FNTA FINAL REVIEW QUESTIONS WITH
COMPLETE SOLUTION
What should be your first step when troubleshooting a network connection that uses a cable modem? -
Ping local devices using their IP addresses.
Which of the following is generally a component of a BYOD policy? - Scope of control
Which term describes a compact personal computer that relies on a touch screen for input, generally
uses a solid-state drive instead of a traditional hard disk,and relies on wireless or mobile networks for
connectivity? - Tablet
What does the following represent?
2E22:4F00:000E:00D0:A267:97FF:FE6B:FE34 - An IPv6 address
A friend has called you about a possible computer problem because her computer is acting strangely.
Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the
computer sometimes reboots itself without warning. When you inspect your friend's system, you notice
that several ports are open. Which of the following is most likely the cause of these symptoms? - The
computer has been infected with an illicit server.
The Windows Device Manager is a tool that enables you to perform a variety of tasks, including: -
Change a resource assignment.
Which type of attack involves the installation of malicious code on personal computers or servers that
redirects Internet Traffic from a legitimate Web site to an identical-looking but malicious imposter Web
site? - Pharming
The capabilities of cellular networks have improved greatly since their original development for analog
voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive
needs. A benefit of 4G networks is that they: - Provide fast transmission rates equivalent to DSL or
broadband-cable.
Selena has run out of memory on her phone's SD card. She has decided to store the files she has
accumulated on a third-party cloud service provider's drives. Which of the following is a typical issue
that she may encounter? - The files become unavailable whenever Internet connectivity is lost.
Which of the following computer system maintenance tasks can help improve file access performance? -
Defragment the drive using the following command: defrag c: -w
Which of the following is a security threat commonly associated with cloud-based services? - Hypervisor
vulnerabilities
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the
computer lab to give the final exam. As an alternative, he asked students to bring their own devices
, (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this
implementation? - Student devices sending unsecured data
What is the biggest security concern with wireless networks? - Wireless encryption algorithms must be
implemented.
Gwen works for a small company where she has been asked to find a cost-effective option for providing
comprehensive customer service. The finance, technical support, sales and customer service
departments all need to share information about their customers. Gwen is considering adoption of a
customer relationship management (CRM) application. Which of the following would be the most cost-
effective solution? - She can contract with a cloud service provider to host the CRM that her company's
employees can access.
Sally is a network technician at Acme Corporation. She has been directed to configure the network
adapter for a company laptop so that it can be used to connect to the company network and the
Internet. What is one of the required TCP/IP settings that she will need to configure? - Default gateway
Which term describes the practice of actively collecting wireless networking data from companies and
individuals? - War driving
Jose is experiencing performance problems with his notebook computer that he purchased a year ago.
Upon discussing this issue with him, you learn that he has never deleted any temporary files since
owning the device. What can Jose do to fix this problem most efficiently? - Use the Windows Disk
Cleanup utility.
Which of the following is a drawback to using Wired Equivalent Privacy (WEP)? - Symmetric-key
encryption is susceptible to cracking.
When using cloud-based services to host company data, a company's disaster recovery plan should
include strategies for: - Creating redundancy and using multiple cloud service providers.
Which of the following statements about virtualization is true? - Virtualization enables you to run
multiple operating systems and applications on a single computer.
When a PC computer device wants to communicate with the processor, which system resource does it
use? - IRQ
Server-based networks typically contain centralized network resources, which are usually not available
on peer-to-peer (P2P) networks. Which of the following examples describes a server based network? -
Three network clients connecting to a file server
On your Windows laptop, you store all your vacation photos and your entire digital music library.
Concerted about data loss, your perform frequent backups. Your laptop has recently been stolen and you
need to restore your files to a desktop computer. Which Windows tool would you use to recover and set
up the saved copies of your files onto your desktop computer? - Backup and Restore
Acme Corp. is a small manufacturing company. To reduce IT infrastructure costs, it uses cloud-based
services extensively and strives to have the least amount of IT equipment onsite. Last year, Acme
suffered a failure that resulted in significant down time and data loss. Management has decided to
Les avantages d'acheter des résumés chez Stuvia:
Qualité garantie par les avis des clients
Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.
L’achat facile et rapide
Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.
Focus sur l’essentiel
Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.
Foire aux questions
Qu'est-ce que j'obtiens en achetant ce document ?
Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.
Garantie de remboursement : comment ça marche ?
Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.
Auprès de qui est-ce que j'achète ce résumé ?
Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur knowledgeNest. Stuvia facilite les paiements au vendeur.
Est-ce que j'aurai un abonnement?
Non, vous n'achetez ce résumé que pour €10,25. Vous n'êtes lié à rien après votre achat.