What should be your first step when troubleshooting a network connection that uses a cable
modem?
D
Which of the following is generally a component of a BYOD policy?
A
Which term describes a compact personal computer that relies on a touch screen for input, generally
uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks
for connectivity?
A
What does the following represent?
2E22:4F00:000E:00D0:A267:97FF:FE6B:FE34
C
A friend has called you about a possible computer problem because her computer is acting strangely.
Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the
computer sometimes reboots itself without warning. When you inspect your friend’s system, you
notice that several ports are open. Which of the following is most likely the cause of these
symptoms?
C
The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:
D
Which type of attack involves the installation of malicious code on personal computers or servers
that redirects Internet traffic from a legitimate Web site to an identical-looking but malicious
imposter Web site?
A
The capabilities of cellular networks have improved greatly since their original development for
analog voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-
intensive needs. A benefit of 4G networks is that they:
B
Selena has run out of memory on her phone’s SD card. She has decided to store the files she has
accumulated on a third-party cloud service provider’s drives. Which of the following is a typical issue
that she may encounter?
B
Which of the following computer system maintenance tasks can help improve file access
performance?
D
Which of the following is a security threat commonly associated with cloud-based services?
C
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to
the computer lab to give the final exam. As an alternative, he asked students to bring their own
devices (BYOD) and connect to the college’s Wi-Fi for network access. What security risk is associated
with this implementation?
C
What is the biggest security concern with wireless networks?
B
Gwen works for a small company where she has been asked to find a cost-effective option for
providing comprehensive customer service. The finance, technical support, sales and customer
service departments all need to share information about their customers. Gwen is considering
adoption of a customer relationship management (CRM) application. Which of the following would
be the most cost-effective solution?
C
Sally is a network technician at Acme Corporation. She has been directed to configure the network
adapter for a company laptop so that it can be used to connect to the company network and the
Internet. What is one of the required TCP/IP settings that she will need to configure?
B