Upgrade to remove ads Show Only €31.99/year
Terms in this set (224)1. Which type of laptop backlight is typically used in smaller mobile devices and consumes the least amount of power? A. IPS C 3. You are purchasing a mobile device that allows you to use your finger to input information. What type of touch screen technology does this device use? A. Capacitive A 4. You are using a public Wi-Fi hotspot and believe that someone is trying to hack into your laptop. Which laptop feature should you use to immediately turn off all wireless connections? A. Silent mode B. Quiet mode C. Airplane mode D. Connectionless mode C 5. You have been asked to purchase a new camera for the company photographer. Some of the cameras are marketed as "smart" cameras. What key feature does this likely mean the camera includes? A. Wi-Fi A 6. A user approaches you and asks for a CPU upgrade so his Lenovo laptop will run faster. What is most likely the easiest way to meet this user's needs? A. Remove the CPU and replace it with a faster one that fits the same socket. B. Replace the laptop with one with a faster CPU. C. Replace the motherboard with a standard laptop motherboard with a faster processor. D. Replace the motherboard with a Lenovo laptop motherboard with a faster processor ... 8) You are using a laptop computer and the wireless network card fails. There are no wired ports nearby. You need to send a file to your boss, who is in another country, in the next 10 minutes. What should you do to fix the situation? A. Remove the defective network card and install a new one. C 9. Which type of mobile device is known for using electrophoretic ink? A 10. What type of connection are you using if you use a USB cable to connect your laptop to your cellular phone in order to use the cellular wireless connection from the laptop? B. Tethering C. USB networking
B 11. For which characteristic was the BlackBerry smartphone most famous? B 12. Which laptop accessory should you purchase if you want to protect the device against D 13. The hard drive in your manager's desktop has failed, and you need to replace it. Your manager asks about the benefits of replacing it with an SSD instead of an HDD. What should you tell her? (Choose two.) C D 14. Which laptop expansion port was designed as an industry standard to replace VGA and DVI ports and is backward compatible with both standards? A 15. In a laptop, which display type illuminates each pixel individually rather than by LED backlight? D 16. You have recently purchased a laptop computer with a touch screen. It allows you to draw images on the screen and save them on the computer. Which device is responsible for converting the input into the image that you are able to save? C 17. A
technician has a failed Lenovo laptop, and he suspects the motherboard is bad. He has d 18. A technician needs to replace a failed laptop hard drive. The user stores a large amount b 19. Which of the following wireless communication
types has a maximum distance of about 4″? A 20. Which two components of a laptop are the most useful when making a video conference B C 22. Which mobile connection type allows you to share your
cellular Internet connection with a 23. You are responsible for replacement parts within your company's IT department. Because d 24. In a laptop computer, which component is responsible for providing light to the display? a 25. You need to purchase a memory card reader and removable memory
for your mobile d 27. You are replacing a motherboard in a laptop computer. When you open the case, you notice that there is a small circuit board attached to the motherboard that appears to have video and network circuitry built into it. What is the
name of this small circuit board? A 28. You are visiting a remote office and need to print some documents. Your host tells you that the printer you need is configured on a piconet. What type of expansion option C 29. You will be traveling to another country for work and will have a 10-hour airplane flight. B 30. Your laptop has an internal Mini PCIe expansion slot. The documentation for an b 31. Of the laptop components listed, which one is least likely to be built into the
display? B 32. A defining characteristic of a phablet is a screen of approximately what size? B 33. You are interested in buying a smart watch that has an OS
compatible with your Android-based smartphone. Which brand of smart watch uses the Android Wear OS? c 34. You want to enable hands-free cellular conversations for when you are driving, so you C 35. The AC adapter for your Dell laptop is not working properly, and you are searching for A B 36.
A laptop user wants to have a full-sized monitor and keyboard, as well as an external D 38. You need to replace a failed
hard drive in a user's laptop, and it's a model you are unfamiliar with. You look at the bottom of the laptop and see no obvious entrance points. Which component will you most likely need to remove to access the hard drive bay? d 39. A new laptop user asks you to explain airplane mode to her. Which of the following A 40. Which memory cards have a capacity of up to 32 GB? (Choose two.) A B 41. The iPhone 8 and iPhone X use what type of connector for charging? B 42. You have a laptop with an ExpressCard/34 slot. Which type of device or devices are you unlikely to be able to use as an expansion option in that slot? A 43. You have enabled the GPS service in your tablet. What is the minimum number of GPS A 44. You are investigating new laptops for your company. You want the laptop displays to C 45. You are using a USB flash drive to transfer files from a laptop. You plug the USB drive in B 46. What is the name of the OS used by the Apple Watch, which was designed specifically C 47. The new model of laptop
just purchased by your company has a Universal ExpressCard B 48. You have a MacBook Pro computer with a Thunderbolt 3 port. What is the maximum D 49. A technician needs to replace a failed laptop hard drive. What are the possible form B C 50. Your laptop has an internal Mini PCIe expansion slot.
The documentation for an expansion card says that it supports Mini PCIe USB 2.0 functionality. At what speed A 51. Which laptop component can take input from a stylus and convert it into an image on the A 52. What type of wearable technology device is specifically designed to track a user's B 53. Your company is producing posters for an upcoming public relations campaign. The A 54. You want to play video games on your tablet computer. Which accessory would you D 55. Which laptop expansion port technology was developed by Apple and supports a wide D 56. You have a laptop with an ExpressCard/34 slot. Which of the following statements is A 57. You are wearing your smart watch, which allows you to make payments like a credit B 58. Which laptop display component is capable of discharging energy and causing severe C 59. Your new laptop has 4 GB system RAM and an integrated video card. The default setting B 60. Oculus, Samsung, and HTC are manufacturers of what type of wearable technology D 61. You need to install a memory upgrade in a laptop computer. The
computer's C 63. You need to replace a failed laptop hard drive. The user has asked that the new hard A 64. Which type of mobile connection uses a process called pairing to logically connect two devices? A 65. Tablet computers feature touch screens that are approximately what size? C 67. Which mobile technology device makes use of an augmented reality display? D 68. Which type of laptop backlight generally does not require the use of an inverter? D 69. You have traveled to the office of one of your suppliers. It does not have wireless networking, and your laptop does not have a wired network connection. If you need to get on the supplier's network, what is the best solution? B 70. You are on the phone talking to a technician who is trying to upgrade a laptop. He is having trouble identifying the Mini PCIe card. How wide should you tell the technician that the card is? B 71. You have been asked to burn a DVD with several videos on it, but your laptop does not C 72. Which type of network connection is
least likely to be found on a tablet computer? C 73. A Lightning connector would be used with what type of device? D 75. A guest presenter plugs an external projector into his laptop using
the VGA port on the D 74. You have decided to start playing video-intensive games on your laptop computer. The D 76. You need to replace a failed motherboard in a laptop computer. Which of the following a b 77. A user has a laptop that is intermittently locking up. Initial diagnostics indicate that the b c 78. A client has an older Windows 7 laptop with an integrated video card. The system seems c 79. You are upgrading a laptop with a Mini PCIe card. What type of connector does Mini PCIe use? A. 52-pin a 80. Which of the following are ways to input information or
commands into Google Glass? C B 81. Which of the following wireless communication methods are the least susceptible to B d 82. Of the laptop LCD technologies,
which consumes the least amount of power? c 83. What types of networking will smart cameras often have built into them? (Choose two.) A d 85. A user has brought his laptop to you because the screen is intermittently flickering. Which
display component is most likely causing this? d 86. Which of the following wireless communication types has a maximum distance of 1 meter and requires line of sight? A. NFC D 87. What is the likely type of Wi-Fi antenna connector
you will find on a laptop? A 88. A user needs ports for external devices in addition to what his laptop is capable of B 89. A warehouse manager at a factory is required to supervise productivity while walking C 90. After enabling your device for communication using the IEEE 802.15.1 standard, what is B 91. When attempting to
pair with a Bluetooth device, what is the typical next step? C 92. Your client is frustrated that her Bluetooth earpiece that was working yesterday is no D 93. Which mail protocol keeps all emails stored on a single device and can only be accessed C 94. Which mail
protocol keeps all emails stored on the server, allowing messages to be a 95. Which protocol is used for sending and receiving encrypted email? A 96. What service is built into Apple-developed
devices and permits users and subscribers to c 97. What is the hosted messaging version of Microsoft's Exchange mail server that saves b 98. What email configuration settings are commonly used when setting up email on a b 99. What type of update is done to mobile devices over the air? a 100. Which number is hard-coded into the phone and identifies your physical phone hardware c 101. Which unique mobile number identifies you as a user and is coded into the SIM card,
b 102. A user is traveling to a country that employs content blocking technology on the cellular D 103. What best practice can save someone from losing her data on her mobile
device if the A 104. A user wants a list of favorite websites to be readily available between multiple devices, C 105. When two parents wish to share appointment dates and times between devices, what is A 106. What technology lets you minimize how often a user
must log in for multiple services? A 107. A user comments he needs to use his phone to find a person's cell number because the desktop mail application's address book has some phone numbers but is missing the person's phone number. What would you suggest that user do to make life easier? A. Copy phone numbers on one central piece of paper. C 108. Before starting to install a new application on an older system, what should be done? B 2-1. Which of the following network devices receives network traffic and makes a decision on whether to send it on based on the destination hardware address? B 2. A technician installed a UTP
splitter on one of your network segments that has CAT6e cable. What is the maximum speed supported by this connection? B 2--3. You are installing a fiber-optic cable between two buildings. To install the cable, you A 2-4. Which TCP/IP protocol, designed to download email, allows for multiple clients to be simultaneously connected to the same mailbox? C 2-
5. You are using your laptop on the company network. In your web browser, you type in www.google.com and press Enter. The computer will not find Google. You open the browser on your phone, and using your cellular connection, you can open Google without a problem. Your laptop finds internal servers and can print without any issues. A 2- 6. A technician needs to run a network cable to a remote building, which is approximately 15 kilometers from his base station. He's not sure if any cable will span that distance. C 2-7. You have been asked to install a run of RG-59 cable from one end of a building to the other. What is the maximum distance for this type of cable run? A. 100 meters (328 feet) B 2-8. Which one of the following TCP/IP protocols was designed as a replacement for Telnet? b 2-9. Which of the following network connectivity devices operate at Layer 2 of the OSI model? (Choose two.) B C 2-10. In IPv4, what is the function of the subnet mask? B 2-11. Which of the following TCP/IP protocols is connection-oriented and attempts to guarantee packet delivery? B 2-12. Which TCP/IP protocol allows a user to log into a remote computer and manage files as if they
were logged in locally? D 2-13. You are given a network configuration of 155.100.63.0/26 from your ISP. When you configure your network hosts, what subnet mask should you assign them? C 2-14. Which Wi-Fi
standard specifies a maximum of 54 Mbps transmissions in the 2.4 GHz frequency range? C 2-15. Which TCP/IP protocol is used to provide shared access to files and printers on the network? C 2-16. What port does the Telnet protocol
use? C 2-17. You have just installed a wireless 802.11ac network for a client. The IT manager is D 2-18. Some of your network users are concerned about submitting confidential information to B. If the website address starts with TLS://, it should be OK to submit confidential information to a trusted site. C. If the website address starts with HTTPS://, it should be OK to submit confidential information to a trusted site. D. Don't ever submit confidential information to any online website. C 2-19. Which TCP/IP Internet layer protocol is responsible for delivering error messages if communication between two computers fails? A 2-21. You are configuring a wireless 802.11n router for a
small network. When setting it up, A 2-20. Which type of IPv6 address identifies a single node on the network? C 2-22. What type of network covers large geographical areas and often
supports thousands of users? B 2-23. Which TCP/IP protocol, developed by Microsoft, allows users to connect to remote computers and run programs on them? A 2-24. What port does the SSH protocol use? B 2-25. Which of the following IP addresses is not routable on the Internet? A 2-26. Which network connectivity device does not forward broadcast messages, thereby creating multiple broadcast domains? D 2-27. You have a desktop computer that is behaving erratically on the network. The wired connection will often disconnect without warning. Which tool should you use to C 2-28. Your company just expanded and is leasing additional space in an adjacent
office building. You need to extend the network to the new building. Fortunately, there is a conduit between the two. You estimate that the cable you need to run will be about 300 meters long. What type of cable should you use? D 2-29. You want to ensure that client computers can download email from external email servers regardless of the protocol their email client
uses. Which ports do you open on the firewall to enable this? (Choose two.) C D 2-30. You are installing network cabling in a highly secure facility. The cables need to be A 2-31.
Which networking device is capable of reading IP addresses and forwarding packets D 2-32. Which network device is designed to be a security guard, blocking malicious data from C 2-33. You are manually configuring TCP/IP hosts on the network. What configuration parameter specifies the address of the router that enables Internet access? D 2-34. A senior administrator calls you and tells you that she is working from home and trying D 2-36. What type of network is most commonly associated with Bluetooth devices and covers a small area? c 2-37. Which TCP/IP Internet layer protocol is responsible for resolving
physical MAC addresses to logical IP addresses? d 2-38. Which of the following IPv6 addresses is equivalent to an address in the 169.254.0.0/16 c 2-39. You need to configure a wireless router for an office
network. The office manager wants d 2-40. You are troubleshooting a computer with an IPv6 address that is in the FE80::/10 range. A C 2-41. You have set up your web server to function as an FTP server as well. Users on the A 2-42. Which TCP/IP port and protocol allows you to access data such as employee phone D 2-43.
You are configuring network hosts with static IP addresses. You have chosen to use a class B B 2-44. You are installing a new network and working in a wiring closet. You need to attach D 2-45. Which of the following Internet connection types offers the fastest download speeds? C 2-46. Which TCP/IP protocol uses TCP ports 137-139 and 445 by default? C 2-47. For IPv6, which of the following statements are not true? (Choose two.) a c 2-48.
Which of the following network architecture devices operate at Layer 1 of the OSI b C 2-49. Which TCP/IP protocol was developed by Apple and used to transfer files between b 2-50. Which of the
following IPv6 addresses is equivalent to 127.0.0.1 in IPv4? b 2-51. A technician is configuring a wireless 802.11ac router for a home network. For security b 2-52. You are asked to perform consulting work for a medium-sized company that is having D 2-53. Which TCP/IP protocol is responsible for dynamically assigning IP addresses to client B 2-54. Which networking device works at Layer 2 of
the OSI model, has multiple ports in which B 2-55. Which TCP/IP port will an email client use to push email to its email server? b
2-56. A technician is going to set up a Wi-Fi network using standard omnidirectional c 2-57. You are troubleshooting an intermittently failing CAT7 network connection. You
suspect c 2-58. Which TCP/IP protocol gathers and manages network performance information using devices called agents? A 2-59.
In which type of office environment would you perform a cable/DSL modem A. Multiple buildings in a single country B. Multiple buildings in many countries C. Single tenant building with 300-500 employees D. Small office or home office with 3-5 employees d 2-60. Which Wi-Fi encryption standard was the first to include the use of a 128-bit dynamic B 2-61. You are installing an 802.11n Wi-Fi network with five wireless access points. The access c 2-62. Which TCP/IP protocol is designed to send email from clients to mail servers? A 2-63. You are setting up a small network in your neighbor's house. She is
concerned about a 2-64. You have been asked to install a Wi-Fi network in a
building that is approximately 100 meters long and 25 meters wide. Because of cost considerations, you will need to use 802.11g. At a minimum, how many wireless access points will you need? b 2-65. You are installing network cabling in a drop ceiling of an office space. The ceiling area is d 2-66. You need to install a wireless hub in a drop ceiling where there is no access to a power source. Which technology will allow you to get power to that device? b 2-67.
Which of the following IP addresses is not a private address and therefore is routable on the Internet? c 2-68. You are configuring a wireless 802.11n router. The office manager insists that you A 69. If you are connecting to a website that encrypts its connection using TLS, what port does D 2-70. Your network is currently running a mix of 802.11b and 802.11g
devices. At the D 2-71. You are consulting with a small field office that needs a dedicated, digital point-to-point D 2-72. What type of network spans multiple buildings or offices but is confined to a relatively D 2-73. Which of the
following shorthand notations corresponds to the CIDR subnet mask A 2-74. You are configuring hosts on a network running IPv4. Which elements are required for B 2-75. Which TCP/IP protocol was developed by Microsoft and has been the default file and A 2-76. Which of the following statements regarding IPv4 configuration is true? D 2-77. Which Wi-Fi encryption standard uses a static key, which is commonly 10, 26, or 58 A. WPA D 2-78. Which TCP/IP port number does SNMP use? D 2-79. Because of a recent security breach, your IT team shut down several ports on the external B 2- 80. All your network hosts are configured to use DHCP. Which IP address would indicate that a host has been unable to locate a DHCP server? A. 192.168.1.1 D 3-2 Which motherboard form factor measures
6.7″ × 6.7″? A 3-1. What is the distance limitation of the FireWire 800 standard when implemented over B 3. Which of the following statements are not true regarding CPUs and
operating systems? B D need double check 2-81. A technician is trying to establish a dial-up network connection using a legacy modem. What is the fastest data throughput for a
modem? B 2-82. You have reason to believe that several network users are actively browsing prohibited content on unsecured sites on the Internet. Which port can you disable on the firewall to immediately stop access to these websites? C 2-83.
Which TCP/IP protocol is designed to help resolve hostnames to IP addresses? D 2-84. You need to install an Internet connection for a forest ranger outlook tower, located far away from electrical lines. Which option would be best for broadband Internet access? D 2-85. Which TCP/IP host-to-host protocol makes its best effort to deliver data but does not guarantee it? C 2-86. What type of network is typically defined as being contained within a single office or building? A 2-87.
Which port is AFP capable of using? D 2-88. You are installing a wireless network for a small company. It wants to have 100 Mbps or better wireless transmission rates. Which of the following standards will allow you to Provide this? (Choose two.) C D 2-89. What legacy network protocol allows NetBIOS-dependent computer applications to communicate over TCP/IP? C 2-90. What networking protocol allows systems to discover local systems and other devices? D 2-91. Which of the
following features does not require a managed network switch? C 2-92. The senior network administrator struggles to configure company network devices spanning several cities. The challenge is because he is required to be on premises for the network infrastructure of each building. What would be a
cost-effective solution? D 2-93. What is the maximum distance allowed between a power over Ethernet injector and the Ethernet device? B 2-94. When setting up a small office, home office (SOHO) network, what end-user device configuration must be performed? c 2-95. What is the typical method for IoT device configuration
to connect to the wireless network? d 2-96. What method is effective in defining how a firewall allows outbound access when the group of approved devices rarely changes? A 2-97. What firewall rule technique allows only a
known list of applications or traffic as legitimate? C 2-98. What communication technology establishes connectivity between enabled devices only when the devices are placed within 4 cm of each other? B 2-99. What
communication technology allows for low power, close-proximity passive reading of a small tag or patch on an object? A 2-100. What is the role of the server responsible for publishing information about the company's values, purpose, and available products or services to the public? D 2-101. What server would function as a central repository of documents and provide network shared file storage for internal users? C 2-102. What server sits between the protected, controlled network and the public Internet, functioning as a gatekeeper of traffic? B 2-103. What type of server can host files for easy access and fetching, similar to how a web server serves web pages? A 2-104. What server is added to a company infrastructure to avoid the
need to attach printers to each individual desktop? C 2-105. What server is used to resolve domain names to IP addresses to facilitate web browsing or locating a directory resource on the network? B 2-106. What server is accessed each time it's necessary to challenge and validate a user's credentials in order for the user to access a network resource? D 2-107. What service can collect and journal all the system-generated messages produced by servers and network devices? A 2-108. A company wanting to monitor network traffic or host system behavior to identify suspect activity will install what type of service? B 2-109. What is the primary difference between an IDS and
IPS? D 2- 110. Your client is interested in a security device that will take action when suspicious activity is identified, as well as filter traffic and perhaps also provide some antivirus functionality. What type of device is the
client looking for? c 2- 111. Your client is now looking at improving control over all the user devices. Particularly, the client wants resource access-controlled based on policy and the users meeting a few criteria. What device would you suggest? A 2- 112. Last weekend you installed and booted several more computers to be ready for Monday morning. Later Monday morning you hear from employees as they come in that they cannot log in. Their desktops don't seem to want to connect. You investigate and find that each faulty workstation has a 169.254.x.x IP address. What might you look at next? A 2- 113. What network segmentation technique reduces broadcast domains? b 2- 114. What connectivity technique can ensure that your network traffic is encrypted from endpoint to endpoint? A 2- 115. Which of the follow components is not typically found in a wireless mesh network C 2- 116. Of the following fiber connectors, which is used for duplex (two strands instead of one)? B 2- 117. What twisted pair connectors are commonly found for telephone wire? c 2-118. Using the T568B wiring standard on both ends of a cable would produce what type of network cable? D 2- 119. What IoT device configuration most likely includes continuous remote monitoring? c 2- 120. What IoT device
configuration requires a microphone? (Choose two) a d 2- 121. Which wireless networking protocol is most limited by the number of potential connected devices? d 2- 122.
Which wireless networking protocol is expected to reach speeds of 1 Gbps? C Sets with similar termsNetwork+110 terms Lisa_Patterson10 Udemy Net+ Questions132 terms Anthony_Messina28 Network+133 terms jstirgus0786 Sets found in the same folderPorts27 terms heyblank Chapter 13 Comptia A +73 terms heyblank port numbers23 terms heyblank 1002 terms72 terms heyblank Other sets by this creatorExam DUmppp162 terms heyblank 500-80051 terms heyblank 300-500200 terms heyblank Exam Dump 281 terms heyblank Other Quizlet setsTH-67 Flight Controls & Hydraulics (Systems I Exam…33 terms
dmond89 PSB 2nd Exam Chp 1272 terms mirandaj1126 Bio 152 e2217 terms Sarah_Yankson AP Biology Chapter 11 Multiple Choice: Cell Commun…69 terms Camdonpark Related questionsQUESTION What is a nontechnical method that a cybercriminal would use to gather sensitive information from an organization? 13 answers QUESTION As discussed earlier, Windows records a ton of information to event logs such as (3) 2 answers QUESTION Which risk response strategy involves purchasing insurance to protect the organization should the risk occur? 15 answers QUESTION Which of the answers listed below refers to a means for executing reflective DOS attack? 12 answers Which of the following are the methods of connecting a smartphone to the Internet?Mobile Data. It is the basic and probably the most common way to connect to Internet. ... . Wi-Fi Networks. Wi-Fi networks are also very common ways to get Internet access for your smartphone. ... . Portable Wi-Fi Hotspot. ... . Bluetooth Tethering. ... . OTG Cable. ... . LAN Adapter. ... . Laptop as a Wi-Fi Hotspot. ... . Use USB Cable.. Which technology is being used when a mobile device is providing Internet access to other devices?Wi-Fi is a wireless technology used to connect computers, tablets, smartphones and other devices to the internet. Wi-Fi is the radio signal sent from a wireless router to a nearby device, which translates the signal into data you can see and use.
What enable users with computers and mobile devices to connect to the Internet wirelessly?A router is a hardware device that allows you to connect several computers and other devices to a single Internet connection, which is known as a home network. Many routers are wireless, which allows you to create a home wireless network, commonly known as a Wi-Fi network.
|