itsc final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following technologies provides a method for personalizing network-connected laptop and desktop computers with only the apps each individual user needs without complicated customization? (Select TWO.)

-Cloud-based applications -Application virtualization

Which of the following will use an RJ-11 connector for connectivity?

DSL

James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files.How can James select what to synchronize from his phone to Google storage?

Settings app

Which of the following is a wireless Internet connectivity method that utilizes cellular technology?

3G

What type of OS should you install for best performance when you have enough RAM? a. 8-bit b. 16-bit c. 32-bit d. 64-bit

64-bit

Bryson has contacted you because he needs to know what kind of data he can synchronize from his iPad to his PC. What can Bryson synchronize from his iPad to his PC? (Select all that apply.)

ContactsE-booksPhotosMusicNotesCalendar

What command should you use to rearrange parts of files on the drive so they are contiguous? a. Chkdsk b. Format c. Defrag d. Shutdown

Defrag

Which of the following aspects of cloud computing allows a service provider to limit a customer's use of a particular resource based on a service agreement between the provider and the customer?

Measured service

How often does Windows automatically defragment a hard drive or trim a solid-state drive? a. Once a week b. Once a day c. Once a Month d. Once an Hour

Once a Week

A user is asking her smartphone to recommend a restaurant, but the app cannot seem to find where the user is located. The device's cellular service is active and functioning. What is the first thing the user should check?

The user should verify location services is enabled on the smartphone.

A technician would like to have the ability to add physical hard drives to a Storage Spaces storage pool at future times on an as-needed basis. Which of the following Storage Spaces features describes this functionality without the need to also reconfigure the available space to users? a. Three-way mirror b. Thin Provisioning c. Resiliency d. Two-way mirror

Thin provisioning

A technician has verified that a bad Cat6 cable run in the wall is responsible for a workstation's lack of communication on the network. Which of the following tools can be used to pinpoint the location of the cable inside the wall?

Toner probe

Which product is not considered to be a hypervisors?

VMVisor

A

Which of the following creates an environment that behaves in a hardware-like manner to run software meant for other hardware? A. Emulator. B. Virtual desktop. C. Zero client. D. Virtualization.

Several of the contacts in your mobile device are responding to test messages that you sent them. However, you don't remember sending any of the messages. Which of the following is the reason for this behavior?

Your device is sending spam messages to your contacts.

Several of the contacts in your mobile device are responding to test messages that you sent them. However, you don't remember sending any of the messages.Which of the following is the reason for this behavior?

Your device is sending spam messages to your contacts.

What makes WPA2 more secure than WPA?

AES (Advanced Encryption Standard)

Which of the following operating systems can be modified and the source code redistributed?

Android

You have connected a cable internet as shown. What connection should you place a filter?

Coaxial

James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files. How can James select what to synchronize from his phone to Google storage?

Connections

Disable the auto-brightness option.

Disable the auto-brightness option.

it is not his job. d. Go right to the president of the company.

Report the person through proper channels.

Which of the following is a function of an endpoint management server appliance?

Restricting a device's access to the network until security requirements are met

Which of the following describes an IPv6 link -local address assigned to a node on a network?

A private unicast address used for limited communication with neighboring nodes in the same link.

Tracy is in a meeting with an important client and wants to know how she can keep her smartphone from interrupting the meeting. She does not want to receive notifications, emails, text messages, or phone calls, but would like to leave her phone on so that she can take notes on the phone. What setting can Tracy use on her phone to make sure she is not interrupted during the meeting?

Airplane mode

A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user powers the device off each evening, and when it is powered on, performance returns to normal. After an hour of operation, performance degrades. Which of the following is the best action to take to resolve this issue?

Close or disable all unused running apps

What command can be used to totally wipe a hard drive clean, including the partitioning system? a. Wpeinit b. Bootrec c. Bcdedit d. Diskpart

Diskpart

Which of the following is best practice to minimize the chance of infecting your mobile device with malware?

Install apps only from trusted sources.

A customer has several mobile device users who have a habit of misplacing their devices during the workday. Which of the following security methods will most benefit these users?

Locator applications

A customer has several mobile device users who have a habit of misplacing their devices during the workday.Which of the following security methods will most benefit these users?

Locator applications

Which of the following will you recommend to your coworker as the best tool to diagnose this issue? (Select TWO.)

Loopback Plug & Network Multimeter

A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text message with a unique PIN that must be entered before she is granted access to the account. Which of the following describes the security method being used?

Multifactor authentication.

A server or service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the location bar. If this service is malfunctioning, your browser will display a page not found error. What server provides this service?

Web Server

Which of the following commands are used by the USMT software? (Choose all that apply.) a. scanstate b. imagestate c. imagecopy d. loadstate

a and d

The OEM version of Windows 7 can only be installed on a new PC for resale. True False

true

Restore points are created at regular intervals and just before you install software or hardware by what utility? a. System Activation b. System Protection c. System Restoration d. System Prevention

System Protection

You are troubleshooting a Windows workstation that is having problems communicating with the host at IP address 1.2.3.4. What utility will you use at the command line to determine where the communication is stopping?

tracert 1.2.3.4

You are troubleshooting a Windows workstation that is having problems communicating with the host at IP address 1.2.3.4.What utility will you use at the command line to determine where the communication is stopping?

tracert 1.2.3.4

When a partition is formatted with a file system and assigned a drive letter it is called a volume. True False

true

Dylan is working on a system that has been having issues with files. Recently, Dylan has noticed that some of the filenames have strange characters, and the file sizes seem to be excessively large. File have been disappearing and Windows system files have been changed. What might be the problem with the computer? a. The hard drive is failing b. Windows OS has become corrupt c. Malware is corrupting the files d. The computer has become part of a botnet

Malware is corrupting the files

A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business. Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients?

DHCP

A server provides the necessary IP configuration to your network host so the host can communicate on the network. If this service malfunctions, your device will not be able to utilize the network. What server provides this service?

DHCP Server

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved. What network setting should you check to see the address of the server being used to resolve this address?

DNS

D

One of the users in your company is asking if he can install an app on his company-provided mobile device. The installation of apps by users is blocked on the company's mobile devices, but you have tested and confirmed this app would be useful for everyone. Which of the following will allow users to request a minimal version of the app that downloads only what is required to run? A. Rapid elasticity. B. Resource pooling. C. Off-site email application. D. Application streaming.

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA/EIA 568B standard. Which wire color code will you use starting with pin 1 of the modular plug?

Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA/EIA 568B standard.Which wire color code will you use starting with pin 1 of the modular plug?

Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown

The touch screen on a mobile device is not responding to input.Which of the following is the best step to take to resolve this issue?

Perform a factory reset on the device.

A mobile device user is having problems keeping malware off his device. The user is continuously removing offending apps and regularly running a check for OS updates. After a short period of relief, the malware continues to be a problem. Which of the following are the best actions for the user to take? (Select TWO.)

Perform a factory reset. Install an anti-malware app.

B

Which of the following technologies can provide an application to remote users without the need to install the application on the users' systems? A. Virtual network interface. B. Application virtualization. C. Synchronization app. D. Infrastructure mode.

A technician is installing UTP cable and needs to terminate the connections on the patch panel shown in the following image. What tool should be used to terminate and complete this installation?

Punchdown tool

B

While servicing a laser printer, the technician notices that paper is jamming immediately after being pulled from the paper Tray. What is the MOST likely cause of paper jams? A. Image drums. B. Paper feed rollers. C. Transfer roller. D. Fuser unit.

D

Which of the following is a cloud computing service model that relies most heavily on the cloud vendor to manage and maintain its service? A. PaaS. B. Traditional. C. IaaS. D. SaaS.

Which network location option means that Network Discovery is turned off and you cannot join a homegroup or domain? a. work network b. public network c. workgroup d. home network

b

What is the name of the directory database that controls access to a Windows Server domain? a. Windows Server Controller b. User Account Database c. Active Directory d. Network ID Directory

c

Is it true or false that most smartphone devices have radio firmware that allows listening to FM radio frequencies?

True

What is it called when a partition is formatted with a file system and assigned a drive letter?

Volume

An upgrade from Windows Vista to Windows 7 carries applications and user settings forward into the new installation. True False

true

Frank is traveling for work and has discovered that he forgot an important file. The good news is the file is in cloud storage. Unfortunately, Frank's laptop cannot connect to the airport's Wi-Fi.How can Frank download this important file? (Select all that apply.)

-Create a hotspot -Tether his Laptop to his smartphone

The network icon in the notification area of a Windows 7 machine is displaying a yellow triangle with a black exclamation point indicating limited connectivity.Checking the computer's network connection properties will most likely indicate which of the following single-assigned host IP addresses? (Select TWO.)

-FE80::feba:123:8:9343 -169.254.1.1

The accounting department moved its network-attached printer from one side of the office to a more centralized location, making the printer much more accessible to all accounting users. Since the move, the users have not been able to print to the printer. The printer powers on and shows it is ready to accept print jobs. The printer configuration page shows the following output.You disconnect the patch cable from the keystone jack at the new location and move the printer and cable to reconnect it at the original location. The printer begins printing the jobs that failed to print earlier.Which of the following are the most likely reasons for the printer failing to print at the new location? (Select TWO.)

-The cable run connecting the new keystone jack to the patch panel is bad. -The patch panel connector for the new location's cable run is not connected to a switch.

Which extension is used when you save a Windows PowerShell Script File? a. .bat b. .vbs c. .ps1 d. .sh

.ps1

Which of the following are valid IPv4 private IP addresses? (Select TWO.)

10.20.30.40 172.29.29.254

What is the maximum number of partitions allowed using the GUID Partition Table (GPT) method for partitioning a drive for Windows?

128

Which of the following 802.11 wireless networking standards support transfer rates of over 54 Mbps?

802.11ac 802.11n

A

A company is hiring several remote employees who will be working primarily from their homes but will need to come into the office once a month. The company is providing the workers with laptop computers and wants a way for them to access their email account whether they are not st home, on the road, or in the office. Which of the following will be the best solution? A. Off-site email application. B. Internal shared resource. C. Virtual desktop infrastructure. D.Private cloud model.

BE

A customer is experiencing intervals during the day when the file server on her local network cannot keep up with the demands of the users. During these times, some users have to wait for files to open or save, and some users get errors stating their application has timed out. Which of the following could be a possible solution to this ongoing issue? (Select TWO) A. Contact the cloud service provider to increase resource pooling. B. Add additional file servers to the local network to handle the demand. C. Ask half of the users to stop using the application during the problem time. D. Implement an off-site cloud-based email application. E. Implement a cloud-based model with rapid elasticity.

Match the protocol and encryption names with the feature: WPA2

A data encryption standard compliant with the IEEE802.11i standard that uses the AES (Advanced Encryption Standard) protocol. WPA2 is currently the strongest wireless encryption standard.

Which of the following describes an IPv6 link -local address assigned to a node on a network?

A private unicast address used for limited communication with neighboring nodes in the same link

D

A small company has hired you to take over its IT needs. The company currently has seven on-site employees and 12 remote employees working from their homes and is looking to hire an additional 20 employees in the next six to eight months. The owners of the company are asking you to obtain a business service that will meet the needs of the current staff as well as scale up when the company grows. The service must provide adequate and scalable computing power and storage. Which cloud service model should you implement? A. XaaS. B. PaaS. C. SaaS. D. IaaS.

Match the protocol and encryption names with the feature: WPA3

A standard that offers improved data encryption over WPA2 and allows for Individual Data Encryption, whereby a laptop or other wireless device can create a secure connection over a public, unsecured Wi-Fi network.

E

A technician is troubleshooting a Windows 10 x64 desktop system with a type 2 hypervisor that is hosting four VMs that must be rum simultaneously. The technician suspects the sluggish performance is due to insufficient physical RAM in the host computer and has disabled dynamic RAM allocation in the hypervisor. Assuming each operating system installed requires 2GB of RAM, what is the minimum amount of physical RAM that will need to be installed in the host system to meet the requirements of this scenario? A. 2048MB. B. 8192MB. C. 12288MB. D. 4096MB. E. 10240MB.

A

A technician is using a network-attached desktop computer with a type 2 hypervisor to run two VMs. One of the VMs is infected with multiple worms and other forms of known malware. The second VM is a clean installation of Windows. The technician has been tasked with logging the impact on the clean Windows VM when the infected VM attempts to infiltrate the clean VM through the network. What should the technician do to best protect the company LAN while performing these tests? A. Place both VMs on virtual NICs that are isolated from the company LAN. B. Disable the virtual network interface controller in each VM OS. C. Encrypt each VM and the host OS using disk-based encryption. D. Enable the software firewalls on each VM OS and on the host OS.

Match the protocol and encryption names with the feature: TKIP

A type of encryption protocol used by WPA to secure a wireless Wi-Fi network.

AE

A user contacted the help desk to report that the laser printer is his department is wrinkling the paper when printed. The user checked the paper is the supply tray, and it is smooth and unwrinkled. Which of the following is the MOST likely reason for the wrinkle paper? (Select TWO). A. The paper does not meet the requirements for the printer. B. The user is selecting the wrong driver for the printer. C. The paper is creased before it is installed in the printer. D. The pages being printed are using too much toner. E. The paper is damp when when run through the printer. F. The printer does not have enough free memory.

A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability. Which of the following should be included in securing the user accounts? (Select THREE.) a. Require user account passwords. b. Require strong passwords. c. Change each account type to Administrator. d. Add each user to the Guests group. e. Set failed logon restrictions. f. Disable password complexity requirements.

A, B, & E

Joann turned on her Windows 10 computer today, and while the computer was booting up, it shut down. She restarted the computer and it booted fine but ran slowly. She opened Task Manager and noticed that her CPU was running at 98% capacity and her network at 75% capacity. When she checked to see what process was using so much network connectivity, she received a message saying that access to the process was denied. Based on these indicators, what should Joann do with her computer? (Select all that apply.) a. Run antivirus software b. Disconnect from the network c. Refresh windows d. Roll back to a previous restore point e. Check the file permissions

A, B, & E

Which products are considered to be hypervisors? (Choose all that apply) a. Client Hyper-v b. Virtual PC c. VirtualBox d. VMVisor e. VMware Player

A, B, C, & E

Your company has decided to replace several hundred hard drives. It would like to donate the old hard drives to a local school system that will use them to increase storage on systems for students. However, the company also wants to make sure the hard drives are completely wiped before donating them. Which disposal method will not allow the company to recycle the device? (Select all that apply.) a. Shredder b. Low Level Format c. Degaussing d. Overwrite e. Incineration f. Drive Wipe

A, C, & E

Which of the following printer issues is most likely resolved by performing a calibrate function on a laser or inkjet printer?

A. Misaligned colors on printed page

Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure. What makes WPA2 more secure than WPA?

AES

What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video?

Accelerometer

John recently upgraded from Windows 8.1 to Windows 10, after the upgrade is complete, on the right-hand side of his desktop there is a new area that contains a way to toggle several Windows features on and off, access the Settings app, and view notifications. What is this area called in Windows 10? a. Control Panel b. Action Center c. Cortana d. Task View

Action Center

A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure?

Address reservation

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect. Where in the Windows Control Panel will Cathy find her computer's network connection settings?

Administrative Tools

Tracy is in a meeting with an important client and wants to know how she can keep her smartphone from interrupting the meeting. She does not want to receive notifications, emails, text messages, or phone calls, but would like to leave her phone on so that she can take notes on the phone.What setting can Tracy use on her phone to make sure she is not interrupted during the meeting?

Airplane Mode

Match the protocol and encryption names with the feature: WEP

An encryption protocol used to secure transmissions on a Wi-Fi wireless network; however, it is no longer considered secure because the key used for encryption is static (it doesn't change).

Match the protocol and encryption names with the feature: AES

An encryption standard used by WPA2; it is currently the strongest encryption standard used by Wi-Fi.

Which of the following will best assist you in meeting this requirement?

Authenticator apps

You want a method of authentication for company-owned mobile devices in which users are required to use two-step authentication. Which of the following will best assist you in meeting this requirement?

Authenticator apps

You have connected an ADSL Internet connection as shown in the exhibit. The ports at the phone jack are connected to the same single-number POTS line. At what location should you place the DSL filter?

B Only

The receptionist's directly connected laser printer is printing blank sheets. The technician assigned to the trouble ticket has replaced the toner. However, blank pages continue to print from the receptionist's PC. Which of the following steps should be performed next?

B. Print a test print from the printer's console

A technician is troubleshooting a mobile device that is experiencing very slow performance, and the decision has been made to perform a factory reset. Which of the following actions should the technician take before starting the reset process?

Back up all user data.

The administrative assistant of the company's CEO is asking about a printer for her use only. It seems the shared department printer is overused, making the assistant wait to print the CEO's last minute documents. Which of the following technologies will best meet the administrative assistant's request? (Select TWO.)

Bluetooth printer Local printer

James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the data is no longer on the drive before he throws it away. What can James use to wipe the data clean? (Select TWO.) a. Zero-fill utility b. Format the drive c. ATA Secure Erase d. Smash the USB drive

C & D

ou require a protocol in order for your Windows network hosts to have access to shared files and folders. Which of the following protocols will provide the necessary file services? (Select TWO.)

CIFS

You require a protocol in order for your Windows network hosts to have access to shared files and folders.Which of the following protocols will provide the necessary file services? (Select TWO.)

CIFS & SMB

Joe would like an Internet connection that is always on, stable, and not influenced by atmospheric conditions. Which of the following Internet connection types would BEST meet Joe's requirements?

Cable

James travels for business and is always worried that his laptop will be taken from his room. Which type of device will ensure that James's laptop will not be stolen while he travels? a. Server Lock b. USB Lock c. PadLock d. Cable Lock

Cable Lock

Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services?

Cable modem DSL modem

The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network. What is the first step Derek should perform to secure the wireless router?

Change default user name and password

The company where Derek works has tasked him with setting up and securing a SOHO router he wants to make sure the wireless network is secure and no unauthorized person can gain access to the network. What is the first step Derek should perform in securing a wireless router?

Change default user name and password (literally the same answer as question #4)

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement?

Change the router's default administrative password.

A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device, and it operates for another day or so. This problem has been occurring for several weeks. Which of the following steps should the user take next to resolve this issue?

Check for OS updates.

A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device, and it operates for another day or so. This problem has been occurring for several weeks.Which of the following steps should the user take next to resolve this issue?

Check for OS updates.

A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an attempt to get the app to install. Which of the following steps should the user take next?

Check for sufficient available storage space.

A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an attempt to get the app to install.Which of the following steps should the user take next?

Check for sufficient available storage space.

A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user powers the device off each evening, and when it is powered on, performance returns to normal. After an hour of operation, performance degrades.Which of the following is the best action to take to resolve this issue?

Close or disable all unused running apps.

A technician is troubleshooting a small network with cable Internet service in which a user is receiving a message in her web browser stating a site cannot be found. While interviewing users, it is determined that every host on the network is experiencing the same issue with all websites. Which of the following is the first step in troubleshooting this issue?

Connect a computer directly to the cable modem and attempt to access the Internet

A technician is troubleshooting a small network with cable Internet service in which a user is receiving a message in her web browser stating a site cannot be found. While interviewing users, it is determined that every host on the network is experiencing the same issue with all websites.Which of the following is the first step in troubleshooting this issue?

Connect a computer directly to the cable modem and attempt to access the Internet.

Derek is planning a camping trip and wants to be able to listen to music at the campsite. Derek currently has a smartphone but does not like the sound coming from the speakers. What will help Derek improve the sound coming from his smartphone's speakers while he is at the campsite?

Connect to a Bluetooth speaker.

Bryson has contacted you because he needs to know what kind of data he can synchronize from his iPad to his PC. What can Bryson synchronize from his iPad to his PC? (Select all that apply.)

Contacts E-books Photos Music Notes Calendar

Bryson has contacted you because he needs to know what kind of data he can synchronize from his iPad to his PC.What can Bryson synchronize from his iPad to his PC? (Select all that apply.)

Contacts E-books Photos Music Notes Calendar

Which of the following must be performed prior to creating a spanned, striped, or mirrored volume on unallocated space in Windows? a. Shrink each disk volume to an equal size b. Format the separate disks using the NTFS file system c. Assign drive letters to each of the separate disks d. Convert basic disks to dynamic disks

Convert basic disks to dynamic disks

Frank is traveling for work and has discovered that he forgot an important file. The good news is the file is in cloud storage. Unfortunately, Frank's laptop cannot connect to the airport's Wi-Fi. How can Frank download this important file? (Select all that apply.)

Create a hotspot Tether his Laptop to his smartphone

A technician is working at a client's office after hours and needs two cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The other cable is for an Ethernet connection from the computer to the existing keystone jack on the wall. The technician has the necessary wire and connectors to make the cables. Which of the following tools will the technician use to make the cables and then verify that they both work properly? (Select THREE.)

Crimper Cable tester Cable stripper

Jenny is preparing to install Windows 10 on a system that has a version of Windows 8.1 installed. This version of Windows 8.1 runs slowly and crashes occasionally. The optical drive also does not work, so Jenny decides to use a flash drive to install Windows 10. Jenny wants to remove all the programs and data from the computer and start over with Windows 10. What type of installation should Jenny perform?

Custom installation

A server provides the services to take you to the correct website domain when you type cengage.com in your web browser. If this service were not functioning, you would have to remember the IP address for cengage.com. What server performs this service?

DNS Server

A server provides the services to take you to the correct website domain when you type cengage.com in your web browser. If this service were not functioning, you would have to remember the IP address for cengage.com.What server performs this service?

DNS server

Which of the following symptoms is most likely related to leaked personal files/data on a mobile device?

Data transmission over limit

Which of the following symptoms is most likely related to leaked personal files/data on a mobile device?

Data transmission over limit.

You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN. Which of the following features will you configure on the SOHO router to accomplish this task?

Demilitarized zone

On a Windows computer, which tab can be used in Task Manager to set the priority given to a specific application or service? a. Processes b. Details c. Performance d. Startup

Details

A user is experiencing problems connecting to a SOHO Wi-Fi network via her mobile device .Which of the following is the first step a technician should take in resolving this issue?

Determine if any other devices are experiencing the same issue

Consider the following configuration. Computer "A" IP address: 172.16.100.100 Subnet mask: 255.255.0.0 Computer "B" IP address: 172.16.200.200 Subnet mask: /16 What should be done to allow these computers to send and receive data to and from each other?

Nothing needs to be done

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone. What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.)

Disable SSID broadcasting. Lower radio power levels. Enable MAC filtering.

A user is complaining that her mobile device is too dim to read when in a dimly lit room. Which of the following actions should you take first?

Disable the auto-brightness option.

Which of the following is not considered good customer service? (Select all that apply.) a. Be on time b. Avoid distractions c. Follow up with the Customer d. Disclosure the experience on social media e. Meet expectations f. Meet timelines, and if not possible, explain why

Disclose the Experience on social media

Your mobile device is displaying messages informing you that your device is infected with malware. The instructions tell you to install another app to properly remove the malware. What should you do?

Disregard the message and check for a compromised app.

What methods are used to assign TCP/IP parameters to network hosts? (Select TWO.)

Dynamic Static

Tracy works for an insurance company that recently received so much spam that the email server became overwhelmed and shut down. Tracy's supervisor has asked her to make sure this does not happen again. What is the first thing Tracy should do to prevent this problem from happening again? a. User education b. MAC filtering c. Firewall d. Email Filtering

Email Filtering

Which of the following creates an environment that behaves in a hardware-like manner to run software meant for other hardware?

Emulator

_____ allows you to launch programs to help solve windows issues without third-party drivers and software loaded. a. Enable Debugging b. Enable Safe mode c. Enable Low Resolution d. Enable Boot Logging

Enable Safe Mode

Dennis is driving a car with his family on board. His children are sitting on the backseat. They have a tablet and want to watch a video on the Internet.​ What can Dennis do that will allow the children to watch a video on the Internet while in the car?

Enable a hotspot on his smartphone.

You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices. Which of the following steps should be taken to eliminate these trouble tickets? a. Disconnect the USB ports from the motherboard. b. Enable the supervisor password in the BIOS/UEFI setup. c. Require all employees to use a unique Windows user account and password. d. Install a lock on the computer case to prevent removal of the covers.

Enable the supervisor password in the BIOS/UEFI setup

Jerry is in the process of setting up a Bluetooth device. He has enabled Bluetooth, paired the device, and located the correct device. What is the next step in the Bluetooth connection process?

Enter the pin code.

Jerry is in the process of setting up a Bluetooth device. He has enabled Bluetooth, paired the device, and located the correct device.What is the next step in the Bluetooth connection process?

Enter the pin code.

Mary, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel. Which of the following is often configured as a required step for a user each time she attempts to use the VPN connection?

Enter the same user name and password used on the corporate network.

Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference. Which of the following could be used to network this building?

EoP

Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference.Which of the following could be used to network this building?

EoP

While investigating an email issue, a support technician discovers no users can access their email accounts on the company's email server connected to the private LAN. Pinging the email server from several workstations on the LAN results in 0% packet loss. Which of the following is the next step the technician should take in troubleshooting this issue?

Escalate the problem to a server administrator to check for issues with the server.

During your service call at the residence of a customer, you discover you will need a part that you don't currently have. What should you do in this case? a. Leave and get the part and come back b. Tell the customer to purchase the part and call when she receives it c. Explain the situation and give the customer options on how to order the part and when you will return to complete the repair d. Tell the customer you need the part, do research on the part, and schedule a time to come back and fix the computer.

Explain the situational and give the customer options on how to order the part and when you will return to complete the repair.

Which of the following is the current Linux file system used to hold the operating system? a. APES b. Ext3 c. NTFS d. Ext4

Ext4

You are planning to install Windows 10 on your computer and must decide which file system to use on the hard drive. What files systems are available in Windows 10 for a local hard drive?

FAT32

The network icon in the notification area of a Windows 7 machine is displaying a yellow triangle with a black exclamation point indicating limited connectivity. Checking the computer's network connection properties will most likely indicate which of the following single-assigned host IP addresses? (Select TWO.)

FE80::feba:123:8:9343 169.254.1.1

Which of the following indicates the most concise abbreviation of the IPv6 address FEFE:0000:0000:0000:0002:0000:0000:0001?

FEFE::2:0:0:1

What Windows 10 utility allows you to create a backup schedule that can include any folder on the hard drive and system image? (Select all that apply.) a. File History b. Recimg c. Automated System Recovery d. Backup and Restore

File history & Backup and Restore

A Mac computer is reporting problems with the HDD, and the user wants to run a check for errors. Which of the following is a disk management tool built into macOS that is useful for finding and repairing disk problems? a. macOS Recovery b. First Aid c. Time Machine d. Grep

First Aid

Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps?

Fourth-generation cellular

What two methods are available for Windows to use to partition a drive?

GPT

Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a new email account for the phone. Which commercial email provider should Angela use for her new Android phone?

Gmail

B

Henry wants to build a computer that will allow him to run a hypervisor program. What does Henry NOT need on his computer? A. Maximum amount of RAM motherboard can accept. B. High-end video card. C. High-end processor with multiple cores. D. Hard drives with large storage capacity.

Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his needs. He wants it to be connected to his Google account. Which smart speaker would you recommend?

Home

Mark has been asked to set up several smartphones to connect to his company's email server. The company wants Mark to set them up so they can be synchronized between multiple email clients on multiple devices. What protocol should Mark use to set up the company smartphones?

IMAP

Mark has been asked to set up several smartphones to connect to his company's email server. The company wants Mark to set them up so they can be synchronized between multiple email clients on multiple devices.What protocol should Mark use to set up the company smartphones?

IMAP

You are tasked with securing a small network for a client in which the following requirements must be met: • If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered. • The private trusted network should not be accessible from the public untrusted network. • If attacks are coming from the external network, the system should detect and prevent malicious activity. • All incoming and outgoing email should be scanned for malware. Which of the following would best meet the requirements of the client?

Implement a UTM appliance

You are tasked with securing a small network for a client in which the following requirements must be met:• If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered.• The private trusted network should not be accessible from the public untrusted network.• If attacks are coming from the external network, the system should detect and prevent malicious activity.• All incoming and outgoing email should be scanned for malware.Which of the following would best meet the requirements of the client?

Implement a UTM appliance

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?

Implement a blacklist on the firewall and add the site the users are visiting

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?

Implement a blacklist on the firewall and add the site the users are visiting.

Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that company-owned workstations are up-to-date with security patches, anti-malware requirements, and software application updates. The manager is also concerned that employee-owned devices connecting to the corporate LAN have the same level of security as the company devices. Which of the following protections and services should you recommend?

Implement an endpoint management server appliance

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?

In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.

Tracy has completed installing Windows 7 on a computer and is ready to install a printer. Tracy attaches the printer to the computer and a message pops up that a new device is being installed. When the process is done, she tries to locate the printer, but the printer is not available. What can Tracy do to use the printer?

Install the driver from the manufacturer's website

Jackson is setting up an IoT thermostat in his home. He has set up the IoT controller on his phone to control the device. What else does Jackson need in order for the thermostat to be considered an IoT?

IoT Bridge.

A technician is installing a hypervisor on a host system with a single physical NIC that runs a high-bandwidth network application. The host NIC is running at optimum bandwidth and cannot support additional network traffic. The technician will be configuring eight networked VMs that will be interconnected and on their own dedicated virtual subnet separate from the existing physical LAN subnet. When networking the VMs, what will the technician need to do to guarantee that the host network's performance is not affected without adding complexity or additional cost to the host configuration?

Isolate all VM virtual NICs from the physical NIC

B

Kendra, a user, would like to share her serial printer that has no networking connectivity with the other users in her small office. Which of the following would be the best choice for providing this functionality with the least effort and cost to the user? A. Install an integrated print server. B. Enable print sharing on the computer. C. Enable print sharing on the printer. D. Update the current print drivers.

You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords. Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords? a. Disable password complexity requirement. b. Disable required passwords. c. Lengthen the time period between forced password changes. d. Increase password length requirement.

Lengthen the time period between forced password changes.

John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cable for his Android smartphone, though it is not quite the same. What type of cable will John need to purchase to replace the iPad's charger cable?

Lightning

John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cable for his Android smartphone, though it is not quite the same.What type of cable will John need to purchase to replace the iPad's charger cable?

Lightning

A coworker is asking for your advice on a problem with a computer that will not communicate on the network. While assisting the coworker, you suspect that the wired NIC may have failed. Which of the following will you recommend to your coworker as the best tool to diagnose this issue? (Select TWO.)

Loopback plug Network multimeter

Jacob wants to set up extra security on his wireless network; he currently uses WPA2. He wants to allow only his devices to connect to the network and reject devices that he does not own. What extra wireless security should Jacob employ in on his wireless router?

MAC filtering

A mobile phone user in your company is experiencing dropped phone calls. While interviewing the user, you determine the problem started after she checked her email this morning. No other mobile devices in the organization are dropping calls. Which of the following is the most likely reason for the dropped calls?

Malware is interfering with the calls.

D

Mary's company has asked her to research new computers. The company wants to provide workers with minimal computers that have an operating system and a browser that will allow the workers to connect to a server. The server will do most of the necessary processing. What kind of COMPUTER should Mary recommend? A. Thick Client. B. Zero Client. C. Virtual Client. D. Thin Client.

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group?

Mobile hotspot

A company requires an Ethernet connection from the north end of its office building to the south end. The distance between connections is 161 meters and will need to provide speeds of up to 10 Gbps in full duplex mode. Which of the following cable combinations will meet these requirements?

Multimode fiber cable with MT-RJ connectors

A company requires an Ethernet connection from the north end of its office building to the south end. The distance between connections is 161 meters and will need to provide speeds of up to 10 Gbps in full duplex mode.Which of the following cable combinations will meet these requirements?

Multimode fiber cable with MT-RJ connectors

John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the data to be synchronized, this service uses a process in which the cloud service and the client on the smartphone will verify the security of all devices' security certificates. What type of security does the cloud-base service employ?

Mutual authentication

John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the data to be synchronized, this service uses a process in which the cloud service and the client on the smartphone will verify the security of all devices' security certificates.What type of security does the cloud-base service employ?

Mutual authentication

Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information for payments made at a retail checkout counter. The technology also allows the marketing team to share data quickly. What technology is set up on the marketing team's phones?

NFC

Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information for payments made at a retail checkout counter. The technology also allows the marketing team to share data quickly.What technology is set up on the marketing team's phones?

NFC

Examine the exhibit above. Which network tool most likely produced the output?

Network Multimeter

A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable. What term best describes this method of printer connectivity? a. Network Printer b. Shared Printer c. Network Drive mapping d. Administrative Share

Network Printer

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect. Where in the Windows Control Panel will Cathy find her computer's network connection settings?

Network and Sharing Center

Consider the following configuration. Computer "A"IP address: 172.16.100.100Subnet mask: 255.255.0.0 Computer "B"IP address: 172.16.200.200Subnet mask: /16What should be done to allow these computers to send and receive data to and from each other?

Nothing needs to be changed.

Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network.​ Which Microsoft command-line command should Henry use to check whether he can connect to the server?

Ping

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)

Port 443 SSH

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)

Port 443 & SSH

In Windows 10, what Task Manager tab shows running processes organized by Apps, Background processes, and Windows processes? a. Applications b. Services c. Processes d. Performance

Processes

Which of the following is the correct order for the steps of laser printing?

Processing, Charging, Exposing, Developing, Transferring, Fusing, Cleaning

A technician is installing UTP cable and needs to terminate the connections on the patch panel shown in the following image. What tool should be used to terminate and complete this installation?

Punchdown Tool

Which of the following symptoms can be attributed to malware infection on a mobile device? (Select TWO.)

Slow data speeds. Battery drains faster than normal.

Dillion's company has decided it wants to find a way to do a better job of tracking clothing inventories. Dillon has been asked to research ways to use the wireless network and IoT devices to help when tracking the clothing inventories. What should Dylan recommend to his company to help track the inventories?

RFID tags

Dillion's company has decided it wants to find a way to do a better job of tracking clothing inventories. Dillon has been asked to research ways to use the wireless network and IoT devices to help when tracking the clothing inventories.What should Dylan recommend to his company to help track the inventories?

RFID tags

What is the purpose for the twists in twisted pair Ethernet cabling?

Reduce crosstalk between wire pairs

Zach wants to install Windows 10 over his existing copy of Windows 10. He wants to keep his personal files, apps, and Windows settings. He currently has a USB drive with a Windows 10 ISO. What type of installation will you recommend for Zach? a. Custom installation b. In-place upgrade c. Repair Upgrade d. Network Installation

Repair Upgrade

Spencer would like to purchase a wearable device that allows him to make phone calls and send text messages. Which type of wearable device should Spencer purchase?

Smart Watch

Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a competitor. Ken has identified an email from the vice president and has tracked the information to the person at the other company. Ken has archived the evidence that proves the data has been sent. What should Ken do next? a. Report the person through proper channels. b. Approach the VP and ask him about the email. c. Ignore the email

Report the person through proper channels.

Jennifer has an iPod that she has not used for six months. She wants to move the music and pictures from the iPod to her new iPhone. She tries to access the iPod using her four-digit code, but the passcode does not work. She tries to use two other codes, but neither work. Obviously, Jennifer does not remember the passcode. What solution does Apple provide that will help Jennifer recover the passcode for her iOS device?

Reset the device and restore the data from iCloud or iTunes.

Jennifer has an iPod that she has not used for six months. She wants to move the music and pictures from the iPod to her new iPhone. She tries to access the iPod using her four-digit code, but the passcode does not work. She tries to use two other codes, but neither work. Obviously, Jennifer does not remember the passcode.What solution does Apple provide that will help Jennifer recover the passcode for her iOS device?

Reset the device and restore the data from iCloud or iTunes.

You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with the headset until a recent corporate-wide OS update. No other mobile devices in the organization are exhibiting this issue with Bluetooth headsets. Which of the following is the first step you will take to resolve this issue?

Reset the network settings in the mobile device Settings app.

You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with the headset until a recent corporate-wide OS update. No other mobile devices in the organization are exhibiting this issue with Bluetooth headsets.Which of the following is the first step you will take to resolve this issue?

Reset the network settings in the mobile device Settings app.

Which of the following is a function of an endpoint management server appliance?

Restricting a device's access to the network until security requirements are met.

Examine the exhibit above. "Device A" is an 8-port layer 2 managed switch and "Device C" is a 4-port hub. Which of the following describes "Device B," assuming all workstations can communicate with each under normal circumstances?

Router

Examine the exhibit above. "Device A" is an 8-port layer 2 managed switch and "Device C" is a 4-port hub.Which of the following describes "Device B," assuming all workstations can communicate with each under normal circumstances?

Router

Examine the exhibit above.Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message through the router?

SMTP

Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message through the router?

SMTP

You are installing network cabling and require a cable solution that provides the best resistance to EMI. Which of the following will you choose for this installation?

STP

Sara wants to set up her lights to turn on when she arrives home. She has heard that she might be able to do this using IoT. What should Sara be concerned about when setting up her IoT lights?

Security

Sara wants to set up her lights to turn on when she arrives home. She has heard that she might be able to do this using IoT.What should Sara be concerned about when setting up her IoT lights?

Security

A technician needs to configure a Windows 10 computer to start a background service automatically each time the computer is booted. Which of the following tools should the technician use? a. Print Management b. Task Manager c. Services Console d. Resource Monitor

Services Console

Windows 10 Professional will not boot on Jackson's computer. During the boot process, the computer fails. While troubleshooting, Jackson determines that the graphical user interface did not load. Which file in the boot process is responsible for loading the graphical user interface and starting the client/server runtime subsystem? a. Smss.exe b. Csrss.exe c. Lsass.exe d. Winload.efi

Smss.exe

A manager in your company wants to standardize all mobile device applications across different operating systems. Some users have Android mobile devices, some users have iOS devices, and some users have Windows Mobile devices. How can you best answer the manager in regard to his request?

Some apps will work on different OS platforms, but many will not.

A manager in your company wants to standardize all mobile device applications across different operating systems. Some users have Android mobile devices, some users have iOS devices, and some users have Windows Mobile devices.How can you best answer the manager in regard to his request?

Some apps will work on different OS platforms, but many will not.

A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP address of 192.168.10.100.Which of the following will the sending host use to determine whether the destination computer is on its own network or another network?

Subnet Mask

A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP address of 192.168.10.100. Which of the following will the sending host use to determine whether the destination computer is on its own network or another network?

Subnet mask

Which of the following are natively supported by the Windows, Mac, and Linux operating systems? a. Support for reading and writing to APFS volumes b. Support for reading and writing to NTFS partitions c. Support for reading and writing to ext4 volumes d. Support for reading and writing to FAT32 partitions

Support for reading and writing to FAT32 partitions

Your mobile device appears to be contacting a remote server to upload your personal data. Which of the following should be performed first to protect your personal data?

Switch to airplane mode.

Your mobile device appears to be contacting a remote server to upload your personal data.Which of the following should be performed first to protect your personal data?

Switch to airplane mode.

Your company has asked you to do research how it can provide smartphones to its employees. The company wants to give employees access to OneDrive in order to synchronize data. What type of synchronization will you recommend to the company?

Synchronization to the cloud

A technician wants to consolidate and log specific alerts from network devices into a database so maintenance tasks and potential device problems can be addressed in a timely manner. Which of the following should the technician implement?

Syslog server

A technician wants to consolidate and log specific alerts from network devices into a database so maintenance tasks and potential device problems can be addressed in a timely manner.Which of the following should the technician implement?

Syslog server

Scott has just completed installing Windows 8.1 and needs to install several applications on the computer before returning it to his client. What should Scott check prior to installing the applications? (Select all that apply.) a. System requirements b. Network Status c. Hard Drive Space d. CPU Priority

System Requirements, C ~ Hard Drive Space

Scott has just completed installing Windows 8.1 and needs to install several applications on the computer before returning it to his client. What should Scott check prior to installing the applications?

System requirements

Currently James's company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS. What will James recommend as an upgrade to RADIUS? a. AES b. WPA2 c. RADIUS+ d. TACACS+

TACACS+

The touchscreen on a mobile device is not responding to input. Which of the following is the best step to take to resolve this issue?

Take off the screen protector if there is one

Your company wants to purchase a device that will allow it to give customers a 3D tour of its facility. What kind of device would you recommend for this type of 3D tour?

Tethered VR headset

ABE

Which of the following are advantages of implementing cloud computing over services hosted internally? )Select THREE) A. Rapid elasticity. B. On-demand services. C. On-site servers. D. Extensive technical configuration. E. Metered services. F. No internet connection required.

You replaced the LCD panel in a laptop computer and verified full system functionality, including wireless connectivity. The customer picked up the laptop and now reports he can no longer access his wireless network regardless of how close the computer is positioned to the WAP. Other users can connect to the WAP without any problem. Which of the following is the most likely reason for this problem?

The Laptop's wireless radio is toggled to the off position

Sam cannot figure out why he can't get sound from his tablet's internal speakers and calls you asking for advice. You ask him to check to see if anything is stuck in the aux port. Sam assures you nothing is in the aux port. He also checks to make sure the sound is not muted. What might prevent Sam from getting sound from his tablet?

The audio output is being directed to a Bluetooth speaker.

The back cover of a mobile device is warmer than usual, and the battery seems to lose its charge much quicker than normal. The user has scanned for malware, closed unused apps, and decreased the brightness level of the screen, but the symptoms persist. Which of the following is the most likely cause for this behavior?

The battery is going bad.

The back cover of a mobile device is warmer than usual, and the battery seems to lose its charge much quicker than normal. The user has scanned for malware, closed unused apps, and decreased the brightness level of the screen, but the symptoms persist. Which of the following is the most likely cause for this behavior?

The battery is going bad.

The accounting department moved its network-attached printer from one side of the office to a more centralized location, making the printer much more accessible to all accounting users. Since the move, the users have not been able to print to the printer. The printer powers on and shows it is ready to accept print jobs. The printer configuration page shows the following output. You disconnect the patch cable from the keystone jack at the new location and move the printer and cable to reconnect it at the original location. The printer begins printing the jobs that failed to print earlier.

The cable run connecting the new keystone jack to the patch panel is bad The patch panel connector for the new location's cable run is not connected to a switch

A new Cat6 cable run and keystone jack were installed for a workstation that was moved from the sales department to the shipping department. Since the move, the user has been complaining of slow transfer speeds on both Internet and local network communications. The technician ran a test and is viewing the following output on the tester. Which of the following is the most likely reason for the sluggish network speeds?

The cable run exceeds the specifications for Ethernet over twisted pair

A new Cat6 cable run and keystone jack were installed for a workstation that was moved from the sales department to the shipping department. Since the move, the user has been complaining of slow transfer speeds on both Internet and local network communications. The technician ran a test and is viewing the following output on the tester.

The cable run exceeds the specifications for Ethernet over twisted pair.

A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed. What is the most likely reason for this message? a. The software repository is out of date and needs to be updated. b. The command syntax needs to be verified. c. The user account is not assigned a password. d. The command needs to be preceded by sudo.

The command needs to be preceded by sudo.

You received a call from a user who brought her own device to the office but cannot find or connect to the company WLAN. The laptop shows other available wireless networks in the building. This user and the other users in her department are connected to the company WLAN and can browse to multiple websites with no problems from their company-assigned laptops. Which of the following is the most likely reason the user cannot find the company WLAN from her own device?

The company WAP has SSID broadcast disabled

Your mobile device has gone over its subscribed data limit the past two months. During this time, you have noticed that the device runs hotter than normal and data speeds seem slower than usual. Which of the following should you consider as a cause for these issues?

The device is infected with malware.

Your mobile device has gone over its subscribed data limit the past two months. During this time, you have noticed that the device runs hotter than normal and data speeds seem slower than usual.Which of the following should you consider as a cause for these issues?

The device is infected with malware.

Why does a normal hard boot take longer than a normal soft boot? a. The operating system must initialize b. The initial steps must be performed by the BIOS/UEFI c. The power takes time to reach the computer d. Windows must enter recovery mode

The initial steps must be performed by the BIOS/UEFI

B

The laser printer in your accounting department is printing faded prints that are getting lighter over time. What is the MOST likely reason for the faded prints? A. The paper pickup rollers are worn. B. The printer is low on toner. C. The fuser is not reaching the correct temperature. D. The printer has foreign matter inside the printer.

A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer's technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors. How can the technician retrieve the requested information from the user's device?

The method for retrieval is dependent on the specific app or device's operating system.

A user called the help desk to report that her mobile device has apps on it that she does not remember installing. Several times throughout the day, she receives alerts in the notification bar from apps she does not recognize asking for permission to download and upload data. Which of the following is the most likely cause for this behavior?

The mobile device has malware on it.

A user called the help desk to report that her mobile device has apps on it that she does not remember installing. Several times throughout the day, she receives alerts in the notification bar from apps she does not recognize asking for permission to download and upload data.Which of the following is the most likely cause for this behavior?

The mobile device has malware on it.

You are preparing to give a presentation at a client's location using your mobile device and a large screen TV. You have successfully connected to the company's guest Wi-Fi network, and you tap the screen mirroring option on your device but cannot locate an available TV, monitor, or projector. The previous presenter finished her presentation a few minutes earlier and had no issues using the TV. Which of the following is the most likely reason for this behavior?

The mobile device is on a different Wi-Fi network than the TV.

A user is unable to install virtualization software on a Windows 8.1 computer. The user verified the host has sufficient RAM, plenty of available free disk space, and a multicore processor. Which of the following is the most likely cause for this behavior?

The motherboard does not support hardware-assisted virtualization

A technician is troubleshooting a Windows system in which an application works properly when the computer is booted in Safe Mode, but does not function when Windows is loaded normally. Which of the following is the most likely reason for this issue? a. The pagefile.sys file is missing or corrupt b. The application is corrupt missing c. Windows does not have a file association for the application d. The operating system or driver is causing the issue

The operating system or driver is causing the issue

A user contacted the help desk to report that the laser printer in his department is wrinkling the paper when printed. The user checked the paper in the supply tray, and it is smooth and unwrinkled. Which of the following is the most likely reason for the wrinkled paper? (Select TWO.)

The paper does not meet the requirements for the printer The paper is damp when run through the printer

A mobile device user is having problems launching apps and texting. The user touches an app to launch it, but the app icon next to the desired app launches instead. When the user types a text message, every word in the message is misspelled. What is the most likely cause for this behavior?

The screen protector is interfering with touch response.

A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in the following message, "Could not find this item. Verify the location of '\\FileServer\Docs' and try again." Which of the following is the most likely cause for this message?

The share to the file server is diconnected

A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in the following message, "Could not find this item. Verify the location of '\\FileServer\Docs' and try again."Which of the following is the most likely cause for this message?

The share to the file server is disconnected.

Jordan likes to use his smartphone in his car. He uses it as a navigation device and connects it via Bluetooth to listen to music. He has purchased accessories that allow him to see his smartphone while he is driving. On a very cold day, and after driving for several minutes, Jordan receives a warning from his smartphone that it is overheating and needs to shut down. When he touches his smartphone, it is hot. What might cause Jordan's smartphone to overheat?

The smartphone is located too close to the car's heat vent.

Jordan likes to use his smartphone in his car. He uses it as a navigation device and connects it via Bluetooth to listen to music. He has purchased accessories that allow him to see his smartphone while he is driving. On a very cold day, and after driving for several minutes, Jordan receives a warning from his smartphone that it is overheating and needs to shut down. When he touches his smartphone, it is hot.What might cause Jordan's smartphone to overheat?

The smartphone is located too close to the car's heat vent.

A technician is troubleshooting a Windows computer experiencing slow startup. Which of the following steps should the technician take first to determine whether startup processes are responsible for the slow startup? a. The technician should permanently disable all startup processes in System Configuration. b. The technician should measure the time it takes to start the system using a normal boot and compare that time against the time it takes for the system to perform a clean boot. c. The technician should back up user data and reinstall Windows and all applications. d. The technician should disable all scheduled tasks in Task Scheduler and reboot the system.

The technician should measure the time it takes to start the system using a normal boot and compare that time against the time it takes for the system to perform a clean boot.

A user is following the instructions of a help desk technician and is attempting to launch System File Checker from the command-line interface. Each time the user types sfc /scannow and presses Enter, the utility fails to run, and an error appears stating the command must be run using an elevated command prompt. Which of the following best describes the reason for this issue? a. The user must open the command-line interface using Run as administrator. b. The user needs to sign out and sign back in as an administrator. c. The computer has a failing hard disk drive. d. The user is mistyping the command at the command line.

The user must open the command-line interface using Run as administrator.

Henry is sent to work with a customer at the company's satellite branch in another town. During his visit, he notices that most of the computer users are not following the corporate guidelines on password safety and are looking at their personal emails, which is not allowed for security reasons. What can Henry do about these corporate policy issues? a. Wait until he returns to his office and inform his supervisor b. Confront the employees about the issue c. Train the employees on why these issues are security concerns d. Ignore the security problems

Train the employees on why these issues are security concerns

George is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle. He wants a way to limit their ability to view content on the Internet.What will you recommend to George?

Use Parental Controls

George is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle. He wants a way to limit their ability to view content on the Internet. What will you recommend to George?

Use Parental Controls

Sam would like to install a new application on every computer in his SOHO network. All the computers are currently connected in a workgroup. What is the easiest way for Sam to install the application on all the computers?

Use a network share to share the installation files

Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide that an update might be installing, so you allow the computer to work for approximately 20 minutes. After 20 minutes, you turn off your computer and then restart it, and it fails two more times. What tool should you use first to help repair your computer? a. Use BIOS to see if the hard drive is available b. Use Safe Mode to boot c. Use Startup Repair d. Run sfc/scannow for Windows RE command Prompt

Use safe mode to boot

A technician is troubleshooting a Windows computer and needs to stop the explorer.exe process. Multiple attempts to open Task Manager have failed. The technician can successfully open a command prompt. Which of the following steps should the technician take next? a. Use the taskkill utility to locate the PID for the explorer.exe process. b. Use the tasklist utility to end the explorer.exe process. c. Use the tasklist utility to locate the PID for the explorer.exe process. d. Use the taskkill utility to end the explorer.exe process.

Use the tasklist utility to locate the PID for the explorer.exe process.

Jerry recently purchased a new iPad. He needs guidance on setting it up and wants to find documentation to help with the setup. Where can Jerry find detailed steps on how to connect to a network, configure email, update the OS, sync, and back up settings and data, as well as what to do when things go wrong with his iPad or an iPhone?

User guide for the device

B

Which of the following is a cloud computing element that gives a service provider the ability to dynamically allocate shared physical resources to multiple customers based on each customer's usage demand? A. On-demand. B. Resource pooling. C. Measured Service. D. Rapid Elasticity.

Randy is concerned about his company's data security on the Internet. Because cellular signals are not encrypted, he is concerned that the new smartphones given to the sales department will allow a breach. Randy has decided the company needs a more secure way to allow the sales department to connect to the company network over the Internet. What should Randy deploy to allow the sales department to connect to the company network securely over a cellular data signal?

VPN

A remote worker wants to connect his computer to his corporation's private trusted network over the Internet. Which of the following will need to be configured?

VPN tunnel

What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest?

WAN, MAN, LAN, PAN

A group of wireless devices are using each other as relays to share a network connection across a large area. Which of the following network categories is being used?

WMN

You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer?

WPA2-PSK, AES

You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer?

WPA2-PSK, AES

A smartphone user entered an incorrect passcode on his phone several times in a row, which locked the device. Which of the following steps should the user take first?

Wait a few minutes for the phone to automatically unlock.

A smartphone user entered an incorrect passcode on his phone several times in a row, which locked the device.Which of the following steps should the user take first?

Wait a few minutes for the phone to automatically unlock.

A server or service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the location bar. If this service is malfunctioning, your browser will display a page not found error.What server provides this service?

Web server

C

What step in the laser printing process is responsible for conditioning the imaging drum in preparation for receiving an electrical charge? A. Charging. B. Transferring. C. Cleaning. D. Fusing

A technician has been dispatched to a client's office to diagnose wireless network issues and suspects that channel overlap may be the problem.Which of the following tools will the technician use to help in determining whether her suspicions are correct?

Wi-Fi analyzer

A technician has been dispatched to a client's office to diagnose wireless network issues and suspects that channel overlap may be the problem. Which of the following tools will the technician use to help in determining whether her suspicions are correct?

Wi-fi analyzer

Larry wants to upgrade to Windows 10. He will use his computer both at home and at work and will need to connect to his company's Wi-Fi network to share files over the network. Which version of Windows 10 would you recommend to Larry? a. Windows 10 Home b. Windows 10 Pro c. Windows 10 Education d. Windows 10 Enterprise

Windows 10 Home

What version of Windows 10 is a valid, in-place upgrade path for a computer that has Windows 7 Starter edition on it? a. Windows 10 Starter b. Windows 10 Home c. Windows 10 Pro d. Windows 7 Processional to Windows 8.1 to Windows 10

Windows 10 Home

A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled. What is the most likely reason the encryption option is disabled? a. The user account is not a member of the Administrators group b. The NTFS file system is corrupt. c. Windows Home editions do not support EFS. d. A volume formatted with NTFS does not support EFS.

Windows Home editions do not support EFS

Henry wants to create a bootable flash drive with Windows 10. He wants to use it on multiple computers to troubleshoot Windows 10 startup issues. What tool can Henry use to create a bootable flash drive in Windows 10? a. Windows Media Creation Tool b. Windows ISO Creator c. Windows Media Center d. Windows DVD Maker

Windows Media Creation Tool

A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection.​ Which of the following is required for the user to successfully sign in to the Windows domain?

Windows domain user name and password

William's supervisor wants to create a test lab at the company in order to test Windows 10 updates. He has instructed William to create a virtual lab. William decides to use Hyper-V as the hypervisor for the virtual machines. When William tries to use Hyper-V, he realizes that it is not installed. What will William use to install Hyper-V in Windows 10?

Windows features

BD

You are troubleshooting an Inkjet printer that prints areas on the page with random voids and missing colors. Which of the following will BEST help resolve the problem. (Select TWO) A. Printhead wires not firing. B. Head cleaning utility. C. Low toner level D.Printer Calibration. E. Printhead gap setting. F. Defective ribbon.

AD

You have been tasked with performing routine maintenance on the inkjet printer. After printing a test page, you notice missing lines of print in various area throughout the page. Which of the following should you do to resolve this issue? (Select TWO) A. Manually clean the print nozzles. B. Replace the toner cartridge. C. Change the image drum. D. Run the head cleaning utility. E. Clean the dot matrix print head. F. Replace the fuser assembly.

In which of the following situations should you install an IPS instead of an IDS?

You want to block unauthorized activity on your LAN from the internet

Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz RF band. The company also wants the device to be at least 50 meters away from the base station. What type of device should the company purchase?

Z-Wave

For some brand-name computers, the hard drive contains a ____ partition that can be used to reinstall Windows. a. hidden recovery b. hidden resolution c. visible recovery d. visible rebuild

a

In a Windows domain, where is the centralized database kept? a. domain controller b. DNS server c. client/server network d. DHCP server

a

What is it called when software is used to simulate the hardware of a physical computer? a. virtual machine b. dual boot c. Windows XP mode d. compatibility mode

a

Which of the following is used to uniquely identify a computer on a network? a. IP address b. network ID c. ARP address d. Serial number

a

Which of the following features are available in Microsoft Windows 7 Home Premium Edition? (Choose all that apply.) a. Scheduled backups b. Windows Media Center c. Backup to network d. Join a domain

a and b

Which of the following are valid in-place upgrade paths for a computer that has Windows 7 Starter edition on it? (Choose all that apply.) a. Windows 7 Professional b. Windows 7 Ultimate c. Windows 7 Enterprise d. Windows 7 Home Premium

a, b and d

In a Windows ____ , each computer maintains a list of users and their rights on that particular computer. a. work unit b. workgroup c. domain d. task group

b

After installation, how many days do you have to activate Windows 7? a. 7 b. 45 c. 30 d. 60

c

Which of the following Windows 7 64-bit version editions could be installed on a computer that has 16 GB of RAM? (Choose all that apply.) a. Windows 7 Starter b. Windows 7 Professional c. Windows 7 Home Premium d. Windows 7 Home Basic

b and c

A ____ boot allows you to install the new OS without disturbing the old one so you can boot to either OS. a. cross b. selective c. controlled d. dual

d

The _____________ is used to change motherboard settings, finds a boot device, and contains instructions for running essential hardware before an OS is started. a. kernel b. system drive c. device driver d. BIOS

d

What important information is needed if you are installing an OEM version of Windows 7? a. Receipt of purchase b. installation code c. OEM license d. product key

d

Where should a user disable virus protection settings that might prevent the boot area of the hard drive from being altered? a. Computer b. Device Manager c. Control Panel d. BIOS setup

d

Which Windows 7 edition is intended for business users and allows you to purchase multiple site licenses? a. Windows 7 Starter b. Windows 7 Enterprise c. Windows 7 Ultimate d. Windows 7 Professional

d

Which type of OS should you install for best performance when you have enough RAM? a. 8 bit b. 16 bit c. 32 bit d. 64 bit

d

A computer must have a DVD drive in order to install Windows 7. True False

false

The price for Windows 7 is the same regardless of the edition and type of license you purchase. True False

false

Sally has just purchased a new iPad. She wants to save all the pictures and files that she creates with her new iPad on the Internet. What service should Sally use to save her pictures and files seamlessly on the Internet?

iCloud

Sally has just purchased a new iPad. She wants to save all the pictures and files that she creates with her new iPad on the Internet. What service should Sally use to save her pictures and files seamlessly on the Internet?

icloud

Tracy has completed installing Windows 7 on a computer and is ready to install a printer. Tracy attaches the printer to the computer and a message pops up that a new device is being installed. When the process is done, she tries to locate the printer, but the printer is not available. What can Tracy do to use the printer? a. Turn the printer off and on again b. Check the printer cable c. Check UEFI/BIOS to make sure printing is enabled d. Install the driver from the manufacturer's website

install the driver from the manufacturer's website

While assisting a Windows user over the phone, you need to determine the IP address for the DHCP server along with the MAC address of the Ethernet NIC. The user has successfully opened a command prompt. What command will you have the user type at the command line to determine these two addresses?

ipconfig /all

While assisting a Windows user over the phone, you need to determine the IP address for the DHCP server along with the MAC address of the Ethernet NIC. The user has successfully opened a command prompt.What command will you have the user type at the command line to determine these two addresses?

ipconfig /all

What Windows process is responsible for authenticating users? a. Lsass.exe b. Winlogon.exe c. Csrss.exe d. Smss.exe

lsass.exe

A technician is troubleshooting a Windows BSOD error. The technician wants to check the memory installed in the system. Which of the following tools is used to launch the Windows Memory Diagnostic tool? a. Taskschd.msc b. Dxdiag.exe c. Compmgnt.msc d. Mdsched.exe

mdsched.exe


Ensembles d'études connexes

Cabot 105- Unit 1 Review, Unit Test 2 Ch 3/4, Chapter 5 & 6 Test, APT 200 unit 4 review, APT 200

View Set

ANTH 1101: Final Exam, Anthropology 101 Exam 1, Anthropology 101 Exam 2, Anthropology 101 Final, Anthropology 101- Exam 3, Anthropology 101, Anthropology 101, Anthropology 101, Anthropology 101, ANTHROPOLOGY 101 MIDTERM, Anthropology 101 Final, Anthr...

View Set

Transport and exchange mechanisms - Using a respirometer to measure oxygen consumption ✅

View Set

Pharm test review 1 Newest version

View Set

Chapter 41 - Professional Roles and Leadership

View Set

Physiological Psychology 260 (Marinković) Exam 3

View Set

Ap- Bio 14 and 15 review questions

View Set