ITF Module 4 Review Questions, CompTIA ITFundamentals+ Module 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Your friend Barbara needs to set up an Internet connection. In this scenario, which of the following options will give her the best speed? a.Cable Internet b.Cellular c.DSL d.Satellite

Cable Internet, DSL

Which one of these connection types has the longest delay?

Cellular

What type of file might a website use to track whether you have visited it before?

Cookie

What is the risk of using a free Wi-Fi network to make an order from an online shop?

Data on an open network may be intercepted by the person running the network or by other computers connected to the network. You need to ensure that the online store uses a secure (HTTPS) connection.

Can you list at least four Internet access methods?

Digital Subscriber Line (DSL), cable/Hybrid Fiber Coax, Fiber to the Curb (FTTC), satellite, and cellular radio.

Which protocol allows people to use names/labels to address network resources rather than numeric addresses?

Domain Name System (DNS).

Which email protocol(s) are used to download messages from a mail server?

Either Post Office Protocol (POP) or Internet Message Access Protocol (IMAP).

If you use an open network, what email configuration setting should you ensure is enabled?

Enable Secure Sockets Layer/Transport Layer Security (SSL/TLS) encryption to protect the account password

True or false? A smartphone cannot join a Wi-Fi network if the SSID is not being broadcast.

False—the SSID (or network name) can be entered manually, as with a computer.

What protocol would be used to provide encrypted file downloads from a web server?

HTTPS—HyperText Transfer Protocol with Secure Sockets Layer/Transport Layer Security (SSL/TLS).

You have a scenario where you need to disable the guest network on your wireless router. You try to log in, but your password does not work. After several attempts, you realize that you forgot your password. What can you do?

Hold the reset button down for 30 seconds to reset the router

What does HTTP stand for?

HyperText Transfer Protocol (HTTP).

You are configuring a computer to participate on a network. Which of the following are mandatory? (Choose two) Select one or more: a.IP address b.Default gateway c.Subnet mask d.DHCP server

IP address, Subnet mask

You need to run an emergency backup of your computer, and you need it to finish as fast as possible. You just backed up about three weeks ago. Which backup option should you use?

Incremental

What protocol is usually used to provide logical addressing on networks?

Internet Protocol (IP)

When configuring a backup solution for your computer, you decide that speed is the most important factor. Which storage option should you choose?

Locally attached storage

You want to install a device in your office that allows for extra storage and has built-in fault tolerance. Which device do you need?

NAS

You are configuring a wireless router to let clients get on the Internet while using private IP addresses. In this scenario, which of the following services do you need to make sure is enabled on the router?

NAT (Network Address Translation)

You are connecting to an email server to download email. Which of the following protocols is your computer most likely using? (Choose two)

POP3, IMAP (Internet Message Access Protocol)

Angela has an iPhone with a biometric scanner enabled. She powered the device off and just turned it back on. What methods can she use to unlock her phone?

Passcode Only

What type of gesture is typically used for zooming on a touchscreen?

Pinch.

You want to visit a web page and make sure that the website does not steal any information about your identity. In that scenario, which of the following should you use?

Private browsing

Your friend Maria asks you which router feature provides for guaranteed bandwidth. What do you tell her?

QoS (Quality of Service)

You have two Mac computers running macOS, and you want to connect them into a network. Which two types of connectors can help you accomplish this? (Choose two) a.eSATA b.FireWire c.RJ-11 d.RJ-45

RJ-45, FireWire

You have decided to retire to a remote mountain cabin and write books. You need an Internet connection to send material to your publisher. What is the option most likely to work for you?

Satellite

You are trying to enter registration information into a website. When you click the Submit button, nothing happens. You try again and still nothing. What is the most likely cause of this problem?

Script blocker

What information do you need to configure a wireless connection manually?

Service Set ID (SSID)/network name, encryption type, and authentication information (a preshared key if not using enterprise authentication)

You have made a backup of system data using a removable hard disk. What should you do next?

Store the disk in a secure location—preferably in a different place to the PC.

What type of backup will make a copy of all files on the computer, including user files and operating system files, to use in the event of a complete failure?

System image

On Monday, you log into your computer at work, but you are not able to access any network resources. You run ipconfig and see that your IP address is 169.254.18.53. What is the most likely cause of the problem?

The DHCP server is down

You want to restrict access to a computer on your network to a single Internet host running a particular application. What two things do you need to configure in your firewall's access control list?

The IP address of the host and the port number of the application.

Francis is trying to change the settings on his iPhone. He opens the Settings app. To see them better, he turns his phone 90 degrees, but nothing happens. What is the most likely cause?

The Settings app does not support rotation

What identifies a website as using the secure HTTPS protocol with a valid certificate?

The URL shows the "https://" protocol and the browser shows a padlock icon. For sites that have passed special validation regimes, the address bar will be shown in green. If a site uses https but the certificate is not trusted by the browser, an alert is displayed.

What feature allows data to be removed from a device if is lost or stolen?

This is referred to as remote wipe or sometimes as a kill switch.

You have installed a screensaver application. Later, after updating your antivirus software, a malicious program is found. This appears to have infected your system at the same time as the screensaver was installed. What class of malware is this?

Trojan Horse.

True or false? A hard disk connected to a computer via a USB port could be described as "Direct Attached Storage."

True

True or false? Any version or edition of Windows can be used to share files with other users.

True—non-server editions are restricted in the number of simultaneous clients though.

Which of the following accurately describes what Airplane mode does on an iPhone?

Turns off all wireless connections

You are setting up a new Wi-Fi connection on your iPad. What is the first step in the process?

Verify wireless capabilities

Which admin tool or screen would you use to configure a Windows computer to join a domain?

Via the System applet in Control Panel or via the Settings app (Access work or school).

You want to use a website that hosts training modules in a custom media format. What type of add-on would you need to install to play this media?

You would need to install a type of browser add-on called a plugin. Plug-ins should be restricted to interacting with the media object on the web page

Which of the following addresses is considered a private IP address? a.172.15.100.101 b.19.21.68.100 c.192.168.100.101 d.168.192.100.101

192.168.100.101

You need to set up a wireless network. Which standard will give you the highest speed?

802.11ac

What type of address identifies a network interface in the context of the local network segment only?

A Media Access Control (MAC) address.

What is a WAN?

A Wide Area Network (WAN) connects sites in different geographic locations. WANs usually make use of telecommunications and service provider networks rather than being directly operated by the network administrators

What is a mapped drive?

A folder shared by a network server that the client connects to via a drive letter that redirects to the network share name (\\Server\Folder).

What is the difference between a modem and a router?

A modem creates a serial link between two computers over some sort of long distance media. It operates at the data link layer. A router makes forwarding decisions between logical networks. It does not need to take account of the framing and transmission details—those are the responsibility of the modem (or of an Ethernet switch or wireless access point). It just needs to know that a particular logical network can be reached over one of its interfaces. Most SOHO devices pack all these functions into a single appliance but it is important to appreciate the differences between the functions.

What is a packet made up of?

A packet consists of a number of fields contained within a header section plus a payload. The payload could be a packet from the protocol layer above.

What is "airplane mode?"

A quick toggle for disabling all wireless functionality (cellular, Wi-Fi, and Bluetooth)

What type of device is used to transfer packets between different networks?

A router.

What device is used to connect computers together in an Ethernet network?

A switch.

By definition, what is an SSID?

A wireless network name

Which of the following allows wireless devices to communicate to a wired network?

Access point

What does attenuation mean?

Attenuation describes the loss of strength of a signal the farther it has to travel. Attenuation sets the distance limitations on different network media types.

What is the latest Wi-Fi standard and which frequency band(s) does it use?

IEEE 802.11ac works in the 5 GHz band. Most 802.11ac access points do have 2.4 GHz radios but they use them to support legacy standards.

What is the purpose of an accelerometer, as fitted in a mobile device?

It is one of the components that detects how the user is moving the device around. This is used to set the screen orientation and as an advanced control mechanism.

Which of the following are wireless networking technologies? (Choose two) a.NFC b.DVI c.RJ-45 d.Bluetooth

NFC, Bluetooth

Which of the following are wireless networking technologies? (Choose two) a.NFC b.RJ-45 c.DVI d.Bluetooth

NFC, Bluetooth

Which of the following are communication devices for computers? (Choose two) a.PCIe b.NIC c.Sound card d.Modem

NIC, Modem

What type of connection would a NAS device use?

Network Attached Storage (NAS) means using either a cabled (Ethernet) or Wi-Fi link to the network.

What are the key features of a packet switching network?

Nodes within the network can perform a forwarding function, allowing a packet to utilize any available path through the network. This makes the network robust against link failures. If is beneficial for the network to use small packets that are easy to re-send.

Which of the following parts of a web address is usually depends on a name resolution service: protocol type, host location, file path?

The host location is usually represented by a Fully Qualified Domain Name (FQDN), such as www.comptia.org, resolved to a numeric IP address by DNS.

Which one of these connection types has the longest delay? a.Infrared b.Wired c.Cellular d.Wireless

Cellular

When configuring a wireless router, which of the following should you always do?

Change the SSID, Change the admin password

You are using a computer in an Internet cafe. What should you do at the end of the session?

Clear the browser cache or use the workstation's browser private/incognito browsing mode.

You are visiting a website to order a product, but you keep seeing old information that you know is outdated. Which of the following will most likely fix the problem?

Clear the cache

A user calls to tell you that every time he browses the Internet, multiple browser windows keep appearing on his screen even though he has not opened them. In this scenario, what should you do to fix the problem?

Configure a pop-up blocker

True or false? Browser pop-up windows are definite symptoms of virus infection.

False—these could be a result of adware or part of the design of a particular site (admittedly, not a site you'd want to visit often).

You have just landed at an airport and have an unexpected six-hour layover. You want to use your smartphone to get some work done. What should you disable as a precautionary device-hardening measure to help prevent potential attacks? (Choose two) a.Autofill b.FFC c.Bluetooth d.NFC

Bluetooth, NFC (Near-Field Communication)

How could you access a network folder called DATA on a network server called TOWER1 using the Explorer address bar?

By entering the UNC path: \\TOWER1\DATA


Ensembles d'études connexes

Lecture 3- diagnosis for pts with no teeth remaining

View Set

AP Psych: Motivation and Emotion Key Terms

View Set

Chapter 43 Iggy Practice Questions #2

View Set