CC Final Exam Practice

Ace your homework & exams now with Quizwiz!

Processes take up disk space while programs take up memory.<br><br>TRUE<br>FALSE [sound:google-a5b4f4eb-6ab41676-ada8e30c-a9f5a9e1-92a9da0c.mp3]

"FALSE<br><br>While a computer program is a passive collection of instructions typically stored in a file on disk, a process is the execution of those instructions after being loaded from the disk into memory.<br>https://en.wikipedia.org/wiki/Process_(computing)#:~:text=While%20a%20computer%20program%20is,from%20the%20disk%20into%20memory.&nbsp;"

The motherboard is a piece of hardware that interconnects all of the different components (such as CPU, RAM, disk drives, and power supply) inside of a computer and is typically fastened to the case.<br><br>TRUE<br>FALSE [sound:google-573b6d95-e2db65c9-13405743-a36c1c55-308e122f.mp3]

"TRUE<br><br><span style=""background-color: rgb(255, 255, 255);"">A motherboard is the main printed circuit board in general-purpose computers and other expandable systems. It holds and allows communication between many of the crucial electronic components of a system, such as the central processing unit and memory, and provides connectors for other peripherals.<br></span>"

The following IP address is valid: 10.255.250.222<br><br>TRUE<br>FALSE [sound:google-63bd72dd-270418b0-84561850-9522ec15-553ce6f9.mp3]

"TRUE<br><br><span style=""background-color: rgb(255, 255, 255);"">Each octet (section) must contain a number between 0 and 255.<br></span>"

You are starting a business and need some infrastructure to house your applications. You don't expect much traffic in the first few months, but expect a large surge of traffic and new users around Q3. Leveraging a cloud solution would be a good idea in this scenario?<br><br>TRUE&nbsp;<br>FALSE [sound:google-8b0a36a7-c39acaab-1a93be1d-96b2b845-bc03c9dc.mp3]

"TRUE<br><br>Azure and other cloud platforms typically implement a ""Pay-as-you-use"" model. Pay-as-you-use (or pay-per-use) is a payment model in cloud computing that charges based on resource usage. The practice is similar to the utility bills (e.g. electricity), where only actually consumed resources are charged.<br><br>"

You receive the following tickets. Which ticket do you address and/or route to the proper team first?<br><br>a) Darryl in Sales has been locked out of his account<br>b) Jimmy in Marketing has been locked out of his account<br>c) Suzie in Engineering has been locked out of her account<br>d) Sijia in Accounting has been locked out of her account<br><br>Since all the tickets are of similar impact in nature, you decide to process them in the order they were created.<br>This was probably the best course of action.<br><br>TRUE<br>FALSE [sound:google-995a8bad-eaa6b4a4-4e2cd2d7-79ee897d-d4b3d10d.mp3]

"TRUE<br><br>Because all of the tickets are relatively similar, assuming they are all ""normal"" employees/individual contributors (non-management/non-executive), you can prioritize based on intake time (when the tickets were created)."

Within Azure, what would you normally use to segregate/separate the cost of resource consumption between your organization's departments?<br><br>a) Subscriptions<br>b) Resource Groups<br>c) Management Groups<br>d) Virtual Networks [sound:google-4a9f52b9-cc932e26-60852fbb-0758550e-970d2f3b.mp3]

Subscriptions<br><br>A subscription is an agreement with Microsoft to use one or more Microsoft cloud platforms or services, for which charges accrue based on either a per-user license fee or on cloud-based resource consumption.<br>You can have multiple subscriptions per Tenant/Organization. For example, you can have a subscription for every department to better track expenses.&nbsp;

Convert the following binary number into human readable format: 0000 1110<br>HINT: 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1<br><br>a) 12<br>b) 13<br>c) 14<br>d) 15 [sound:google-0c06f6b1-9aa05047-982bfa4b-746e851d-f0ff4f75.mp3]

c) 14<br><br>Looking at the hint, simply add up the numbers where there is a '1' to get the result in decimal.<br>Example: 0 + 0 + 0 + 0 + 8 + 4 + 2 + 0 = 14<br>

___________ should be strongly considered when trying to prioritize help desk tickets<br><br>a) The name of the user<br>b) Your relationship with the user<br>c) SLA (Service-Level Agreement)<br>d) Department budget [sound:google-09f823d3-bc45d2fd-edbe3d75-2294c78b-17c783e1.mp3]

c) SLA (Service-Level Agreement)<br><br>The SLA (Service-Level Agreement) is a commitment between a service provider and a client. Particular aspects of the service - quality, availability, responsibilities - are agreed between the service provider and the service user. Depending on your organization, you might have an SLA in place that certain tickets must be responded to and/or resolved within a certain time period.<br>

Convert the following binary number into human readable format: 0000 1111<br>HINT: 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1<br><br>a) 12<br>b) 13<br>c) 14<br>d) 15 [sound:google-bb92ce22-29896d9f-0021e0af-771cc119-0e0203da.mp3]

d) 15<br><br>Looking at the hint, simply add up the numbers where there is a '1' to get the result in decimal.&lt;br&gt;Example: 0 + 0 + 0 + 0 + 8 + 4 + 2 +1 = 15<br>

Convert the following binary number into human readable format: 1111 1110<br>HINT: 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1&nbsp;<br><br>a) 0<br>b) 255<br>c) 1<br>d) 254 [sound:google-418a9d8a-677c6015-94deae25-4f0ae5a2-a8fc0455.mp3]

d) 254<br><br>Looking at the hint, simply add up the numbers where there is a '1' to get the result in decimal.<br>Example: 128 + 64 + 32 + 16 + 8 + 4 + 2 + 0 = 254<br><br>

Which operating system is MOST LIKELY to be found on a smart refrigerator?<br><br>a) Microsoft Windows<br>b) Google Android OS<br>c) Apple iOS<br>d) Some version of Linux [sound:google-f0ccdf8b-455e888e-359aea71-4bf1802a-6e65c16e.mp3]

d) Some version of Linux<br><br>Operating systems based on the Linux kernel are used in embedded systems such as consumer electronics. Linux is open source and is various versions of it are found in many IoT (internet of things) and smart devices.<br>

Which of the following systems typically contain a motherboard within them?<br><br>a) Desktops<br>b) Servers<br>c) Laptops<br>d) Mobile Devices/Smart Phones<br>e) All of the above [sound:google-e3122fb8-f3e8aae8-a4f0454f-a016337f-7cefa62d.mp3]

e) All of the above<br><br>Even though the shape may be different, all of the systems described in the question have a motherboard as well as most other core components (such as CPU, RAM, and some type of power supply).&nbsp;

What is the CIDR notation for the following Network ID and Subnet Mask?<br>Network ID: 10.10.10.0<br>Subnet Mask: 255.255.0.0<br><br>a) 10.10.10.0/8<br>b) 10.10.10.0/16<br>c) 10.10.10.0/24<br>d) 10.10.10.0/32 [sound:google-e84328dd-eb0c4674-57e46316-db91b921-b488bdb4.mp3]

b) 10.10.10.0/16<br><br>CIDR notation specifies an IP address, a slash ('/') character, and a decimal number. The decimal number is the count of consecutive leading 1-bits (from left to right) in the network (subnet) mask.<br>

You create a resource group along with two virtual machines (VMs) within your Azure Subscription. You use the virtual machines to do a lab, then finish up. When you are completely finished with your labs and no longer need to use the VMs, what should you consider doing next?<br><br>a) Leave the VMs there, turned on, in case you need to use them in the future.<br>b) Delete the resource group along with all the VMs, as their mere existence on the platform will continue to slowly rack up costs and/or deplete your free Azure credits.<br>c) Turn the VMs off, but leave them provisioned within your subscription. If they are off, they won't cost anything.<br>d) None of the above.

b) Delete the resource group along with all the VMs, as their mere existence on the platform will continue to slowly rack up costs and/or deplete your free Azure credits.<br>

What ports does DHCP (Dynamic Host Configuration Protocol) typically use?<br><br>a) TCP Ports 80 and 443<br>b) UDP Ports 67 and 68<br>c) TCP Ports 20 and 21<br>d) TCP Ports 22 and 23 [sound:google-2e1c55ba-cc6730b5-c7759f4b-7d645fa9-9408667f.mp3]

b) UDP Ports 67 and 68<br><br>The DHCP employs a connectionless service model, using the User Datagram Protocol (UDP). It is implemented with two UDP port numbers for its operations which are the same as for the bootstrap protocol (BOOTP). UDP port number 67 is the destination port of a server, and UDP port number 68 is used by the client.<br>

"You are troubleshooting network connectivity issues on a users computer. They can browse the Internet and most other things seem to work, but the user is unable to access resources on a certain internal server (Server-A). You suddenly remember that Server-A got moved to a different portion of the network recently and probably has a new IP address. You decide to issue the ""ipconfig /flushdns"" command to fix the issue. This was probably a good course of action.<br><br>TRUE<br>FALSE [sound:google-f41fb08d-56ed5173-dc6732cb-52076874-4950a7ea.mp3]"

"TRUE<br><br>Since the user can browse the internet and most other things seem to be working, you can assume the issue might be isolated to something having to do with Server-A specifically. Since you know the IP address of Server-A has changed recently, it's possible the old IP address is still in the user's local DNS cache (which can be inspected with the command 'ipconfig /displaydns'). Flushing the DNS cache with the command 'ipconfig /flushdns' will clear the local cache and force their computer to query DNS for the latest IP address. This is a difficult question, so consider reviewing the ""Common Tools"" video lesson.<br>"

It is possible to save money by using Virtual Machines.<br><br>TRUE<br>FALSE [sound:google-f5b40c40-d0b48922-593ed87d-97d7caf8-1f5b8a08.mp3]

"TRUE<br><br>Virtual Machines (VMs) have all sorts of use cases that revolve around saving time/space/money.<br><br>In computing, a system virtual machine is a virtual machine that provides a complete system platform and supports the execution of a complete operating system (OS).[1] These usually emulate an existing architecture, and are built with the purpose of either providing a platform to run programs where the real hardware is not available for use (for example, executing on otherwise obsolete platforms), or of having multiple instances of virtual machines leading to more efficient use of computing resources, both in terms of energy consumption and cost effectiveness (known as hardware virtualization, the key to a cloud computing environment), or both. A VM was originally defined by Popek and Goldberg as ""an efficient, isolated duplicate of a real machine"".<br>"

The ipconfig (ifconfig in mac/linux) command is primarily used to show the network adapter's IP addressing and configuration.<br><br>TRUE<br>FALSE [sound:google-28fd22ff-d418637a-6ee88d5f-23f43083-c9d7fdbc.mp3]

"TRUE<br><br>ipconfig (standing for ""Internet Protocol configuration"") is a console application program of some computer operating systems that displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.<br>"

What ports do HTTP and HTTPS (Hypertext Transfer Protocol/Secure) typically use?<br><br>a) TCP Ports 80 and 443<br>b) UDP Ports 80 and 443<br>c) TCP Ports 20 and 21<br>d) TCP Ports 22 and 23 [sound:google-ec09294f-9bedbb8c-b725ed3d-20112840-09419f11.mp3]

"a) TCP Ports 80 and 443<br><br>HTTPS URLs begin with ""https://"" and use port 443 by default, whereas, HTTP URLs begin with ""http://"" and use port 80 by default.<br>"

What port does ICMP (Internet Control Message Protocol) typically use?<br><br>a) TCP Port 22<br>b) UDP Port 23<br>c) TCP Port 21<br>d) ICMP does not use a port [sound:google-1d53b668-74cf4db5-130bcc4d-a2f2324d-a5822eec.mp3]

"d) ICMP does not use a port<br><br>ICMP is a network-layer protocol. There is no TCP or UDP port number associated with ICMP packets as these numbers are associated with the transport layer above.<br>https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol#:~:text=ICMP%20is%20a%20network%2Dlayer%20protocol.%20There%20is%20no%20TCP%20or%20UDP%20port%20number%20associated%20with%20ICMP%20packets%20as%20these%20numbers%20are%20associated%20with%20the%20transport%20layer%20above.%5B3%5D [sound:google-6d775dce-8095d4bf-6d6ea294-2f4d02e5-8994e5a8.mp3]"

<div>The front of this card is blank.<br><a href='https://anki.tenderapp.com/kb/card-appearance/the-front-of-this-card-is-blank'>More information</a></div>

<div>The front of this card is blank.<br><a href='https://anki.tenderapp.com/kb/card-appearance/the-front-of-this-card-is-blank'>More information</a></div>

"A router traditionally sends traffic to different computers on the same network, while a switch sends traffic between separate networks.<br><br>TRUE<br>FALSE<br>https://www.cisco.com/c/en/us/solutions/small-business/resource-center/networking/network-switch-vs-router.html#~switches [sound:google-cf3864d6-69393330-5f7389ea-f8ca7b5f-3e0344bb.mp3]"

FALSE<br><br>A Router forwards traffic between different networks whereas a Switch forwards traffic between different hosts on the same network. Another way to put it, is a switch connects multiple devices to create a network, a router connects multiple switches, and their respective networks, to form an even larger network. These networks may be in a single location or across multiple locations. When building a small business network, you will need one or more routers.<br>

Microsoft Excel is what most large organizations use to keep track of, and provide access to all of their users.<br><br>TRUE<br>FALSE&nbsp; [sound:google-08453dc0-26642d4d-00c0c7a1-4da534ec-0e0be6b3.mp3]

FALSE<br><br>Active Directory is what most large organizations use to keep track of, and provide access to all of their users. A server running the Active Directory Domain Service (AD DS) role is called a domain controller. It authenticates and authorizes all users and computers in a Windows domain type network, assigning and enforcing security policies for all computers, and installing or updating software. For example, when a user logs into a computer that is part of a Windows domain, Active Directory checks the submitted username and password and determines whether the user is a system administrator or normal user.<br>

The nslookup command is often used during troubleshooting as a simple way to check connectivity between two devices on a network.<br><br>TRUE<br>FALSE&nbsp; [sound:google-90195714-c5d62f1e-b2257ed3-75502f1d-d3c934f7.mp3]

FALSE<br><br>Correct answer: Ping. ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It is available for virtually all operating systems that have networking capability, including most embedded network administration software.<br>

The ipconfig /flushdns command is primarily used when you want to figure out what another computer's IP address is if you know the name, or what the name is if you know the IP address.<br><br>TRUE<br>FALSE [sound:google-017027e5-e5380f07-67b1b802-029b1eff-7762271a.mp3]

FALSE<br><br>Correct answer: nslookup. nslookup (from name server lookup) is a network administration command-line tool for querying the Domain Name System (DNS) to obtain the mapping between domain name and IP address, or other DNS records.<br>

The following IP address is valid: 192.168.256.1<br><br>TRUE<br>FALSE [sound:google-a8602804-b92436dc-d9d9fdb0-0106c690-5830ac1d.mp3]

FALSE<br><br>Each octet (section) must contain a number between 0 and 255.<br>

The following IP address is valid: 33.322.198.197<br><br>TRUE<br>FALSE [sound:google-eb5ddd99-3fe7e197-01908c50-bb93a2dd-d8a60889.mp3]

FALSE<br><br>Each octet (section) must contain a number between 0 and 255<br>

"You are a cloud support engineer working on a complicated issue for a customer. You are being blocked from making any progress because you are waiting on another team to perform some tests for you. It's been 24 hours and there hasn't been any status updates or changes on the customer's ticket. You decide to reach out ot the customer every day even if no progress is being made. Your coworker notices this and advises against it as it is a ""waste of time"". Your coworker has offered some good advice.<br><br>TRUE<br>FALSE [sound:google-150d9ec8-fac6b4e6-3f8ac60e-3f192f9c-3a7325c5.mp3]"

FALSE<br><br>For cases that are taking longer than usual to solve, it's good to keep an open line of communication with the customer. This shows empathy and lets the customer know that you are on their side. You should keep an open line of communication to avoid the customer feeling neglected or minimized. Communicating no updates is better than radio silence.&nbsp;

"Your office is undergoing a hardware refresh to replace 1000 desktop computers and you are in charge of choosing the specifications. Overall performance (the ""speed"") of the system is paramount. You are trying to decide between a build with a 750GB HDD or a build with a 500GB SSD but the SSD build is $100 more. Your coworker urges you to go with the cheaper HDD build. This is the best choice for the given scenario.<br><br>TRUE<br>FALSE [sound:google-a0727464-c63728e5-95980266-6425f90c-0d4483d1.mp3]"

FALSE<br><br>General speaking, SSDs (Solid State Disks) have much higher performance in terms of seek time and read/write speeds than HDDs (Hard Disk Drives). HDDs have spinning platters and a mechanical arm which moves to read/write data, where as the SSDs have no moving parts and have better performance overall. SSDs are typically more expensive, but the question states that performance is paramount, so going with the SSD build is the best choice in this scenario.&nbsp;

Printers, keyboards, monitors, and speakers are all considered input devices.<br><br>TRUE<br>FALSE [sound:google-5414e950-a4dad47c-7de87a1d-77a6ff1a-53ea9477.mp3]

FALSE<br><br>I/O (input/output) devices are the items of hardware used by a human (or other system) to communicate with a computer. For instance, a keyboard or computer mouse is an input device for a computer, while speakers, monitors and printers are output devices.

"An IPv4 address has 3 octets.<br><br>TRUE<br>FALSE<br>https://en.wikipedia.org/wiki/IP_address#:~:text=IPv4%20addresses%20are%20usually%20represented,an%20octet)%20of%20the%20address. [sound:google-2e9133d1-8e657f9f-cba2366a-a5484f76-e42b98ea.mp3]"

FALSE<br><br>IPv4 addresses have four(4) octets. IPv4 addresses are usually represented in dot-decimal notation, consisting of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g., 192.0.2.1. Each part represents a group of 8 bits (an octet) of the address.<br>

Your organization issues laptops to its employees and has budgeted $1000 per year, per employee for any extra peripherals they may need. Alice from accounting has submitted a Help Desk ticket and is complaining that it takes forever for her to plug in and unplug her monitors and other peripherals from her laptop whenever she comes to or leaves work. You are considering several solutions for her and decide to tell her that nobody else's is complaining and to just continue what she is doing in order to save the company money. Given the budget and existing technology, this was the best course of action.<br><br>TRUE<br>FALSE

FALSE<br><br>Providing Alice with a docking station is a simple, cost effective solution. It is also stated that a budget was created for providing extra peripherals if needed.<br>

The following IP address is a PRIVATE IP address: 172.42.1.244<br><br>TRUE<br>FALSE [sound:google-20fbc817-f80703bd-8ea6904b-d725198b-c0180a45.mp3]

FALSE<br><br>Reserved private IPv4 network ranges:<br>10.0.0.0 - 10.255.255.255<br>172.16.0.0 - 172.31.255.255<br>192.168.0.0 - 192.168.255.255<br><br>

The following IP address is a PRIVATE IP address: 192.167.99.55<br><br>TRUE<br>FALSE [sound:google-19348083-ac8474a2-2927608f-ddd4eff6-c8a3f8b9.mp3]

FALSE<br><br>Reserved private IPv4 network ranges:<br>10.0.0.0 - 10.255.255.255<br>172.16.0.0 - 172.31.255.255<br>192.168.0.0 - 192.168.255.255<br><br>

The following IP address is a PRIVATE IP address: 99.99.99.99<br><br>TRUE<br>FALSE [sound:google-ed8cbf8a-aad43404-f464277b-7cf96300-9454ed42.mp3]

FALSE<br><br>Reserved private IPv4 network ranges:<br>10.0.0.0 - 10.255.255.255<br>172.16.0.0 - 172.31.255.255<br>192.168.0.0 - 192.168.255.255<br><br>

When working in help desk, communication and soft skill should always come second to technical ability.<br><br>TRUE<br>FALSE [sound:google-8636819c-004435d0-067ea544-81714a32-adb4cd13.mp3]

FALSE<br><br>Soft skills are incredibly important when working in Help Desk (and tech in general) and their importance should not be overlooked.&nbsp;&nbsp;

Within a computer system, the CPU, motherboard, graphics card, case fans, and disk drives all operate on 110v AC, unfiltered, straight from the wall.<br><br>TRUE<br>FALSE [sound:google-4e0c3b45-dea9915b-3ca4c965-8e4e02dd-c2af5ee0.mp3]

FALSE<br><br>While power comes from the wall, it is first filtered through the Power Supply Unit (PSU) before powering the components. A PSU converts mains AC to low-voltage regulated DC power for the internal components of a computer.<br>

You receive the following help desk tickets at the beginning of your shift:<br><br>a) Accounting department (5 individuals) are unable to access a file share. They have a work around, but requires them to spend extra time<br>b) The CEO of the company is experiencing slowness on his iPad and seems upset<br>c) All customers in the west region are unable to checkout/complete purchases<br>d) Darryl in Sales has been locked out of his account<br><br>You panic that the CEO has created a ticket and begin working on the case.<br>This was the best course of action.<br><br>TRUE<br>FALSE

FALSE<br><br>While the CEO may be upset about his iPad, he's going to be even more upset when he finds out the company is losing several thousand dollars per hour due to a large-scale outage. In most cases, you'll prioritize work based on business impact unless otherwise directed by management.&nbsp;

The job of the CPU is to execute program instructions and its performance is typically measured in cycle per second. This component, typically, is directly connected to a computer's motherboard and is sometimes even soldered in place on some devices.<br><br>TRUE<br>FALSE [sound:google-be216dd0-36ad818a-8f312da1-d620f7b5-44e67fb3.mp3]

TRUE<br><br>A central processing unit (CPU), also called a central processor, main processor or just processor, is the electronic circuitry that executes instructions comprising a computer program. The CPU performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions in the program.

A network is a system that connects numerous independent computers in order to share information (data) and resources.<br><br>TRUE<br>FALSE<br>https://en.wikipedia.org/wiki/Computer_network [sound:google-276ff678-ee30c0a8-529ba952-30f32b25-60fa12b3.mp3]

TRUE<br><br>A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other.<br>

The NIC (Network Access Control) allows the computer to communicate over the network/Internet. A virtual version of this can also be found on, and added to virtual machines.<br><br>TRUE<br>FALSE [sound:google-79360728-096f4129-f6d68a8b-83e1e5b9-ea984a09.mp3]

TRUE<br><br>A network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter or physical network interface, and by similar terms) is a computer hardware component that connects a computer to a computer network.<br>

"An on-site user needs to travel abroad for a few months for a family event but wishes to continue working. You think to yourself, if they were to use a VPN, they would be able to continue to work remotely and maintain access to the internal corporate resources required to do their job. Your thinking is probably correct.<br><br>TRUE<br>FALSE<br><span style=""text-decoration-line: underline; color: rgb(17, 85, 204);""><a href=""https://en.wikipedia.org/wiki/Virtual_private_network"">https://en.wikipedia.org/wiki/Virtual_private_network</a></span>&nbsp; [sound:google-9604deb6-667d7c83-d3e9b31e-b29ee753-92c2e658.mp3]"

TRUE<br><br>A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The benefits of a VPN include increases in functionality, security, and management of the private network. It provides access to resources that are inaccessible on the public network and is typically used for remote workers.<br>

"You get several tickets from several different users that ever since arriving at the office, they have been unable to browse the internet. You go to one of their workstations and issue the command ""ipconfig"". You notice they have an IP address of 169.254.33.145, an APIPA address. You check two more users' ip configuration and they have similar IP address. You consult with your coworker and they suggest something may be wrong with DHCP. This is a reasonable assumption?<br><br>TRUE<br>FALSE"

TRUE<br><br>APIPA is a DHCP failover mechanism used by all Microsoft Windows Operating Systems. When a Windows machine connects to the network, but fails to locate a DHCP server (that is, fails to get assigned an IP address), APIPA takes over and automatically assigns an address in the following range: 169.254.0.0/16.<br><br>This allows hosts on the same network to be able to communicate with each other in spite of not being assigned an address by a DHCP server.<br>

The following IP address is valid: 4.5.6.7<br><br>TRUE<br>FALSE [sound:google-ef697e5b-2dea2e56-bc3b174b-d328dddd-42a2726f.mp3]

TRUE<br><br>Each octet (section) must contain a number between 0 and 255.<br>

Speakers, monitors, and printers are all considered output devices.<br><br>TRUE<br>FALSE [sound:google-19ca4a33-20225522-e879a646-7093290d-4ae7c744.mp3]

TRUE<br><br>I/O (input/output) devices are the items of hardware used by a human (or other system) to communicate with a computer. For instance, a keyboard or computer mouse is an input device for a computer, while speakers, monitors and printers are output devices.<br>

You are at your first day of work, working at a help desk in a medium-sized company. A user calls you and describes a problem they are having. You are familiar with the system they are using, but have no idea why they are having the problem or how to fix it. The user asks if you know how to fix it or if you know what's going on. You become very anxious because it is your first day and don't want to appear incompetent. You decide to tell the customer you are familiar with the system, but don't actually know how to solve the problem yet. Let them know you have a team full of smart people and a lot of resources, and you'll research the issue and follow up soon. This was probably an appropriate response.<br><br>TRUE<br>FALSE [sound:google-01608aee-58dd452c-91210766-d16dfde2-6c31d10f.mp3]

TRUE<br><br>Just be honest. Nobody knows how to solve everything. People appreciate honesty, and as long as you follow up with them and communicate, everything will more than likely be fine.

You receive the following help desk tickets at the beginning of your shift:<br><br>a) Accounting department (5 individuals) are unable to access a file share. They have a work around, but requires them to spend extra time<br>b)The CEO of the company is experiencing slowness on his iPad and seems upset<br>c)The CFO's laptop has been infected with a virus and seems to be slowly sending data outside the company network to an unknown server<br>d)Darryl in Sales has been locked out of his account<br><br>You feel sketched out about the CFO's laptop being compromised and decide to triage this ticket first, since there is likely sensitive information involved.<br>This was probably the course of action.<br><br>TRUE<br>FALSE

TRUE<br><br>Out of the listed options, the CFO's laptop being compromised has the largest potential impact to the business. We don't yet know what data has been stolen or what the potential impact could be, but because the incident involves an executive's workstation, assume high impact. [sound:google-b12008da-f349cb93-a8b5358b-b1f26048-2820f394.mp3]

"Random Access Memory (or RAM) serves as a computer's ""short-term memory"" and holds applications that are currently open and in use on the system.<br><br>TRUE<br>FALSE [sound:google-1e29b583-158c88da-1a9dd002-73731107-d7931ef4.mp3]"

TRUE<br><br>Random-access memory (RAM;) is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code.<br>

Remote Desktop Protocol/RDP, which uses TCP Port 3389, is commonly used in corporate environments when you want to remotely connect to another users desktop. Maybe you need to install some kind of software or work on their computer in some way. You could also use it to connect to a server to do some kind of activity.<br><br>TRUE<br>FALSE [sound:google-c1cc08e9-602087e1-2eed9b32-89e78371-ef484c0d.mp3]

TRUE<br><br>Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.[1] The user employs RDP client software for this purpose, while the other computer must run RDP server software.<br>https://en.wikipedia.org/wiki/Remote_Desktop_Protocol<br><br>In computing, the term remote desktop refers to a software- or operating system feature that allows a personal computer's desktop environment to be run remotely off of one system (usually a PC, but the concept applies equally to a server or a smartphone), while being displayed on a separate client device.<br>

The following IP address is a PRIVATE IP address: 10.69.42.0<br><br>TRUE<br>FALSE [sound:google-476735c1-cef6bafc-4ae0ef84-9f87d4bd-280ff757.mp3]

TRUE<br><br>Reserved private IPv4 network ranges:<br>10.0.0.0 - 10.255.255.255<br>172.16.0.0 - 172.31.255.255<br>192.168.0.0 - 192.168.255.255<br><br>

The following IP address is a PRIVATE IP address: 172.18.1.3<br><br>TRUE<br>FALSE [sound:google-056ce8b5-1ec3c279-eb69ff31-f1db6ac0-8ab32135.mp3]

TRUE<br><br>Reserved private IPv4 network ranges:<br>10.0.0.0 - 10.255.255.255<br>172.16.0.0 - 172.31.255.255<br>192.168.0.0 - 192.168.255.255<br><br>

Arguably the most important piece of software running on a computer, A.K.A. the Operating System, sits between the user and the hardware and kind of acts as in interpreter, allowing us to use the computer. This piece of software allows you to run other programs (such as word, calculator, chrome)<br><br>TRUE<br>FALSE [sound:google-350de74c-f7572e27-15bd1915-8a797c9e-11aea7a5.mp3]

TRUE<br><br>The Operating System (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs.<br>

"A program is an actual file that exists on the hard drive and a process is an instance of that program running in memory.<br><br>TRUE<br>FALSE<br>https://en.wikipedia.org/wiki/Process_(computing)#:~:text=While%20a%20computer%20program%20is,from%20the%20disk%20into%20memory. [sound:google-16067f21-9ee83025-815bdecb-62aef7e3-1326ecbf.mp3]"

TRUE<br><br>While a computer program is a passive collection of instructions typically stored in a file on disk, a process is the execution of those instructions after being loaded from the disk into memory.<br>

Convert the following binary number into human readable format: 1000 0000<br>HINT: 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1<br><br>a) 128<br>b) 129<br>c) 130<br>d) 131 [sound:google-9ac8c9b6-b565d7d6-7eb1ddf2-6fab16c4-39b7d3e1.mp3]

a) 128<br><br>Looking at the hint, simply add up the numbers where there is a '1' to get the result in decimal.<br>Example: 128 + 0 + 0 + 0 + 0 + 0 + 0 + 0 = 128<br>

What is the CIDR notation for the following Network ID and Subnet Mask?<br>Network ID: 192.168.0.0<br>Subnet Mask: 255.0.0.0<br><br>a) 192.168.0.0/8<br>b) 192.168.0.0/16<br>c) 192.168.0.0/24<br>d) 192.168.0.0/32 [sound:google-efec8d1e-1273a584-9461b533-205cddbe-f85144c6.mp3]

a) 192.168.0.0/8<br><br>CIDR notation specifies an IP address, a slash ('/') character, and a decimal number. The decimal number is the count of consecutive leading 1-bits (from left to right) in the network (subnet) mask.<br>

Convert the following binary number into human readable format: 0000 1000<br>HINT: 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1<br><br>a) 8<br>b) 9<br>c) 10<br>d) 11 [sound:google-e9734dcc-a804fdd7-e85e8ad9-a19c4308-27ab1b07.mp3]

a) 8<br><br>Looking at the hint, simply add up the numbers where there is a '1' to get the result in decimal.<br>Example: 0 + 0 + 0 + 0 + 8 + 0 + 0 + 0 = 8<br>

You are observing your coworker troubleshoot a network issue on a customer's computer. You see her open a command-line and issue the following command:<br><br><b>ping www.google.com</b><br><br>What is likely her reason for doing this?<br><br>a) She is checking Internet connectivity<br>b) She is likely checking if the network adapter is functioning and installed properly<br>c) She is checking connectivity to the local DNS server<br>d) She is checking connectivity to the local DHCP server [sound:google-79cddfdc-608980ff-725816b3-0dc076ce-cbf38723.mp3]

a) She is checking Internet connectivity<br><br>Since www.google.com as a public website, a successful ping to this address would indicate a functioning Internet connection; she was likely testing for Internet connectivity.&nbsp;

What port does SSH (Secure Shell) typically use?<br><br>a) TCP Port 22<br>b) UDP Port 23<br>c) TCP Port 21<br>d) TCP Ports 20 [sound:google-68af2c49-f6ed8451-20acff38-b571f27c-c8e1493f.mp3]

a) TCP Port 22<br><br>The transport layer (RFC 4253) typically uses the Transmission Control Protocol (TCP) of TCP/IP, reserving port number 22 as a server listening port.<br>

What port does RDP (Remote Desktop Protocol) typically use?<br><br>a) TCP Port 3389<br>b) UDP Port 3389<br>c) TCP Port 21<br>d) TCP Ports 22<br><br> [sound:google-4c316483-3ed26f84-978d8d71-88a8923f-6bb5ac2e.mp3]

a) TCP Port 3389<br><br>Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.[1] The user employs RDP client software for this purpose, while the other computer must run RDP server software. By default, the server listens on TCP port 3389[2] and UDP port 3389.[3]<br>

"What ports does DNS (Domain Naming System) typically use?<br><br><span style=""background-color: rgb(255, 255, 255);"">a) TCP and UDP Port 53<br>b) TCP and UDP Port 35<br>c) TCP and UDP Port 69<br>d) TCP and UDP Port 443</span> [sound:google-224de6af-9b31968c-d61730ec-5c6bdf3e-49423a4a.mp3]"

a) TCP and UDP Port 53<br><br>From the time of its origin in 1983 until quite recently, DNS has primarily answered queries on User Datagram Protocol (UDP) port number 53. In 1989, RFC 1123 specified optional Transmission Control Protocol (TCP) transport for DNS queries, replies and, particularly, zone transfers.<br>

The purpose of the Subnet Mask is to ________________.<br><br>a) identify which portion of the IP address is the Network ID; the remainder is considered the the Host ID<br>b) help understand where the DNS servers on the network are<br>c) help understand when DHCP should be used<br>d) identify the router on the network [sound:google-11751ff4-ae72772a-ea946b02-8644a8fa-7b66900e.mp3]

a) identify which portion of the IP address is the Network ID; the remainder is considered the the Host ID<br><br>An IPv4 subnet mask consists of 32 bits; it is a sequence of ones (1) followed by a block of zeros (0). The ones indicate bits in the address used for the network prefix (network ID) and the trailing block of zeros designates that part as being the host identifier (host ID).<br>


Related study sets

Chapter 13: Supply Chain Process Integration

View Set

check your understanding 44, 45, 47, 51, 52

View Set

105E.1 Building Blocks of the Human Body

View Set

biceps brachii, brachialis, coracobrachialis, triceps brachii

View Set

Life Span Development by John Santrock 13th Edition Chapter 8

View Set

Lesson 12: LIFE IN A PURITAN COMMUNITYLIFE IN A PURITAN COMMUNITY

View Set

FINC 512 Quizzes1-11 (Final Exam)

View Set

Biology Section 4-3 Review: Cell Organelles and Features

View Set

Anatomy and physiology directional terms

View Set

Chapter 6 concepts & Definitions

View Set