Chapter 8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A network technician attempts to ping www.example.net from a customer computer, but the ping fails. Access to mapped network drives and a shared printer are working correctly. What are two potential causes for this problem? (Choose two.)

1. DNS service is unavailable on the customer network. 2. The target web server is down.

Which two statements are true of network computing in contrast to non-network computing? (Choose two.)

1. Fewer peripherals are needed. 2. Centralized administration capabilities are enhanced.

Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)

1. The company network requires secure access to confidential information. 2. The users need a central database to store inventory and sales information. 3. The data gathered by the employees is critical and should be backed up on a regular basis.

Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)

1. The device must be powered on. 2. The device must be connected to a network.

A user has taken a personal laptop to work. The laptop is unable to discover the name of the office wireless network. What are two potential causes of this problem? (Choose two.)

1. The network does not support the wireless protocol in use by the laptop. 2. The wireless router is not broadcasting the SSID.

Which two factors are used to determine the different categories of UTP (Unshielded Twisted Pair) cabling? (Choose two.)

1. The number of twists in the wires inside the cable. 2. The number of wires inside the cable.

What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)

1. The operating system can be fine-tuned to improve the speed of the device. 2. The user interface can be extensively customized.

After an upgrade to a mobile device, some applications are no longer working, but some work fine. The user can make calls and send and receive email. Which two kinds of problems could be related to these issues? (Choose two.)

1. a memory problem 2. a software problem

What are two touchscreen characteristics that are used by most mobile devices? (Choose two.)

1. an electrical field of the screen that is interrupted when the user touches the screen 2. two transparent layers of material capable of conducting electricity

Which two items common to both Android and iOS devices can be remotely backed up? (Choose two.)

1. contacts 2. calendar

A technician installs a new NIC in a PC and connects an Ethernet patch cord from the NIC to a wall jack. The technician then notes that the link lights are not active on the NIC. Which two problems could be indicated by this lack of activity? (Choose two.)

1. faulty NIC 2. faulty patch cord

Which two characteristics describe Ethernet technology? (Choose two.)

1. supported by IEEE 802.3 standards 2. uses a bus logical topology

What two functions can be performed with the home button on an iOS mobile device? (Choose two.)

1. the same functions as the Android navigation buttons 2. start voice control

What are two purposes of the passcode lock feature on mobile devices? (Choose two.)

1. to place the device into a power saving state 2. to help prevent theft of private information

What is the maximum range a data signal can travel through a 1000BASE-T network segment?

328 ft (100 m)

What is the most commonly used DSL technology?

ADSL (Asymmetric Digital Subscriber Line)

Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?

Attach a cable that has an RJ-45 connector.

Which statement is true about industry standards for cellular networks?

Cell phones that use a single standard can often only be used in specific geographic areas.

A business traveler connects to a wireless network with open authentication. What should the traveler do to secure confidential data when connecting to the business services?

Connect with a VPN.

A user accidentally drops a mobile device into a pool. What corrective action should be taken?

Contact the manufacturer for repair or replacement.

Which networking protocol translates a network name such as www.cisco.com to a unique IP address?

DNS (Domain Name System)

What is an advantage of using flash memory to store data in mobile devices?

Flash memory requires very little power to store and retrieve data.

What is a good source for safely downloading Android apps?

Google Play

What is the acronym for the protocol that is used when securely communicating with a web server?

HTTPS

A technician is configuring email on a mobile device. The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the technician use?

IMAP (Internet Message Access Protocol)

What is true about the TIA/EIA? (Telecommunications Industry Association)

It developed standards to replace proprietary standards after U.S. telephone industry deregulation.

Which method is recommended in order to avoid problems with counterfeit network equipment?

Purchase equipment only through manufacturer-authorized partners.

After being left in a car for many hours on a hot day, an iPhone cannot be turned on. What should the user do to fix this problem?

Return the phone to the manufacturer for repair.

Which suite of protocols is used to transmit data across the Internet?

TCP/IP

A user notices that the data transfer rate for the gigabit NIC in the user computer is much slower than expected. What is a possible cause for the problem?

The NIC duplex settings have somehow been set to half-duplex.

Which scenario or situation would prevent a user from upgrading the OS on an Android device?

The hardware does not meet specifications.

Which statement about synchronizing a mobile device to a PC is true?

To synchronize data on an iOS device, iTunes must be installed on the PC.

Workers are required to access the company LAN when traveling. Which networking technology can provide secure and encrypted access to the LAN?

VPN (Virtual Private Network)

The Internet is an example of which type of network?

WAN (Wide Area Network)

Which mobile device troubleshooting procedure is correct?

When a problem appears with a mobile device, the owner should analyze if it is cost-effective to fix it.

Which statement is true about wireless connectivity on an Android mobile device?

When the device roams out of the range of any Wi-Fi networks, it can connect to the cellular data network if this feature is enabled.

A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?

a bad network cable

In the context of mobile devices, what does the term tethering involve?

connecting a mobile device to another mobile device or computer to share a network connection

A technician uses the nbtstat -A 192.168.0.3 command. What does the technician expect to view in the command output?

current connections and statistics

Which device enables computers to be attached to a network without segmenting the network?

hub

Which component is field-replaceable in most mobile devices?

memory card

Which term describes the ability of a mobile device to recognize when two or more points of contact are made on the screen?

multitouch

Which mobile device security feature requires the user to slide a finger over the screen in a specific sequence to unlock the device?

pattern

Which dotted decimal number is used to distinguish the network portion of an IP address from the host portion?

subnet mask

A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?

the available wireless networks within range

Why should network cables always be labeled?

to save troubleshooting time

Which Windows XP command displays the route taken by packets crossing an IP network?

tracert


संबंधित स्टडी सेट्स

Howard Gardner's theory of multiple intelligences

View Set

Quiz and homework questions and answers

View Set

National Electrical Code Article 110 Requirements for Electrical Installations

View Set

Microeconomics Unit 2 HW Questions

View Set

hyperventilation vs. hypoventilation

View Set

Managerial Accounting Exam 2 Practice Exam

View Set

High-Risk Postpartum- Davis Practice Q's

View Set