version of a device's OS.

What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity? Distro End-of-life Force Quit Forced kill

End-of-life An end-of-life vendor limitation is the point in time when a vendor (also called manufacturer) no longer provides updates or support for an operating system.

Cody is signing into the corporate network by using a VPN. Using this method, the VPN encrypts and protects data from when it leaves his computer until it reaches a server on the corporate network. What is the process referred to as? Set Channel to 2.412 GHz a Tunneling Internet Options Hash

Tunneling Tunneling is an encryption technique often used by a VPN for remote workers.

Steve noticed that Janette finished setting up some equipment in the office but realized she forgot to connect the rest of the wired devices on the local network. What device can heconnect the equipment in order to fix the problem? Proxy server Router VPN Switch

Switch A switch manages several network ports that can be connected to wired devices on the local network.

Scott has been asked to factory reset his old corporate-owned Android device. Upon opening the settings application, Scott is greeted with several options and paths. Which of the following paths would he need to take in order to erase all the data from his device? Biometrics and security > Clear credentials System > Advanced > Reset options > Erase all data Privacy > Android System Intelligence > Clear Data

System > Advanced > Reset options > Erase all data This option will remove all data and set the device back to factory default.

Bill needs to print a copy of his birth certificate, which will require him to connect it to his printer. What would allow his devices to discover and communicate with each other on the network? Wireless access point (WAP) Proxy server Universal Plug and Play (UPnP) Port address

Universal Plug and Play (UPnP) Universal Plug and Play allows devices to discover and communicate with each other on the network.

It can provide a great amount of benefit for any organization to be aware of the types of origins of applications and be able to verify that they are legitimate. A type of site has evolved for mobile devices to download and use verified applications. This gives an organization confidence that the applications, their devices are employing, are safe. Which of the following is a safe site for downloading apps to use on a company or personal device? Firewalls Trusted sources Device access controls SDK

Trusted sources

What is a list of what content cannot be accessed through a router's preferences? Screened subnet Port Forwarding Blacklists Whitelists

Blacklists Blacklists are lists of what content cannot be accessed.

Hardware and software are supported for long periods of time by the creating organization. However, vendors may eventually discontinue modifications or replacement parts.Which of the following refers to a device aging out of the vendor's updates? BYOD MDM EOL OOP

EOL EOL stands for end-of-life and is a self-imposed limitation in which vendors cap an age for an application or a piece of hardware.

What can be done to prevent your wireless SSID from showing up on a list of available networks? Disable SSID broadcast Set Channel to 2.412 GHz a Disable Guest Network Change the firewall settings

Disable SSID broadcast You can choose to Hide SSID, which disables SSID broadcasting. Doing so causes the wireless network to appear as Unnamed or Unknown Network on an end user's device. When a user selects this network, they are given the opportunity to enter the SSID.

Devices malfunction on a regular basis and can require some level of intervention to return to working order. Administrators need to understand the various types of potential fixes that can be put in place to ensure devices are back in working order as soon as possible. Which of the following is a last resort solution to return a device to working order and involves erasing all data and resetting the device to its default state? BYOD Factory reset Security profile Full device

Factory reset Factory reset is a full reset of a device to its factory default condition.

Working with backups and the assurance that information is protected and kept so that the organization's assets are safe, is a mission critical IT activity. There are a number of backup types and as such, it is important for an administrator or technician to be aware of what each type does so that they are backing up in an efficient and effective manner. What would be a tool used to process the syncing of emails, contacts, calendars, photos, and other data through online accounts? iCloud backup Google Drive backup File level backup partial image-level backup

File level backup This is a process of syncing emails, contacts, calendars, photos, and other data through online accounts, with each file being backed up individually.

Daniel assists an internal employee with their corporate-owned mobile device. Upon further troubleshooting, Daniel notices the employees' phone contacts are currently missing and their corporate account has been logged out. Once logged back into the user's account, Daniel would like to further assist by preventing any data from being lost. Which of the following would synchronize the user's data using their online corporate account? Emulator End-Of-Life (EOL) File-Level Backup Android Package

File-Level Backup Synching emails, contacts, calendars, photos, and other data through online accounts or to your computer.

Understanding the tools and techniques for protecting a device or a network is an important knowledge base for any administrator. There are a number of security measures that can be employed to accomplish device and data protection. Which of the following is a tool that controls which apps or services can use network connections? Firewalls MDM EOL SDK

Firewalls Firewalls are tools for networks, including mobile devices, that control which apps or services can use network connections.

When installing a file, a technician notices that a value has been generated at the end of the file name. Once the installation is completed, the technician notices that the value is not similar to the one that was seen during installation. This indicates that an issue occurred when installing the file. What is the generated value called? Pop-up blockers Password Managers Internet Options Hash If the tech Hash

Hash If the technician notices that the hash values do not match, that information can be used to identify where the error in download occurred.

Suppose you wanted to download a new browser on your machine, but you are unsure if you are downloading from a trusted source. What can be used to verify that the download is genuine and error-free? VPN Hash generator Proxy server Windows Defender Firewall

Hash generator A hash generator is used to verify the integrity of a file by ensuring that the file you're downloading matches the original hash value by checking its digital signature.

Luis is troubleshooting a BYOD (bring your own device) for an internal employee. On further review within their iOS device, Luis notices a bootlegged application has been installed onto the device causing software harm to the employee's device. \Which of the following has allowed the user to install the illegal application onto their iOS device and has now violated BYOD policies? Remote Wipe Rooting File-Level Backup Jailbreaking

Jailbreaking Jailbreaking grants root or administrative privileges to the OS and the entire file system, and complete access to all commands and features for an iOS device. Jailbreaking in this scenario violates BYOD policies in an enterprise environment.

When devices are lost or stolen, it is important that administrators have setup tools to help find and secure the devices to ensure that company assets are protected. Which of the following helps to find and secure company mobile devices? Locator AirDrop Data syncing Remote wipe

Locator Locator helps to find lost or stolen devices, force them to ring at their highest volume, and lock the devices, among other abilities.

Mobile policies are extremely important for organizations as using personal devices for work activities is a growing trend. As a result, categories of applications have developed to help enforce these mobile policies. Which of the following policies would ensure the installation of software on servers and mobile devices to enforce an organization's various mobile device policies? Local group policy MDM policy Group policy Audit logon policy

MDM policy MDM or mobile device management software is installed on both the server and mobile devices to enforce corporate MDM policies for securing data and apps.

Seeing various issues with a device, an administrator becomes more knowledgeable about common problems and solutions. As such, when certain conditions are met, the likelihood that a problem is something that has been seen before becomes greater. Being able to quickly and efficiently diagnose and resolve those issues is important. Which of the following has symptoms of short battery life or power drain? OOP Malware Low storage SDK

Malware Batteries draining quickly can be a sign of malware apps running in the background.

A user calls the service desk for assistance with an issue they are having on their computer. The service desk technician uses a program to remote into the user's computer in order to troubleshoot. What allowed the technician to access the user's computer? Microsoft Remote Assistance (MSRA) Microsoft Terminal Services Client (mstsc.exe) Kerberos RADIUS (Remote Access Dial-In User Service)

Microsoft Remote Assistance (MSRA) Microsoft Remote Assistance allows a user on the server computer to remain signed in during the remote session, retains control of the session, and can see the screen. This is helpful when troubleshooting problems on a computer.

Daniel has been tasked with setting up an option for users who work from home to gain access to the desktops within the office. What would allow the users to access the office desktops from their local network so that they may continue their work from home environment? Channel Microsoft Terminal Services Client (mstsc.exe) Kerberos RADIUS (Remote Access Dial-In User Service)

Microsoft Terminal Services Client (mstsc.exe) Microsoft Terminal Services Client provides access for remoting into a Desktop from a user's local network.

Sarah has started her position as a Service Desk Advisor and has been provided with a new mobile device. Sarah must set up her corporate email account and a few other applications. Which of the following is the process in which she can set up her secure corporate data and apps? Mobile Device Management (MDM) Baseband Update SDK Emulator

Mobile Device Management (MDM) It is software on both the server and mobile device that is designed to secure corporate data and apps for both corporate-owned and personal devices.

As mobile devices continue to evolve and to be able to accomplish organization objectives, their use continues to grow in all situations. Knowing how to control access to those devices is an important tool for administrators to be able to work with. Which of the following is a method for controlling access to the mobile device? Firewalls Pin code EOL SDK

Pin code

Steve is in charge of security for his company's resources, and his firewall controls what is allowed on his local network. His firewall picks up a message at the router. Where will that message be directed next? Wireless access point (WAP) Proxy server Universal Plug and Play (UPnP), Port Address

Port Address When a message arrives at a router, it is directed to a specific IP address and to a particular port address or port number.

A technician is working out of town at a new job site, but unfortunately has left some important documents on his home computer. He could email them to himself if he could connect his phone to his home computer remotely. What would allow his phone to connect past his home network's firewall? Wireless access point (WAP) Port forwarding Universal Plug and Play (UPnP), Demilitarized zone (DMZ)

Port forwarding

Suppose you wanted to run a publicly accessible website from your network server. For user activity from the auto-configured to access your website and bypass your firewall, you allow incoming traffic on port 80 on your router for this purpose. What is this process called? DMZ Keyword filtering Port forwarding IP filtering

Port forwarding Port forwarding is a technique that enables (opens) certain ports to certain computers so that activity initiated from the Internet can get past your firewall.

Michael is going through onboarding for his new position as a supervisor. While setting up his new corporate-owned device, he would like to make sure that all his data is not only backed up through Google, but also through the company's cloud storage. Which of the following would allow him to back up the device's data to the company's cloud storage? Jailbreaking Remote Backup Application Android Package Baseband Update

Remote Backup Application Remotely backs up the device's data to the company's secured cloud storage.

John is currently out for a business trip but requires access to his machine back in the office for a specific file. John uses a process that will allow him to access his machine through the Internet. What is this method of connection called? Channel Service Set Identifier (SSID) Remote Desktop Connection Whitelists

Remote Desktop Connection

John is currently out for a business trip but requires access to his machine back in the office for a specific file. John uses a process that will allow him to access his machine through the Internet. What is this method of connection called? Channel Service Set Identifier (SSID) Remote Desktop Connection Whitelists

Remote Desktop Connection Remote Desktop Connection, commonly called Remote Desktop, gives a user access to a Windows desktop from anywhere on the Internet

Steve just got back from a business trip and noticed that his corporate mobile device was missing. Using My Device, Android's built-in locator application, Steve was able to locate his device in another state. Feeling worried that the device may be compromised, Steve would like to take the next step and erase the device. Which of the following would allow him to erase the device from the My Device application? Remote Wipe End-Of-Life (EOL) Mobile Device Management (MDM) Rooting

Remote Wipe This feature allows the user to remotely erase all data from the device to protect their privacy.

A popular activity for some users with their mobile devices is to create an environment where any applications can be installed from any source. Which of the following is a reference to an Android device that is able to have applications from any source installed? BYOD Bootlegged Rooting Jailbreaking

Rooting Rooting is the process of getting root or administrative privileges to the OS and entire file system on an Android device.

Jannette has just finished setting up the modem within the corporate office and would like to connect several devices to the modem at once in an organized method. She needs something that can manage the traffic between all the networks. What would help to facilitate this scenario? Proxy server Router Trackers Zigbee

Router A router is a device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another

Developing new applications and apps for mobile devices and many other categories of devices is a growing field of expertise for many application developers. As such, there are application development tools that have been created to help to standardize development projects across various languages and ecosystems. Which tool is used to create a new application for various hardware devices? BYOD MDM EOL SDK

SDK SDK stands for software development kit and is a tool used to create, compile, and test applications.

What is another name for a type of computer that has no firewall, limited protections, and can receive any communication from the Internet? Screened subnet Universal Plug and Play (UPnP) Wireless access point (WAP)

Screened subnet A screened subnet is similar to a DMZ. It is a network where a single firewall is used with three separate network interfaces.

Organizations play an important role in setting the rules and procedures for how their devices and data will be used by employees, vendors, customers, and leadership. This ensures that company resources are protected from theft but that they are also protected legally.Which of the following is a set of policies and procedures that restrict how a user can access, create and edit the organization's resources? BYOD MDM Security profile Full device

Security profile A security profile is a set of policies and procedures that restrict how a user can access, create, and edit the organization's resources. This can include full device encryption, backups, remote wipes, and other abilities

Steve is having a hard time finding a network to connect to his new laptop. What should he be looking for in order to get properly connected? Channel Service Set Identifier (SSID) Blacklists Whitelists

Service Set Identifier (SSID) An SSID is the name of a wireless network.

If a printer connected to your local network does not get a dynamically assigned IP address from the DHCP server, an IP address can be manually configured. What type of IP address is this? Static IP Public IP Private IP Dynamic IP

Static IP

A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed. What is the most likely reason for this message? The software repository is out of date and needs to be updated. The command syntax needs to be verified. The user account is not assigned a password. The command needs to be preceded by sudo.

The command needs to be preceded by sudo. The sudo (substitute user) command is used to perform a command as superuser when logged in as a normal user.

Andy is working as a service technician and has been asked by a user for assistance with transferring files. Andy would like to not only assist in transferring files but also remote in and take control of the user's computer to further help walk through the requested process. What would allow Andy to do all three? Virtual Network Computing (VNC) SSH protocol Kerberos Ping

Virtual Network Computing (VNC) VNC is client or server software used to remotely control a computer, transfer files, and screen sharing.

Andy is working as a service technician and has been asked by a user for assistance with transferring files. Andy would like to not only assist in transferring files but also remote in and take control of the user's computer to further help walk through the requested process. What would allow Andy to do all three? Virtual Network Computing (VNC) SSH protocol Kerberos Ping

Virtual Network Computing (VNC) VNC is client or server software used to remotely control a computer, transfer files, and screen sharing.

A technician is in the process of installing a program that would assist her with her work in the office. The technician unknowingly downloads the program from an unsafe website. Luckily the installation is canceled due to an internal source on her computer that also prevents her computer from attacking other computers. What was this application? VPN Windows Defender Firewall Tracker Hash

Windows Defender Firewall Windows Defender Firewall is a personal firewall that protects a computer from intrusion and from attacking other computers; it is automatically configured when you set up your security level for a new network connection.

Bill is attempting to connect his new phone to his Wi-Fi network but is having trouble enabling the connection to his home network. What can he use to connect his phone? Wireless access point (WAP) Router VPN Switch

Wireless access point (WAP) A WAP enables wireless devices to connect to the network.

Danielle is setting up wirelessly connected lights for the team's office space so they can monitor their power usage. During setup, she uses her device to connect to the light bulb's own wi-fi like connection. Once the lights have been set up, the wi-fi connection is no longer needed, and the lights can be wirelessly connected from Danielle's device. The connection range is up to 100 meters in open air alone. What type of connection is this? VPN Windows Defender Firewall Z-Wave Hash

Z-Wave A Z-Wave is a wireless connection that transmits around the 900 MHz band and requires less power than Wi-Fi. It has a larger range than Bluetooth, reaching a range of up to 100 meters in open air (although significantly less inside buildings).

Susan has been tasked with setting up wireless connecting lights that do not require too much power and have no need for Wi-Fi. The connection must reach at least 20 meters within the office. What type of connection would fit these parameters? Proxy server DMZ Trackers Zigbee

Zigbee This wireless connection operates in either the 2.4 GHz band or the 900 MHz band, requires less power than Wi-Fi, and generally reaches a range of about 20 meters inside, but it can reach much farther.

A user calls in about an issue they are having on their computer. In order to remotely control the user's computer, the help desk technician requires the user's IP address. Which of the following would provide the IP address? ipconfig SSH protocol Kerberos Ping

ipconfig This is a command that can display network configuration information and refresh the TCP/IP assignments for a connection, including its IP address.

A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task? Disk Utility Boot Camp macOS Recovery Mission Control

macOS Recovery Using the macOS Recovery tool, the technician can reinstall the macOS from the Internet or from a Time Machine backup.  can also erase the HDD before reinstalling the OS.


Kaugnay na mga set ng pag-aaral

2: Sensations and Perception [EAR]

View Set

SGQ 13, SGQ 14, SGQ 15, SGQ 16, SGQ 18, SGQ 19

View Set

Professional Cooking - Chapter 15 "Understanding Meats and Game"

View Set

Google Search Optimization Course

View Set

Unidad 6 Las costumbres, los valores y los comportamientos

View Set

EMTB CH 15 HW and Quiz Questions

View Set

Final exam- Alabama life and health

View Set

Chapter 1 - Management, Supervision and Leadership

View Set