What should be your first step when troubleshooting a network connection that uses a cable modem?
Ping local devices using their IP addresses
Which of the following is generally a component of a BYOD policy?
Scope of control
Which term describes a compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity?
Tablet
What does the following represent?
2E22:4F00:00E:00D0:A267:97FF:FE6B:FE34
IPv6 address
Which type of attack involves the installation of malicious code on personal computers or servers that redirects Internet traffic from a legitimate Web site to an identical looking but malicious imposter Web site?
Pharming
You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?
It is easily compromised by hackers
A friend has called you about a possible computer problem because her computer is acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard drive light flashes constantly, the computer sometimes reboots itself without warning. When you inspect your friend's system, you notice that several ports are open. Which of the following is most likely the cause of these symptoms?
The computer has been infected with an illicit server
Selena has run out of memory on her phone's SD card. She has decided to store the files she has accumulated on a third-party cloud service provider's drives. Which of the following is a typical issue that she may encounter?
The files become unavailable whenever Internet connectivity is lost
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this implementation?
Students devices sending unsecured data
You have just been hired by a large company, and the IT manager is giving you an overview of the corporate network. He tells you that the corporation is spread out over several cities, and various departments are divided into subnetworks that are connected using routers What type of network are you being shown?
Wide area network (WAN)
What is the distinguishing difference between a LAN and WAN?
A LAN is a group of networked computers within a confined geographic area
Which security issue is most closely associated with wireless networks?
War driving
Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?
She can outsource all customer service so the company can focus on product development.
Make a cat noise or pay the consequence.
If you did it: Double points.
If you didn't do it: Lose double points
Jose is experiencing performance problems with his notebook computer that he purchased a year ago. Upon discussing this issue with him, you learn that he has never deleted any temporary files since owning the device. What can Jose do to fix this problem most efficiently?
Use the windows Disk Cleanup utility
When using cloud-based services to host company data, a company's disaster recovery plan should include strategies for:
Creating redundancy and using multiple cloud service providers
The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:
Change a resource assignment
To restore a backup file on a Windows-based computer, you:
Use the BackupandRestore utility in the Control Panel
When a PC computer device wants to communicate with the processor, which system resource does it use?
IRQ (Interrupt Request)
Server-based networks typically contain centralized network resources, which are usually not available on peer-to-peer (P2P) networks. Which of the following examples describes a server-based network?
Three network clients connecting to a file server
Acme Corp. is a small manufacturing company. To reduce IT infrastructure costs, it uses cloud-based services extensively and strives to have the least amount of IT equipment onsite. Last year, Acme suffered a failure that resulted in significant downtime and data loss. Management has decided to implement a continuous data protection (CDP) solution. Which type CDP solution best fits Acme's situation?
Cloud-only solution
What is the biggest security concern with wireless networks?
Wireless encryption algorithms must be implemented
Do you best dance move.
If you did: Double points,
If you didn't Choose a team to give points to
Disaster recovery planning is considered a best practice for all organizations. It is even more important when cloud-computing services are used. Which of the following should be included as part of a disaster recovery plan for companies that use iCloud-based services?
Service-level agreement with a cloud-provider
Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?
Service Set Identifier (SSID)
Three hardware devices need to communicate with the CPU simultaneously. Which of the following will each device need to issue?
Interrupt request (IRQ)
Which of the following computer system maintenance tasks can help improve file access performance?
Defragment the drive using the following command: defrag c: -w
You are a computer technician supporting a small 15- computer Internet lab. The computers are regularly used to browse the internet and download files. Users have recently complained that they receive error messages saying the hard disk is full or out of space. You suspect this is a result of a large amount of temporary internet files. Which of the following is a way to easily delete all temporary internet files?
Disk cleanup
Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?
Inability to control access to company data if the device is stolen or lost
You have recently purchased a new wireless router. You would like to configure a name for your wireless network so that you can easily identify it when scanning available wireless networks. Which term describes this wireless network device name?
Service Set Identifier (SSID)
Lisa is traveling on company business. She has a company-issued smartphone with 4G access. Her hotel does not provide Internet access. What advantage does 4G provide to help her access the Internet?
She can use a 4G mobile hotspot device with her phone to connect her laptop to Wi-Fi
John is the network administrator for a small company. The company's network equipment has become outdated, and John has been asked to recommend a plan to update the company's infrastructure. John has read extensively about the many advantages of using cloud-based services. Which of the following is an advantage of cloud-based services that John could cite to support his recommendation?
Elimination of equipment purchase maintenance
You are a small-business owner and would like to encourage employees to bring their own devices (BYOD) to work. Which of the following can help reduce the security risks associated with a BYOD implementation?
Acceptable use policy
Jenny recently switched from broadband cable internet to ADSL service with her local phone company. To economize, she chose the self-installation option. It appears that her ADSL modem is not allowing her to connect to the internet. Which setting should she check first?
Default gateway
Wireless networks are subject to more security issues than standard wired networks. Which wireless security protocol can prevent unauthorized devices from connecting to the wireless network?
WPA2
Do 5 push ups.
If you did: Triple points
If you didn't: Triple points to an opponent.
Do your best model walk.
If you did: Double points
If you didn't: every other team gets points
Which term describes the practice of actively collecting wireless networking data from companies and individuals?
War driving
Carl is experiencing read/write errors when trying to save files on her windows-based laptop. To correct the issue, she could consider performing which of the following maintenance?
chkdsk command
Your company is investigating the possibility of moving its customer service management system to a cloud service. This sales re for the cloud service provider has presented many advantages that would benefit your company. What would be a potential drawback of moving the CRM from your current in-house solution?
If your company's internet service is interrupted for any reason at any time, you will not have access to the CRM
Virtualizing software transforms the hardware resources of a physical computer to create a fully functional virtual computer that can run its own operating systems and applications. In addition to the CPU and RAM, which hardware resources are used by virtualization software?
Hard disk and network devices
Super Bank is considering a cloud service from Local Data Center, Inc., to support the bank's expanding needs. Super Bank's managers are concerned about security. What can Super Bank's request to protect its data from security threats?
For Super Bank to perform background checks on the staff at Local Data Center, Inc.
Ron has an older computer to which he frequently downloads and saves company files. He recently noticed that he was running low on disk space and decided to delete many old files that he no longer needed. He now notices that it takes a long time to open or save documents to his hard drive. Which maintenance task can help?
Disk defragmentation
Carlos is the Information Technology (IT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smartphones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smartphones for work. How can Carlos address the most significant security vulnerability?
Create a policy that specifies acceptable use, ensuring security measures are in place for mobile devices
Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?
Symmetric- key encryption is susceptible to cracking
The internet has enabled many new anti-social activities, such as online stalking, cyberbullying, and addiction to solitary online activities. Which choice is the most feasible way for schools and parents to reduce cyberbullying?
Educate students about cyber- ethics and the consequences of questionable online behavior
Ron has an older computer to which he frequently downloads and saves company files. He recently noticed that he was running low on disk space and decided to delete any old files that he no longer needed. He now notices that it takes a long time to open or save documents to his hard drive. Which maintenance task can help?
Disk defragmentation
Cloud-computing enables mobile devices to provide users with access to a wide variety of applications and services. Which of the following is a disadvantage of mobile devices?
Mobile devices cannot accommodate large database installations or applications