Csit chapter 4 or 14

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You connect your computer to a wireless network available at the local library. You find that you cannot access several websites on the internet. Which of the following is the MOST likely cause of this problem?

A proxy server is filtering access to websites.

When assisting users, a technician often uses the macOS Force Quit function and the Linux kill command. Which of the following situations would require their use?

A runaway application does not respond to user input.

Most operating systems have a GUI as part of their system. Which of the following BEST describes an operating system's GUI?

A user-friendly interface that uses icons and visual components to interact with the system.

Which type of file is commonly used by trusted websites to create installation software for mobile devices?

APK FILE

Which of the following provides a set of rules that specify which types of network traffic are allowed through a firewall?

Acl

Match each operating system attribute on the left with the correct description on the right. Ability to use multiple processing devices. Multiprocessing Ability to run multiple applications simultaneously. Multitasking Ability to run multiple parts of an application simultaneously. Multithreading

Answers

Which of the following is designed to provide a Linux command line interface?

Bash

When Linus Torvalds first released Linux version 0.02 in 1991, which utilities were included in the release? (Select three.)

Bash shell update utility gcc complier system

Which of the following functions are performed by proxy servers? (Select two.)

Block employees from accessing certain websites. Cache web pages.

A technician is tasked with installing the Windows OS on a macOS computer so that the computer can boot to either macOS or the Windows OS. Which macOS feature should the technician use to complete this task?

Boot camp

Which of the following proxy server roles stores frequently accesses data so that a user's request never has to leave the network for retrieval?

Caching

Which of the following are features of the Windows taskbar component? (Select two.)

Can be moved to the left or left-centered on the screen. Can be hidden.

What else does the macOS Keychain utility store besides passwords? (Select two.)

Certificates security notes

Which of the following is a web-browser based operating system?

Chrome OS

Which of the following operating systems was derived from Linux?

Chrome OS

Which of the following is a firewall type that scans network traffic based on TCP or UDP transmission?

Circuit-layer gateway

You want to configure a Windows workstation with your network proxy server's IP address from Control Panel using the Internet Properties window. Click on the tab in the Internet Properties window that you would use to do this.

Connections

Which of the following are common symptoms of a compromised mobile device? (Select two.)

Connectivity issues Increased data usage

You have been given a .app file for your Macintosh computer. The file is a graphics editor that you plan to install. What would you normally do to install the graphics editor?

Copy the .app file to the Applications directory.

Mission Control is a desktop and window management utility that is used to access several macOS features. Which of the following are macOS features that you can access through Mission Control? (Select three.)

Dashboard Multiple Desktops All windows

You are an IT technician for your company. Vivian, an employee, has been receiving error messages, indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian called again because she is still having the same issue. You now suspect that a corruption or a renaming of the system files is being caused by malware. Which of the following is the FIRST step you should take to remove any malware on the system?

Disconnect Vivian's computer from the network.

Which of the following Mac features is used to launch apps, switch between running apps, access the Trash, and access specific folders?

Dock

Which of the following keeps track of various network devices while ensuring that the software is secure?

Endpoint management server

Which of the following Windows 11 Enterprise edition versions is specifically intended for organizations that want to use cloud-delivered endpoint security?

Enterprise E5

You have just visited a website on your mobile device when your web browser locks up, and you receive a warning that your device has a virus. You are given a phone number to call to remove the virus. Which of the following describes the type of malware symptom that you are MOST likely experiencing?

False security warning

You have decided to use the Apple Remote Disc feature to share CDs and DVDs among employees on your company headquarters office network. Which of the following DVDs can you share with the employees using Remote Disc?

Financial application documentation

You are trying to connect from outside the company network to a server inside the company network using RDP (Remote Desktop Connection). However, the connection is failing. Which network device does your network administrator MOST likely need to configure to allow this connection?

Firewall

For some time now, you have been using an application on your Windows 11 computer at home and while in the office. This application communicates with the internet. Today, your team lead decides to have a special team meeting at a local hotel. During this meeting, you obtain access to the internet using the hotel's network, but when you try to run your application, it cannot communicate with the internet. Which of the following Windows settings is MOST likely causing this behavior?

Firewall & security

As a network administrator for your company, you want to set up a network device that manages traffic leaving and entering your network from the outside. Which of the following would BEST meet your requirements?

Forward proxy server

What is normally disabled by default on most Linux servers?

GUI

Which of the following keys let you switch between keyboard languages?

Globe key

Two employees are unable to access any websites on the internet, but they can still access servers on the local network, including those residing on other subnets. Other employees are not experiencing the same problem. Which of the following actions would BEST resolve this issue?

Identify the proxy server name and port number in Internet Options.

Which of the following is a best practice when using Remote Desktop Protocol (RDP) to access another computer?

Implement additional security protocols.

A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria and be cost effective: No one from the internet should be able to access her internal network. Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. Employees access to non-work-related websites, especially sites that contain inappropriate content, should be blocked. A system should be put in place to detect and prevent external attacks on her network. Which of the following would BEST meet your client's criteria?

Implement an all-in-one UTM security appliance.

You are currently running the latest version of Windows 10 on your laptop. You want to install Windows 11 to take advantage of several new features. However, you have critical data on the OS hard drive that you want to preserve while installing Windows 11. Which of the following installation methods should you use?

In place upgrade

You would like to control internet access based on user, time of day, and websites visited. Which of the following actions would BEST meet your criteria?

Install a proxy server. Allow internet access only through the proxy server.

Which of the following processors allowed macOS users to run Windows on their computers?

Intel

Which of the following all-in-one security appliance (UTM) functions detects intrusions and alerts the network but does not block traffic?

Intrusion detection

Which mobile device vulnerability results in a user unlocking all of a mobile device's features and capabilities?

Jailbreaking

Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform for applications to run on. What is the name of this core component?

Kernel

You are creating a Linux program that needs to write data to a hard disk. In order to save time, you decide to have your program call a pre-written code element that tells the operating system to perform the task. What is this focused pre-written code element called?

Library

Which of the following Linux software applications provides word processing, spreadsheets, and presentations?

Libreoffice

Ruth has a startup business and limited resources. She wants to save money by using an operating system on her business computers that has no associated fees for installation. Which of the following operating systems could Ruth install for free?

Linux

Which of the following is an open-source operating system?

Linux

Which of the following must specifically be modified to embed Linux within intelligent devices (such as smart TVs and tablets)?

Linux operating system

Which of the following vendors offers the largest variety of editions for its operating system?

Microsoft windows

Linux has been a mainstay operating system in server rooms for many years, and it has grown even more pervasive in recent times. Which of the following types of devices has Linux taken over a large percentage of the market for?

Mobile devices

Gestures are specific finger motions that are used to perform specific functions on a macOS system. Apple systems use the multi-touch trackpad, the Magic Mouse, or the touchscreen to perform these motions. Drag each macOS hand gesture on the left to its associated function on the right.

Navigate between pages in a document Slide two !ngers left or right Zoom in Spread two !ngers apart Scroll Slide up or down using Right-click Tap with two !ngers Display all windows for the active app Slide four !ngers straight down

Match each Windows 11 edition on the left with the correct description on the right.

Only offers Windows' 11 most basic features. home Intended for most business professionals. pro Intended for those whose work requires high-end hardware for intense computing. pro for workstations Intended for large organizations that have IT professionals managing the systems. Enterprise

You want to be able to access your home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. Which of the following is the BEST solution to your problem?

Open the firewall port for the Remote Desktop protocol.

Which of the following is software that allows a user to access a computer's memory, file system, processes, and hardware?

Operating system

Which of the following is a type of firewall?

Packet filtering

There are several cloud computing options available for Linux. Drag the cloud computing option on the left to its appropriate description on the right.

Provides access to software and data through the cloud. SaaS Provides access to storage devices through the cloud. STaaS Provides network connectivity through the cloud. NaaS Provides access to virtual machines through a network connection. Iaas

An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would MOST likely provide this service?

Proxy server

Which of the following are the FIRST settings you should check if you suspect that a malware attack has impacted your internet connection? (Select two.)

Proxy settings DNS settings

Which of the following are likely symptoms of a malware infection? (Select two.)

Renamed system files. Changed file permissions.

As a network administrator for your company, you want to set up a network device that manages internal traffic between servers and clients. Which of the following would BEST meet your requirements?

Reverse proxy server

An employee calls to complain that their browser keeps opening up to a strange search engine page, and a toolbar has been added to their browser. Which of the following malware issues are MOST likely causing the problem?

Software issues

A macOS user has forgotten the location of an important spreadsheet document. Which macOS feature could they use to find the spreadsheet?

Spotlight

Which of the following best describes the GNU General Public License (GPL) that is associated with the Linux kernel source code?

The Linux source code remains freely available to anybody who wants it.

Jack has a small retail business. He had a custom application developed for his inventory tracking. All of Jack's company computers have an operating system on them that will soon reach end of life because a newer version was released two years ago. Jack is afraid that his custom inventory application won't be compatible with the new version of the operating system. Which of the following is a risk that Jack is taking if he continues to use the operating system after its end of life?

The OS will become increasing vulnerable to cyberattacks.

Your company is creating a financial application that you want to first test on mobile devices. Several customers have asked to be part of the beta testing process. What do the employees need to do on their mobile devices in order to be able to participate in the beta test?

Turn on Developer Mode.

Which of the following are popular Linux OS distributions? (Select three.)

Ubuntu SUSE Debian

While browsing the internet, a pop-up browser window comes up, warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the BEST next actions to take? (Select two.)

Update the virus definitions for your locally installed anti-malware software. Run a full system scan using the anti-malware software installed on your system.

You want to perform an upgrade from Windows 10 to Windows 11 on your laptop computer without going directly to a website or external source to retrieve or access the upgrade package. Which of the following should you use?

Updates and Security

Which of the following Windows desktop components lets you create multiple desktop to organize availability for different sets of applications?

Virtual desktop

Which of the following proxy server roles allows users to connect to the internet anonymously with their data encrypted during transmission?

Vpn

Which of the following is currently the most in-use operating system in the world?

Windows

As the IT administrator for a small consulting firm, you want all the computers in the company office to be able to share files, printers, and local network resources. There are currently 15 computers in the office. Which of the following Windows features could you implement that would MOST closely match your network requirements?

Workgroup

In which of the following situations should you install a firewall?

You want to restrict internet users from accessing private data on your network.


Set pelajaran terkait

(Week 12) Supply chain management

View Set

Genetics Final Exam Review (Old material)

View Set