Deck 14: Comptia Asp

Full screen (f)
exit full mode
Question
Security is one of the most important issues an organization must discuss. Mitch wants security that is built into an application. Why would this be a problem?

A)Mitch isn't the head of security.
B)Security is usually within security products and perimeter devices.
C)The security application is far too expensive.
D)All of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
David is a security administrator at his organization. He is trying to prevent unauthorized access to the corporate wireless network by people loafing around the office. What kind of wireless network threat is he trying to curb?

A)Man-in-the-middle
B)War driving
C)Dictionary attack
D)DNS spoofing
Question
You have entered information in the database. It has been changed and is reflected in the database. What has been done?

A)Integrity Check
B)Commit
C)Rollback
D)Savepoint
Question
Database models define the relationship between different data elements, dictate how data can be accessed and define acceptable operations, the type of integrity offered, and how the data is organized. What type of database uses attributes and tuples to contain and organize information?

A)Hierarchical Data Model
B)Relational Database Model
C)Network Database Model
D)Object-oriented Database
Question
Which of the following organizations regularly issues ethics-related statements concerning the use of the Internet?

A)Ethics Board International
B)The International Internet Associations
C)The Internet Architecture Board
D)Corporate Ethics and Internet Organization
Question
What is a single link that is pre-established for the purposes of WAN communications between two destinations?

A)Sonnet Links
B)Dedicated Links
C)Telecommunication Links
D)None of the Above
Question
Which of the following statements regarding the MD5 algorithm is NOT true?

A)It uses a two-way hash.
B)It offers better security than its predecessors.
C)It uses a one-way hash.
D)It uses a 32-bit hash for encryption.
Question
What is the type of software that is installed on someone's computer without their knowledge?

A)Adware
B)Spyware
C)Both A and B
D)Neither A nor B
Question
What item below is not associated with Session Initiation Protocol (SIP)?

A)User Agent Client
B)User Agent Server
C)User Agent Database
D)Signaling Protocol
Question
Which of the following is a feature of Asymmetric cryptography?

A)Both encryption and authentication can take place without sharing private keys.
B)This cryptography uses the best algorithm possible.
C)Encryption occurs only when both sides are authenticated.
D)Encryption is limited to shared keys.
Question
What provides for fault tolerance and higher performance when databases are clustered?

A)Online Transaction Processing
B)Cell Suppression
C)Content-dependent Access Control
D)Polyinstantiation
Question
Which of these malicious agents are capable of distributing themselves without the use of a host file?

A)Trojan
B)Stealth Virus
C)Logic Bomb
D)Worm
Question
Networks have different types of topologies. Which topology is a single cable running the entire length of the network?

A)Ring Topology
B)Bus Topology
C)Mesh Topology
D)Network Topology
Question
Which of the following is a term used to define a collection of software robots-or bots-that run autonomously and automatically and may harm your computer?

A)Automizer
B)Botnet
C)Softbots
D)Rootkit
Question
Which technology uses a person's physical characteristics to establish identity?

A)CHAP
B)PAP
C)Biometrics
D)Smart card
Question
Jim's company is paying Chris's company to develop software and a third party keeps a copy of the source code. What should Jim have in place for protection?

A)Financial Escrow
B)Software Escrow
C)Application Escrow
D)Technical Escrow
Question
Software development methods provide software developers and vendor guidelines for program creation. What software development method is generally implemented in scenarios requiring rapid adaptations to changing client requirements?

A)Iterative Development
B)Component-Based Development
C)Modified Prototype model
D)Extreme Programming
Question
What is created when RAM and secondary storage is combined?

A)Combined Mode
B)Virtual Memory
C)Salvaged Memory
D)Protection Rings
Question
Which of the following situations would incline you to use a vulnerability scanner?

A)Enabling a protocol analyzing capability.
B)Enabling remote access.
C)Enabling encryption.
D)Identifying ports that are open on the computer.
Question
What would dictate the degree of association between elements, methods of access, processing alternatives, and the organization of data elements?

A)Cohesion
B)Coupling
C)Attributions
D)Data Structure
Question
John is in charge of setting up an infrastructure which includes flammable liquids. Which of the following Fire extinguisher types should he use in case of a fire emergency?

A)B
B)D
C)A
D)C
Question
Eddie is discussing with his brother-in-law his company's trade secrets, healthcare information, programming code, and information that keeps the company competitive. What type of classification is being discussed?

A)Sensitive
B)Confidential
C)Classified
D)Unclassified
Question
John wants to measure the network utilization factor of his network, that is, the ratio of current network traffic to the maximum traffic that a port can handle. Which of the following should he use?

A)Application log
B)Task Manager
C)Security log
D)Performance baseline
Question
Which of the following access control models uses a subject and object label?

A)DBAC
B)RBAC
C)MAC
D)DAC
Question
What are mandatory activities, actions, or rules?

A)Baselines
B)Standards
C)Expectations
D)Regulations
Question
David is a Security Administrator at his organization. He is trying to prevent unauthorized access of the corporate wireless network by people passing by. What kind of wireless network threat is he trying to curb?

A)Man in the middle
B)Dictionary attack
C)DNS spoofing
D)War driving
Question
John is a Network Security Administrator at his organization. The company plans to establish secure connections between the company's headquarters and branch offices. Which of the following protocols should be used to configure the router?

A)FTP protocol
B)IPSec protocol in Tunnel mode
C)IPSec protocol in Transport mode
D)SSH protocol
Question
Ryan is inserting data inside of an ICMP packet to communicate to an already comprised system. What is Ryan doing?

A)Resolution Attack
B)Loki Attack
C)Backdoor Entering
D)Data Swiping
Question
Which method(s) of risk analysis have both pros and cons attached?

A)Quantitative
B)Qualitative
C)Stringent
D)A and B
Question
What is the imaginary boundary that divides the trusted from the un-trusted components?

A)Security Static
B)Static Boundary
C)Random Access Memory
D)Security Perimeter
Question
Volmetric intrusion detection systems are photoelectric, acoustical-seismic, ultrasonic, and microwave. Which can only be used in windowless rooms?

A)Photoelectric
B)Acoustical-seismic
C)Ultrasonic
D)Microwave
Question
Sam was in a building that caught on fire where the fire suppression method is bad for many types of life. What type of method was being used?

A)Halon
B)CO2
C)Fire Extinguishers
D)Water Sprinklers
Question
It is law for there to be fire sprinkler or suppression systems in buildings. Which type of fire sprinkler has pipes that hold pressurized air in the pipes and does not release until an actual fire is detected?

A)Wet Pip Systems
B)Dry Pipe Systems
C)Preaction Systems
D)Deluge Systems
Question
Which of the following authentication methods sends an encrypted challenge to the client and then sends it back to the server?

A)Kerberos
B)PAP
C)CHAP
D)DAC
Question
Channels allow for communication to travel from one computer to another. What channel type divides communication channels into individual and independent channels?

A)Digital
B)Analog
C)Baseband
D)Broadband
Question
A customer complains that their touch screen is working but the response is inaccurate. Which common resolution should be performed to help troubleshoot the problem?

A)Check backlight failure
B)Replace the screen
C)Recalibrate the device
D)Reinstall graphics drivers
Question
A user has an old tablet that uses NiMH battery. The battery was working fine until lately, where it drains quicker even with minimal usage. The user explains that there are times when they performed partial recharges. You advised the user to replace the battery. Of the following, which term best describes this power drain issue?

A)Memory effect
B)Bulged battery
C)Overheating battery
D)Aging effect
Question
A customer finds that their phone's touch screen is not responsive. Which of the following could be the reason?

A)Degraded battery
B)Backlight failure
C)Stuck keys
D)Digitizer failure
Question
A customer complains that their mobile device screen is very dim. As the technician, which course of action should you do first?

A)Check if the screen brightness setting is turned down
B)Replace the screen
C)Carefully remove, then replace the backlight
D)Advise the customer to file a warranty claim
Question
You just purchased a mobile device. You want to synchronize your photos and music to your desktop computer running Windows 7. However, after plugging in the USB cable, you received an error stating that the device driver was not successfully installed. Which Windows system tools should you use to troubleshoot the error?

A)Command Prompt
B)Dxdiag
C)Regedit
D)Device Manager
E)Services.msc
Question
Which windows 8 and 8.1 feature allows you to synchronize files in the cloud?

A)Drop Box
B)One Drive
C)Branch Cache
D)iCloud
Question
In Windows 8/8.1, which keyboard shortcut combination summons the Charms Bar?

A)Windows + C
B)Windows + E
C)Alt + Tab
D)Windows + Shift + Tab
Question
What feature is included with Windows 8/8.1 that allows a system administrator to use of cmdlets or run scripts and functions to perform certain tasks?

A)CMD
B)PowerShell
C)PuTTy
D)iTerm2
Question
You are the systems administrator for your company. You want to implement a WAN bandwidth optimization technology in order to improve end user productivity and network performance for client computers that are running windows 8 Enterprise. Which feature will allow you to do this?

A)AppLocker
B)Universal Group Membership Caching
C)BranchCache
D)PowerShell
Question
You want to install 64 bit version of Windows 8.1 on your machine. Your machine currently have the following specs: Processor: 3 GHz with support for PAE, NX, and SSE2
RAM: 1GB
Hard disk space: 16GB
Graphics Card: DirectX 10 Video Card
Which components should you upgrade first to achieve proper functionality? (Choose two.)

A)RAM
B)Processor
C)Hard Disk
D)Graphics Card
Question
Which Mac OS X 10.5 feature allows a user to restore the whole system or files from the OS X install DVD?

A)Rollback RX
B)Time Machine
C)System Restore
D)Backup and Restore
Question
You just purchased a new machine that runs OS X. You want to view the full system information of your Mac. On a terminal, which command should you enter to view your full system information?

A)msconfig
B)uname -a
C)system_profiler
D)msinfo32
E)sw_vers
Question
You have a computer running on Linux. You currently don't have a GUI app for backing up files. You want to schedule a backup using a command line backup utility, which creates an archive of specified files. Which command should you use to accomplish your task?

A)archive
B)wbadmin
C)zip
D)tar
Question
You just installed a Linux distro on your machine, specifically Fedora 21. You want to manage some installed applications packages on your machine. Which Fedora package management utility should you use?

A)yum
B)apt-get
C)pacman
D)portage
Question
Which Linux command should you use if you want to view or set the TCP/IP properties of wired network connections?

A)netconfig
B)iwconfig
C)ifconfig
D)ipconfig
Question
Which mobile security methods allow corporate administration of mobile devices?

A)BYOD
B)MDM
C)MITM
D)WYSIWYG
Question
What security feature on android devices running OS version 5 or later, allows users to use facial recognition, voice, or trusted places to unlock the device screen?

A)Touch ID
B)Swipe Lock
C)Passcode Lock
D)Smart Lock
Question
Which of the following is an example of MDM software, now owned by VMware, and is used to manage content, applications, and emails?

A)Meraki
B)AirWatch
C)Intune
D)Profile Manager
Question
You own a phone with private data stored. You want to be able to secure by erasing the private data in case you lose your phone. Which of the following methods should be implemented?

A)Remote Wipe
B)Anti-Malware
C)GPS Locator
D)Antivirus
Question
Which of the following makes use of remote location to store backed up data from an Apple device?

A)iOS
B)Android Store
C)Google Play
D)iCloud
Question
A customer complains that a recently purchased app from an official app store is not loading upon installation. Which action could help troubleshoot the problem?

A)Advise the customer to file a warranty claim
B)Uninstall/Re-install the app
C)Run the phone antivirus
D)Update the phone OS
Question
A customer complains that at times, their phone signal suddenly drops or beocmes weak. Which of the following could be the problem?

A)Defective OS update
B)The SSID for the wireless access point has changed
C)Too many apps installed on the phone
D)Conflicting phones with different wireless communications provider
Question
A customer complains that their iPhone 6 battery is constantly drained even if no apps are running in the background. What other reason might be causing the power drain?

A)A virus
B)Signal searching
C)Memory effect
D)The phone uses NiMH battery
Question
A slow data speed is being experienced by some mobile users on one area of the company building. Several wireless routers have been installed on the building. Which of the following actions should be done to help troubleshoot the issue?

A)Upgrade the routers to support only 5Ghz channel
B)Change the SSID of the wireless routers
C)Change the channel on Wireless routers to less-used channel
D)Set the wireless encryption to WPA2 enterprise
Question
A user complains that his phone data transmission is always over the limit even when they use the phone to browse and do stuff on the internet at his house through wireless connection. Which of the following actions should be done to prevent/fix the issue?

A)Disable the phone Wi-Fi radio
B)Limit internet usage
C)Disable the phone data carrier network
D)Don't use multimedia-heavy stuff on the phone
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/60
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Comptia Asp
1
Security is one of the most important issues an organization must discuss. Mitch wants security that is built into an application. Why would this be a problem?

A)Mitch isn't the head of security.
B)Security is usually within security products and perimeter devices.
C)The security application is far too expensive.
D)All of the above
Security is usually within security products and perimeter devices.
2
David is a security administrator at his organization. He is trying to prevent unauthorized access to the corporate wireless network by people loafing around the office. What kind of wireless network threat is he trying to curb?

A)Man-in-the-middle
B)War driving
C)Dictionary attack
D)DNS spoofing
War driving
3
You have entered information in the database. It has been changed and is reflected in the database. What has been done?

A)Integrity Check
B)Commit
C)Rollback
D)Savepoint
Commit
4
Database models define the relationship between different data elements, dictate how data can be accessed and define acceptable operations, the type of integrity offered, and how the data is organized. What type of database uses attributes and tuples to contain and organize information?

A)Hierarchical Data Model
B)Relational Database Model
C)Network Database Model
D)Object-oriented Database
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following organizations regularly issues ethics-related statements concerning the use of the Internet?

A)Ethics Board International
B)The International Internet Associations
C)The Internet Architecture Board
D)Corporate Ethics and Internet Organization
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
6
What is a single link that is pre-established for the purposes of WAN communications between two destinations?

A)Sonnet Links
B)Dedicated Links
C)Telecommunication Links
D)None of the Above
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following statements regarding the MD5 algorithm is NOT true?

A)It uses a two-way hash.
B)It offers better security than its predecessors.
C)It uses a one-way hash.
D)It uses a 32-bit hash for encryption.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
8
What is the type of software that is installed on someone's computer without their knowledge?

A)Adware
B)Spyware
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
9
What item below is not associated with Session Initiation Protocol (SIP)?

A)User Agent Client
B)User Agent Server
C)User Agent Database
D)Signaling Protocol
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is a feature of Asymmetric cryptography?

A)Both encryption and authentication can take place without sharing private keys.
B)This cryptography uses the best algorithm possible.
C)Encryption occurs only when both sides are authenticated.
D)Encryption is limited to shared keys.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
11
What provides for fault tolerance and higher performance when databases are clustered?

A)Online Transaction Processing
B)Cell Suppression
C)Content-dependent Access Control
D)Polyinstantiation
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
12
Which of these malicious agents are capable of distributing themselves without the use of a host file?

A)Trojan
B)Stealth Virus
C)Logic Bomb
D)Worm
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
13
Networks have different types of topologies. Which topology is a single cable running the entire length of the network?

A)Ring Topology
B)Bus Topology
C)Mesh Topology
D)Network Topology
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is a term used to define a collection of software robots-or bots-that run autonomously and automatically and may harm your computer?

A)Automizer
B)Botnet
C)Softbots
D)Rootkit
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
15
Which technology uses a person's physical characteristics to establish identity?

A)CHAP
B)PAP
C)Biometrics
D)Smart card
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
16
Jim's company is paying Chris's company to develop software and a third party keeps a copy of the source code. What should Jim have in place for protection?

A)Financial Escrow
B)Software Escrow
C)Application Escrow
D)Technical Escrow
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
17
Software development methods provide software developers and vendor guidelines for program creation. What software development method is generally implemented in scenarios requiring rapid adaptations to changing client requirements?

A)Iterative Development
B)Component-Based Development
C)Modified Prototype model
D)Extreme Programming
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
18
What is created when RAM and secondary storage is combined?

A)Combined Mode
B)Virtual Memory
C)Salvaged Memory
D)Protection Rings
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following situations would incline you to use a vulnerability scanner?

A)Enabling a protocol analyzing capability.
B)Enabling remote access.
C)Enabling encryption.
D)Identifying ports that are open on the computer.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
20
What would dictate the degree of association between elements, methods of access, processing alternatives, and the organization of data elements?

A)Cohesion
B)Coupling
C)Attributions
D)Data Structure
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
21
John is in charge of setting up an infrastructure which includes flammable liquids. Which of the following Fire extinguisher types should he use in case of a fire emergency?

A)B
B)D
C)A
D)C
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
22
Eddie is discussing with his brother-in-law his company's trade secrets, healthcare information, programming code, and information that keeps the company competitive. What type of classification is being discussed?

A)Sensitive
B)Confidential
C)Classified
D)Unclassified
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
23
John wants to measure the network utilization factor of his network, that is, the ratio of current network traffic to the maximum traffic that a port can handle. Which of the following should he use?

A)Application log
B)Task Manager
C)Security log
D)Performance baseline
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following access control models uses a subject and object label?

A)DBAC
B)RBAC
C)MAC
D)DAC
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
25
What are mandatory activities, actions, or rules?

A)Baselines
B)Standards
C)Expectations
D)Regulations
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
26
David is a Security Administrator at his organization. He is trying to prevent unauthorized access of the corporate wireless network by people passing by. What kind of wireless network threat is he trying to curb?

A)Man in the middle
B)Dictionary attack
C)DNS spoofing
D)War driving
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
27
John is a Network Security Administrator at his organization. The company plans to establish secure connections between the company's headquarters and branch offices. Which of the following protocols should be used to configure the router?

A)FTP protocol
B)IPSec protocol in Tunnel mode
C)IPSec protocol in Transport mode
D)SSH protocol
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
28
Ryan is inserting data inside of an ICMP packet to communicate to an already comprised system. What is Ryan doing?

A)Resolution Attack
B)Loki Attack
C)Backdoor Entering
D)Data Swiping
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
29
Which method(s) of risk analysis have both pros and cons attached?

A)Quantitative
B)Qualitative
C)Stringent
D)A and B
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
30
What is the imaginary boundary that divides the trusted from the un-trusted components?

A)Security Static
B)Static Boundary
C)Random Access Memory
D)Security Perimeter
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
31
Volmetric intrusion detection systems are photoelectric, acoustical-seismic, ultrasonic, and microwave. Which can only be used in windowless rooms?

A)Photoelectric
B)Acoustical-seismic
C)Ultrasonic
D)Microwave
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
32
Sam was in a building that caught on fire where the fire suppression method is bad for many types of life. What type of method was being used?

A)Halon
B)CO2
C)Fire Extinguishers
D)Water Sprinklers
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
33
It is law for there to be fire sprinkler or suppression systems in buildings. Which type of fire sprinkler has pipes that hold pressurized air in the pipes and does not release until an actual fire is detected?

A)Wet Pip Systems
B)Dry Pipe Systems
C)Preaction Systems
D)Deluge Systems
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following authentication methods sends an encrypted challenge to the client and then sends it back to the server?

A)Kerberos
B)PAP
C)CHAP
D)DAC
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
35
Channels allow for communication to travel from one computer to another. What channel type divides communication channels into individual and independent channels?

A)Digital
B)Analog
C)Baseband
D)Broadband
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
36
A customer complains that their touch screen is working but the response is inaccurate. Which common resolution should be performed to help troubleshoot the problem?

A)Check backlight failure
B)Replace the screen
C)Recalibrate the device
D)Reinstall graphics drivers
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
37
A user has an old tablet that uses NiMH battery. The battery was working fine until lately, where it drains quicker even with minimal usage. The user explains that there are times when they performed partial recharges. You advised the user to replace the battery. Of the following, which term best describes this power drain issue?

A)Memory effect
B)Bulged battery
C)Overheating battery
D)Aging effect
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
38
A customer finds that their phone's touch screen is not responsive. Which of the following could be the reason?

A)Degraded battery
B)Backlight failure
C)Stuck keys
D)Digitizer failure
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
39
A customer complains that their mobile device screen is very dim. As the technician, which course of action should you do first?

A)Check if the screen brightness setting is turned down
B)Replace the screen
C)Carefully remove, then replace the backlight
D)Advise the customer to file a warranty claim
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
40
You just purchased a mobile device. You want to synchronize your photos and music to your desktop computer running Windows 7. However, after plugging in the USB cable, you received an error stating that the device driver was not successfully installed. Which Windows system tools should you use to troubleshoot the error?

A)Command Prompt
B)Dxdiag
C)Regedit
D)Device Manager
E)Services.msc
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
41
Which windows 8 and 8.1 feature allows you to synchronize files in the cloud?

A)Drop Box
B)One Drive
C)Branch Cache
D)iCloud
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
42
In Windows 8/8.1, which keyboard shortcut combination summons the Charms Bar?

A)Windows + C
B)Windows + E
C)Alt + Tab
D)Windows + Shift + Tab
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
43
What feature is included with Windows 8/8.1 that allows a system administrator to use of cmdlets or run scripts and functions to perform certain tasks?

A)CMD
B)PowerShell
C)PuTTy
D)iTerm2
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
44
You are the systems administrator for your company. You want to implement a WAN bandwidth optimization technology in order to improve end user productivity and network performance for client computers that are running windows 8 Enterprise. Which feature will allow you to do this?

A)AppLocker
B)Universal Group Membership Caching
C)BranchCache
D)PowerShell
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
45
You want to install 64 bit version of Windows 8.1 on your machine. Your machine currently have the following specs: Processor: 3 GHz with support for PAE, NX, and SSE2
RAM: 1GB
Hard disk space: 16GB
Graphics Card: DirectX 10 Video Card
Which components should you upgrade first to achieve proper functionality? (Choose two.)

A)RAM
B)Processor
C)Hard Disk
D)Graphics Card
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
46
Which Mac OS X 10.5 feature allows a user to restore the whole system or files from the OS X install DVD?

A)Rollback RX
B)Time Machine
C)System Restore
D)Backup and Restore
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
47
You just purchased a new machine that runs OS X. You want to view the full system information of your Mac. On a terminal, which command should you enter to view your full system information?

A)msconfig
B)uname -a
C)system_profiler
D)msinfo32
E)sw_vers
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
48
You have a computer running on Linux. You currently don't have a GUI app for backing up files. You want to schedule a backup using a command line backup utility, which creates an archive of specified files. Which command should you use to accomplish your task?

A)archive
B)wbadmin
C)zip
D)tar
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
49
You just installed a Linux distro on your machine, specifically Fedora 21. You want to manage some installed applications packages on your machine. Which Fedora package management utility should you use?

A)yum
B)apt-get
C)pacman
D)portage
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
50
Which Linux command should you use if you want to view or set the TCP/IP properties of wired network connections?

A)netconfig
B)iwconfig
C)ifconfig
D)ipconfig
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
51
Which mobile security methods allow corporate administration of mobile devices?

A)BYOD
B)MDM
C)MITM
D)WYSIWYG
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
52
What security feature on android devices running OS version 5 or later, allows users to use facial recognition, voice, or trusted places to unlock the device screen?

A)Touch ID
B)Swipe Lock
C)Passcode Lock
D)Smart Lock
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is an example of MDM software, now owned by VMware, and is used to manage content, applications, and emails?

A)Meraki
B)AirWatch
C)Intune
D)Profile Manager
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
54
You own a phone with private data stored. You want to be able to secure by erasing the private data in case you lose your phone. Which of the following methods should be implemented?

A)Remote Wipe
B)Anti-Malware
C)GPS Locator
D)Antivirus
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following makes use of remote location to store backed up data from an Apple device?

A)iOS
B)Android Store
C)Google Play
D)iCloud
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
56
A customer complains that a recently purchased app from an official app store is not loading upon installation. Which action could help troubleshoot the problem?

A)Advise the customer to file a warranty claim
B)Uninstall/Re-install the app
C)Run the phone antivirus
D)Update the phone OS
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
57
A customer complains that at times, their phone signal suddenly drops or beocmes weak. Which of the following could be the problem?

A)Defective OS update
B)The SSID for the wireless access point has changed
C)Too many apps installed on the phone
D)Conflicting phones with different wireless communications provider
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
58
A customer complains that their iPhone 6 battery is constantly drained even if no apps are running in the background. What other reason might be causing the power drain?

A)A virus
B)Signal searching
C)Memory effect
D)The phone uses NiMH battery
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
59
A slow data speed is being experienced by some mobile users on one area of the company building. Several wireless routers have been installed on the building. Which of the following actions should be done to help troubleshoot the issue?

A)Upgrade the routers to support only 5Ghz channel
B)Change the SSID of the wireless routers
C)Change the channel on Wireless routers to less-used channel
D)Set the wireless encryption to WPA2 enterprise
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
60
A user complains that his phone data transmission is always over the limit even when they use the phone to browse and do stuff on the internet at his house through wireless connection. Which of the following actions should be done to prevent/fix the issue?

A)Disable the phone Wi-Fi radio
B)Limit internet usage
C)Disable the phone data carrier network
D)Don't use multimedia-heavy stuff on the phone
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 60 flashcards in this deck.