Mod 19 Network Security and Troubleshooting

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When installing a file, a technician notices that a value has been generated at the end of the file name. Once the installation is completed, the technician notices that the value is not similar to the one that was seen during installation. This indicates that an issue occurred when installing the file. What is the generated value called?

Hash

Suppose you wanted to download a new browser on your machine, but you are unsure if you are downloading from a trusted source. What can be used to verify that the download is genuine and error-free?

Hash generator

A user calls the service desk for assistance with an issue they are having on their computer. The service desk technician uses a program to remote into the user's computer in order to troubleshoot. What allowed the technician to access the user's computer?

Microsoft Remote Assistance (MSRA)

Daniel has been tasked with setting up an option for users who work from home to gain access to the desktops within the office. What would allow the users to access the office desktops from their local network so that they may continue their work from home environment?

Microsoft Terminal Services Client (mstsc.exe)

What are applications that can be installed in a browser to change the way the browser functions or to enhance the features of a single website?

Plug-ins and extensions

Steve is in charge of security for his company's resources, and his firewall controls what is allowed on his local network. His firewall picks up a message at the router. Where will that message be directed next?

Port Address

A technician is working out of town at a new job site, but unfortunately has left some important documents on his home computer. He could email them to himself if he could connect his phone to his home computer remotely. What would allow his phone to connect past his home network's firewall?

Port forwarding

Suppose you wanted to run a publicly accessible website from your network server. For user activity from the auto-configured to access your website and bypass your firewall, you allow incoming traffic on port 80 on your router for this purpose. What is this process called?

Port forwarding

John is currently out for a business trip but requires access to his machine back in the office for a specific file. John uses a process that will allow him to access his machine through the Internet. What is this method of connection called?

Remote Desktop Connection

Jannette has just finished setting up the modem within the corporate office and would like to connect several devices to the modem at once in an organized method. She needs something that can manage the traffic between all the networks. What would help to facilitate this scenario?

Router

What is another name for a type of computer that has no firewall, limited protections, and can receive any communication from the Internet?

Screened subnet

Steve is having a hard time finding a network to connect to his new laptop. What should he be looking for in order to get properly connected?

Service Set Identifier (SSID)

If a printer connected to your local network does not get a dynamically assigned IP address from the DHCP server, an IP address can be manually configured. What type of IP address is this?

Static IP

Steve noticed that Janette finished setting up some equipment in the office but realized she forgot to connect the rest of the wired devices on the local network. What device can he connect the equipment in order to fix the problem?

Switch

Cody is signing into the corporate network by using a VPN. Using this method, the VPN encrypts and protects data from when it leaves his computer until it reaches a server on the corporate network. What is the process referred to as?

Tunneling

What network protocol allows devices to discover and communicate with each other on the network, without the need for manual configuration or user intervention?

Universal Plug and Play

Bill needs to print a copy of his birth certificate, which will require him to connect it to his printer. What would allow his devices to discover and communicate with each other on the network?

Universal Plug and Play (UPnP)

Andy is working as a service technician and has been asked by a user for assistance with transferring files. Andy would like to not only assist in transferring files but also remote in and take control of the user's computer to further help walk through the requested process. What would allow Andy to do all three?

Virtual Network Computing (VNC)

What is a list of what content cannot be accessed through a router's preferences?

Blacklists

Bill is out camping with his family and is attempting to connect his phone to the radio, but for some reason he cannot find the correct frequency. What should he be looking for in order to get his favorite station playing?

Channel

A user has just finished surfing the Internet. What is the suggested best practice to secure the browser?

Clear the cache and all browsing data about you each time the browser is closed

Bill just sent himself an important document that includes his personal information. Unfortunately, he needs a secure device to receive this document on and all he can find is a public computer. What are the type of computers that aren't protected by a firewall or that have limited protection, that Bill should avoid?

DMZ (Demilitarized Zone)

What can be done to prevent your wireless SSID from showing up on a list of available networks?

Disable SSID broadcast

A user reports having issues with Internet Explorer on Windows 10. The service technician would like to further troubleshoot by checking the configuration in the control panel. This will allow the technician to check the current certificates and delete browsing history. What would the applet be called?

Internet options

A technician is in the process of installing a program that would assist her with her work in the office. The technician unknowingly downloads the program from an unsafe website. Luckily the installation is canceled due to an internal source on her computer that also prevents her computer from attacking other computers. What was this application?

Windows Defender Firewall

Bill is attempting to connect his new phone to his Wi-Fi network but is having trouble enabling the connection to his home network. What can he use to connect his phone?

Wireless access point (WAP)

Danielle is setting up wirelessly connected lights for the team's office space so they can monitor their power usage. During setup, she uses her device to connect to the light bulb's own wi-fi like connection. Once the lights have been set up, the wi-fi connection is no longer needed, and the lights can be wirelessly connected from Danielle's device. The connection range is up to 100 meters in open air alone. What type of connection is this?

Z-Wave

Susan has been tasked with setting up wireless connecting lights that do not require too much power and have no need for Wi-Fi. The connection must reach at least 20 meters within the office. What type of connection would fit these parameters?

Zigbee

A user calls in about an issue they are having on their computer. In order to remotely control the user's computer, the help desk technician requires the user's IP address. Which of the following would provide the IP address?

ipconfig


Ensembles d'études connexes

World Lit-Things Fall Apart Test

View Set

On the Go 1, Unit 5, Study: Pop-up pirates

View Set

Astronomy Ch.1 Charting the Heavens: The Foundations of Astronomy, Astronomy Ch. 2 The Copernican Revolution: The Birth of Modern Science, Astronomy Ch. 6 The Solar System: Comparative Planetology and Formation Models, Astronomy Ch. 7 Earth: Our Home...

View Set

Autonomic Nervous System and Visceral Sensory Neurons

View Set