SkillSoft Exam Practice No Notes

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You have installed an '802.11a' wireless network router which is rated at 54 Mbps but, you observe that it is not able to transmit data even at a rate of 30 Mbps. Where may the problem lie?

The maximum theoretical transmitted throughput is 1/2 of the maximum bi-directional throughput of 27 Mbps.

You connect your desktop computer to a TV with built-in speakers via a DVI-to-HDMI cable. You are able to see the video on the TV, but there is no audio. What is the most likely cause of this issue?

The video card does not support audio transmission.

You need to transfer critical files from your desktop to a file server. You want to ensure that you use a private and safe data stream. Which of the following should you use?

SSH

Refer to the exhibit. Identify the main power connector in the exhibit.

1

You attempt to connect to a Windows 7 system using Remote Assistance. However, the connection is not successful. You identify the issue as the firewall blocking the connection. Which port should you open in the firewall to connect to this system?

3389

If you are purchasing a micro-ATX motherboard, how many PCI expansion cards should you be able to install?

4

You need to run several desktop applications on a system. You also want to store the data locally. To be able to meet these requirements, which of the following type of system would be appropriate?

A. Thick client

If fast forward and previous buttons aren't working in Windows Media Player, which of the following methods can be used to attempt to resolve this problem? [Choose all methods that apply] A. Clear the Windows Media Player database cache files B. Run Troubleshooter and select Windows Media Player C. Turn Windows Media Player off as a feature and then turn it on D. Clear the Windows Media Player database

A. Clear the Windows Media Player database cache files B. Run Troubleshooter and select Windows Media Player C. Turn Windows Media Player off as a feature and then turn it on D. Clear the Windows Media Player database

Which of the following are drawbacks of a using 7200rpm hard drive instead of a 5400rpm hard drive? [Choose all that apply.] A. They tend to be more expensive. B. They produce more heat. C. They produce more noise.

A. They tend to be more expensive. B. They produce more heat. C. They produce more noise

Refer to the exhibit. Identify the image(s) that have distorted geometry.

A. 2 and 3

What is the number of pins in a SATA 2.5 drive?

A. 44

You have several laptops that have 2 GB DDR2 memory modules installed. You need to upgrade the memory in these laptops. You want to utilize the existing memory modules. What should you do?

A. Add more DDR2 memory modules in the empty slots

If overclocking is enabled on a processor, which of the following considerations should you make? [Choose all that apply.] A. Adequate power from the motherboard B. System stability C. Adequate cooling D. The higher amount of RAM E. Higher I/O

A. Adequate power from the motherboard B. System stability C. Adequate cooling

Which of the following can cause the No boot device error? [Choose all that apply] A. Bad CMOS battery B. Missing master boot record (MBR) C. SMART not enabled D. Missing active partition E. Slow spinning hard drive

A. Bad CMOS battery B. Missing master boot record (MBR) D. Missing active partition

You connect a monitor to a system. When you power on the system, you do not see any image on the screen. You verify several times, but there is no display. Which of the following actions should you perform to rectify this problem? [Choose all that apply] A. Check the seating of the display adapter B. Check the monitor connectivity with the system C. Turn off the monitor and turn it on again D. Replace the monitor with another monitor

A. Check the seating of the display adapter B. Check the monitor connectivity with the system D. Replace the monitor with another monitor

If you install an analog wireless camera at home and it works at 2.4 GHz frequency, which of the following is likely to cause interference? [Choose all that apply] A. Cordless phone B. Routers C. Video game controllers D. Microwave

A. Cordless phone B. Routers C. Video game controllers D. Microwave

You have connected your laptop with your TV using the HDMI cable. You want to watch a movie on the TV that is stored on the laptop. However, you are not able to see anything on the TV. Which of the following methods can help you resolve this problem? [Choose all that apply.] A. Disconnect the cable from both the end, reboot the laptop, keep the TV on, and then connect the cable to both the end B. Keep the TV off, connect the laptop and then reboot the laptop C. Keep the TV on, connect with the laptop and then reboot the laptop D. Keep the laptop on while keeping the cables connected at both the ends and then switch off and switch on the TV

A. Disconnect the cable from both the end, reboot the laptop, keep the TV on, and then connect the cable to both the end B. Keep the TV off, connect the laptop and then reboot the laptop C. Keep the TV on, connect with the laptop and then reboot the laptop D. Keep the laptop on while keeping the cables connected at both the ends and then switch off and switch on the TV

On a laptop, which of the following could be reasons for no wireless connectivity? [Choose all that apply] A. Enabling Airplane mode B. Having limited wireless connectivity C. Pressing the wireless push button D. Enabling Bluetooth

A. Enabling Airplane mode C. Pressing the wireless push button

You have successfully resolved a critical issue in a system. The customer has also verified the solution and is satisfied with it. What else should you do next? Answers A. Get a sign-off from the customer B. Verify full system functionality C. Document the problem and solution D. Implement preventative measures

A. Get a sign-off from the customer B. Verify full system functionality D. Implement preventative measures

You have been asked to implement an 802.11n wireless network. The key requirement is that the wireless network should provide maximum performance. How should you implement this wireless network?

A. Implement it in the Greenfield mode

Which of the following could be the key reason for oversized images and icons on the monitor? A. Incompatible monitor resolution B. Display drivers C. Bad monitor cable D. Corrupt operating system

A. Incompatible monitor resolution B. Display drivers

In which of the following devices are you likely to use an SD card with the dimensions 32x24 mm by directly inserting in? [Choose all that apply] A. Laptop B. Digital cameras C. Netbook D. Desktop

A. Laptop B. Digital cameras C. Netbook

If you are using the Zigbee protocol, which of the following types of network is being used?

A. Mesh

Refer to the exhibit. Identify the connector shown in the exhibit.

A. Micro-USB

Your system is unable to detect the hard drive a few times when you boot it up. Other times, the hard drive is detected without any problem. When you connect the hard drive using the same cable with another system, this issue does not occur. Which of the following could be causing this problem?

A. Motherboard

You are not getting any sound from the built-in speakers in your laptop. You have verified in Device Manager that the speakers are enabled. What could the possible causes for this? [Choose all that apply.] A. Mute is turned on. B. Speakers are powered off. C. Speakers are not connected properly. D. Laptop volume is turned down

A. Mute is turned on. D. Laptop volume is turned down

Which of the following can be the cause for continuous reboots of a system? [Choose all that apply] A. Overheating CPU B. Corrupt Windows installation C. Power supply D. Power brownouts E. Bad device drivers

A. Overheating CPU B. Corrupt Windows installation C. Power supply D. Power brownouts E. Bad device drivers

To read a CompactFlash card, which of the following methods do you use? [Choose all that apply] A. PC card slot with a plug adapter B. FireWire C. As an ATA (IDE) D. PCMCIA storage device with a reader E. USB

A. PC card slot with a plug adapter B. FireWire C. As an ATA (IDE) D. PCMCIA storage device with a reader E. USB

You boot up a system, but it does not power on. You notice that the power supply fan is spinning. Which of the following could be causing this issue? [Choose all that apply] A. Power supply B. Motherboard C. RAM D. Processor

A. Power supply B. Motherboard

Which of the following are valid reasons to choose to use 802.11n/ac over 802.11g? [Choose two.] A. Provides larger channel bandwidths per user B. Use of 5GHz frequencies incur less interference C. 802.11g provides higher bandwidths D. Use of 2.4GHz frequencies provide more bandwidth and less interference

A. Provides larger channel bandwidths per user B. Use of 5GHz frequencies incur less interference.

You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is listening on port number 161 for network events. Which network monitoring protocol is in use?

A. SNMP

Refer to the exhibit. Identify the component labeled as 1.

A. Scraper

You have a network that uses the 192.168.0.1 IP range and has 50 systems. If you need to assign a static IP address to a system that will connect to the Internet using the proxy server using its name, which of the following configuration must be done on the system? [Choose all that apply] A. Subnet mask B. DNS server C. IPv4 address D. IPv6 address E. Gateway

A. Subnet mask B. DNS server C. IPv4 address E. Gateway

If you have connected the printer to your laptop and want to share it with the other users, which of the following requirements must be met? [Choose all that apply.] A. The laptop must be on. B. The printer must be connected using a USB cable C. Users must have permissions. D. The printer must be powered on.

A. The laptop must be on. C. Users must have permissions. D. The printer must be powered on.

You have upgraded from a 3G to a 4G SIM card. However, when you insert the new SIM into your mobile device, you only get a 3G connection. Which are the most likely causes? [Choose two.] A. The mobile device is set to use 3G. B. The mobile device does not support 4G connectivity. C. The service provider is providing only 3G connectivity. D. A wrong service provider is configured on the mobile.

A. The mobile device is set to use 3G. B. The mobile device does not support 4G connectivity.

Which of the following can be the reasons for paper jams in a laster printer? [Choose all that apply.] A. Transfer rollers are worn out. B. Imaging drum is worn out C. Developer roller is defective. D. Incorrect paper size is being used.

A. Transfer rollers are worn out. D. Incorrect paper size is being used.

Which USB standards are compatible with a USB C-Type cable? A. USB 3.0 B. USB 1.1 C. USB 3.1 D. USB 2.0

A. USB 3.0 C. USB 3.1 D. USB 2.0

You are designing a new Ethernet network for the first time. Your manager has asked you not to use UTP cabling. What could be the possible reasons? [Choose three.] A. UTP cables will be laid near the fluorescent lighting. B. Cables longer than 100 meters are required. C. There are high voltage cables running nearby. D. UTP cables paths run a parallel to fiber optic cables. E. Cables will need to run perpendicular to high voltage cable.

A. UTP cables will be laid near the fluorescent lighting. B. Cables longer than 100 meters are required. C. There are high voltage cables running nearby.

Which of the following method should you use to ensure the printer is safe from the unauthorized users? [Choose all that apply.] A. Use printer drivers with encryption B. Disable remote printing C. Lock the printer configuration D. Encrypt the printer hard drive

A. Use printer drivers with encryption B. Disable remote printing C. Lock the printer configuration D. Encrypt the printer hard drive

Which of the following can cause slow transfer speeds from a Web server on the Internet? [Choose all that apply] A. Virus on the local system B. Hard drive fragmentation the local system C. Too little space on the hard drive of the local system D. Overload on the Internet connectivity

A. Virus on the local system D. Overload on the Internet connectivity

Identify the components that can cause ghost images on a printout in a laser printer: 1. Toner cartridge 2. Imaging drum wiper blade 3. Fusing unit

B. 1, 2, and 3

You need to implement an IEEE 802.11 standard wireless network with maximum data rates of over 3Gbps and operates at the 5GHz frequency band. You will need to connect a printer to this network for the users to use. Of the given choices, which of the following would meet your requirement?

B. 802.11ac

Which of the following could be digitizers? A. A mechanical keyboard B. A graphics tablet C. A laptop touchpad

B. A graphics tablet C. A laptop touchpad

You have an e-commerce application that needs to be implemented. Implementing the application includes allowing access to external users on the Internet. You want to ensure the application is protected from cross-site scripting (XSS) and SQL injection. You also want to prevent OSI Layer 7 traffic. To meet the criteria in the scenario, which of the following should you implement along with the application?

B. Application Firewall

Refer to the exhibit. Identify the card displayed in the exhibit.

B. Cellular wireless data card

You need to connect a laptop to a mobile device for Internet connectivity. Which of the following solutions will work? [Choose all that apply] A. Enable wireless on the mobile phone B. Enable hotspot on the mobile phone C. Enable hotspot on the laptop D. Use tethering method

B. Enable hotspot on the mobile phone D. Use tethering method

You want to configure switches with VLANs to mitigate from switch spoofing. You want to ensure that you can use all possible methods to prevent this type of attack. What should you do? [Choose all that apply.] Answers A. Use encrypted VLANs B. Hardcode all the access ports as an access port and disable DTP everywhere C. Avoid keeping an access port in dynamic desirable, dynamic auto, or trunk mode D. Disable unused physical ports on a switch E. Disable unused TCP ports on a switch F. Hardcode all the trunk ports as a trunk port and never enable DTP on trunk ports

B. Hardcode all the access ports as an access port and disable DTP everywhere C. Avoid keeping an access port in dynamic desirable, dynamic auto, or trunk mode D. Disable unused physical ports on a switch Notes: F. Hardcode all the trunk ports as a trunk port and never enable DTP on trunk ports

You are designing a new network in which you need to use network cables. You need to use the air ducts to lay down the cables. Which of the following type of cable would be most appropriate in this situation?

B. Plenum rated cable

You attempt to boot a newly assembled system, but it does not turn on. When you inspect it, you notice that the system is not receiving power. You have verified that the system is properly connected to the power socket on the wall. What could be the possible causes? [Choose all that apply] A. Loose connection to the power socket B. Power supply failure C. Loose power supply connection on the motherboard D. Incorrect front panel connection on the motherboard

B. Power supply failure C. Loose power supply connection on the motherboard D. Incorrect front panel connection on the motherboard

Refer to the exhibit. Identify the connector shown in the exhibit.

B. RS-232

You need to provide resources for a server that you have set up with a cloud service provider. You do not want the cloud service provider's intervention or dependency on them as you may need to add more resources at odd office hours. Which of the following methods would be good to use in this scenario? [Choose two.] A. Resource pooling B. Rapid elasticity C. Measured service D. On-demand

B. Rapid elasticity D. On-demand

You have a USB 2.0 port on your laptop. You usually use this port to connect a USB drive. However, now the USB port is not detecting the USB drive, which is working on another system. You need to fix this issue. What should you do first?

B. Reboot the laptop

You use a USB drive to copy data between two systems. You have copied the data to the USB drive recently. Due to a recent Windows update, you boot your system and are prompted with the no boot device found error. How should you resolve this error? [Choose all that apply.] A. Change the hard drive and boot the system B. Remove the USB drive and boot the system C. Fix the MBR on the hard drive D. Repair the Windows installation E. Go to BIOS and then set hard drive as the first boot device

B. Remove the USB drive and boot the system E. Go to BIOS and then set hard drive as the first boot device

You need to replace the network backbone cable, which is CAT5. You do not have a spare CAT5 cable with the same length. You want to replace it with a cable that reduces electromagnetic interference. The cable that you use must be backward compatible with CAT5 cable. What should you do? [Choose all that apply.] A. Replace it with a CAT3 cable B. Replace it with a CAT6 cable C. Replace it with a CAT7 cable D. Replace it with a CAT5e cable

B. Replace it with a CAT6 cable C. Replace it with a CAT7 cable

You are investigating an issue with a system. You have discussed with the user and have a fair idea about the issue. After you have reproduced the problem, what are you likely to do?

B. Test your solution

You are using Internet Explorer to access an FTP server on the Internet. When you attempt to connect, you get the following error: Windows cannot access this folder. Make sure you typed the file name correctly and that you have consent to access to the folder. The operation timed out. What could be the probable cause? [Choose all that apply.] A. The FTP Server is not configured to accept connections from Internet Explorer. B. The Enable folder view for FTP sites option is enabled in Internet Explorer. C. A firewall on the network is preventing access. D. It is a network bandwidth issue.

B. The Enable folder view for FTP sites option is enabled in Internet Explorer. C. A firewall on the network is preventing access.

Which of the following statement can be considered a drawback for the BD-RE discs when you need to re-write them?

B. They perform a pre-write

You use an old laptop that does not have a wireless adapter. You need to connect this laptop to a wireless network. Which of the following methods could you use?

B. Use a USB wireless adapter

Your office has satellite Internet connectivity, which is causing problems. Every time, there is a thunderstorm or heavy rains, there is intermediate connectivity. You want to replace this connection with a fast connection that has low latency and has high speed. What should you do?

B. Use a fiber connection

You are deploying a Web application that will have a database running in the backend. Users from the Internet will log in to the application. You need to secure the application and ensure that the data between each user's system and the Web application is encrypted during transmission. What should you do?

C. Use the HTTPS with the Web application

You have been using a Gmail account on your mobile. However, you are no longer able to send E-mails and receive emails. You open Google Chrome and search online for solutions but do not get a proper solution. Which of the following methods can help you resolve this situation?

C. Check your password

You are the administrator for a small network of 20 computers that contain static IP configurations. You need to add 100 more computers on this network. Which of the following protocols would you use to avoid having to configure the IP network configuration parameters of each computer individually?

C. DHCP

You have installed a RAID controller in a system in a proper way. However, the system is not able to detect it. What should be your first step to resolve this issue?

C. Enable the RAID controller in the BIOS

Which of the following can take full advantage of the mATX motherboard?

C. Gaming

You are configuring a messaging client on your laptop. You want to retain the messages on the server but also want them to synchronize them with the messaging client on your laptop. Any changes made to the messages must get replicated with the server. Which of the following protocol should you configure in the messaging client?

C. IMAP

When you enable Bluetooth on a mobile handset, how does it find a device for pairing?

C. It will scan for and list Bluetooth-enabled devices within 10-meters radius

You are using a dual-slot graphics adapter in a gaming system, which overheats within a few hours of usage. Which of the cooling method would be most appropriate?

C. Liquid-based cooling

Your laptop's lithium-ion battery provides less than one-hour battery time. What should you do to fix this issue?

C. Replace the battery with a new one

Refer to the exhibit. Which of the following problem is indicated by the picture in the exhibit?

C. SPoD

Your organization has multiple file servers that are used for file sharing. The Sales team has a requirement for these files to be readily available when they are working remotely. You decide to provide cloud storage. However, before you implement this solution, which of the factors should be a concern from a security aspect?

C. Sensitivity of files

You connect your iPhone to the charging cable to charge it. However, the phone is not charging. You test the cable with another iPhone, and it works fine. You do not have a spare cable to charge your phone, and you suspect that the charging port on the phone has got dust inside. You need to clean this port. What should you do? [Choose all that apply.] A. Blow into the charging port B. Use a needle to scrape the dust C. Shake the phone D. Use compressed air E. Use a pin to draw out the dust carefully

C. Shake the phone D. Use compressed air

If you are building a media streaming server, which of the following should be the most critical requirement of the system?

C. Storage

Refer to the exhibit. Which of the following laptop component is being discussed?

C. Touchpad

You are setting up a new network with multiple subnets, and you want to be able to have more control over the network traffic. You should be able to configure, manage, and monitor your network and its traffic. What should you do?

C. Use the managed switches for the network

Your home Wi-Fi is not able to cover the small room in the corner of the lawn of your house, which is at a distance of 100 meters from your main house complex. If the WI-Fi is not detectable, what would you do to make a cost-effective internet connection available in the small room without using additional wiring or calling an electrician?

C. Using ethernet over power adaptors for extending the range of a home network to places where your wireless coverage is poor.

What device has a virtual NIC?

C. VM

A user is unable to access any other system or network share on the network. No other user has reported this problem. What should be your first step in troubleshooting this problem?

Check the IP address on the system

In which of the following situations would you update the radio firmware?

D. When there is an issue with the cellular signals

Refer to the exhibit. In the given 802.11b/g/n 2.4 GHz frequency, identify the channels that can be used.

D. 1, 6, 11

Your laptop is running out of storage space. You would like to extend its storage using an external device. What should you do?

D. Add an eSATA drive to the laptop.

When troubleshooting a problem where users are not able to access resources on the network, after the most probable cause of the problem is determined, what should be done next?

D. An action plan should be formulated mentioning the steps to resolve the problem

Which of the following is an example of an emulator?

D. BlueStacks

You need to have only selected wireless clients to connect to the wireless network of your office. Which of the following will help you achieve this?

D. Enabling MAC filtering on WAP

A Windows system has suffered a Blue Screen of Death (BSOD). The system indicates the IRQL_NOT_LESS_OR_EQUAL error. What does this error mean?

D. Error is caused by a faulty device driver

You have an older system that has an IDE hard drive. When you attempt to boot the system, you are prompted with a message that IDE drive is not ready. What could be the cause?

D. Hard drive not spinning fast enough

You are using a Mac notebook and an iPhone. You need to connect the devices together and transfer the data from the iPhone to the Mac notebook. Which of the following connection would be most appropriate in this scenario?

D. Lightning

Refer to the exhibit. You are using an iPhone, and your WhatsApp is configured to backup data on iCloud. One day, while the backup starts, you are prompted with the error shown in the exhibit. What should you do?

D. Make some space available on the iPhone

Refer to the exhibit. Identify the connector shown in the exhibit.

D. Mini-USB

Refer to the exhibit. Which device is being displayed?

D. Port Replicator

Refer to the exhibit. Identify the component of the inkjet printer.

D. Print Head

You have a book on a Kindle application on your mobile device. The book is synchronized on your laptop. However, the current page of the book from the mobile device is not synchronized to Kindle application on your laptop. Remaining books are getting synchronized properly. What should you do?

D. Remove the book from the mobile and add it on both the devices

You are using a computer with an IP address of 192.168.2.44 and a subnet mask of 255.255.255.0. You can ping the destination of 192.168.2.66 but not 192.168.3.21 even though you know that the latter is a functioning workstation. The workstation with the IP address, 192.168.3.21 can ping systems on the 192.168.2.x subnet. What could be the reason for this?

D. The default gateway is configured incorrectly.

Your organization uses Active Directory with Exchange Server 2016 for messaging. The network is protected by a firewall. You need your laptop to be configured with Outlook 2016 using the IMAP protocol. When you attempt to login to the E-mail account using your domain account, the authentication fails. However, you are able to log in to your laptop. You check with IT support and no other remote user has reported this issue. What could be the probable cause?

D. The password contains Unicode characters.

You have configured two devices to share contact information over NFC. The information sharing starts, but then you move one of the devices a little further away accidentally. Contact sharing between devices now fails. What could be the probable cause?.

D. There should be a maximum of two-inches distance between both the devices.

If you want to access blocked websites, hide your location, encrypt data, which of the following should you do?

D. Use VPN

You have recently setup a new virtual environment with multiple virtual machines. You need to protect these virtual machines and need to ensure that the entire environment is secured. Which device should you use?

D. Virtual firewall

You are creating a document in MS Word, and the cursor jumps from its location on a regular basis. Which of the following settings must you configure to correct this issue?

Touchpad

You want to implement Software Defined Networking without adding any extra on-premises hardware for your cloud applications. Your solution should offer zero provisionings. Which of the following should you implement? A. Network-as-a-service (Naas) B. SaaS (Software-as-a-Service) C. Cloud-based network controller D. PaaS (Platform-as-a-Service)

UNKNOWN

You have to deploy a solution on a client site where the solution must consist of a Firewall, Anti-spam, Content filtering, DLP, and Malware scanner. The client wants to receive alerts if suspicious traffic is detected. It should also be able to provide reports on the number of viruses and spam messages blocked, and summaries of content filter violations. The client does not want to load the network with multiple devices and wants a single solution. To be able to meet your goal, which of the following would be an optimal solution for the client?

Unified Threat Management (UTM)

You configure a Wireless Access Point (WAP); you disable the SSID broadcast. What will be the outcome of this configuration?

Users will no longer be able to see the wireless network, but they can connect to it manually


Ensembles d'études connexes

Chapter Two: 2.2 The Intension and Extension of Terms

View Set

Chapter 22: The Shoulder Complex

View Set

*Tiffeny's Comprehensive AANP Review (LEIK/Barkley/Fitzgerald) pt 2*.

View Set

MGMT Exam #2 3013 Fundamentals of Managment Oklahoma State

View Set

Chapter 7- E Business and E Commerce

View Set