Npower ITF+ Study Guide: Questions And Answers (A+)
The broadcast signal from a recently installed wireless acess point is not as
strong as expected. Which of the following actions would BEST improve the
signal strength?
Select one:
A. Update from 802.11b to 802.11g
B. Ensure source of EMI are removed
C: Enable WPA2-Enterprise
D: Use WiFi Protected Setup Right Ans - B: Ensure source of EMI are
removed,
Electromagnetic interference can significantly impact wireless signals,
causing them to be weakened or even lost. Removing any sources of EMI, such
as other electronic devices or appliances, can help improve the wireless signal
strength.
A user is getting an error message when trying to go to a website. A technician
asks the user a few questions to find out more about the issue. The technician
opens a browser locally and browses to the same site as the user. Which of the
following troubleshooting steps is the technician using by browsing to the
same site?
Select one:
A. Establish a plan of action
B. Find the root cause
C. Duplicate the problem
D. Gather information Right Ans - C: Duplicate the problem,
Duplicating the problem is an essential step in troubleshooting any technical
issue. By browsing to the same site, the technician is attempting to reproduce
the error that the user is experiencing, which is a crucial step in isolating the
root cause of the issue.
Which of the following relational database constructs is used to ensure valid
values are entered for a column?
Select one:
A. Permissions
B. Constraint
,C. Hypervisor type 2
D. Schema Right Ans - B: Constraint,
A constraint is a rule that is defined in a relational database to ensure the
validity and accuracy of the data that is entered into it. Constraints can be
applied to one or more columns in a database table and can be used to enforce
a wide range of rules, such as data type, uniqueness, and foreign key
relationships.
Application Architecture models have how many layers?
Select one:
A. 2
B. 5
C. 1
D. 3 Right Ans - D: 3,
The three layers of application architecture models are:
Presentation layer
Business layer
Data storage layer
Which of the following actions is the FINAL step in the standard
troubleshooting methodology?
Select one:
A. Create a new theory of cause
B. Research the problem online
C. Impement preventive measures
D. Documnet the soultion and cause Right Ans - D: Documnet the soultion
and cause,
The standard troubleshooting methodology typically involves several steps,
such as:
Identify the problem
Establish a theory of probable cause
Establish a plan of action and implement a solution
Verify the solution and full system functionality
mplement preventive measures
Document the solution and cause
,Which of the following would work BEST stored as a flat file rather than
stored in a database?
Select one:
A. Contact list
B. Directions to doctor's office
C. Movie theater locations.
D. Store inventory Right Ans - A: Contact list,
A flat file database is a database that stores data in a plain text file, where each
line of the file represents a record and each field within the record is
separated by a delimiter, such as a comma or a tab.
An administrator grants permission for a user to access data in a database.
Which of the following actions was performed?
Select one:
A. Data gathering
B. Data manipulation
C. Data definition
D. Data correlation Right Ans - C: Data definition,
Defining the user's access privileges (permissions).
A programmer needs to store output in a place that can be accessed as quickly
as possible. The data does not need to remain persistent. Which of the
following is the BEST option for storing the data?
Select one:
A. Relational database
B. Solid state drive
C. Memory
D. Flat file Right Ans - D: Flat file, Memory is faster, however, harder to
access, Flat file, is the fastest to access. Does not need to remain persistent
A technician is installing a new wireless network and wants to secure the
wireless network to prevent unauthorized access. Which of the following
protocols would be the MOST secure?
Select one:
, a. WPA
b. SSID
c. WEP
d. WPA2 Right Ans - D: WPA2,
WEP, old/outdated/weak encryption -> WPA, okay encryption/decent
security protocols -> WPA2 newest/most secure
Which of the following network protocols will MOST likely be used when
sending and receiving Internet email? (Choose two.)
Select one or more:
A. ICMP
B. HTTPS PoP3
C. SMTP Right Ans - B: HTTPS PoP3
C: SMTP
SMTP (Simple Mail Transfer Protocol) standard protocol used for sending
email messages over the internet.
PoP3 (Post Office Protocol version 3) standard protocol used for receiving
email messages over the internet.
WRONG
ICMP (Internet Control Message Protocol) network protocol used for error
reporting and diagnosing network problems.
Which of the following file systems does not have built-in security?
Select one:
A. HFS
B. FAT
C. ext3
D. ext4 Right Ans - B: FAT
FAT (File Allocation Table), FAT is an older file system used primarily on older
versions of Windows and other legacy operating systems. It does not have
built-in security features like access control lists (ACLs), which allow
administrators to control who can access or modify files and directories.
Which of the following would not be considered metadata for a spreadsheet
file?
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller LeCrae. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $23.49. You're not tied to anything after your purchase.