A+ Ch. 7 Questions, A+ Ch. 8 Questions, A+ Ch. 9 Questions, A+ Ch. 10 Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You have connected an ADSL Internet connection as shown in the exhibit. The ports at the phone jack are connected to the same single-number POTS line. At what location should you place the DSL filter?

"B" only

A technician is troubleshooting a Windows 10 x64 desktop system with a Type 2 hypervisor that is hosting four VMs that must be run simultaneously. The technician suspects the sluggish performance is due to insufficient physical RAM in the host computer and has disabled dynamic RAM allocation in the hypervisor. Assuming each operating system installed requires 2GB of RAM, what is the minimum amount of physical RAM that will need to be installed in the host system to meet the requirements of this scenario?

10240MB

Which of the following is a wireless Internet connectivity method that utilizes cellular technology?

3G

Which of the following describes an IPv6 link -local address assigned to a node on a network?

A private unicast address used for limited communication with neighboring nodes in the same link.

Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure. What makes WPA2 more secure than WPA?

AES

What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video?

Accelerometer

You are installing several VMs on your desktop computer and need to determine whether your system can support running all the VMs at the same time. Your host operating system is Windows 10 Pro, and your system has 16GB of physical RAM installed. Which of the following is the best approach in making this determination, assuming dynamic allocation of RAM is disabled?

Add up the required RAM for each of the guest VM operating systems you want to run at the same time and add the RAM required by your host OS.

A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure?

Address reservation

One of your sales employees is taking a trip to several conventions over the next several weeks and will need to have access to a printer at each of the locations. Each of the convention centers will be providing hassle-free printing for all Apple computer and iOS mobile device users. Which of the following technologies will most likely be used to provide print services?

AirPrint

A technician is troubleshooting a mobile device that is experiencing very slow performance, and the decision has been made to perform a factory reset. Which of the following actions should the technician take before starting the reset process?

Back up all user data.

You require a protocol in order for your Windows network hosts to have access to shared files and folders. Which of the following protocols will provide the necessary file services? (Select TWO.)

CIFS

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved. What network setting should you check to see the address of the server being used to resolve this address?

DNS

A server provides the services to take you to the correct website domain when you type cengage.com in your web browser. If this service were not functioning, you would have to remember the IP address for cengage.com. What server performs this service?

DNS Server

Which of the following will use an RJ-11 connector for connectivity?

DSL

Which of the following symptoms is most likely related to leaked personal files/data on a mobile device?

Data transmission over limit

Jerry is in the process of setting up a Bluetooth device. He has enabled Bluetooth, paired the device, and located the correct device. What is the next step in the Bluetooth connection process?

Enter the pin code.

Mary, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel. Which of the following is often configured as a required step for a user each time she attempts to use the VPN connection?

Enter the same user name and password used on the corporate network.

Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference. Which of the following could be used to network this building?

EoP

Which of the following indicates the most concise abbreviation of the IPv6 address FEFE:0000:0000:0000:0002:0000:0000:0001?

FEFE::2:0:0:1

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?

Implement a blacklist on the firewall and add the site the users are visiting.

Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that company-owned workstations are up-to-date with security patches, anti-malware requirements, and software application updates. The manager is also concerned that employee-owned devices connecting to the corporate LAN have the same level of security as the company devices. Which of the following protections and services should you recommend?

Implement an endpoint management server appliance.

Jacob wants to set up extra security on his wireless network; he currently uses WPA2. He wants to allow only his devices to connect to the network and reject devices that he does not own. What extra wireless security should Jacob employ in on his wireless router?

MAC filtering

A mobile phone user in your company is experiencing dropped phone calls. While interviewing the user, you determine the problem started after she checked her email this morning. No other mobile devices in the organization are dropping calls. Which of the following is the most likely reason for the dropped calls?

Malware is interfering with the calls.

Which of the following aspects of cloud computing allows a service provider to limit a customer's use of a particular resource based on a service agreement between the provider and the customer?

Measured service

Which of the following printer issues is most likely resolved by performing a calibrate function on a laser or inkjet printer?

Misaligned colors on printed page.

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect. Where in the Windows Control Panel will Cathy find her computer's network connection settings?

Network and Sharing Center

While servicing a laser printer, the technician notices that paper is jamming immediately after being pulled from the paper tray. What is the most likely cause of the paper jams?

Paper feed rollers

The touch screen on a mobile device is not responding to input. Which of the following is the best step to take to resolve this issue?

Perform a factory reset on the device.

A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected with multiple worms and other forms of known malware. The second VM is a clean installation of Windows. The technician has been tasked with logging the impact on the clean Windows VM when the infected VM attempts to infiltrate the clean VM through the network. What should the technician do to best protect the company LAN while performing these tests?

Place both VMs on virtual NICs that are isolated from the company LAN.

The help desk received a call from a user who cannot get any print jobs to print on the locally shared printer. While questioning the user, the technician determines that no users can print to the printer, and the printer indicates it is "Offline." The technician instructs the user on how to place the printer in the "Online" mode, but print jobs are still not printing on the printer. Which of the following is the next step to take to resolve this issue?

Power cycle the printer.

The receptionist's directly connected laser printer is printing blank sheets. The technician assigned to the trouble ticket has replaced the toner. However, blank pages continue to print from the receptionist's PC. Which of the following steps should be performed next?

Print a test print from the printer's console.

What connector is shown in the exhibit?

RJ-45

Which of the following is a function of an endpoint management server appliance?

Restricting a device's access to the network until security requirements are met.

Examine the exhibit above. ​ "Device A" is an 8-port layer 2 managed switch and "Device C" is a 4-port hub. Which of the following describes "Device B," assuming all workstations can communicate with each under normal circumstances?

Router

Examine the exhibit above. Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message through the router?

SMTP

You are installing network cabling and require a cable solution that provides the best resistance to EMI. Which of the following will you choose for this installation?

STP

Which of the following can provide a user with a cloud-based application that is integrated with a cloud-based virtual storage service and can be accessed through a web browser?

SaaS

Which of the following is a cloud computing service model that relies most heavily on the cloud vendor to manage and maintain its services?

SaaS

Sara wants to set up her lights to turn on when she arrives home. She has heard that she might be able to do this using IoT. What should Sara be concerned about when setting up her IoT lights?

Security

James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files. How can James select what to synchronize from his phone to Google storage?

Settings app

Spencer would like to purchase a wearable device that allows him to make phone calls and send text messages. Which type of wearable device should Spencer purchase?

Smart watch

Sam cannot figure out why he can't get sound from his tablet's internal speakers and calls you asking for advice. You ask him to check to see if anything is stuck in the aux port. Sam assures you nothing is in the aux port. He also checks to make sure the sound is not muted. What might prevent Sam from getting sound from his tablet?

The audio output is being directed to a Bluetooth speaker.

The laser printer in your accounting department is printing faded prints that are getting lighter over time. What is the most likely reason for the faded prints?

The printer is low on toner.

A mobile device user is having problems launching apps and texting. The user touches an app to launch it, but the app icon next to the desired app launches instead. When the user types a text message, every word in the message is misspelled. What is the most likely cause for this behavior?

The screen protector is interfering with touch response.

A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in the following message, "Could not find this item. Verify the location of '\\FileServer\Docs' and try again." Which of the following is the most likely cause for this message?

The share to the file server is disconnected.

Jordan likes to use his smartphone in his car. He uses it as a navigation device and connects it via Bluetooth to listen to music. He has purchased accessories that allow him to see his smartphone while he is driving. On a very cold day, and after driving for several minutes, Jordan receives a warning from his smartphone that it is overheating and needs to shut down. When he touches his smartphone, it is hot. What might cause Jordan's smartphone to overheat?

The smartphone is located too close to the car's heat vent.

A user is asking her smartphone to recommend a restaurant, but the app cannot seem to find where the user is located. The device's cellular service is active and functioning. What is the first thing the user should check?

The user should verify location services is enabled on the smartphone.

Mary's company has asked her to research new computers. The company wants to provide workers with minimal computers that have an operating system and a browser that will allow the workers to connect to a server. The server will do most of the necessary processing. What kind of computer should Mary recommend?

Thin client

What type of computer is recommended when you want to allow the server to do most of the computing but would like to connect to the server via a browser?

Thin client

A technician has verified that a bad Cat6 cable run in the wall is responsible for a workstation's lack of communication on the network. Which of the following tools can be used to pinpoint the location of the cable inside the wall?

Toner probe

Is it true or false that most smartphone devices have radio firmware that allows listening to FM radio frequencies?

True

A customer is looking to replace three aging network servers that are not able to keep up with the growing demand of the company's users. The customer would also like to add three additional servers to provide on-site DNS, intranet, and file services. A technician is recommending a bare metal hypervisor as the best solution for this customer. Which of the following describes the recommended solution?

Type 1 hypervisor installed directly on server hardware.

George is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle. He wants a way to limit their ability to view content on the Internet. What will you recommend to George?

Use Parental Controls.

A company needs a way to convert 10 years of shipping records currently on paper into files that can be saved to its private cloud storage. Which of the following will be the best choice to accomplish this goal with the least amount of employee effort?

Use a dedicated ADF scanner connected to either a workstation or the LAN.

A company needs a way to convert 10 years of shipping records currently on paper into files that can be saved to its private cloud storage. Which of the following will be the best choice to accomplish this goal with the least amount of employee effort?

Use a dedicated ADF scanner connected to either a workstation or the LAN.

Jerry recently purchased a new iPad. He needs guidance on setting it up and wants to find documentation to help with the setup. Where can Jerry find detailed steps on how to connect to a network, configure email, update the OS, sync, and back up settings and data, as well as what to do when things go wrong with his iPad or an iPhone?

User guide for the device

Which of the following is a centrally hosted and managed desktop environment with the capability of spanning multiple offices across various countries in which each user's desktop instance is dynamically provisioned?

VDI

A remote worker wants to connect his computer to his corporation's private trusted network over the Internet. Which of the following will need to be configured?

VPN tunnel

You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer?

WPA2-PSK, AES

A smartphone user entered an incorrect passcode on his phone several times in a row, which locked the device. Which of the following steps should the user take first?

Wait a few minutes for the phone to automatically unlock.

A server or service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the location bar. If this service is malfunctioning, your browser will display a page not found error. What server provides this service?

Web server Web server

A technician has been dispatched to a client's office to diagnose wireless network issues and suspects that channel overlap may be the problem. Which of the following tools will the technician use to help in determining whether her suspicions are correct?

Wi-Fi analyzer

A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection. ​ Which of the following is required for the user to successfully sign in to the Windows domain?

Windows domain user name and password

A new printer has been added in your office and connected to a WAP for use by all users in the company. Which of the following best describes the method of connectivity for the new printer?

Wireless infrastructure mode

In which of the following situations should you install an IPS instead of an IDS?

You want to block unauthorized activity on your LAN from the Internet

Sally has just purchased a new iPad. She wants to save all the pictures and files that she creates with her new iPad on the Internet. What service should Sally use to save her pictures and files seamlessly on the Internet?

iCloud

While assisting a Windows user over the phone, you need to determine the IP address for the DHCP server along with the MAC address of the Ethernet NIC. The user has successfully opened a command prompt. What command will you have the user type at the command line to determine these two addresses?

ipconfig /all

Tracy is in a meeting with an important client and wants to know how she can keep her smartphone from interrupting the meeting. She does not want to receive notifications, emails, text messages, or phone calls, but would like to leave her phone on so that she can take notes on the phone. What setting can Tracy use on her phone to make sure she is not interrupted during the meeting?

Airplane mode.

Which of the following could be a major concern for implementing cloud computing for business-critical services?

An intermittent or unavailable Internet connection.

Which of the following operating systems can be modified and the source code redistributed?

Android

One of the users in your company is asking if he can install an app on his company-provided mobile device. The installation of apps by users is blocked on the company's mobile devices, but you have tested and confirmed this app would be useful for everyone. Which of the following will allow users to request a minimal version of the app that downloads only what is required to run?

Application streaming

Which of the following technologies can provide an application to remote users without the need to install the application on the users' systems?

Application virtualization

You want a method of authentication for company-owned mobile devices in which users are required to use two-step authentication. Which of the following will best assist you in meeting this requirement?

Authenticator apps

A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on. Which of the following will meet these requirements?

Cable

The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network. What is the first step Derek should perform to secure the wireless router?

Change default user name and password.

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement?

Change the router's default administrative password.

A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device, and it operates for another day or so. This problem has been occurring for several weeks. Which of the following steps should the user take next to resolve this issue?

Check for OS updates.

A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an attempt to get the app to install. Which of the following steps should the user take next?

Check for sufficient available storage space.

What step in the laser printing process is responsible for conditioning the imaging drum in preparation for receiving an electrical charge?

Cleaning

A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user powers the device off each evening, and when it is powered on, performance returns to normal. After an hour of operation, performance degrades. Which of the following is the best action to take to resolve this issue?

Close or disable all unused running apps.

A company is utilizing servers, data storage, data backup, and software development platforms over an Internet connection. Which of the following describes the company's approach to computing resources?

Cloud computing

A technician is troubleshooting a small network with cable Internet service in which a user is receiving a message in her web browser stating a site cannot be found. While interviewing users, it is determined that every host on the network is experiencing the same issue with all websites. Which of the following is the first step in troubleshooting this issue?

Connect a computer directly to the cable modem and attempt to access the Internet.

A technician wants to use a hosted virtual machine to provide shared files and folders on the company LAN.

Connect the virtual NIC to the host's physical NIC.

A technician wants to use a hosted virtual machine to provide shared files and folders on the company LAN. Which of the following will provide the necessary network connection for the VM?

Connect the virtual NIC to the host's physical NIC.

Derek is planning a camping trip and wants to be able to listen to music at the campsite. Derek currently has a smartphone but does not like the sound coming from the speakers. What will help Derek improve the sound coming from his smartphone's speakers while he is at the campsite?

Connect to a Bluetooth speaker.

A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business. Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients?

DHCP server

A server provides the necessary IP configuration to your network host so the host can communicate on the network. If this service malfunctions, your device will not be able to utilize the network. What server provides this service?

DHCP server

You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN. Which of the following features will you configure on the SOHO router to accomplish this task?

Demilitarized zone

A user is experiencing problems connecting to a SOHO Wi-Fi network via her mobile device. Which of the following is the first step a technician should take in resolving this issue?

Determine if any other devices are experiencing the same issue.

A user is complaining that her mobile device is too dim to read when in a dimly lit room. Which of the following actions should you take first?

Disable the auto-brightness option

Your mobile device is displaying messages informing you that your device is infected with malware. The instructions tell you to install another app to properly remove the malware. What should you do?

Disregard the message and check for a compromised app.

You were hired by a design firm that uses Mac equipment exclusively. You prefer to use your Windows laptop and would like to print to the printers that are already in use. When you open the list of shared printers, nothing is shown. Which of the following will allow you to discover and print to the network printers from your Windows device?

Download and install Bonjour Print Services.

Which of the following creates an environment that behaves in a hardware-like manner to run software meant for other hardware?

Emulator

Dennis is driving a car with his family onboard. His children are sitting on the backseat. They have a tablet and want to watch a video on the Internet. ​ What can Dennis do that will allow the children to watch a video on the Internet while in the car?

Enable a hotspot on his smartphone.

Kendra, a user, would like to share her serial printer that has no networking connectivity with the other users in her small office. Which of the following would be the best choice for providing this functionality with the least effort and cost to the user?

Enable print sharing on the computer.

A company purchased a high-quality color laser printer to print color brochures and sales proposals. The printer is connected to a marketing PC via USB and is configured as a shared local printer for use by the sales and marketing teams. The manager is concerned about the cost of consumables for the printer and does not want users to unintentionally print to the printer. What can be done to ensure that only authorized users can send print jobs to the printer?

Enable user authentication on the printer share.

A help desk technician needs to run virtual machines on her laptop computer for several upcoming training sessions. Which of the following must be completed before she can use virtualization on her laptop?

Enable virtualization support in the laptop's UEFI.

While investigating an email issue, a support technician discovers no users can access their email accounts on the company's email server connected to the private LAN. Pinging the email server from several workstations on the LAN results in 0% packet loss. Which of the following is the next step the technician should take in troubleshooting this issue?

Escalate the problem to a server administrator to check for issues with the server.

Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps?

Fourth-generation cellular

A customer states that when she removes the printed pages from her laser printer output tray, the black ink smears all over her fingers. Which of the following is the most likely problem?

Fuser unit

Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a new email account for the phone. Which commercial email provider should Angela use for her new Android phone?

Gmail

Henry wants to build a computer that will allow him to run a hypervisor program. What does Henry not need on his computer?

High-end video card

Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his needs. He wants it to be connected to his Google account. Which smart speaker would you recommend?

Home

Which of the following components provides the physical network connectivity for a virtual machine, managed by a Type 2 hypervisor, to connect to an Ethernet switch via a UTP patch cable?

Host computer's physical network interface.

Which of the following terms describes the software layer that is responsible for creating and running a VM on a host?

Hypervisor

Mark has been asked to set up several smartphones to connect to his company's email server. The company wants Mark to set them up so they can be synchronized between multiple email clients on multiple devices. What protocol should Mark use to set up the company smartphones?

IMAP

A small company has hired you to take over its IT needs. The company currently has seven on-site employees and 12 remote employees working from their homes and is looking to hire an additional 20 employees in the next six to eight months. The owners of the company are asking you to obtain a business service that will meet the needs of the current staff as well as scale up when the company grows. The service must provide adequate and scalable computing power and storage. Which cloud service model should you implement?

IaaS

A client is asking for a printing solution that will print three sheets of paper with identical information on each page with a single pass of the printer. Furthermore, the client requests that the solution take the least amount of time and effort to maintain. Which of the following printer types should be recommended?

Impact

You are tasked with securing a small network for a client in which the following requirements must be met: • If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered. • The private trusted network should not be accessible from the public untrusted network. • If attacks are coming from the external network, the system should detect and prevent malicious activity. • All incoming and outgoing email should be scanned for malware. Which of the following would best meet the requirements of the client?

Implement a UTM appliance.

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?

In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.

A software developer is testing an application on a Windows 10 desktop computer and needs to perform testing of this same application on Windows 7, Windows 8.1, and Linux operating systems. Due to company policy, the developer must use her existing computer and must be disconnected from the company network while performing these tests. Which of the following will best meet these requirements while providing the developer the same level of usability she is accustomed to?

Install a Type 2 hypervisor and create the Windows VMs and a Linux VM.

Which of the following is best practice to minimize the chance of infecting your mobile device with malware?

Install apps only from trusted sources.

A company is in the middle of an operating system update to Windows 10 from Windows XP, Windows 7, and Windows 8.x. The diverse nature of the update has made it imperative that the help desk techs have the ability to run several concurrent VMs. A few of the techs are experiencing frequent and extended periods of 100% CPU usage on their computers, and these spikes are limiting their ability to assist users in a timely manner. Which of the following is most likely causing this behavior?

Insufficient number of physical processor cores.

A technician is installing a hypervisor on a host system with a single physical NIC that runs a high-bandwidth network application. The host NIC is running at optimum bandwidth and cannot support additional network traffic. The technician will be configuring eight networked VMs that will be interconnected and on their own dedicated virtual subnet separate from the existing physical LAN subnet. When networking the VMs, what will the technician need to do to guarantee that the host network's performance is not affected without adding complexity or additional cost to the host configuration?

Isolate all VM virtual NICs from the physical NIC.

Which of the following is considered a security benefit when utilizing virtualization?

Isolating operating system when running multiple concurrent VMs.

John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cable for his Android smartphone, though it is not quite the same. What type of cable will John need to purchase to replace the iPad's charger cable?

Lightning

A customer has several mobile device users who have a habit of misplacing their devices during the workday. Which of the following security methods will most benefit these users?

Locator applications

A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text message with a unique PIN that must be entered before she is granted access to the account. Which of the following describes the security method being used?

Multifactor authentication

A company requires an Ethernet connection from the north end of its office building to the south end. The distance between connections is 161 meters and will need to provide speeds of up to 10 Gbps in full duplex mode. Which of the following cable combinations will meet these requirements?

Multimode fiber cable with MT-RJ connectors

John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the data to be synchronized, this service uses a process in which the cloud service and the client on the smartphone will verify the security of all devices' security certificates. What type of security does the cloud-base service employ?

Mutual authentication

Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information for payments made at a retail checkout counter. The technology also allows the marketing team to share data quickly. What technology is set up on the marketing team's phones?

NFC

Examine the exhibit above. Which network tool most likely produced the output?

Network multimeter

You have connected a cable Internet connection as shown in the exhibit. ​ At what location should you place a filter?

No filters are required

Consider the following configuration. ​ Computer "A" IP address: 172.16.100.100 Subnet mask: 255.255.0.0 ​ Computer "B" IP address: 172.16.200.200 Subnet mask: /16 What should be done to allow these computers to send and receive data to and from each other?

Nothing needs to be changed.

A company is hiring several remote employees who will be working primarily from their homes but will need to come into the office once a month. The company is providing the workers with laptop computers and wants a way for them to access their email account whether they are at home, on the road, or in the office. Which of the following will be the best solution?

Off-site email application

A customer has contacted you to help him alleviate the large amount of time and effort that goes into adding and removing users who require access to a business productivity suite. The suite of applications includes word processing, spreadsheet, presentation, and email. Each time an employee is hired, a technician spends over an hour preparing a computer for the user. Likewise, when an employee leaves the company, a technician spends an hour decommissioning the computer. What aspect of cloud computing will be most beneficial in reducing a technician's time and effort while still giving the technician the ability to create and delete user accounts?

On-demand

A customer has contacted you to help him alleviate the large amount of time and effort that goes into adding and removing users who require access to a business productivity suite. The suite of applications includes word processing, spreadsheet, presentation, and email. Each time an employee is hired, a technician spends over an hour preparing a computer for the user. Likewise, when an employee leaves the company, a technician spends an hour decommissioning the computer. What aspect of cloud computing will be most beneficial in reducing a technician's time and effort while still giving the technician the ability to create and delete user accounts?

On-demand

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA/EIA 568B standard. Which wire color code will you use starting with pin 1 of the modular plug?

Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown

A small bank with several regional branches is searching for a solution to consolidate its business services into a single site with centralized management. The service should provide secure resources for use by the bank, and these resources must be isolated from any other organization using the same service provider. Which of the following will best meet the needs of the bank?

Private cloud

Which of the following is the correct order for the steps of laser printing?

Processing, charging, exposing, developing, transferring, fusing, cleaning

A technician is installing UTP cable and needs to terminate the connections on the patch panel shown in the following image. What tool should be used to terminate and complete this installation?

Punchdown tool

Dillion's company has decided it wants to find a way to do a better job of tracking clothing inventories. Dillon has been asked to research ways to use the wireless network and IoT devices to help when tracking the clothing inventories. What should Dylan recommend to his company to help track the inventories?

RFID tags

What is the purpose for the twists in twisted pair Ethernet cabling?

Reduce crosstalk between wire pairs.

You connected a printer directly to the network using the printer's integrated NIC. The printer was configured with an IP address for users on the local subnet to utilize. Which of the following best describes the printing method used by this printer?

Remote printing

Jennifer has an iPod that she has not used for six months. She wants to move the music and pictures from the iPod to her new iPhone. She tries to access the iPod using her four-digit code, but the passcode does not work. She tries to use two other codes, but neither work. Obviously, Jennifer does not remember the passcode. What solution does Apple provide that will help Jennifer recover the passcode for her iOS device?

Reset the device and restore the data from iCloud or iTunes.

You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with the headset until a recent corporate-wide OS update. No other mobile devices in the organization are exhibiting this issue with Bluetooth headsets. Which of the following is the first step you will take to resolve this issue?

Reset the network settings in the mobile device Settings app.

A laser printer is displaying a message indicating a maintenance kit is due for replacement. Which of the following will be a part of the replacement process?

Reset the page counter.

Which of the following is a cloud computing element that gives a service provider the ability to dynamically allocate shared physical resources to multiple customers based on each customer's usage demand?

Resource pooling

A manager in your company wants to standardize all mobile device applications across different operating systems. Some users have Android mobile devices, some users have iOS devices, and some users have Windows Mobile devices. How can you best answer the manager in regard to his request?

Some apps will work on different OS platforms, but many will not.

A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP address of 192.168.10.100. Which of the following will the sending host use to determine whether the destination computer is on its own network or another network?

Subnet mask

Your mobile device appears to be contacting a remote server to upload your personal data. Which of the following should be performed first to protect your personal data?

Switch to airplane mode.

You are on a committee tasked with researching and recommending a service that will allow employees the opportunity to save files from their mobile phones, laptop computers, and workstation computers to cloud file storage services. Which of the following will need to be researched and considered in order to make a comprehensive recommendation?

Synchronization apps

Your company has asked you to do research how it can provide smartphones to its employees. The company wants to give employees access to OneDrive in order to synchronize data. What type of synchronization will you recommend to the company?

Synchronization to the cloud

A technician wants to consolidate and log specific alerts from network devices into a database so maintenance tasks and potential device problems can be addressed in a timely manner. Which of the following should the technician implement?

Syslog server

Your company wants to purchase a device that will allow it to give customers a 3D tour of its facility. What kind of device would you recommend for this type of 3D tour?

Tethered VR headset

A new Cat6 cable run and keystone jack were installed for a workstation that was moved from the sales department to the shipping department. Since the move, the user has been complaining of slow transfer speeds on both Internet and local network communications. The technician ran a test and is viewing the following output on the tester. Which of the following is the most likely reason for the sluggish network speeds?

The cable run exceeds the specifications for Ethernet over twisted pair.

You received a call from a user who brought her own device to the office but cannot find or connect to the company WLAN. The laptop shows other available wireless networks in the building. This user and the other users in her department are connected to the company WLAN and can browse to multiple websites with no problems from their company-assigned laptops. Which of the following is the most likely reason the user cannot find the company WLAN from her own device?

The company WAP has SSID broadcast disabled.

Your mobile device has gone over its subscribed data limit the past two months. During this time, you have noticed that the device runs hotter than normal and data speeds seem slower than usual. Which of the following should you consider as a cause for these issues?

The device is infected with malware.

You replaced the LCD panel in a laptop computer and verified full system functionality, including wireless connectivity. The customer picked up the laptop and now reports he can no longer access his wireless network regardless of how close the computer is positioned to the WAP. Other users can connect to the WAP without any problem. Which of the following is the most likely reason for this problem?

The laptop's wireless radio is toggled to the off position.

A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer's technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors. How can the technician retrieve the requested information from the user's device?

The method for retrieval is dependent on the specific app or device's operating system

A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer's technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors. How can the technician retrieve the requested information from the user's device?

The method for retrieval is dependent on the specific app or device's operating system.

A user called the help desk to report that her mobile device has apps on it that she does not remember installing. Several times throughout the day, she receives alerts in the notification bar from apps she does not recognize asking for permission to download and upload data. Which of the following is the most likely cause for this behavior?

The mobile device has malware on it.

You are preparing to give a presentation at a client's location using your mobile device and a large screen TV. You have successfully connected to the company's guest Wi-Fi network, and you tap the screen mirroring option on your device but cannot locate an available TV, monitor, or projector. The previous presenter finished her presentation a few minutes earlier and had no issues using the TV. Which of the following is the most likely reason for this behavior?

The mobile device is on a different Wi-Fi network than the TV.

A user is unable to install virtualization software on a Windows 8.1 computer. The user verified the host has sufficient RAM, plenty of available free disk space, and a multicore processor. Which of the following is the most likely cause for this behavior?

The motherboard does not support hardware-assisted virtualization.

A technician has connected a USB printer to a workstation and shared the printer on the local workstation for other users on the network to utilize. The technician successfully printed a test print from the printer's console and the workstation that the printer is physically connected to. After leaving the customer's site, the technician received a call from the customer stating no one other than the local user can print to the printer. Each time they attempt to print, they receive an "Access Denied" message. Which of the following is the most likely reason the other users cannot print?

The other users lack sufficient permissions for the shared printer.

Randy is concerned about his company's data security on the Internet. Because cellular signals are not encrypted, he is concerned that the new smartphones given to the sales department will allow a breach. Randy has decided the company needs a more secure way to allow the sales department to connect to the company network over the Internet. What should Randy deploy to allow the sales department to connect to the company network securely over a cellular data signal?

VPN

A technician is troubleshooting a printer connected to a computer via USB. The printer will print using the controls at the printer but fails to print from the computer. Which of the following steps should be taken next?

Verify the USB cable is attached.

What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest?

WAN, MAN, LAN, PAN

A group of wireless devices are using each other as relays to share a network connection across a large area. Which of the following network categories is being used?

WMN

Several of the contacts in your mobile device are responding to test messages that you sent them. However, you don't remember sending any of the messages. Which of the following is the reason for this behavior?

Your device is sending spam messages to your contacts.

Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz RF band. The company also wants the device to be at least 50 meters away from the base station. What type of device should the company purchase?

Z-Wave

You are troubleshooting a Windows workstation that is having problems communicating with the host at IP address 1.2.3.4. What utility will you use at the command line to determine where the communication is stopping?

tracert 1.2.3.4


संबंधित स्टडी सेट्स

Nursing Care of the Child With an Alteration in Tissue Integrity/Integumentary Disorder

View Set

FSHN150 - Chapter 4 Carbohydrates

View Set

mental health: fundamental and legal ethical, treatment setting and program, legal and ethical

View Set

CISC3000 Quiz 02 - Chapter 02 Introduction to the Relational Model

View Set