How can smartphones without wi fi access connect to the internet quizlet

Upgrade to remove ads

Only €31.99/year

  1. Other
  2. Computer Skills

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (224)

1. Which type of laptop backlight is typically used in smaller mobile devices and consumes the least amount of power?

A. IPS
B. TN
C. LED
D. CCFL

C

3. You are purchasing a mobile device that allows you to use your finger to input information. What type of touch screen technology does this device use?

A. Capacitive
B. Human based
C. Warmth
D. Resistive

A

4. You are using a public Wi-Fi hotspot and believe that someone is trying to hack into your laptop. Which laptop feature should you use to immediately turn off all wireless connections?

A. Silent mode

B. Quiet mode

C. Airplane mode

D. Connectionless mode

C

5. You have been asked to purchase a new camera for the company photographer. Some of the cameras are marketed as "smart" cameras. What key feature does this likely mean the camera includes? A. Wi-Fi
B. RJ-45
C. Separate video processor
D. Internal hard drive

A

6. A user approaches you and asks for a CPU upgrade so his Lenovo laptop will run faster. What is most likely the easiest way to meet this user's needs?

A. Remove the CPU and replace it with a faster one that fits the same socket.

B. Replace the laptop with one with a faster CPU.

C. Replace the motherboard with a standard laptop motherboard with a faster processor.

D. Replace the motherboard with a Lenovo laptop motherboard with a faster processor

...

8) You are using a laptop computer and the wireless network card fails. There are no wired ports nearby. You need to send a file to your boss, who is in another country, in the next 10 minutes. What should you do to fix the situation?

A. Remove the defective network card and install a new one.
B. Install a USB to RJ-45 dongle.
C. Install a USB to Wi-Fi dongle.
D. Install a USB to Bluetooth dongle.

C

9. Which type of mobile device is known for using electrophoretic ink?
A. E-reader
B. Smart watch
C. Smart glasses
D. Tablet

A

10. What type of connection are you using if you use a USB cable to connect your laptop to your cellular phone in order to use the cellular wireless connection from the laptop?
A. Hotspot

B. Tethering

C. USB networking
D. Phoning

B

11. For which characteristic was the BlackBerry smartphone most famous?
A. Wi-Fi
B. Hardware keyboard
C. Anti-glare
D. Trackball

B

12. Which laptop accessory should you purchase if you want to protect the device against
theft?
A. Docking station
B. Change Protective cover
C. Cable lock
D. LoJack

D

13. The hard drive in your manager's desktop has failed, and you need to replace it. Your manager asks about the benefits of replacing it with an SSD instead of an HDD. What should you tell her? (Choose two.)
A. They are cheaper.
B. They take up less space.
C. They consume less power and generate less heat.
D. They operate silently

C D

14. Which laptop expansion port was designed as an industry standard to replace VGA and DVI ports and is backward compatible with both standards?
A. DisplayPort
B. VideoPort
C. Thunderbolt
D. HDMI

A

15. In a laptop, which display type illuminates each pixel individually rather than by LED backlight?
A. CCFL
B. E Ink
C. LCD
D. OLED

D

16. You have recently purchased a laptop computer with a touch screen. It allows you to draw images on the screen and save them on the computer. Which device is responsible for converting the input into the image that you are able to save?
A. Inverter
B. Touch pad
C. Digitizer
D. Touch screen

C

17. A technician has a failed Lenovo laptop, and he suspects the motherboard is bad. He has
several other laptops available from which he can harvest parts. Which of the following
statements is most likely true regarding the replacement motherboard he selects?
A. The motherboard is not replaceable.
B. He can choose a motherboard from any other laptop.
C. He can choose a motherboard from any other Lenovo laptop.
D. He must choose a motherboard from that same model of Lenovo laptop.

d

18. A technician needs to replace a failed laptop hard drive. The user stores a large amount
of video on her computer and needs the largest-capacity drive possible. What type of
hard drive should you install?
A. SSD
B. Magnetic
C. Hybrid
D. Flash

b

19. Which of the following wireless communication types has a maximum distance of about 4″?
A. NFC
B. Wi-Fi
C. IR
D. Bluetooth

A

20. Which two components of a laptop are the most useful when making a video conference
call? (Choose two.)
A. Digitizer
B. Webcam
C. Microphone
D. Inverter

B C

22. Which mobile connection type allows you to share your cellular Internet connection with
a Wi-Fi enabled device?
A. Hotspot
B. NFC
C. Bluetooth
D. IR

a

23. You are responsible for replacement parts within your company's IT department. Because
of the critical nature of your business, you need to have replacement parts on hand in
the event of a hardware failure. Your company uses four different types of laptops, two
HP and two Dell. How many different types of motherboards do you most likely need to
stock?
A. One
B. Two
C. Three
D. Four

d

24. In a laptop computer, which component is responsible for providing light to the display?
A. Backlight
B. Inverter
C. LCD
D. Screen

a

25. You need to purchase a memory card reader and removable memory for your mobile
device. You need to transfer approximately 1 TB of data at a time. Which technology
should you invest in?
A. SDHC
B. miniSD
C. microSDHC
D. SDXC

d

27. You are replacing a motherboard in a laptop computer. When you open the case, you notice that there is a small circuit board attached to the motherboard that appears to have video and network circuitry built into it. What is the name of this small circuit board?
A. Daughterboard
B. Secondary motherboard
C. Junior board
D. Expansion board

A

28. You are visiting a remote office and need to print some documents. Your host tells you that the printer you need is configured on a piconet. What type of expansion option
should you use to connect to this printer?
A. USB to RJ-45 dongle
B. USB to Wi-Fi dongle
C. USB to Bluetooth
D. USB to Thunderbolt

C

29. You will be traveling to another country for work and will have a 10-hour airplane flight.
You need to work on your laptop while on the flight, but your battery won't last that long.
What should you buy to allow you to use the auxiliary power outlets on the airplane?
A. AC adapter
B. DC adapter
C. Power inverter
D. Docking station

B

30. Your laptop has an internal Mini PCIe expansion slot. The documentation for an
expansion card says that it supports Mini PCIe 2.0 x1 functionality. At what speed does
the expansion card run?
A. 500 Mbps
B. 2.5 Gbps
C. 5.0 Gbps
D. 6.0 Gbps

b

31. Of the laptop components listed, which one is least likely to be built into the display?
A. Wi-Fi antenna
B. Speakers
C. Webcam
D. Digitizer

B

32. A defining characteristic of a phablet is a screen of approximately what size?
A. Between 3″ and 5″
B. Between 5″ and 7″
C. Between 7″ and 12″
D. Between 12″ and 24″

B

33. You are interested in buying a smart watch that has an OS compatible with your Android-based smartphone. Which brand of smart watch uses the Android Wear OS?
A. Apple Watch
B. Samsung Gear S
C. Sony SmartWatch 3
D. Pebble Time

c

34. You want to enable hands-free cellular conversations for when you are driving, so you
purchase a wireless headset. Which wireless technology does the headset most likely use?
A. Wi-Fi
B. IR
C. Bluetooth
D. NFC

C

35. The AC adapter for your Dell laptop is not working properly, and you are searching for
a replacement. Which two factors should be most important when selecting a new AC
adapter? (Choose two.)
A. Polarity
B. Same wattage as or higher wattage than the original
C. Brand of the adapter
D. Size of the adapter

A B

36. A laptop user wants to have a full-sized monitor and keyboard, as well as an external
hard drive, available to him when he is at his desk. Which accessory can he purchase so
that he doesn't need to plug in each of these devices separately to his laptop every time he
returns to his desk?
A. KVM switch
B. Port bay station
C. Desktop station
D. Docking station

D

38. You need to replace a failed hard drive in a user's laptop, and it's a model you are unfamiliar with. You look at the bottom of the laptop and see no obvious entrance points. Which component will you most likely need to remove to access the hard drive bay?
A. Plastics/frames
B. Battery
C. System board
D. Keyboard

d

39. A new laptop user asks you to explain airplane mode to her. Which of the following
statements best describes what airplane mode does?
A. It turns off all your wireless connections.
B. It turns off your Wi-Fi connection.
C. It turns off your Wi-Fi and cellular connections.
D. It turns off your Wi-Fi and Bluetooth connections.

A

40. Which memory cards have a capacity of up to 32 GB? (Choose two.)
A. miniSDHC
B. microSDHC
C. SD
D. microSDXC

A B

41. The iPhone 8 and iPhone X use what type of connector for charging?
A. Thunderbolt
B. Lightning
C. ApplePower
D. USB-C

B

42. You have a laptop with an ExpressCard/34 slot. Which type of device or devices are you unlikely to be able to use as an expansion option in that slot?
A. Hard drive
B. Sound card
C. Network card
D. eSATA adapter

A

43. You have enabled the GPS service in your tablet. What is the minimum number of GPS
satellites your tablet needs to be in contact with to determine its location?
A. One
B. Two
C. Three
D. Four

A

44. You are investigating new laptops for your company. You want the laptop displays to
have a wide viewing angle. Which technology is best suited for your needs?
A. LED
B. CCFL
C. IPS
D. TN

C

45. You are using a USB flash drive to transfer files from a laptop. You plug the USB drive in
and then copy the files to it. What is the recommended way to remove the drive?
A. Unplug the drive.
B. Use the Safely Remove Hardware icon in the system tray, stop the drive, and then
unplug it.
C. Close the drive's window in Windows Explorer and unplug it.
D. Use the Shut Down Hardware icon in the system tray, stop the drive, and then unplug it.

B

46. What is the name of the OS used by the Apple Watch, which was designed specifically
for the watch?
A. iOS
B. OS X mobile
C. WatchOS
D. Tizen

C

47. The new model of laptop just purchased by your company has a Universal ExpressCard
slot. Which of the following types of cards can you install into that slot?
A. ExpressCard/54 only
B. ExpressCard/34 and ExpressCard/54
C. ExpressCard/24, ExpressCard/34, and ExpressCard/54
D. ExpressCard/34, ExpressCard/54, and CardBus

B

48. You have a MacBook Pro computer with a Thunderbolt 3 port. What is the maximum
throughput of a device plugged into this port?
A. 5 Gbps
B. 10 Gbps
C. 20 Gbps
D. 40 Gbps

D

49. A technician needs to replace a failed laptop hard drive. What are the possible form
factors of this hard drive? (Choose two.)
A. 1.3″
B. 1.8″
C. 2.5″
D. 3.5″

B C

50. Your laptop has an internal Mini PCIe expansion slot. The documentation for an expansion card says that it supports Mini PCIe USB 2.0 functionality. At what speed
does the expansion card run?
A. 480 Mbps
B. 2.5 Gbps
C. 5.0 Gbps
D. 6.0 Gbps

A

51. Which laptop component can take input from a stylus and convert it into an image on the
computer?
A. Digitizer
B. Touch pad
C. Point stick
D. Inverter

A

52. What type of wearable technology device is specifically designed to track a user's
movements and heart rate and may include features such as GPS?
A. Smart watch
B. Fitness monitor
C. Smart glasses
D. Smart headset

B

53. Your company is producing posters for an upcoming public relations campaign. The
project leader wants to embed information into an NFC tag in the poster. How much
information can this tag hold?
A. 8 KB
B. 144 KB
C. 1.4 MB
D. 4.4 MB

A

54. You want to play video games on your tablet computer. Which accessory would you
purchase if you wanted to play the game much like you would on a gaming console?
A. Docking station
B. Touch pad
C. Point stick
D. Game pad

D

55. Which laptop expansion port technology was developed by Apple and supports a wide
variety of peripheral devices?
A. USB
B. DisplayPort
C. eSATA
D. Thunderbolt

D

56. You have a laptop with an ExpressCard/34 slot. Which of the following statements is
true regarding installing expansion cards?
A. You can only plug in an ExpressCard/34 card.
B. You can plug in an ExpressCard/34 card or an ExpressCard/22 card.
C. You can plug in an ExpressCard/34 card or an ExpressCard/54 card.
D. You can plug in an ExpressCard/34 card or an ExpressCard Universal card.

A

57. You are wearing your smart watch, which allows you to make payments like a credit
card. What type of connection technology does this service use?
A. Bluetooth
B. NFC
C. Wi-Fi
D. IR

B

58. Which laptop display component is capable of discharging energy and causing severe
injuries to technicians?
A. Screen
B. Backlight
C. Inverter
D. LCD

C

59. Your new laptop has 4 GB system RAM and an integrated video card. The default setting
specifies 512 MB of video memory. How much RAM is available for the processor to use?
A. 4 GB
B. 3.5 GB
C. 3 GB
D. It's variable.

B

60. Oculus, Samsung, and HTC are manufacturers of what type of wearable technology
devices?
A. Smart glasses
B. Smart headsets
C. Smart watches
D. VR/AR headsets

D

61. You need to install a memory upgrade in a laptop computer. The computer's
documentation says that the laptop uses DDR3 SODIMMs. How many pins will be on
the SODIMM?
A. 144
B. 200
C. 204
D. 240

C

63. You need to replace a failed laptop hard drive. The user has asked that the new hard
drive be as fast as possible, regardless of disk space or cost. What type of drive should
you install?
A. SSD
B. Magnetic
C. Hybrid
D. External

A

64. Which type of mobile connection uses a process called pairing to logically connect two devices?
A. Bluetooth
B. Wi-Fi
C. NFC
D. IR

A

65. Tablet computers feature touch screens that are approximately what size?
A. Between 5″ and 7″
B. Between 3″ and 5″
C. Between 7″ and 12″
D. Between 12″ and 24″

C

67. Which mobile technology device makes use of an augmented reality display?
A. Smartphone
B. Smart watch
C. Smart camera
D. Smart glasses

D

68. Which type of laptop backlight generally does not require the use of an inverter?
A. TN
B. IPS
C. CCFL
D. LED

D

69. You have traveled to the office of one of your suppliers. It does not have wireless networking, and your laptop does not have a wired network connection. If you need to get on the supplier's network, what is the best solution?
A. Install a Mini PCIe network card with an RJ-45 port.
B. Install a USB to RJ-45 dongle.
C. Install a USB to Bluetooth dongle.
D. Install a USB to Wi-Fi dongle.

B

70. You are on the phone talking to a technician who is trying to upgrade a laptop. He is having trouble identifying the Mini PCIe card. How wide should you tell the technician that the card is?
A. 27 mm
B. 30 mm
C. 51 mm
D. 60 mm

B

71. You have been asked to burn a DVD with several videos on it, but your laptop does not
have an internal optical drive. You are certain that this request will be made several
times. Which option is the best for you to install or replace a DVD burner?
A. Remove the secondary hard drive bay and install an internal DVD burner.
B. Remove the battery pack and install a DVD burner in its place.
C. Install an external DVD burner using a USB port.
D. Install an external DVD burner using the DB-15 port.

C

72. Which type of network connection is least likely to be found on a tablet computer?
A. Wi-Fi
B. Bluetooth
C. RJ-45
D. Cellular

C

73. A Lightning connector would be used with what type of device?
A. Samsung Galaxy S9
B. Fitbit Surge
C. Apple iPhone 4
D. Apple iPhone X

D

75. A guest presenter plugs an external projector into his laptop using the VGA port on the
back of the laptop. He then uses the Fn key and his video toggle switch; the projector
displays his presentation, but his laptop screen goes dark. What should he do if he wants
to see the presentation on both the projector and his laptop?
A. Install a second video driver and then use the video toggle key to switch the video
output to both screens.
B. Unplug the projector and plug it back in to synchronize it with the laptop.
C. Unplug the projector, use the video toggle key to switch the video output, and then
plug the projector back in.
D. Press the video toggle key again until the presentation is shown on both screens.

D

74. You have decided to start playing video-intensive games on your laptop computer. The
video appears jumpy and slow to respond. What should you do first to try to increase the
performance during gameplay?
A. Upgrade the video card.
B. Install additional video memory.
C. Use Windows Control Panel to increase the amount of video memory available.
D. Use the system BIOS to increase the amount of video memory available.

D

76. You need to replace a failed motherboard in a laptop computer. Which of the following
components are most likely integrated into the motherboard? (Choose two.)
A. Video card
B. Network card
C. Hard drive
D. RAM

a b

77. A user has a laptop that is intermittently locking up. Initial diagnostics indicate that the
processor is overheating. What can you do to try to remediate the issue? (Choose two.)
A. Leave the case open while the system is running to allow for better airflow and
cooling.
B. Lower the CPU voltage in the system BIOS.
C. Lower the CPU clock speed in the system BIOS.
D. Run the laptop on AC power instead of battery power.

b c

78. A client has an older Windows 7 laptop with an integrated video card. The system seems
to boot but produces no video, even with an external monitor hooked up. What can you
do to fix this?
A. Add an external USB video card and connect the monitor to it.
B. Remove the old video card, and replace it with a new internal video card.
C. Replace the motherboard.
D. Leave the old card in the system, and add an internal Mini PCIe video card.

c

79. You are upgrading a laptop with a Mini PCIe card. What type of connector does Mini PCIe use?

A. 52-pin
B. 78-pin
C. 144-pin
D. 200-pin

a

80. Which of the following are ways to input information or commands into Google Glass?
(Choose two.)
A. Touch screen
B. Touch pad
C. Voice command
D. Virtual keyboard

C B

81. Which of the following wireless communication methods are the least susceptible to
hacking? (Choose two.)
A. Wi-Fi
B. IR
C. Bluetooth
D. NFC

B d

82. Of the laptop LCD technologies, which consumes the least amount of power?
A. LED
B. IPS
C. TN
D. CCFL

c

83. What types of networking will smart cameras often have built into them? (Choose two.)
A. Bluetooth
B. IR
C. RJ-45
D. 802.11b/g/n

A d

85. A user has brought his laptop to you because the screen is intermittently flickering. Which display component is most likely causing this?
A. Backlight
B. LCD
C. Screen
D. Inverter

d

86. Which of the following wireless communication types has a maximum distance of 1 meter and requires line of sight?

A. NFC
B. Bluetooth
C. Wi-Fi
D. IR

D

87. What is the likely type of Wi-Fi antenna connector you will find on a laptop?
A. SMA-female-RP
B. N-male
C. SMA-male-RP
D. N-female

A

88. A user needs ports for external devices in addition to what his laptop is capable of
connecting. The user would like to have these devices available even without the laptop.
What device provides that additional connectivity without the laptop?
A. Docking station
B. Port replicator
C. KVM switch
D. Docking port

B

89. A warehouse manager at a factory is required to supervise productivity while walking
and taking notes. She finds the laptop awkward to type on while walking but does not
want to have to use two devices. What would you recommend she do?
A. Get a small tablet to synchronize with the laptop.
B. Place accessible workstations throughout the factory.
C. Get a laptop with a rotating or removable screen.
D. Get a smaller laptop.

C

90. After enabling your device for communication using the IEEE 802.15.1 standard, what is
the next step?
A. Entering the PIN code
B. Finding a device for pairing
C. Enter the IMAP server and port.
D. Opening the firewall for 802.15.1 traffic

B

91. When attempting to pair with a Bluetooth device, what is the typical next step?
A. Enabling Bluetooth on both devices simultaneously
B. Entering the Bluetooth password
C. Entering the Bluetooth PIN code
D. Exiting out of any running Bluetooth applications

C

92. Your client is frustrated that her Bluetooth earpiece that was working yesterday is no
longer working? As she asks you for help, what is the likely source of the problem?
A. Earpiece has paired to a different device.
B. Broken earpiece
C. Weak Wi-Fi signal
D. Bluetooth connectivity was lost.

D

93. Which mail protocol keeps all emails stored on a single device and can only be accessed
from one device?
A. IMAP
B. SMTP
C. POP3
D. S/MIME

C

94. Which mail protocol keeps all emails stored on the server, allowing messages to be
synchronized between multiple devices?
A. IMAP
B. SMTP
C. POP3
D. S/MIME

a

95. Which protocol is used for sending and receiving encrypted email?
A. S/MIME
B. SMTP
C. SNMP
D. SignE

A

96. What service is built into Apple-developed devices and permits users and subscribers to
store documents, media, and contact information off their devices?
A. iStore
B. BackCloud
C. iCloud
D. CloudOnline

c

97. What is the hosted messaging version of Microsoft's Exchange mail server that saves
customers off-site?
A. Google Inbox
B. Exchange Online
C. iExchange
D. On-Prem Exchange

b

98. What email configuration settings are commonly used when setting up email on a
device?
A. Active Directory domain name
B. Port and SSL settings
C. DNS server
D. Administrative contact

b

99. What type of update is done to mobile devices over the air?
A. PRI and PRL
B. IMEI
C. Screen resolution
D. IMSI

a

100. Which number is hard-coded into the phone and identifies your physical phone hardware
to the cellular tower?
A. PRI
B. IMSI
C. IMEI
D. MAC

c

101. Which unique mobile number identifies you as a user and is coded into the SIM card,
allowing you to transition it from one phone to another?
A. PRI
B. IMSI
C. IMEI
D. MAC

b

102. A user is traveling to a country that employs content blocking technology on the cellular
network. What would you suggest he uses to bypass the content blocking as well as keep
his mobile browsing more private?
A. S/MIME
B. PRL
C. Baseband
D. VPN

D

103. What best practice can save someone from losing her data on her mobile device if the
device is lost?
A. Synchronization
B. VPN
C. Encryption
D. Updating

A

104. A user wants a list of favorite websites to be readily available between multiple devices,
including his mobile device. What is his best option?
A. Email weblinks to self.
B. Send links to a URL shortening service.
C. Synchronize bookmarks.
D. Print web URLs to carry. system to the maximum.

C

105. When two parents wish to share appointment dates and times between devices, what is
their best option?
A. Synchronizing calendars
B. Sharing calendar passwords
C. Texting calendar data to each other
D. Emailing calendar invites to each other

A

106. What technology lets you minimize how often a user must log in for multiple services?
A. SSO
B. SMTP
C. Synchronization
D. Repudiation

A

107. A user comments he needs to use his phone to find a person's cell number because the desktop mail application's address book has some phone numbers but is missing the person's phone number. What would you suggest that user do to make life easier?

A. Copy phone numbers on one central piece of paper.
B. Verify all contact information as still current.
C. Synchronize contact information between devices.
D. Erase duplicate numbers, then manually copy missing information.

C

108. Before starting to install a new application on an older system, what should be done?
A. Verify that the operating system is compatible.
B. Confirm software requirements to install the application.
C. Upgrade the memory on the system to the maximum amount.
D. Expand the storage capacity on the

B

2-1. Which of the following network devices receives network traffic and makes a decision on whether to send it on based on the destination hardware address?
A. Hub
B. Bridge
C. Access point
D. Repeater

B

2. A technician installed a UTP splitter on one of your network segments that has CAT6e cable. What is the maximum speed supported by this connection?
A. 10 Mbps
B. 100 Mbps
C. 1 Gbps
D. 10 Gbps

B

2--3. You are installing a fiber-optic cable between two buildings. To install the cable, you
must run it through a conduit between the buildings, and access to the conduit is not
easy. Before you run the cable, you want to ensure that it's working properly. Which tool
should you use?
A. Cable tester
B. Multimeter
C. Loopback plug
D. Tone generator and probe

A

2-4. Which TCP/IP protocol, designed to download email, allows for multiple clients to be simultaneously connected to the same mailbox?
A. SMTP
B. POP3
C. IMAP
D. SMB

C

2- 5. You are using your laptop on the company network. In your web browser, you type in www.google.com and press Enter. The computer will not find Google. You open the browser on your phone, and using your cellular connection, you can open Google without a problem. Your laptop finds internal servers and can print without any issues.
What is the most likely reason you can't open Google?
A. DNS server problem
B. DHCP server problem
C. Missing subnet mask
D. Duplicate IP address

A

2- 6. A technician needs to run a network cable to a remote building, which is approximately 15 kilometers from his base station. He's not sure if any cable will span that distance.
What is the maximum distance of SMF cable?
A. 300 meters
B. 550 meters
C. 40 kilometers
D. 100 kilometers

C

2-7. You have been asked to install a run of RG-59 cable from one end of a building to the other. What is the maximum distance for this type of cable run?

A. 100 meters (328 feet)
B. 228 meters (750 feet)
C. 304 meters (1,000 feet)
D. 500 meters (1,645 feet)

B

2-8. Which one of the following TCP/IP protocols was designed as a replacement for Telnet?
A. SMB
B. SSH
C. SFTP
D. FTPS

b

2-9. Which of the following network connectivity devices operate at Layer 2 of the OSI model? (Choose two.)
A. Hub
B. Switch
C. Bridge
D. Router

B C

2-10. In IPv4, what is the function of the subnet mask?
A. It tells hosts where to route packets.
B. It differentiates between the network ID and host ID.
C. It determines which subnet the host is on.
D. It masks external networks from the host.

B

2-11. Which of the following TCP/IP protocols is connection-oriented and attempts to guarantee packet delivery?
A. IP
B. TCP
C. UDP
D. ICMP

B

2-12. Which TCP/IP protocol allows a user to log into a remote computer and manage files as if they were logged in locally?
A. FTP
B. SFTP
C. SMB
D. Telnet

D

2-13. You are given a network configuration of 155.100.63.0/26 from your ISP. When you configure your network hosts, what subnet mask should you assign them?
A. 255.255.0.0
B. 255.255.255.0
C. 255.255.255.192
D. 255.255.255.240

C

2-14. Which Wi-Fi standard specifies a maximum of 54 Mbps transmissions in the 2.4 GHz frequency range?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

C

2-15. Which TCP/IP protocol is used to provide shared access to files and printers on the network?
A. FTP
B. SSH
C. SMB
D. SNMP

C

2-16. What port does the Telnet protocol use?
A. 21
B. 22
C. 23
D. 25

C

2-17. You have just installed a wireless 802.11ac network for a client. The IT manager is
concerned about competitors intercepting the wireless signal from outside the building.
Which tool is designed to test how far your wireless signal travels?
A. Tone generator and probe
B. Protocol analyzer
C. Packet sniffer
D. Wi-Fi analyzer

D

2-18. Some of your network users are concerned about submitting confidential information to
an online website. What should you tell them?
A. It's fine, because all Internet traffic is encrypted.

B. If the website address starts with TLS://, it should be OK to submit confidential information to a trusted site.

C. If the website address starts with HTTPS://, it should be OK to submit confidential information to a trusted site.

D. Don't ever submit confidential information to any online website.

C

2-19. Which TCP/IP Internet layer protocol is responsible for delivering error messages if communication between two computers fails?
A. ICMP
B. IP
C. TCP
D. UDP

A

2-21. You are configuring a wireless 802.11n router for a small network. When setting it up,
which security option should you choose?
A. WPA2
B. WPA
C. WEP
D. SSID

A

2-20. Which type of IPv6 address identifies a single node on the network?
A. Multicast
B. Anycast
C. Unicast
D. Localcast

C

2-22. What type of network covers large geographical areas and often supports thousands of users?
A. LAN
B. WAN
C. PAN
D. MAN

B

2-23. Which TCP/IP protocol, developed by Microsoft, allows users to connect to remote computers and run programs on them?
A. RDP
B. SMB
C. CIFS
D. Telnet

A

2-24. What port does the SSH protocol use?
A. 21
B. 22
C. 23
D. 25

B

2-25. Which of the following IP addresses is not routable on the Internet?
A. 10.1.1.1
B. 11.1.1.1
C. 12.1.1.1
D. 13.1.1.1

A

2-26. Which network connectivity device does not forward broadcast messages, thereby creating multiple broadcast domains?
A. Hub
B. Switch
C. Bridge
D. Router

D

2-27. You have a desktop computer that is behaving erratically on the network. The wired connection will often disconnect without warning. Which tool should you use to
troubleshoot the network adapter?
A. Multimeter
B. Tone generator and probe
C. Loopback plug
D. Cable tester

C

2-28. Your company just expanded and is leasing additional space in an adjacent office building. You need to extend the network to the new building. Fortunately, there is a conduit between the two. You estimate that the cable you need to run will be about 300 meters long. What type of cable should you use?
A. CAT5
B. CAT5e
C. CAT7
D. MMF

D

2-29. You want to ensure that client computers can download email from external email servers regardless of the protocol their email client uses. Which ports do you open on the firewall to enable this? (Choose two.)
A. 23
B. 25
C. 110
D. 143

C D

2-30. You are installing network cabling in a highly secure facility. The cables need to be
immune to electronic eavesdropping. What type of cable should you use?
A. Fiber-optic
B. UTP
C. STP
D. Coaxial

A

2-31. Which networking device is capable of reading IP addresses and forwarding packets
based on the destination IP address?
A. Hub
B. Switch
C. Bridge
D. Router

D

2-32. Which network device is designed to be a security guard, blocking malicious data from
entering your network?
A. PoE injector
B. Bridge
C. Firewall
D. Router

C

2-33. You are manually configuring TCP/IP hosts on the network. What configuration parameter specifies the address of the router that enables Internet access?
A. Subnet mask
B. DHCP server
C. DNS server
D. Default gateway

D

2-34. A senior administrator calls you and tells you that she is working from home and trying
to use RDP, but it won't connect. What port do you need to ensure is open on the
firewall to grant her access?
A. 143
B. 443
C. 548
D. 3389

D

2-36. What type of network is most commonly associated with Bluetooth devices and covers a small area?
A. LAN
B. WAN
C. PAN
D. MAN

c

2-37. Which TCP/IP Internet layer protocol is responsible for resolving physical MAC addresses to logical IP addresses?
A. IP
B. ICMP
C. ARP
D. RARP

d

2-38. Which of the following IPv6 addresses is equivalent to an address in the 169.254.0.0/16
range in IPv4?
A. 2000::/3
B. FC00::/7
C. FE80::/10
D. FF00::/8

c

2-39. You need to configure a wireless router for an office network. The office manager wants
new devices to be able to automatically join the network and announce their presence to
other networked devices. Which service should you enable to allow this?
A. DHCP
B. NAT
C. QoS
D. UPnP

d

2-40. You are troubleshooting a computer with an IPv6 address that is in the FE80::/10 range.
Which of the following statements are true? (Choose two.)
A. The computer will not be able to get on the Internet.
B. The computer will be able to get on the Internet.
C. The computer is configured with a link local unicast address.
D. The computer is configured with a global unicast address.

A C

2-41. You have set up your web server to function as an FTP server as well. Users on the
Internet complain that they are not able to access the server using FTP clients. What port
are they trying to access the server on?
A. 21
B. 22
C. 23
D. 25
E. 80

A

2-42. Which TCP/IP port and protocol allows you to access data such as employee phone
numbers and email addresses that are stored within an information directory?
A. 427 - SLP
B. 25 - SMTP
C. 445 - CIFS
D. 389 - LDAP

D

2-43. You are configuring network hosts with static IP addresses. You have chosen to use a class B
network address. What is the default subnet mask that you should configure on the hosts?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255

B

2-44. You are installing a new network and working in a wiring closet. You need to attach
several network cables to a 110 block. Which tool should you use to perform this task?
A. Crimper
B. Cable stripper
C. Cable tester
D. Punchdown tool

D

2-45. Which of the following Internet connection types offers the fastest download speeds?
A. Cable
B. DSL
C. Fiber-optic
D. ISDN

C

2-46. Which TCP/IP protocol uses TCP ports 137-139 and 445 by default?
A. FTP
B. SSH
C. SMB
D. SNMP

C

2-47. For IPv6, which of the following statements are not true? (Choose two.)
A. Each IPv6 interface can have only one address.
B. Each IPv6 interface is required to have a link local address.
C. IPv6 addresses are incompatible with IPv4 networks.
D. IPv6 no longer uses broadcasts.

a c

2-48. Which of the following network architecture devices operate at Layer 1 of the OSI
model? (Choose two.)
A. Switch
B. Hub
C. Extender
D. Router

b C

2-49. Which TCP/IP protocol was developed by Apple and used to transfer files between
computers?
A. FTP
B. AFP
C. ATP
D. SMB

b

2-50. Which of the following IPv6 addresses is equivalent to 127.0.0.1 in IPv4?
A. ::0
B. ::1
C. ::127
D. 2000::/3

b

2-51. A technician is configuring a wireless 802.11ac router for a home network. For security
purposes, he enables the firewall. He wants to configure it so that if a computer makes
an outbound request on a specific port, subsequent inbound traffic on that port would be
allowed through the firewall. Which option does he need to configure to manage these
settings?
A. Port forwarding
B. Port triggering
C. NAT
D. QoS

b

2-52. You are asked to perform consulting work for a medium-sized company that is having
network connectivity issues. When you examine the patch panel, you notice that none
of the dozens of UTP cables are labeled. Which tool can you use to identify which cable
goes to which workstation?
A. Cable tester
B. Loopback plug
C. Punchdown tool
D. Tone generator and probe

D

2-53. Which TCP/IP protocol is responsible for dynamically assigning IP addresses to client
computers?
A. DNS
B. DHCP
C. RDP
D. LDAP

B

2-54. Which networking device works at Layer 2 of the OSI model, has multiple ports in which
each is its own collision domain, and examines the header of the incoming packet to
determine which port it gets sent to?
A. Hub
B. Switch
C. Bridge
D. Router

B

2-55. Which TCP/IP port will an email client use to push email to its email server?
A. 23
B. 25
C. 110
D. 143

b

2-56. A technician is going to set up a Wi-Fi network using standard omnidirectional
antennae. Because of the building configuration, transmitting signals for the greatest
distance is his primary criterion. Which standard should he choose?
A. 802.11a
B. 802.11g
C. 802.11n
D. 802.11ac

c

2-57. You are troubleshooting an intermittently failing CAT7 network connection. You suspect
that there is a short in the connection. Which tool can you use to determine this?
A. Tone generator and probe
B. Loopback plug
C. Multimeter
D. Crimper

c

2-58. Which TCP/IP protocol gathers and manages network performance information using devices called agents?
A. SNMP
B. SMTP
C. LDAP
D. SMB

A

2-59. In which type of office environment would you perform a cable/DSL modem
configuration?

A. Multiple buildings in a single country

B. Multiple buildings in many countries

C. Single tenant building with 300-500 employees

D. Small office or home office with 3-5 employees

d

2-60. Which Wi-Fi encryption standard was the first to include the use of a 128-bit dynamic
per-packet encryption key?
A. WEP
B. WPA
C. WPA2
D. AES

B

2-61. You are installing an 802.11n Wi-Fi network with five wireless access points. The access
points are set up so their ranges overlap each other. To avoid communications issues, what principle should you follow when configuring them?
A. Configure all access points to use the same channel.
B. Configure all access points to use adjacent channels.
C. Configure all access points to use nonoverlapping channels.
D. Channel configuration will not cause communications issues.

c

2-62. Which TCP/IP protocol is designed to send email from clients to mail servers?
A. SMTP
B. POP3
C. IMAP
D. SMB

A

2-63. You are setting up a small network in your neighbor's house. She is concerned about
wireless security, so she doesn't want to use wireless networking at all. She needs to
connect two computers to each other, but it will be impossible to run a network cable
between them. Which technology can help her network these computers?
A. Ethernet over power
B. Power over Ethernet
C. Firewall
D. Access point

a

2-64. You have been asked to install a Wi-Fi network in a building that is approximately 100 meters long and 25 meters wide. Because of cost considerations, you will need to use 802.11g. At a minimum, how many wireless access points will you need?
A. Two
B. Three
C. Four
D. Six

b

2-65. You are installing network cabling in a drop ceiling of an office space. The ceiling area is
used to circulate breathable air. What type of cable do you need to install?
A. Coaxial
B. UTP
C. Fiber-optic
D. Plenum

d

2-66. You need to install a wireless hub in a drop ceiling where there is no access to a power source. Which technology will allow you to get power to that device?
A. Ethernet over power
B. Power over Ethernet
C. Wireless access point
D. Repeater/extender

b

2-67. Which of the following IP addresses is not a private address and therefore is routable on the Internet?
A. 10.1.2.3
B. 172.18.31.54
C. 172.168.38.155
D. 192.168.38.155

c

2-68. You are configuring a wireless 802.11n router. The office manager insists that you
configure the router such that traffic from her computer receives higher priority on the
network than other users' traffic. Which setting do you need to configure to enable this?
A. QoS
B. UPnP
C. DMZ
D. Port forwarding

A

69. If you are connecting to a website that encrypts its connection using TLS, what port does
that traffic travel on?
A. 21
B. 80
C. 143
D. 443

D

2-70. Your network is currently running a mix of 802.11b and 802.11g devices. At the
end of the year, you have extra budget to upgrade some, but not all, of the wireless
infrastructure. You want to upgrade to the newest technology but still maintain
backward compatibility. Which standard should you choose?
A. 802.11g
B. 802.11ac
C. 802.11r
D. 802.11n

D

2-71. You are consulting with a small field office that needs a dedicated, digital point-to-point
network connection to its parent office. Which Internet connection type will meet this
requirement?
A. Dial-up
B. Cable
C. DSL
D. ISDN

D

2-72. What type of network spans multiple buildings or offices but is confined to a relatively
small geographical area?
A. LAN
B. WAN
C. PAN
D. MAN

D

2-73. Which of the following shorthand notations corresponds to the CIDR subnet mask
255.255.224.0?
A. /19
B. /20
C. /21
D. /22

A

2-74. You are configuring hosts on a network running IPv4. Which elements are required for
the computer to connect to the network?
A. IP address
B. IP address and subnet mask
C. IP address, subnet mask, and default gateway
D. IP address, subnet mask, default gateway, and DNS server address

B

2-75. Which TCP/IP protocol was developed by Microsoft and has been the default file and
print sharing protocol on Windows-based computers since Windows 2000?
A. CIFS
B. SMB
C. FTP
D. LDAP

A

2-76. Which of the following statements regarding IPv4 configuration is true?
A. All hosts on a network must have a unique subnet mask.
B. All hosts on a network must have their network ID set to all 1s.
C. All hosts on a network must have a default gateway.
D. All hosts on a network must have a unique host address.

D

2-77. Which Wi-Fi encryption standard uses a static key, which is commonly 10, 26, or 58
characters long?

A. WPA
B. WPA2
C. TKIP
D. WEP

D

2-78. Which TCP/IP port number does SNMP use?
A. TCP 143
B. UDP 143
C. TCP 161
D. UDP 161

D

2-79. Because of a recent security breach, your IT team shut down several ports on the external
firewall. Now, users can't get to websites by using their URLs, but they can get there by
using IP addresses. What port does the IT team need to open back up to enable Internet
access via URLs?
A. 21
B. 53
C. 67
D. 80

B

2- 80. All your network hosts are configured to use DHCP. Which IP address would indicate that a host has been unable to locate a DHCP server?

A. 192.168.1.1
B. 10.1.1.1
C. 172.16.1.1
D. 169.254.1.1

D

3-2 Which motherboard form factor measures 6.7″ × 6.7″?
A. Mini-ITX
B. Nano-ITX
C. Pico-ITX
D. Mobile-ITX

A

3-1. What is the distance limitation of the FireWire 800 standard when implemented over
fiber-optic cable?
A. 4.5 meters
B. 100 meters
C. 400 meters
D. 800 meters

B

3. Which of the following statements are not true regarding CPUs and operating systems?
(Choose two.)
A. A 32-bit OS can run only on a 32-bit CPU.
B. A 64-bit OS can run only on a 64-bit CPU.
C. A 64-bit OS can run on a 32-bit CPU or a 64-bit CPU.
D. A 32-bit OS can run on a 32-bit CPU or a 64-bit CPU

B D need double check

2-81. A technician is trying to establish a dial-up network connection using a legacy modem. What is the fastest data throughput for a modem?
A. 28.8 Kbps
B. 56 Kbps
C. 1 Mbps
D. 4 Mbps

B

2-82. You have reason to believe that several network users are actively browsing prohibited content on unsecured sites on the Internet. Which port can you disable on the firewall to immediately stop access to these websites?
A. 53
B. 67
C. 80
D. 443

C

2-83. Which TCP/IP protocol is designed to help resolve hostnames to IP addresses?
A. ARP
B. RARP
C. DHCP
D. DNS

D

2-84. You need to install an Internet connection for a forest ranger outlook tower, located far away from electrical lines. Which option would be best for broadband Internet access?
A. Cable
B. DSL
C. ISDN
D. Satellite

D

2-85. Which TCP/IP host-to-host protocol makes its best effort to deliver data but does not guarantee it?
A. IP
B. TCP
C. UDP
D. ICMP

C

2-86. What type of network is typically defined as being contained within a single office or building?
A. LAN
B. WAN
C. PAN
D. MAN

A

2-87. Which port is AFP capable of using?
A. 427
B. 443
C. 445
D. 548

D

2-88. You are installing a wireless network for a small company. It wants to have 100 Mbps or better wireless transmission rates. Which of the following standards will allow you to Provide this? (Choose two.)
A. 802.11g
B. 802.11i
C. 802.11n
D. 802.11ac

C D

2-89. What legacy network protocol allows NetBIOS-dependent computer applications to communicate over TCP/IP?
A. IPX
B. SPX
C. NetBT
D. BGP

C

2-90. What networking protocol allows systems to discover local systems and other devices?
A. DHCP
B. DNS
C. HTTP
D. SLP

D

2-91. Which of the following features does not require a managed network switch?
A. Priority of traffic
B. VLAN configuration
C. Directing Layer 2 traffic
D. Port mirroring

C

2-92. The senior network administrator struggles to configure company network devices spanning several cities. The challenge is because he is required to be on premises for the network infrastructure of each building. What would be a cost-effective solution?
A. Employ network administrators at each building.
B. Go to a flat network.
C. Train a local sales associate.
D. Employ a cloud-based network controller.

D

2-93. What is the maximum distance allowed between a power over Ethernet injector and the Ethernet device?
A. 50 meters
B. 100 meters
C. 250 meters
D. 450 meters

B

2-94. When setting up a small office, home office (SOHO) network, what end-user device configuration must be performed?
A. Network switch broadcasts configuration settings.
B. Devices utilize service location protocol.
C. NIC set with static address or be DHCP-served
D. End users configure as needed.

c

2-95. What is the typical method for IoT device configuration to connect to the wireless network?
A. DNS
B. AD
C. SLP
D. DHCP

d

2-96. What method is effective in defining how a firewall allows outbound access when the group of approved devices rarely changes?
A. MAC filtering
B. Dynamic DNS
C. Whitelist
D. Blacklist

A

2-97. What firewall rule technique allows only a known list of applications or traffic as legitimate?
A. MAC filtering
B. Dynamic DNS
C. Whitelist
D. Blacklist

C

2-98. What communication technology establishes connectivity between enabled devices only when the devices are placed within 4 cm of each other?
A. RFID
B. NFC
C. Wi-Fi
D. UHF

B

2-99. What communication technology allows for low power, close-proximity passive reading of a small tag or patch on an object?
A. RFID
B. NFC
C. Wi-Fi
D. UHF

A

2-100. What is the role of the server responsible for publishing information about the company's values, purpose, and available products or services to the public?
A. FTP server
B. Proxy server
C. File server
D. Web server

D

2-101. What server would function as a central repository of documents and provide network shared file storage for internal users?
A. FTP server
B. Proxy server
C. File server
D. Web server

C

2-102. What server sits between the protected, controlled network and the public Internet, functioning as a gatekeeper of traffic?
A. FTP server
B. Proxy server
C. File server
D. Web server

B

2-103. What type of server can host files for easy access and fetching, similar to how a web server serves web pages?
A. FTP server
B. Proxy server
C. File server
D. Web server

A

2-104. What server is added to a company infrastructure to avoid the need to attach printers to each individual desktop?
A. Syslog server
B. DNS server
C. Print server
D. Authentication server

C

2-105. What server is used to resolve domain names to IP addresses to facilitate web browsing or locating a directory resource on the network?
A. Syslog server
B. DNS server
C. Print server
D. Authentication server

B

2-106. What server is accessed each time it's necessary to challenge and validate a user's credentials in order for the user to access a network resource?
A. Syslog server
B. DNS server
C. Print server
D. Authentication server

D

2-107. What service can collect and journal all the system-generated messages produced by servers and network devices?
A. Syslog server
B. DNS server
C. Print server
D. Authentication server

A

2-108. A company wanting to monitor network traffic or host system behavior to identify suspect activity will install what type of service?
A. Proxy server
B. IDS
C. UTM
D. Email

B

2-109. What is the primary difference between an IDS and IPS?
A. IDS works both on a host and a network.
B. IDS will not actively alert on suspect activity.
C. IPS works in pairs.
D. IPS will actively react to suspect activity.

D

2- 110. Your client is interested in a security device that will take action when suspicious activity is identified, as well as filter traffic and perhaps also provide some antivirus functionality. What type of device is the client looking for?
A. Proxy server
B. Firewall
C. UTM
D. IPS

c

2- 111. Your client is now looking at improving control over all the user devices. Particularly, the client wants resource access-controlled based on policy and the users meeting a few criteria. What device would you suggest?
A. End-point management server
B. Perimeter authentication server
C. RADIUS server
D. SFTP server

A

2- 112. Last weekend you installed and booted several more computers to be ready for Monday morning. Later Monday morning you hear from employees as they come in that they cannot log in. Their desktops don't seem to want to connect. You investigate and find that each faulty workstation has a 169.254.x.x IP address. What might you look at next?
A. DHCP reservation
B. LAN connector broken
C. Windows patch unable to install
D. Corrupted Registry

A

2- 113. What network segmentation technique reduces broadcast domains?
A. VPN
B. VLAN
C. BGP
D. EIGRP

b

2- 114. What connectivity technique can ensure that your network traffic is encrypted from endpoint to endpoint?
A. VPN
B. VLAN
C. BGP
D. EIGRP

A

2- 115. Which of the follow components is not typically found in a wireless mesh network
(WMN)?
A. WMN router
B. WMN gateway
C. WMN server
D. WMN client

C

2- 116. Of the following fiber connectors, which is used for duplex (two strands instead of one)?
A. ST
B. SC
C. FC
D. RJ-11

B

2- 117. What twisted pair connectors are commonly found for telephone wire?
A. RJ-45
B. Coaxial
C. RJ-11
D. FC

c

2-118. Using the T568B wiring standard on both ends of a cable would produce what type of network cable?
A. T568B on both ends is not a working network cable.
B. T568B is a telephone wiring standard.
C. T568B on both ends is a crossover network cable.
D. T568B on both ends is a straight-through network cable.
term-221term-221

D

2- 119. What IoT device configuration most likely includes continuous remote monitoring?
A. Thermostat
B. Light switches
C. Security cameras
D. Door locks

c

2- 120. What IoT device configuration requires a microphone? (Choose two)
A. Voice-enabled smart speaker
B. Light switches
C. Door locks
D. Voice-activated Digital assistant

a d

2- 121. Which wireless networking protocol is most limited by the number of potential connected devices?
A. LTE
B. 3G
C. Zigbee
D. Z-wave

d

2- 122. Which wireless networking protocol is expected to reach speeds of 1 Gbps?
A. 3G
B. 4G
C. 5G
D. Z-wave

C

Sets with similar terms

Network+

110 terms

Lisa_Patterson10

Udemy Net+ Questions

132 terms

Anthony_Messina28

Network+

133 terms

jstirgus0786

Sets found in the same folder

Ports

27 terms

heyblank

Chapter 13 Comptia A +

73 terms

heyblank

port numbers

23 terms

heyblank

1002 terms

72 terms

heyblank

Other sets by this creator

Exam DUmppp

162 terms

heyblank

500-800

51 terms

heyblank

300-500

200 terms

heyblank

Exam Dump 2

81 terms

heyblank

Other Quizlet sets

TH-67 Flight Controls & Hydraulics (Systems I Exam…

33 terms

dmond89

PSB 2nd Exam Chp 12

72 terms

mirandaj1126

Bio 152 e2

217 terms

Sarah_Yankson

AP Biology Chapter 11 Multiple Choice: Cell Commun…

69 terms

Camdonpark

Related questions

QUESTION

What is a nontechnical method that a cybercriminal would use to gather sensitive information from an organization?

13 answers

QUESTION

As discussed earlier, Windows records a ton of information to event logs such as (3)

2 answers

QUESTION

Which risk response strategy involves purchasing insurance to protect the organization should the risk occur?

15 answers

QUESTION

Which of the answers listed below refers to a means for executing reflective DOS attack?

12 answers

Which of the following are the methods of connecting a smartphone to the Internet?

Mobile Data. It is the basic and probably the most common way to connect to Internet. ... .
Wi-Fi Networks. Wi-Fi networks are also very common ways to get Internet access for your smartphone. ... .
Portable Wi-Fi Hotspot. ... .
Bluetooth Tethering. ... .
OTG Cable. ... .
LAN Adapter. ... .
Laptop as a Wi-Fi Hotspot. ... .
Use USB Cable..

Which technology is being used when a mobile device is providing Internet access to other devices?

Wi-Fi is a wireless technology used to connect computers, tablets, smartphones and other devices to the internet. Wi-Fi is the radio signal sent from a wireless router to a nearby device, which translates the signal into data you can see and use.

What enable users with computers and mobile devices to connect to the Internet wirelessly?

A router is a hardware device that allows you to connect several computers and other devices to a single Internet connection, which is known as a home network. Many routers are wireless, which allows you to create a home wireless network, commonly known as a Wi-Fi network.