Which of the following is a way to identify logical partitions on a SCSI hard drive?
Host ID
OUI
SCSI ID
LUN
SCSI ID
Which of the following memory module form factors are used in laptop computers? (Select 2 answers)
SODIMM
ECC RAM
DIMM
MicroDIMM
C-RIMM
SODIMM
MicroDIMM
Due to size restrictions and the compact nature of laptop devices, this type of storage media has become less commonly found on new laptops.
Flash drives
Optical drives
Solid-state drives
Magnetic drives
Optical drives
What is the name of a proprietary connector type used by Apple mobile devices?
8P8C connector
Lightning connector
BNC connector
Lucent Connector (LC)
Lightning connector
Which of the following wireless security protocols has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws?
EAP
AES
WPA2
WEP
WEP
Which of the following answers list(s) example(s) of storage media type(s) that can be read, but not written to? (Select all that apply)
A. BD-R
B. CD-ROM
C. DVD-RW
D. BD-RE
E. DVD-ROM
F. CD-RW
CD-ROM
DVD-ROM
What is the name of a laptop component that provides the function of a pointing device?
Touchpad
A laptop’s Bluetooth module enables communication over:
WWAN
VLAN
WLAN
WPAN
WPAN
Which type of technology enables contactless payment transactions?
NFC
SDN
PED
WAP
NFC
What are the characteristic features of a WPA/WPA2 Enterprise mode? (Select 2 answers)
Suitable for large corporate networks
Does not require an authentication server
Suitable for all types of wireless LANs
Requires RADIUS authentication server
Suitable for large corporate networks
Requires RADIUS authentication server
Which of the following is an example of Write Once, Read Many (WORM) storage media type?
BD-R
Flash drive
CD-RW
Magnetic tape
CD-ROM
BD-R
Which of the following answers refers to a display technology most commonly used in modern laptops?
LCD
Due to the compact nature of laptop devices, all laptop GPUs come in the form of CPU-integrated graphics.
True
False
False
A popular, short-range wireless technology used for connecting various personal devices in a WPAN is known as:
802.11
NFC
Bluetooth
Z-Wave
Bluetooth
Which of the following EAP methods offers the highest level of security?
PEAP
EAP-FAST
EAP-TLS
EAP-TTLS
EAP-TLS
Examples of storage media that can be erased and written to multiple times include: (Select all that apply)
BD-R
CD-ROM
DVD-RW
BD-RE
DVD-ROM
CD-RW
DVD-RW
BD-RE
CD-RW
Which of the answers listed below refers to the location of a laptop's Wi-Fi antenna?
Near the top, inside display case.
A type of laptop expansion slot characterized by a much smaller form factor when compared to its desktop counterpart is known as:
mITX
MicroSD
mini PCIe
PCI-X
mini PCIe
A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection with the right cell phone tower is called:
PRL
RIS
PRI
PII
PRL
A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is known as:
PEAP
TKIP
CCMP
WPA2
TKIP
Which of the following are examples of SSD host interfaces? (Select 3 answers)
MAPI
M.2
PCIe
GDI
SATA
ACPI
SATA
PCIe
M.2
What type of power jack can be found on a laptop case?
DC
What is the most common battery type that can be found in modern portable devices?
Alkaline
Nickel–metal hydride
Lithium-ion
Nickel-cadmium
Lithium-ion
Which of the following is the unique number used to identify a physical mobile device?
MAPI
IMEI
SSID
IMSI
IMEI
Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three.
True
False
True