ITN 106 Midterm Study
Organize the following network types from smallest to largest:
-PAN -LAN -MAN -WAN
Which of the following is as wireless internet connectivity method that uses cellular technology?
3G
The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access. What is the first step that should be taken to secure the wireless router?
Change default username and password.
Which of the following OS can be modified and the source code redistributed?
Chrome OS
What is the use of an RJ-11 connector?
Commonly used for telephone networks. Used for DSL and Dial-Up and connects to a Modem.
DNS
Domain Name Service. nslookup command is useful for testing name resolution issues with DNS servers by requesting info from the DNS server's zone data.
Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information for making payments at a retail checkout counter. The technology also allows the marketing team to share data quickly. What technology is set up on the marketing team's phones?
NFC - Near Field Communication
A technician requires a file system on an internal 1.5 TB Windows 10 boot drive that supports file encryption, disk quotas, and security features such as file and folder permissions. Which of the following will support these requirements?
NFTS
Jennifer has an iPod that she has not used for six months. She wants to move the music and pictures from the iPod to her new iPhone. She tries to access the iPod using her four-digit code, but the passcode does not work. She tries to use two other codes, but neither work. Obviously, Jennifer does not remember the passcode. What solution does Apple provide that will help Jennifer recover the passcode for her iOS device?
Reset the device and restore the data from iCloud or iTunes.
What is a snapshot of the system settings and configuration called?
Restore Point
What does an RJ-11 connector look like?
See image
TKIP
Temporal Key Integrity Protocol. generates a different key for every transmission. The encryption algorithm used for its calculations are no longer considered secure. It is essentially obsolete.
Ping -a
Tests for name resolution. Displays host name and verifies DNS is working.
A user is attempting to format a 4 TB HDD using NTFS but only has the option to format the disk with a size of approximately 2 TB. What is the most likely reason the user is unable to format the disk to its full capacity?
The disk is using the MBR partitioning scheme
A technician would like to have the ability to add physical hard drives to a Storage Spaces storage pool at future times on an as-needed basis. Which of the following Storage Spaces features describes this functionality without the need to also reconfigure the available space to users?
Thin provisioning
Ping 127.0.0.1
This is a loopback test. 127.0.0.1 always refers to the local computer. If it does not respond, there is a problem with the network connection's configuration.
Which of the following windows commands will delete the files and directories at the destination location that no longer exist at the source location?
robocopy /purge
What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video?
Accelerometer
A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure?
Address Reservation
AES
Advanced Encryption Standard. The current encryption algorithm used today and the strongest encryption standard used by Wi-Fi.
Parental Controls
Allows parents to manage content and what is allowed from the Internet, as well as monitor websites and content accessed.
You want a method of authentication for company-owned mobile devices in which users are required to use two-step authenticatino. Which of the following will best assist you in meeting this requirement?
Authenticator Apps
MAC Filtering
Before letting any device join the network, the router checks the device's MAC address against a list of approved addresses.
A client is requesting an internet connection type that is not affected by atmospheric conditions and is always on. Which of the following will meet these requirements?
Cable
Ping
Can assist with connectivity testing. Useful for verifying that a DNS is working.
Ping -t
Causes pinging to continue until interrupted. Ctrl+Break displays statistics. Ctrl+C stops pinging.
A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician must protect the customer's private network from unauthorized access while performing initial router setup. What is the best step to take to ensure the router is secure?
Change the router's default administration password.
DSL Modem
Converts a computer's digital signals to analogy when sending them and converts the incoming analog data to digital, but is connected through the phone line and is a dedicated circuit.
Cable Modem
Converts a computer's digital signals to analogy when sending them and converts the incoming analog data to digital. Connected to cable lines, which share infrastructure in an area and are not dedicated circuits.
A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at this new home-based business. Which of the following SOHO routers will simplify IP address configuration on the private network for both wired and wireless clients?
DHCP Server
You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN. Which of the following features will you configure on the SOHO router to accomplish this task?
Demilitarized Zone
On a Windows computer, which tab can be used in Task Manager to set the priority given to a specific application or service?
Details
Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than your company computers have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone.What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.)
Disable SSID broadcasting Lower radio power levels Enable MAC filtering.
Mary, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel. Which of the following is often configured as a required step for a user each time she attempts to use a VPN connection?
Enter the same user name and password used on the corporate network.
Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps?
Fourth-generation cellular
Mark has been asked to set up several smart phones to connect to his company's email server. The company wants Mark to set them up so they can be synchronized between multiple devices. What protocol should Mark use to set up company Smartphones?
IMAP
Jackson is setting up an IoT thermostat in his home. He has set up the IoT controller on his phone to control the device. What else does Jackson need in order for the thermostat to be considered an IoT?
IP Address App to control it over the Internet
Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?
If a DHCP server is not available, the workstation will have a valid IP address on the subnet.
Mobile Hotspot
If a smart phone has Wi-Fi capabilities, it can create its own Wi-Fi hotspot for other computers and devices to connect wirelessly. The carrier subscription must allow it.
A manager in a small office is asking if it is possible to limit access to a website during business hours. Which of the following is the best solution to accomplish the request from the manager?
Implement a blacklist on the firewall and add the desired site.
Wearable Technology Device
Includes smart watches, wristbands, arm bands, eyeglasses, headsets, clothing, tracking tags, and even cameras. Often includes fitness monitoring. They can sync with a computer and transmit data.
What does an RJ-45 connector look like?
See image
Sam cannot figure out why they can't get sound from their tablet's internal speakers and calls you asking for advice. You ask them to check to see if anything is stuck in the aux port, but nothing is there. They also check to make sure the sound is not muted. What might prevent Sam from getting sound from their tablet?
The audio output is being directed to a bluetooth speaker.
A technician removed several instances of malware from a customer's Windows PC. Now when the user double clicks .doc files, an error message appears asking what program to use. Which of the following is most likely causing this error?
The malware removal process changed the file association for the .doc file type.
A manager in your company wants to standardize all mobile device applications across different operating systems. Some users have Android and other iOS. How can you best answer the manager with this request?
The manager must settle on using a single mobile operating system.
A technician is troubleshooting a Windows system in which an application works properly when the computer is booted in Safe Mode, but does not function when Windows is loaded normally. Which of the following is the most likely reason for this issue?
The operating system or driver is causing the issue.
A technician is troubleshooting a Windows computer and needs to stop the explorer.exe process. Multiple attempts to open Task Manager have failed. The technician can open a command prompt. Which of the following steps should the technician take next?
Use tasklist utility to locate the PID for the explorer.exe process.
A remote worker wants to connect his computer through his corporation's private trusted network over the internet. What will need to be configured?
VPN Tunnel
A group of wireless devices are using each other as relays to share a network over a large area. Which of the following network categories is being used?
WMN - Wireless Mesh Network
You are tasked with configuring a wireless SOHO router for a customer. Which setting is most secure with least effort and cost to the customer?
WPA2-PSK, AES
WPA2
Wi-Fi Protected Access 2. Also called 802.11i standard. This is the current wireless security standard. WPA2 uses AES (Advanced Encryption Standard), which provides faster and more secure encryption than TKIP. All wireless devices sold today support WPA2.
WPA3
Wi-Fi Protected Access 3. Offers better encryption and additional features over WPA2, such as securely configuring a nearby wireless device, like a webcam or motion sensor, over a wireless network, eliminating need to connect the device with a wired connection to configure it. Also allows Individual Data Encryption, which allows a secure connection for a wireless device over a public, unsecured wireless network.
WPA
Wi-Fi Protected Access. Stronger than WEP and designed to replace it. Typically uses TKIP (Temporal Key Integrity Protocol) for encryption. TKIP generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure.
A corporate user is attempting to connect the company's windows domain server on the local network with her new laptop through a wired connection. Which of the following is required for the user to successfully sign in to the Windows domain?
Windows Domain username and password.
WEP
Wired Equivalent Privacy. No longer considered secure because the key used for encryption is static.
Your company wants to use an IoT device but wants to ensure that it does not interfere with other RF devices that use the 2.4 GHz RF band. The company also wants the device at least 50 meters away from the base station. What type of device should the company purchase?
Z-Wave
A Windows 10 user wants to display all files in all subdirectories on the E: drive with the file extension doc. What command would perform this function?
dir e:\*.doc /s
A technician is troubleshooting a Windows BSOD error. The technician wants to check the memory installed in the system. Which of the following tools is used to launch the Windows Memory Diagnostic tool?
mdsched.exe
A technician is performing Windows preventive maintenance on all computers in an organization. She wants to create a custom console containing only the tools she regularly launches and then distribute to this custom console to each computer. Which of the following Windows tools will allow the technician to configure a custom console?
mmc.exe