doj rep II to three

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How many channels are available with IEEE 802.11g

11

All 802.11 standards use one of two frequency bands. What are these frequency bands

2.4 ghz to and 5 ghz

You are using a modem emulator to test a DOCSIS 3.0 256-QAM downstream signal. What is the minimum acceptable signal-to-noise ratio (SNR)?

30 dB minimum

Unfortunately, it is often necessary to protect information on a computer from other employees. What are some measures that can protect against employee snooping?

Account lockout threshold, account lockout duration, and reset account lockout counter.

What can help you manage your laptop energy and performances?

Adjust Windows Power Options. ... Reduce The Brightness Of Your PC. ... Put Your PC Into the Sleep Mod. ... Close Unnecessary Programs. ... Use a Power Efficient Browser & Close Unrequired Tabs. ... Turn Off Bluetooth And Wi-Fi. ... Change Your Hardware. ... Use External Devices When Required.

When setting up a wireless access point, you should do which of the following?

Enable the SSID and change its name Use a site survey tool to help locate an unoccupied channel Change the network key or password Use WPA2 encryption

If a modem has used a dial-up connection to an Internet service provider, the connection is enabled when the system boots up

False

On a personal computer which is the deepest mode that takes the longest to get out of?

Hibernate

What is the mobile operating system for Windows?

It is not to be confused with Windows 10 Mobile, Windows Phone, or Microsoft Mobile. Windows Mobile was a family of mobile operating systems developed by ...

What type of Bluetooth profile is being used when two personal devices are sharing files?

LAN Access Profile (LAP)

What are some configurations of a web browser application such as Microsoft's Internet Explorer (IE) that can be adjusted

The browser home page, security, and privacy.

Just like desktop computers, expansion carts can also be added to a laptop. What type of expansion card has been used in most laptop computers since 2005?

Type 3 PC card.

What is it called when several computers are sharing files without a WAP

ad hoc mode

Although likely to be made obsolete by universal serial bus (USB), PC cards and Express cards are still being used. Of the three types of PC card and three types of Express card currently in use, which is used mostly as an external hard drive?

· Type 3 PC card.

Just like a desktop computer, expansion cards can also be added to a laptop. What type of expansion card has been used in most laptop computers since 2005?

Mini-PCIe card.

What can plug into a laptop's USB port and provide an interface to the monitor, mouse, and keyboard?

Port replicator

This protocol is used for sending email. It uses TCP port 25

SMTP

This protocol sends packets between devices to ensure a connection

TCP

What is one of the most important things you can do when working inside a laptop computer?

Wear an santi electrostatic discharge wrist band

Which encryption method is the most secure for a wireless network?

Wpa2

What is the payment service for Apple?

Apple Pay

What uses the 2.4-GHz band and runs at 54 Mbps?

802.11g

Dial-up Internet service, once the primary method of connecting to the Internet, has been supplanted by broadband Internet, but is still used by some people. What is a requirement in order to have dial-up Internet service?

A dial-up Internet service provider (ISP) subscription and phone number that the user can dial into.

Most households and small businesses in the United States use tier three Internet service providers (IPS) for Internet access. What qualifies an ISP as a tier three provider?

A dial-up Internet service provider (ISP) subscription and phone number that the user can dial into.

You discover that an amplifier is blocking the return path. What type of amplifier is this?

A one-way house amplifier.

Which mode uses a wireless access point (WAP) connected to a wired network?

Infrastruce

There are three primary protocols for sending and receiving email simple mail transfer protocol (SMTP), post office protocol version 3 (POP3), and Internet Message Access Protocol version 4 (IMAP4). Which are send-only and receive-only email protocols?

SMTP is used for sending email. POP3 and IMAP4 are both used to receive email using different ports.

Which encryption method is the most secure of a wireless network?

WPA2 uses the Advanced Encryption Standard (AES) which is also used by the U.S. government to protect classified documents. This is the strongest level of security you can provide for your home wifi network.

The customer is reporting delays when he plays Internet games. What is likely the cause of the problem?

What Is Latency

Which of the following is a true statement?

Which of the following is a true statement?

What is one of the most important things you can do when working inside a laptop computer?

wear an anti electrostatic discharge wrist band

What wireless connection would you use to connect a tablet to a cellular phone so that the phone acts like a hotspot for the tablet?

wifi

What is the standard encryption method used with WPA2?

AES

Which of these is important for security of data and operability with an Android tablet?

Anti-malware

What are the type of laptop screen backlight?

LED - is a current backlighting system which does not use an inverter, and instead of a fluorescent tube it uses a strip of LEDs (

Docking stations and port replicators enable a laptop to be used as a desktop computer with a standard monitor, mouse, wired network connection, and keyboard. What is the biggest difference between a docking station and a port replicator

Most docking stations require proprietary connections, whereas port replicators plug into the laptop' universal serial bus (USB) ports.

Of the four categories of laptops, which tends to have a low or starter edition of Windows and a low-power 32-bit processor

Net book

What is the first step of the wireless access point (WAP) setup?

One of the big first steps you're going to be doing with any wireless access point is going ahead and setting it to a static IP address. Now, on this particular router, because it's also my router, the LAN IP address is already set to 10.11.

Occasionally, it can become necessary to take a computer of service for legal purposes. What should be the first step in a chain-of-custody protocol?

Anti-malware programs inspect data coming into the computer system for malware and then prevent infected programs from entering the system.

How do anti-malware programs work?

Antivirus software usually works on one of two principles: Either it scans programs and files as they enter your device and compares them to ...

Where doWhat is the place called, in windows Mobile, where you can download an application?you go to get applications for an iOS device?

App Store

What is the last step of the basic wireless access point (WAP) setup?

Apply security.

What parameters are set in the Windows operating system Account Lockout Policy?

Biometrics and RSA, a public-key cryptography algorithm used in encryption systems.

How can you avoid extra charges for traveling info coverage areas not covered by your cellular phone plan?

Data Roaming

In regard to Wi-Fi networks; what is WPS used for?

It is designed to make the process of connecting to a secure wireless network from a computer or other device easier.

The customer accidentally nicked the cable while moving some patio furniture. What trouble might this cause with the high-speed data service?

Lost Packets.

What are some configurations of a web browser application such as Microsoft's Internet Explorer (IE) that can be adjusted?

SMTP is used for sending email.The browser home page, security, and privacy.

There could be times when it becomes necessary to work inside a laptop for upgrades or to make repairs. Because the inside of a laptop is so dense, what should be done to help ensure that everything goes back into place afterwards?

Sketch out or take pictues of the laptop interior before dissembling

What kind of firewall can be instructed to perform specific actions such as blocking a port or blocking a computer from accessing the Internet at a specific time of day?

Stateful Inspection Firewall

What feature is part of most routers used for small office/home office (SOHO) applications?

Stateless. Most SOHO routers can be configured to capture or block malicious programs and email coming off the Internet before they can infect a connected computer system.

What could the result of unnecessarily amplifying the high-speed data return path?

System noise fluctuations may cause disruptions to high-speed data service.

What are two common remote access applications that enable remote access into a computer system for maintenance and retrieval of data using command line prompts?

Telnet and Secure Shell (SSH).

What uses the 5-Ghz band and runs at 1 Gbps?

The 802.11ac standard uses the 5 GHz frequency and supports data transmission speeds up to 1.3 Gbps.

What used the 2.4 GHz band and runs at 54 Mbps?

The 802.11g standard uses a frequency band of 2.4 GHz and has a maximum bandwidth of 54 Mbps.

Your cable system is a DOCSIS 1.1. Your customer has a DOCSIS 3.0 modem. Which of the following is a true statement?

The DOCSIS 3.0 modem will work on the DOCSIS 1.1 system, but a DOCSIS 1.1 modem will not work on a DOCSIS 3.0 system.

In regard to Wi-Fi networks, what is WPS used for?

To enable connection to a Wi-Fi network without a Windows interface.

Data sent using this protocol is sent without confirmation of its receipt

UPD

Which laptop category inspired by Apple MacBook Air uses solid state storage and offers plenty of random access memory (RAM)

Ultra book laptops

Remote desktop protocol (RDP), Telnet, and Secure Shell (SSH) enable remote access into a computer system for maintenance and retrieval of data. What separates RDP from Telnet and SSH?

Unlike Telnet and SSH, RDP provides a graphical view of the remote computer desktop, includes mouse operation, and runs on port 3389.

Configuring a computer with individual user accounts is considered a best practice in order to limit the amount of damage an individual user can inflict upon a computer system. What guidelines should be followed when configuring a computer' individual user account

Use a firewall. ... Keep all software up to date. ... Use antivirus software and keep it current. ... Make sure your passwords are well-chosen and protected. ... Don't open suspicious attachments or click unusual links in messages. ... Browse the web safely. ... Stay away from pirated material. More items...

Which of these is not an 802.11 standard used with computers?

Which is not an 802.11 wireless standard? 802.11a is incompatible with the 802.11b and 802.11g wireless standards. IEEE 802.11b: The 802.11b standard provides for a maximum transmission speed of 11Mbps. However, devices are designed to be backward-compatible with previous 802.11 standards that provided for speeds of 1, 2, and 5.5Mbps

What is the place called, in windows Mobile, where you can download an application?

Windows 10 Mobile. What is the mobile operating system for Windows?

What Windows service can be used to convert a computer into a router that shares an Internet connection with other computers on a network?

Windows Internet Connection Sharing (ICS).

An Internet connection in which one computer is connected to the Internet and acts as a router for another computer that is not connected to the Internet best describes

Windows Internet Connection Sharing.

What is it called when several computers are sharing files without a WAP?

ad-hoc mode

Dial-up Internet service, once the primary method of connecting to the Internet, has been supplanted by broadband internet, but is still used by some people. What is a requirement in order to have dial-up Internet service?

but with substantially relaxed constraints.

The two biggest issue in connection to the Internet are domain name system (DNS) server problems that prevent connections to web pages and slow connections. What are two utility programs that can be used to identify processes that can extend network usage?

domain name system (DNS) server problems that prevent connection to web pages and slow connections.

Which energy saving mode copiers RAM to disk and powers off everything?

hibernation

Which energy saving mode copies RAM to disk and powers off everything?

hibernation

What is iOS?

iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. It is the operating system that ...

. Why is the Datagram Protocol (UDP), considered a connectionless protocol?

it doesn't require a virtual circuit to be established before any data transfer occurs. The communication protocol just sends the packets, which means it has much lower bandwidth overhead and laten

What other uses do 3.5 mm audio jacks on a mobile communication device have besides outputting audio?

open-source operating system

When configuring a computer's email, what transmission control protocol (TCP) port number should be used for simple mail transfer protocol (SMTP)?

port 25

You want to test the return path within the customer premises. Which tester requires that you detach the drop at the tap or ground block?

signal generator

What are two common remote access applications that enable a remote access into a computer system for maintenance and retrieval of data using command line prompts?

tellnet and secure shell ssh

.When would a two-way house amplifier be appropriate in a high-speed data installation?

to eliminate or minimize ingress/noise that originates in the customer premises? A. Two-way house amplifiers, window


Set pelajaran terkait

Computer Applications 2019 Midterm

View Set

Oncology NCLEX practice questions copy

View Set

2.8 - 3.8 AP GOV (second half of the trimester)

View Set

Rutgers Supply Chain Management Chapter 4

View Set

Primerica HEALTH insurance (some General Life questions included)

View Set