FNTA FINAL REVIEW QUESTIONS WITH
COMPLETE SOLUTION
What should be your first step when troubleshooting a network connection that uses a cable modem? -
Ping local devices using their IP addresses.
Which of the following is generally a component of a BYOD policy? - Scope of control
Which term describes a compact personal computer that relies on a touch screen for input, generally
uses a solid-state drive instead of a traditional hard disk,and relies on wireless or mobile networks for
connectivity? - Tablet
What does the following represent?
2E22:4F00:000E:00D0:A267:97FF:FE6B:FE34 - An IPv6 address
A friend has called you about a possible computer problem because her computer is acting strangely.
Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the
computer sometimes reboots itself without warning. When you inspect your friend's system, you notice
that several ports are open. Which of the following is most likely the cause of these symptoms? - The
computer has been infected with an illicit server.
The Windows Device Manager is a tool that enables you to perform a variety of tasks, including: -
Change a resource assignment.
Which type of attack involves the installation of malicious code on personal computers or servers that
redirects Internet Traffic from a legitimate Web site to an identical-looking but malicious imposter Web
site? - Pharming
The capabilities of cellular networks have improved greatly since their original development for analog
voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive
needs. A benefit of 4G networks is that they: - Provide fast transmission rates equivalent to DSL or
broadband-cable.
Selena has run out of memory on her phone's SD card. She has decided to store the files she has
accumulated on a third-party cloud service provider's drives. Which of the following is a typical issue
that she may encounter? - The files become unavailable whenever Internet connectivity is lost.
Which of the following computer system maintenance tasks can help improve file access performance? -
Defragment the drive using the following command: defrag c: -w
Which of the following is a security threat commonly associated with cloud-based services? - Hypervisor
vulnerabilities
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the
computer lab to give the final exam. As an alternative, he asked students to bring their own devices
, (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this
implementation? - Student devices sending unsecured data
What is the biggest security concern with wireless networks? - Wireless encryption algorithms must be
implemented.
Gwen works for a small company where she has been asked to find a cost-effective option for providing
comprehensive customer service. The finance, technical support, sales and customer service
departments all need to share information about their customers. Gwen is considering adoption of a
customer relationship management (CRM) application. Which of the following would be the most cost-
effective solution? - She can contract with a cloud service provider to host the CRM that her company's
employees can access.
Sally is a network technician at Acme Corporation. She has been directed to configure the network
adapter for a company laptop so that it can be used to connect to the company network and the
Internet. What is one of the required TCP/IP settings that she will need to configure? - Default gateway
Which term describes the practice of actively collecting wireless networking data from companies and
individuals? - War driving
Jose is experiencing performance problems with his notebook computer that he purchased a year ago.
Upon discussing this issue with him, you learn that he has never deleted any temporary files since
owning the device. What can Jose do to fix this problem most efficiently? - Use the Windows Disk
Cleanup utility.
Which of the following is a drawback to using Wired Equivalent Privacy (WEP)? - Symmetric-key
encryption is susceptible to cracking.
When using cloud-based services to host company data, a company's disaster recovery plan should
include strategies for: - Creating redundancy and using multiple cloud service providers.
Which of the following statements about virtualization is true? - Virtualization enables you to run
multiple operating systems and applications on a single computer.
When a PC computer device wants to communicate with the processor, which system resource does it
use? - IRQ
Server-based networks typically contain centralized network resources, which are usually not available
on peer-to-peer (P2P) networks. Which of the following examples describes a server based network? -
Three network clients connecting to a file server
On your Windows laptop, you store all your vacation photos and your entire digital music library.
Concerted about data loss, your perform frequent backups. Your laptop has recently been stolen and you
need to restore your files to a desktop computer. Which Windows tool would you use to recover and set
up the saved copies of your files onto your desktop computer? - Backup and Restore
Acme Corp. is a small manufacturing company. To reduce IT infrastructure costs, it uses cloud-based
services extensively and strives to have the least amount of IT equipment onsite. Last year, Acme
suffered a failure that resulted in significant down time and data loss. Management has decided to
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller knowledgeNest. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.