Multiple Response Identify one
or more choices that best complete the statement or answer the question.
|
|
1.
|
A Windows computer is shared between several users, each with his own local user
account. Each user has his own dedicated, uniquely configured VM stored in a public folder on the
computer. Which of the following steps should be taken to secure the VMs so no user can
copy or delete another user’s VM files? (Select TWO.)
|
|
2.
|
The accounting department moved its network-attached printer from one side of
the office to a more centralized location, making the printer much more accessible to all accounting
users. Since the move, the users have not been able to print to the printer. The printer powers on
and shows it is ready to accept print jobs. The printer configuration page shows the following
output. You disconnect
the patch cable from the keystone jack at the new location and move the printer and cable to
reconnect it at the original location. The printer begins printing the jobs that failed to print
earlier. Which of the following are the most likely reasons for the printer failing to
print at the new location? (Select TWO.)
|
|
3.
|
Molly, a technician, has been tasked with researching an emulator for the
software developers to test cross-platform applications on various PCs and a variety of mobile
devices. Which of the following will be a required step in selecting an emulator?
(Select TWO.)
|
|
4.
|
Which of the following are secure protocols, ports, services, or applications?
(Select TWO.)
|
|
5.
|
What methods are used to assign TCP/IP parameters to network hosts? (Select
TWO.)
|
|
6.
|
A mobile device user is having problems keeping malware off his device. The user
is continuously removing offending apps and regularly running a check for OS updates. After a short
period of relief, the malware continues to be a problem. Which of the following are the
best actions for the user to take? (Select TWO.)
|
|
7.
|
Frank is traveling for work and has discovered that he forgot an important file.
The good news is the file is in cloud storage. Unfortunately, Frank’s laptop cannot connect to
the airport’s Wi-Fi. How can Frank download this important file? (Select all that
apply.)
|
|
8.
|
Which of the following technologies provides a method for personalizing
network-connected laptop and desktop computers with only the apps each individual user needs without
complicated customization? (Select TWO.)
|
|
9.
|
A technician is working at a client’s office after hours and needs two
cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is
for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The
other cable is for an Ethernet connection from the computer to the existing keystone jack on the
wall. The technician has the necessary wire and connectors to make the cables. Which of
the following tools will the technician use to make the cables and then verify that they both work
properly? (Select THREE.)
|
|
10.
|
The administrative assistant of the company’s CEO is asking about a
printer for her use only. It seems the shared department printer is overused, making the assistant
wait to print the CEO’s last minute documents. Which of the following technologies
will best meet the administrative assistant’s request? (Select TWO.)
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
11.
|
John just bought a used iPad from a friend who had lost the charging cable. John
notices that the cable is like the charging cable for his Android smartphone, though it is not quite
the same. What type of cable will John need to purchase to replace the iPad’s
charger cable?
a. | Mini HDMI | c. | USB C | b. | Lightning | d. | Micro USB |
|
|
12.
|
A smartphone user entered an incorrect passcode on his phone several times in a
row, which locked the device. Which of the following steps should the user take
first?
a. | Disable full device encryption. | c. | Wait a few minutes for the phone to
automatically unlock. | b. | Turn off multifactor
authentication. | d. | Perform a
reset on the device. |
|
|
13.
|
Mark has been asked to set up several smartphones to connect to his
company’s email server. The company wants Mark to set them up so they can be synchronized
between multiple email clients on multiple devices. What protocol should Mark use to set
up the company smartphones?
a. | Bluetooth | c. | VPN | b. | POP3 | d. | IMAP |
|
|
14.
|
Your mobile device appears to be contacting a remote server to upload your
personal data. Which of the following should be performed first to protect your personal
data?
a. | Switch to airplane mode. | c. | Install anti-malware
software. | b. | Perform a factory reset. | d. | Verify you are on the correct Wi-Fi network. |
|
|
15.
|
A technician is troubleshooting a printer connected to a computer via USB. The
printer will print using the controls at the printer but fails to print from the
computer. Which of the following steps should be taken next?
a. | Make sure printing paper is installed. | c. | Verify the USB cable is
attached. | b. | Verify the printer is powered on. | d. | Check for low memory errors on the
printer. |
|
|
16.
|
Which of the following could be a major concern for implementing cloud computing
for business-critical services?
a. | An intermittent or unavailable Internet connection. | c. | Being charged for computing
services that go unused. | b. | A cloud provider’s inability to scale up
or down. | d. | Incompatible
software, hardware, or operating systems. |
|
|
17.
|
Which of the following printer issues is most likely resolved by performing a
calibrate function on a laser or inkjet printer?
a. | Misaligned colors on printed page. | c. | Multiple sheets pulled from the
paper tray at one time. | b. | Voids in one or more colors on a printed
page. | d. | Misfeeds (no paper
being pulled from the paper tray) |
|
|
18.
|
A mobile device you are troubleshooting is experiencing a sharp decrease in
performance after an hour of operation. The user powers the device off each evening, and when it is
powered on, performance returns to normal. After an hour of operation, performance
degrades. Which of the following is the best action to take to resolve this
issue?
a. | Close or disable all unused running apps. | c. | Adjust the brightness
control. | b. | Update the mobile device firmware. | d. | Reset the device to factory
defaults. |
|
|
19.
|
A server provides the necessary IP configuration to your network host so the
host can communicate on the network. If this service malfunctions, your device will not be able to
utilize the network. What server provides this service?
a. | Syslog server | c. | DNS server | b. | Proxy server | d. | DHCP server |
|
|
20.
|
A user is unable to install virtualization software on a Windows 8.1 computer.
The user verified the host has sufficient RAM, plenty of available free disk space, and a multicore
processor. Which of the following is the most likely cause for this behavior?
a. | The user does not have a valid product license key. | c. | The motherboard does not support
hardware-assisted virtualization. | b. | The system is incompatible with Type 1
hypervisors. | d. | Windows 8.1
does not support Type 2 hypervisors. |
|
|
21.
|
You are troubleshooting a Windows workstation that is having problems
communicating with the host at IP address 1.2.3.4. What utility will you use at the
command line to determine where the communication is stopping?
a. | ipconfig /all | c. | tracert 1.2.3.4 | b. | netstat | d. | ping 1.2.3.4 |
|
|
22.
|
A mobile device user has tried to install a new app numerous times without
success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an
attempt to get the app to install. Which of the following steps should the user take
next?
a. | Check for sufficient available storage space. | c. | Back up all user data and perform a
factory reset. | b. | Disable full device encryption. | d. | Generate a new public
key. |
|
|
23.
|
Angela recently purchased a new Android smartphone. While purchasing the phone,
Angela was told that she would need to set up a new email account for the phone. Which
commercial email provider should Angela use for her new Android phone?
a. | Microsoft Exchange Online | c. | Gmail | b. | Yahoo!
Mail | d. | iCloud |
|
|
24.
|
Which of the following indicates the most concise abbreviation of the IPv6
address FEFE:0000:0000:0000:0002:0000:0000:0001?
a. | FEFE:0:0:0:2:0:0:1 | c. | FEFE::2:0:0:1 | b. | FEFE::0002:0000:0000:0001 | d. | FEFE::2::1 |
|
|
25.
|
Which of the following aspects of cloud computing allows a service provider to
limit a customer’s use of a particular resource based on a service agreement between the
provider and the customer?
a. | On-demand | c. | Metered service | b. | Rapid elasticity | d. | Measured
service |
|
|
26.
|
Your company received a call from a historical society inquiring about the
possibility of networking a two-century-old building with no existing network. In 1924, someone added
electrical outlets to the building, but the layout and design of the building prohibits adding any
additional copper or fiber cable. You completed a wireless site survey and concluded that wireless
networking is out of the question and will not properly function due to environmental
interference. Which of the following could be used to network
this building?
|
|
27.
|
You are troubleshooting a mobile device that will not pair with a Bluetooth
headset. The device was functioning properly with the headset until a recent corporate-wide OS
update. No other mobile devices in the organization are exhibiting this issue with Bluetooth
headsets. Which of the following is the first step you will take to resolve this
issue?
a. | Reset the network settings in the mobile device Settings app. | c. | Forget all Wi-Fi
networks on the mobile device | b. | Replace the Bluetooth headset with a new
pair. | d. | Update the radio
firmware in the mobile device. |
|
|
28.
|
A small bank with several regional branches is searching for a solution to
consolidate its business services into a single site with centralized management. The service should
provide secure resources for use by the bank, and these resources must be isolated from any other
organization using the same service provider. Which of the following will best meet the
needs of the bank?
a. | Community cloud | c. | Public cloud | b. | Hybrid cloud | d. | Private cloud |
|
|
29.
|
Which of the following creates an environment that behaves in a hardware-like
manner to run software meant for other hardware?
a. | Virtualization | c. | Emulator | b. | Virtual desktop | d. | Zero client |
|
|
30.
|
Which of the following is best practice to minimize the chance of infecting your
mobile device with malware?
a. | Install apps only from trusted sources. | c. | Perform regular
backups. | b. | Keep the device fully charged. | d. | Install apps only from untrusted
sources. |
|