Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
1.
|
Which of the following indicates the most concise abbreviation of the IPv6
address FEFE:0000:0000:0000:0002:0000:0000:0001?
a. | FEFE::2::1 | c. | FEFE::2:0:0:1 | b. | FEFE::0002:0000:0000:0001 | d. | FEFE:0:0:0:2:0:0:1 |
|
|
2.
|
Your mobile device appears to be contacting a remote server to upload your
personal data. Which of the following should be performed first to protect your personal
data?
a. | Install anti-malware software. | c. | Verify you are on the correct Wi-Fi
network. | b. | Switch to airplane mode. | d. | Perform a factory reset. |
|
|
3.
|
A smartphone user entered an incorrect passcode on his phone several times in a
row, which locked the device. Which of the following steps should the user take
first?
a. | Turn off multifactor authentication. | c. | Disable full device
encryption. | b. | Perform a reset on the device. | d. | Wait a few minutes for the phone to
automatically unlock. |
|
|
4.
|
Which of the following is best practice to minimize the chance of infecting your
mobile device with malware?
a. | Install apps only from untrusted sources. | c. | Keep the device fully
charged. | b. | Install apps only from trusted sources. | d. | Perform regular
backups. |
|
|
5.
|
A mobile device you are troubleshooting is experiencing a sharp decrease in
performance after an hour of operation. The user powers the device off each evening, and when it is
powered on, performance returns to normal. After an hour of operation, performance
degrades. Which of the following is the best action to take to resolve this
issue?
a. | Reset the device to factory defaults. | c. | Close or disable all unused running
apps. | b. | Update the mobile device firmware. | d. | Adjust the brightness
control. |
|
|
6.
|
A mobile device user has tried to install a new app numerous times without
success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an
attempt to get the app to install. Which of the following steps should the user take
next?
a. | Back up all user data and perform a factory reset. | c. | Disable full device
encryption. | b. | Check for sufficient available storage space. | d. | Generate a new public
key. |
|
|
7.
|
John just bought a used iPad from a friend who had lost the charging cable. John
notices that the cable is like the charging cable for his Android smartphone, though it is not quite
the same. What type of cable will John need to purchase to replace the iPad’s
charger cable?
a. | Micro USB | c. | USB C | b. | Lightning | d. | Mini HDMI |
|
|
8.
|
Mark has been asked to set up several smartphones to connect to his
company’s email server. The company wants Mark to set them up so they can be synchronized
between multiple email clients on multiple devices. What protocol should Mark use to set
up the company smartphones?
a. | POP3 | c. | VPN | b. | IMAP | d. | Bluetooth |
|
|
9.
|
Angela recently purchased a new Android smartphone. While purchasing the phone,
Angela was told that she would need to set up a new email account for the phone. Which
commercial email provider should Angela use for her new Android phone?
a. | Gmail | c. | Microsoft Exchange Online | b. | Yahoo!
Mail | d. | iCloud |
|
|
10.
|
You are troubleshooting a Windows workstation that is having problems
communicating with the host at IP address 1.2.3.4. What utility will you use at the
command line to determine where the communication is stopping?
a. | ipconfig /all | c. | tracert 1.2.3.4 | b. | ping 1.2.3.4 | d. | netstat |
|
|
11.
|
You are troubleshooting a mobile device that will not pair with a Bluetooth
headset. The device was functioning properly with the headset until a recent corporate-wide OS
update. No other mobile devices in the organization are exhibiting this issue with Bluetooth
headsets. Which of the following is the first step you will take to resolve this
issue?
a. | Reset the network settings in the mobile device Settings app. | c. | Update the radio
firmware in the mobile device. | b. | Replace the Bluetooth headset with a new
pair. | d. | Forget all Wi-Fi
networks on the mobile device |
|
|
12.
|
Which of the following aspects of cloud computing allows a service provider to
limit a customer’s use of a particular resource based on a service agreement between the
provider and the customer?
a. | Rapid elasticity | c. | Metered service | b. | On-demand | d. | Measured
service |
|
|
13.
|
A technician is troubleshooting a printer connected to a computer via USB. The
printer will print using the controls at the printer but fails to print from the
computer. Which of the following steps should be taken next?
a. | Check for low memory errors on the printer. | c. | Verify the printer is powered
on. | b. | Make sure printing paper is installed. | d. | Verify the USB cable is
attached. |
|
|
14.
|
Which of the following printer issues is most likely resolved by performing a
calibrate function on a laser or inkjet printer?
a. | Misaligned colors on printed page. | c. | Misfeeds (no paper being pulled
from the paper tray) | b. | Voids in one or more colors on a printed
page. | d. | Multiple sheets
pulled from the paper tray at one time. |
|
|
15.
|
Which of the following could be a major concern for implementing cloud computing
for business-critical services?
a. | Incompatible software, hardware, or operating systems. | c. | A cloud provider’s inability
to scale up or down. | b. | Being charged for computing services that go
unused. | d. | An intermittent or
unavailable Internet connection. |
|
|
16.
|
A server provides the necessary IP configuration to your network host so the
host can communicate on the network. If this service malfunctions, your device will not be able to
utilize the network. What server provides this service?
a. | DHCP server | c. | Proxy server | b. | DNS server | d. | Syslog server |
|
|
17.
|
Your company received a call from a historical society inquiring about the
possibility of networking a two-century-old building with no existing network. In 1924, someone added
electrical outlets to the building, but the layout and design of the building prohibits adding any
additional copper or fiber cable. You completed a wireless site survey and concluded that wireless
networking is out of the question and will not properly function due to environmental
interference. Which of the following could be used to network
this building?
|
|
18.
|
A user is unable to install virtualization software on a Windows 8.1 computer.
The user verified the host has sufficient RAM, plenty of available free disk space, and a multicore
processor. Which of the following is the most likely cause for this behavior?
a. | Windows 8.1 does not support Type 2 hypervisors. | c. | The user does not have a valid
product license key. | b. | The motherboard does not support
hardware-assisted virtualization. | d. | The system is incompatible with Type 1 hypervisors. |
|
|
19.
|
Which of the following creates an environment that behaves in a hardware-like
manner to run software meant for other hardware?
a. | Virtualization | c. | Virtual desktop | b. | Emulator | d. | Zero client |
|
|
20.
|
A small bank with several regional branches is searching for a solution to
consolidate its business services into a single site with centralized management. The service should
provide secure resources for use by the bank, and these resources must be isolated from any other
organization using the same service provider. Which of the following will best meet the
needs of the bank?
a. | Hybrid cloud | c. | Community cloud | b. | Private cloud | d. | Public cloud |
|
Multiple Response Identify one
or more choices that best complete the statement or answer the question.
|
|
21.
|
Frank is traveling for work and has discovered that he forgot an important file.
The good news is the file is in cloud storage. Unfortunately, Frank’s laptop cannot connect to
the airport’s Wi-Fi. How can Frank download this important file? (Select all that
apply.)
|
|
22.
|
A mobile device user is having problems keeping malware off his device. The user
is continuously removing offending apps and regularly running a check for OS updates. After a short
period of relief, the malware continues to be a problem. Which of the following are the
best actions for the user to take? (Select TWO.)
|
|
23.
|
A technician is working at a client’s office after hours and needs two
cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is
for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The
other cable is for an Ethernet connection from the computer to the existing keystone jack on the
wall. The technician has the necessary wire and connectors to make the cables. Which of
the following tools will the technician use to make the cables and then verify that they both work
properly? (Select THREE.)
|
|
24.
|
Which of the following technologies provides a method for personalizing
network-connected laptop and desktop computers with only the apps each individual user needs without
complicated customization? (Select TWO.)
|
|
25.
|
A Windows computer is shared between several users, each with his own local user
account. Each user has his own dedicated, uniquely configured VM stored in a public folder on the
computer. Which of the following steps should be taken to secure the VMs so no user can
copy or delete another user’s VM files? (Select TWO.)
|
|
26.
|
The accounting department moved its network-attached printer from one side of
the office to a more centralized location, making the printer much more accessible to all accounting
users. Since the move, the users have not been able to print to the printer. The printer powers on
and shows it is ready to accept print jobs. The printer configuration page shows the following
output. You disconnect
the patch cable from the keystone jack at the new location and move the printer and cable to
reconnect it at the original location. The printer begins printing the jobs that failed to print
earlier. Which of the following are the most likely reasons for the printer failing to
print at the new location? (Select TWO.)
|
|
27.
|
Molly, a technician, has been tasked with researching an emulator for the
software developers to test cross-platform applications on various PCs and a variety of mobile
devices. Which of the following will be a required step in selecting an emulator?
(Select TWO.)
|
|
28.
|
What methods are used to assign TCP/IP parameters to network hosts? (Select
TWO.)
|
|
29.
|
The administrative assistant of the company’s CEO is asking about a
printer for her use only. It seems the shared department printer is overused, making the assistant
wait to print the CEO’s last minute documents. Which of the following technologies
will best meet the administrative assistant’s request? (Select TWO.)
|
|
30.
|
Which of the following are secure protocols, ports, services, or applications?
(Select TWO.)
|