Module 5 and 6 study guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You are in the market for a used smartphone, but you want to ensure it you can use it as a hotspot. Which technology should it support? Select all that apply.

4G 5G

Makani is participating in an on-the-job training program at work. He is learning how to configure computers in a network. He is told to use private IP addresses because all organizations could use them without conflict since they are not routable.If the addresses are not routable, he wonders, how will the computers have internet access?

A NAT router will translate a private address to a public one

Collette wants to stream a movie from her iPad to her Apple TV. What type of connection should she use?

AirDrop

You have been asked to work on 25 mobile devices at a mid-sized company due to malware. Once you clean the devices, you suggest implementing a company-wide mobile device policy. Which of the following would you recommend? Select three.

Always keep the OS up to date Provide basic security training Install an anti-malware app

Jolie wants to see a list of, and manage, apps on her Android phone. Where can she go on her phone to do this?

App drawer

You are asked to install an authentication system at a data center that requires both, a fingerprint scanner, and facial recognition for access. What type of authentication will you implement?

Biometric authentication

Derek is planning a camping trip and wants to be able to listen to music at the campsite. Derek currently has a smartphone but does not like the sound coming from the speakers.What can Derek do to enjoy better sound quality while at the campsite?

Connect to a Bluetooth speaker.

Quintavius loves to tinker with computers so he sets off to see how many networking services he can install in one physical server. He sets up the system to support DCHP, DNS, HTTP, HTTPS, Telnet, SSH, and an email server. On what port will these services listen?

DCHP 67, DNS 53, HTTP 80, HTTPS 443, Telnet 23, SSH 22, SMTP 25

Ramah is preparing a presentation on networking terminology. She wants to ensure everyone understands the difference between a node and a host. How should she define these terms? Select three.

Every host is a node, but not every node is a host. A node is not used to run a variety of applications. A smart thermostat is an example of a node.

Liem just discovered the used phone he bought is on an IMEI blacklist. What does this mean?

He may not be able to activate it

Jozef is a youngster who writes an app for the iPhone. He posts it on a website, but nobody ever downloads it. He speaks with a senior developer who gives him advice. He implements the advice, and his app now has a lot of downloads. What did Jozef do differently?

He placed the app on the Apple App Store

Akello uses his computer to download a document from the internet. What role does his computer play as opposed to the computer from which he is downloading the document? Select two.

His computer is a client The computer from which he downloads the document is a server

Gulliver is trying to determine why one of the computers at work cannot connect to the network. He thinks it might be DHCP related but wants to rule out the computer itself as being the problem. Gulliver manually configures the network settings that will allow the computer to connect to the network. What three values does he configure? Select three.

IP address Subnet Mask Default Gateway

The owner of a small loan brokerage firm does not know much about computers but has always been concerned with security, so he buys a used enterprise grade router. Mango, a loan officer with a little bit of IT knowledge, configures FE80::1 as the only address on the internal interface of the router. What effect will this have?

Internet access will now be suppressed.

John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is similar to the charging cable for his Android smartphone, but not quite the same.What type of cable will John need to purchase to charge the iPad?

Lightning

You run the ipconfig /all command on your Windows computer and see a hexadecimal value that looks like this: E0-70-EA-4E-AB-A5What does it represent? Select two.

MAC address Physical address

You are running a performance test using three different browsers on the same computer to simultaneously access the same web site. What numeric identifier or address is used to keep the three connections separate at the application (browser) level?

Port number

Arun recently graduated with both, civil and electrical engineering degrees. His first project is to design a system that will replace the manual tolls in a highway with a wireless toll booth collection system. He decides that passing vehicles should have a small device that transmits data to fixed stations at various points along the highway for automated billing. What type of technology should Arun consider to be the most viable?

RFID

Kwan, a fifth-grade teacher, has been learning about computers but does not know much about networking. He found a hub in the supply closet and decided to create a small network in his classroom consisting of a file/application server, 10 relatively new computers, and a printer. The students often complain that the computers are slow, but one student blames it on the network. What can Kwan do to eliminate complaints?

Replace the hub with a switch

Venus is a member of the IT department at a company that has a moderately-sized network. One of her performance review objectives is to help her department be more proactive relative to being notified, and responding to, certain events that occur in the network. What type of server will help her meet the objective?

Syslog Server

Jesenia read an article that said stored data, such as when you are downloading an app, is transmitted using TCP, but live-streaming events are transmitted using UDP. Why would this be true? Select two.

TCP is reliable and ensures the delivery of data using a connection-oriented mechanism. UDP is fast and does not retransmit lost data so as not to disrupt the live video feed.

A restricted computer lab at a college has been set up with local authentication. Students are able to log in but do not have internet access. You check the network settings on one of the computers and it has an IP address of 169.254.1.10. What is the problem?

The DHCP server is not reachable

Torino receives a call from a SOHO client who says her computer is not working. He goes to her office and checks the network settings. He notices that the default gateway entry is blank, yet he can ping the router. Once he enters the default gateway, the problem is solved. What did the client mean when she said her computer is not working?

The computer had no internet access

Kiran realizes her iPhone has no battery power. She needs to make an emergency call and starts charging it. When she turns around, her two-year-old grabs the phone and starts running into the kitchen. She chases him so he tries to hide it in the sink, but it lands in a pot full of water. What should Kiran do with the wet iPhone?

Try charging the phone anyway

Juniper wants to buy her father a tablet. He has relatively poor vision, so she does not want him to have to worry about the orientation of the plug on the cable when he charges the device.Juniper will get her father a tablet with what type of USB charging port?

USB-C

You need to create LAN a connection using a mobile device. Which of the following will most readily allow you to create the connection without using a physical tether? Select two.

Use Wi-Fi to connect to a LAN Create a mobile Wi-Fi hotspot

Ferran got a new cell phone. But every month he receives a data-usage limit notification even though he has not done anything unusual except use, install, and remove games and apps. What can he do to try to rectify the problem?

Verify all apps that are not being used are closed.

A company asks Aurora to work on a mobile device that belongs to a colleague. After her evaluation, she narrows down the list of things to consider doing. They include uninstalling some apps, updating the OS, and possibly performing a factory reset. What would have prompted her to consider these actions?

You are trying to remove suspected malware.

You recently bought a new router, modem, and switch to create a wired network at home containing six computers. Beginning with the computers, how would you connect the devices to ensure the computers have internet access?

computers, switch, router, modem

You are asked to add a resource record in the DNS namespace for a website your company wants to publish. Which of the following entries will you make?

www.company.com A IN 14440 209.165.200.5


Ensembles d'études connexes

Orthodontic Assistant Terminology

View Set

Healthy Wealthy and Wise Chapter 2/3 Quiz

View Set

AP Psych - Unit 12 & 13: Abnormal Psychology & Treatments

View Set