CIS100 15-24

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed?

%systemdrive%\Program Files (x86)

Which of the following file extensions types can be run from a Windows system Command Prompt?

.exe, .bat, and .com

Which of the following extensions identifies a program packaged for use by Windows Installer?

.msi

Which of the following is a valid IP address?

1.0.0.1

What is the size of an IPV6 address?

128 bit

Which of the following IP address is Class B addresses?

132.12.0.0

Which one is not a common band for wireless networking technology?

20 GHz

What port does Hypertext Transfer Protocol Secure (HTTPS) use?

443

You are currently using a cellular network plan that provides maximum speeds of up to 10 Gbps for your smart phone. Which of the following cellular network types are you using?

5G

Which Windows feature can you use to encrypt a hard drive volume?

BitLocker

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which of the following is the BEST choice for this wireless connection?

Bluetooth

You have installed your Windows 11 system on a C: drive. Where are your fonts stored on your Windows 11 system?

C:\Windows\Fonts\

Which of the following is not an email protocol?

DHCP

You want to implement name resolution on the Linux workstations in your company. Which protocol should you use to do this?

DNS

Which component is designed to let you use a notebook system as a desktop system by making it possible to connect a normal-sized external mouse, keyboard, monitor, and speakers?

Docking station

Which of the following are printer languages?

Escape codes, PCL, and PostScript

You are establishing a new security policy for user authentication and want to implement multifactor authentication. Which of the following would BEST accomplish this?

Fingerprint and one-time code text message

When a user rotates a mobile device, the operating system changes the screen orientation so that the display remains upright for the user. Which of the following technologies detects this movement on a mobile device?

Gyroscope and accelerometer

Which of the following protocols is often combined with TCP to send data across the internet?

IP

Which printer type is ideal for printing carbon-copy documents?

Impact printer (Dot matrix printers )

What are the two most common printer types?

Laser and inkjet printers

Which of the following can be paired with a motion sensor to improve security?

Lights

Which of the following should be installed inside the entrance to the building to prevent weapons or unauthorized equipment being brought into the building?

Magnetometer

A user pays for a retail purchase by placing a smartphone next to the merchant's reader. Which of the following wireless mobile device connections is this?

NFC

Which of the following wireless networking technology allows two-way communication between two devices, but they must be within a few centimeters of each other?

NFC

Which of the following network components is responsible for converting digital data into a signal that can be transmitted?

Network interface

What are the standards called that define how data is formatted and transmitted over a network

Networking protocols

Which of the following BEST describes the Platform as a Service (PaaS) cloud computing service model?

PaaS delivers everything a developer needs to build an application on the existing cloud infrastructure.

A group of workers in an office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols. Which of the following network types is in use?

Personal Area Network (PAN)

You want to connect your internal network to an external network in order to provide internet access to your employees. Which of the following network components is designed to make this type of connection?

Router

Which of the following is a specialized controller that you can use to remotely manage all your network devices?

SDN

Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network?

SaaS

A healthcare organization provides mobile clinics throughout the world and needs to transfer patients' data to a central database via the internet. Which technology is BEST to use to ensure network connectivity for any clinic located in the world?

Satellite

What type of IP addressing method requires manual configuration and provides a fixed, unchanging IP address?

Static IP addressing

Which of the following network types uses special hardware to provide high-speed access to storage across the network?

Storage area network

Which of the following factor significantly determine the number of virtual machines that a host can accommodate?

The components installed on host machine.

The strongest technological security measures can be quickly defeated if employees engage in unsafe behaviors.

True

You want to create a virtualization environment that runs directly on the host machine's hardware to manage the virtual machines. Which of the following virtualization types should you use?

Type 1 hypervisor

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which Transport layer protocol is MOST likely used for this service?

User Datagram Protocol (UDP)

Which of the following authentication methods allows you to securely connect a printer to the wireless network with the least amount of effort?

WPS

You need to see which kind of CPU is being used on a Linux system. The /proc directory contains a text file called cpuinfo that will give you the information you are looking for. Which commands will display the entire contents of the cpuinfo text file?

cat /proc/cpuinfo

technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following commands should the technician use?

chmod

What is a base-10 numbering system also known as?

decimal

Which of the following hardware devices regenerates a signal out to all connected ports without examining the frame or packet contents?

hub

A thin layer of software that resides between the virtual machine and hardware.

hypervisor

A technician wants to move a file called widget.txt from the current directory to /home/fred. Which of the following commands should the technician use at the shell prompt?

mv widget.txt /home/fred

What would you enter at the shell prompt on a Linux system to display the present working directory?

pwd

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes?

robocopy

You would like to completely shut down a system 10 minutes after notifying all users of your intent. Which of the following commands should you enter at the shell prompt?

shutdown -h +10 message

The most effective way of improving security is to implement _________________.

user education and training.

Which of the following is an example of a strong password?

wl0v2Et!?


Set pelajaran terkait

Jarvis Modules 4-6 Module 4: Abdomen, Female and Male GU & Rectum Module 5: Musculoskeletal and Neurologic and Mental Status Systems Module 6: Skin, Hair, Nails, Breasts, and Nutritional Assessment

View Set

Mastering Math Facts Multiplication Set L (3x4, 4x3, 7x7)

View Set

Fundamentals 402 Questions Practice for Final

View Set

Unit 2: Objects and Primitive Data

View Set

Network Pro Part 2 +++++++++++++++++++

View Set