MOD 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which technology uses existing electrical wiring to connect devices to a network?

Ethernet over Power

A technician has been asked to assist with some LAN cabling. What are two standards that the technician should research before this project begins?

T568A and T568B

Which two protocols operate at the transport layer of the TCP/IP model? (

TCP and UDP

What are two common media used in networks?

fiber and copper

A programmer is building a script in order to calculate the corporate bank account balance within two decimal places. Which data type would be used in the script to represent the balance?

float

What two roles or tasks are associated with the level one technician?

gathering customer information to initiate a work order, escalating a trouble ticket to a level two technician

Which network device regenerates the data signal without segmenting the network?

hub

In which situation would it be appropriate for a technician to back up personal and confidential data from a computer belonging to a customer?

if the customer permits it

A technician has recently changed jobs from supporting a small company to a large company in the security group. What are two types of passwords the larger company could use to secure a workstation?

BIOS and login

A technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation?

Consult the company security policy to decide on actions to take against the employee. Immediately remove the device from the network.

A corporate employee has recently taken the mandated security awareness training and is wanting to use the correct security term. Which issue can occur when browsing the internet and is often initiated by the destination website?

pop-up

When a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?

ransomware

broadband

technology uses different frequencies to transmit multiple signals simultaneously over the same cable.

A technician wishes to update the NIC driver for a computer. What is the best location for finding new drivers for the NIC?

the website for the manufacturer of the NIC

Which filtering method uses IP addresses to specify allowed devices on your network?

whitelisting

What is considered ethical behavior by a technician when communicating with a customer?

A technician must only send solicited emails.

Which network service automatically assigns IP addresses to devices on the network?

DHCP

Which protocol dynamically assigns IP addresses to network devices?

DHCP

What is the correct way to conduct a telephone call to troubleshoot a computer problem?

Maintain professional behavior at all times.

What is the problem if a computer automatically configures an IP address in the 169.254.x.x address range?

The DHCP server is unreachable.

Which situation would require that a support desk call be given the highest priority?

The company cannot operate because of a system failure.

A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?

The technician interrupted a number of times to ask questions.

A wireless router is displaying the IP address of 192.168.0.1. What could this mean?

The wireless router still has the factory default IP address.

A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this scenario?

WAN

A customer is explaining a problem with a computer to a technician. The technician recognizes the problem prior to the customer finishing the explanation. What should the technician do?

Wait politely for the customer to finish explaining the problem.

What is a result when the DHCP servers are not operational in a network?

Workstations are assigned with IP addresses in the 169.254.0.0/16 network.

Which smart home technology requires the use of a device, known as a coordinator, to create a wireless PAN?

Zigbee

Which is an example of social engineering?

an unidentified person claiming to be a technician collecting user information from employees

What action should a technician avoid when dealing with a talkative customer?

asking social questions such as "How are you today?"

A corporate executive has asked the IT department to provide a solution to ensure data security of removable drives that are being taken off the premises. Which security solution should be recommended?

bitlocker to go

As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

data encryption

A customer has a web server for a small business. The business uses both wired and wireless networking. A Linksys WRT300N wireless router provides wireless and wired connectivity. What firewall option may be enabled in order for customers to gain access to the web server from their remote locations?

port forwarding

A device has been assigned the IPv6 address of 2001:0db8:cafe:4500:1000:00d8:0058:00ab/64. Which is the network identifier of the device?

2001:0db8:cafe:4500

A technician has captured packets on a network that has been running slowly when accessing the internet. Which port number should the technician look for within the captured material to locate HTTP packets?

80

Which three Wi-Fi standards operate in the 2.4GHz range of frequencies?

802.11n, 802.11g, 802.11b

A programmer uses an operator to compare two variable values within a program. The variable A is assigned a value of 5 and the valuable B is assigned a value of 7. Which condition test syntax would have provided the result of "true"?

A != B

Which statement best describes a call center?

It is a place to provide computer support to customers.

What approach should a technician take when receiving a call from a stressed customer?

Try to establish a rapport with the customer.

Which protocol is used by ping to test connectivity between network hosts?

ICMP

Which security technology is used to passively monitor network traffic with the objective of detecting a possible attack?

IDS

Which type of network will extend a short distance and connects printers, mice, and keyboards to an individual host?

PAN

A user reports that the corporate web server cannot be accessed. A technician verifies that the web server can be accessed by its IP address. What are two possible causes of the problem?

The DNS server address is misconfigured on the workstation. The web server information is misconfigured on the DNS server

A new computer workstation has been installed in a small office. The user of the workstation can print a document using a network printer on the LAN, but cannot access the Internet. What is a possible cause of the problem?

The gateway IP address is misconfigured.

A technician has recently joined an organization and during the first week on the job, discovers a security breach. What policy should the technician implement after the security breach has occurred?

incident handling policy

A computer has been assigned an IP address of 169.254.33.16. What command initiates the process of requesting a new IP address?

ipconfig /release

What category of technician uses remote access software to update a computer belonging to a customer?

level two technicians

Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

phising

Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter?

ports and protocol

Which action could be used to determine if a host is compromised and flooding traffic onto the network?

Disconnect the host from the network.

A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?

It cannot communicate outside its own network.

A switch is a networking device that will record ________ addresses by inspecting every incoming data frame.

MAC (media access control)

The technology that allows a switch to deliver power to a device like an IP phone or an access point through the data cable is known as

POW (Power over Ethernet)

Which type of hard drive format is commonly performed at the factory where the drive is assembled?

low-level

When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?

Ensure that all applications are working.

A customer is upset and wants to speak to a specific technician to resolve a problem immediately. The requested technician is away from the office for the next hour. What is the best way to handle this call?

Make an offer to help the customer immediately, and advise the customer that otherwise the requested technician will call the customer back within two hours.

A technician in a small business is configuring the local security policy for a computer. Which configuration setting would the technician use to require the user to change the password after 90 days?

Maximum password age

The process that a wireless router uses to translate a private IP address on internal traffic to a routable address for the Internet is called

NAT (network address translation)

A technician working on a computer discovers what is suspected to be illegal activity. Which three pieces of information should be immediately documented?

location of the computer, evidence of the suspected illegal activity, why the computer was accessed by the technician

What command can be used to troubleshoot domain name resolution issues?

nslookup

When configuring Windows security, which term is used to mean a rule assocated with an object such as a folder or printer?

permission


Ensembles d'études connexes

changing relationships between the federal government and private business

View Set

Art appreciation artworks portion

View Set

Political Science International Relations

View Set

Chapter 15 Section 1: How the Nervous System Works

View Set

25QW/exp Chapter 5: Sexually Transmitted Infections

View Set