Chapter 12: Using Mobile Computers

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the main advantage of using Direct Access over VPN connections? * Users don't have to manually connect to the remote network * Direct Access uses IPV4 rather than IPV6 * Direct Access supports more operating systems than VPNs * Direct Access connections are uni-directional

* Users don't have to manually connect to the remote network

Transparent caching saves temporary copies of files based on which of the following criteria? 1. File size 2. Network roundtrip latency 3. Number of requests for the file 4. User time limits

2. Network roundtrip latency

Which of the following is NOT a prerequisite for a DirectAccess server? 1. Two consecutive, public IPv4 addresses 2. Two network interface adapters 3. A NAT connection to the Internet 4. Membership in an AD DS domain

3. A NAT connection to the Internet A DirectAccess server must have a direct connection to the Internet, not a NAT connection.

Which of the following wireless networking standards uses spatial multiplexing to increase bandwidth? 1. IEEE 802.11b 2. IEEE 802.11g 3. IEEE 802.11n 4. IEEE 802.1X

3. IEEE 802.11n

Which of the following IPv6/IPv4 transition technologies takes the form of a hardware device? 1. 6to4 2. Teredo 3. NAT-PT 4. ISATAP

3. NAT-PT Network Address Translation-Protocol Translation (NAT‐PT): A hardware device that enables DirectAccess clients to access IPv4 applications.

Which of the following BitLocker operational modes must you configure using Group Policy? 1. TPM + startup key 2. TPM only 3. TPM + startup PIN + startup key 4. Startup key only

3. TPM + startup PIN + startup key

Which of the following tools can you use to import and export power management plans in Windows 7? 1. The Power Options control panel and Group Policy 2. Powercfg.exe and Group Policy 3. The Power Options control panel only 4. Powercfg.exe only

4. Powercfg.exe only

Which of the following wireless security protocols is the most secure? 1. WPA-TKIP 2. WEP (128-bit) with 802.1X authentication 3. WEP (128-bit) 4. WPA-AES

4. WPA-AES

Which technology is the most common to connect to a wireless network for a corporation that allows a data rate up to 54 MB/sec? 802.11a 802.11b 802.11g 802.11n

802.11g

What technology is used to configure power settings using the graphical control panel? APM ACPI PIM PS

ACPI - Advanced Configuration and Power Interface

_______________ enables remote users to automatically connect to the computer network whenever they have Internet access. DirectAccess BranchCache Remote App Network Access Protection

DirectAccess

Which of the following is the most secure password-based authentication protocol supported by the VPN client in Windows 7? 1. EAP-MSCHAPv2 2. POP 3. EAP (PEAP) 4. CHAP

EAP‐MSCHAPv2, the default selection for new connections and the strongest password‐based mechanism in Windows 7

What component is used to ensure that all clients meet a minimum set of criteria such as up-to-date anti-virus protection and Windows updates? VPN Reconnect Network Access Protection Remote App Direct Access

Network Access Protection

What bundles together the configuration settings that users most often use when giving a presentation into a single switch? Mobility on the Go Presentation Settings Mobile Show Mobile Display

Presentation Settings

Which of the following steps in the DirectAccess connection establishment process occurs first? 1. The client and the DirectAccess server authenticate each other using their computer certificates. 2. The client submits a health certificate to a Network Policy Server (NPS) on the host network. 3. The client attempts to connect to a designated network detection server on the intranet. 4. The client establishes a connection to the domain controller and performs a standard AD DS user authentication.

The client attempts to connect to a designated network detection server on the intranet.

What is the main advantage of using DirectAccess over VPN connections?

Users don't have to manually connect to the remote network. *Designed as a replacement for VPNs, DirectAccess eliminates the need for client users to manually establish wide area connections to their networks.

Which wireless technology is considered a weak encryption protocol? 802.1x WEP WPA WPA2

WEP

What replaced ActiveSync to synchronize data files, email, appointments, and contact information with the mobile devices? Partner Sync Center Sync Center Windows Mobile Device Center BitLocker

Windows Mobile Device Center

Which tool set is designed specifically for mobile PCs? * Computer Management console * Mobile Management console * Windows Mobility Center * Computer Information Center

Windows Mobility Center


Ensembles d'études connexes

abeka 8th grade english reading quiz c

View Set

chapter 26 : The fetal spine and muskuloskeletal system

View Set

Chapter 1: Psychiatric Mental Health Nursing and Evidence-Based Practice

View Set

Science F & E Chapter 3 Lesson 2

View Set

Anatomy and Physiology chapter 11 & 12

View Set