Question 1 of 20
5.0 Points
What is the primary limitation of free versions of antivirus
applications?
A. They don’t protect in real time.
B. They only perform quick scans.
C. They cannot scan the Windows directory.
D. They only install on 64-bit operating systems.
Reset Selection
Question 2 of 20
5.0 Points
Which selection below lists two operating systems that include
BitLocker?
A. Windows XP Professional and Windows 7 Professional
B. Vista Ultimate and Windows 8 Enterprise
C. Windows 7 Professional and Windows 8 Professional
D. Windows 7 Ultimate and Windows 8 Professional
Reset Selection
Question 3 of 20
5.0 Points
You own a laptop with Windows 8 installed on it. How is
someone able to access your files by installing another copy of
Windows 8?
A. Use BitLocker with the new OS to copy and paste the files to
a USB drive.
B. Use the Administrator account of the new OS to take
ownership of the files.
C. Decrypt the files using the encryption key of the new OS on
the system volume.
D. Decrypt the files using the newly installed certificate from
the new OS.
Reset Selection
Question 4 of 20
5.0 Points
Your mom’s computer is running extremely slow. She asks you
what might be causing this. Which of the options below is not a
reason for her slow performance?
A. A fragmented volume
B. Spyware
C. A bad printer driver
D. Not enough memory
Reset Selection
Question 5 of 20
5.0 Points
Your AV software is unable to detect a recent virus that has
infected your computer. You want to download another AV
application to see if it can detect the virus. Which application
below will do this?
A. CCleaner
B. Disk Cleanup
C. MalwareBytes
D. Auslogics Disk Defrag
Reset Selection
Question 6 of 20
5.0 Points
Why is it best to run AV scans when the computer isn’t being
utilized?
A. The scans consume resources and can impede computer
performance.
B. Executable files can’t be scanned if a user is using them
within an application.
C. The Windows directory can’t be scanned if the computer is
being used.
D. AV applications can only do full scans if the computer is in
safe mode.
Reset Selection
Question 7 of 20
5.0 Points
What type of hard drive does not require defragging?
A. A hard drive for a server
B. A hard drive for a 64-bit operating system
C. A solid-state drive hosting Windows 7
D. An SCSI drive hosting Server 2008
Reset Selection
Question 8 of 20
5.0 Points
Which statement below is not true about EFS?
A. It can only be implemented on an NTFS partition.
B. It requires a user to type in a PIN.
C. It is supported by the Windows operating system.
D. It doesn’t require TPM compatibility.
Reset Selection
Question 9 of 20
5.0 Points
You are configuring the local firewall for your Windows 8
computer. Which types of rules should you create for your
computer?
A. Inbound rules only
B. Outbound rules only
C. Neither inbound nor outbound rules
D. Both inbound and outbound rules
Reset Selection
Question 10 of 20
5.0 Points
Which of the events below would automatically create a new
restore point on your Windows 8 computer?
A. Deleting the temporary files
B. Installing a new printer
C. Downloading music files
D. Creating a new Internet favorite
Reset Selection
Question 11 of 20
5.0 Points
What is a limiting factor of EFS when compared to BitLocker?
A. It only works on 32-bit operating systems.
B. It only works with a public certificate.
C. It only works under the Administrator account.
D. It only works at the file or folder level.
Reset Selection
Question 12 of 20
5.0 Points
Which of the actions below will not create more room on your
hard drive?
A. Defragging your hard drive
B. Uninstalling an application
C. Deleting temporary Internet files
D. Deleting image and video files
Reset Selection
Question 13 of 20
5.0 Points
You want to run CHKDSK and have it repair any errors it
identifies, if possible. What is the command you would type?
A. CHKDSK /f
B. CHKDSK /r
C. CHKDSK /e
D. CHKDSK /RD
Reset Selection
Question 14 of 20
5.0 Points
In order for BitLocker to protect the System Volume without the
aid of an external drive, your computer must:
A. be 32-bit.
B. host a virtualized enabled BIOS.
C. be TPM-compatible.
D. have a USB 3.0 interface.
Reset Selection
Question 15 of 20
5.0 Points
A spyware application is consuming a lot of memory on your
Windows 7 computer. You want to end this process. Where can
you do this from?
A. From the Processes tool in the Control Panel
B. From the Process tab in Task Manager
C. From the Performance tab in Task Manager
D. From the Windows Defrag console
Reset Selection
Question 16 of 20
5.0 Points
Your computer is once again out of hard drive space and you
want to see which folders are consuming the most space on your
hard drive. Which application below will do this?
A. Ccleaner
B. TreeSize
C. MalwareBytes
D. Auslogics Disk Defrag
Reset Selection
Question 17 of 20
5.0 Points
Which type of Windows updates below is strictly security-
related?
A. Critical
B. Optional
C. Recommended
D. Service Pack
Reset Selection
Question 18 of 20
5.0 Points
You have a Windows 2000 computer that has no built-in
firewall so you are looking for a third-party firewall to install.
Which of the selections below will accommodate this?
A. CCleaner
B. ZoneAlarm
C. Microsoft Security Essential
D. MalwareBytes
Reset Selection
Question 19 of 20
5.0 Points
You run a Defrag utility on your computer to see if you need to
defrag your system volume. What fragmentation level represents
a threshold at which point you need to defrag it?
A. 3%
B. 5%
C. 10%
D. 15%
Reset Selection
Question 20 of 20
5.0 Points
Which of the instances below is an example of a Trojan horse?
A. An attachment in an email that is really a malicious file
B. A link in an email that downloads a virus
C. An executable file that replicates throughout the network
D. A computer game that creates a backdoor into your computer
Reset Selection
Question 1 of 40
2.5 Points
You are trying to network two laptops together using an
Ethernet cable but it isn’t working. Which of the following
selections might explain why it isn’t working?
A. You are using an outdated CAT 3 cable.
B. You are using a straight-through cable.
C. You are using a crossover cable.
D. The wireless is interfering with the signal.
Question 2 of 40
2.5 Points
You want to use a terminal emulation program to terminal into a
series of Cisco routers. You will be managing these devices
remotely. What protocol should you use?
A. FTP
B. FTPS
C. SSH
D. Telnet
Question 3 of 40
2.5 Points
You need to know the MAC address of a Windows 8 computer.
How can you accomplish this?
A. Look in the system properties.
B. Type ipconfig at a command prompt.
C. Type ipconfig/all at a command prompt.
D. Type arp –m at a command
Question 4 of 40
2.5 Points
You are advising one of your neighbors about the HomeGroup
feature of Microsoft. He wants to make sure that all of his
computers support this feature. Which one of the operating
systems below does not support HomeGroup?
A. Windows 7
B. Windows RT
C. Windows Vista
D. Windows 8
Reset Selection
Question 5 of 40
2.5 Points
You are unpacking and setting up workstations for a local
school system. The school system has given you cables to
connect the computers to the network once they are set up in the
classrooms. You connect one end of the cables into the built-in
NIC cards. What will you plug the other end into?
A. A router
B. The MDF
C. The IDF
D. A drop
Question 6 of 40
2.5 Points
Your boss tells you that he wants you to upgrade the network to
a Domain. What type of server will you need to create in order
to accomplish this?
A. A DNS Server
B. A Domain Controller
C. A Proxy Server
D. An Ad-hoc server
Reset Selection
Question 7 of 40
2.5 Points
Which of the selections below is an example of a LAN?
A. The Internet
B. A fiber link connecting different Internet providers
C. A network within a single building location
D. A network comprised of offices in multiple states
Question 8 of 40
2.5 Points
Your Windows 8 computer is DHCP enabled. You want to find
out what the IP address is for it. How do you do this?
A. Type IP /? at a command prompt.
B. Type IPCONFIG at a command prompt.
C. Look at the manual settings of the Network Interface Card.
Question 9 of 40
2.5 Points
Your boss it trying to console into an old switch that he found
in storage and wants to configure it. He asks you to describe
what the serial port would look like. What do you tell him?
A. Look for a male connector with 7 pins.
B. Look for a female connector that accommodates 7 pins.
C. Look for a male connector with 9 pins.
Question 10 of 40
2.5 Points
Port 25 is currently closed on your firewall. What does this
mean?
A. Computers can’t get the correct time.
B. Users can’t telnet outside of the network.
C. Users can’t RDP outside of the network.
Question 11 of 40
2.5 Points
If you PING a device, you are using the __________ protocol.
A. ICMP
B. POP3
C. DHCP
D. IP
Question 12 of 40
2.5 Points
Your boss wants you to get certified in the area of managing
and routing switches and routers. Which of the IT certifications
below would satisfy this requirement?
A. Microsoft MCP
B. Microsoft MCSE
C. Cisco CCP
D. Cisco CCNA
Question 13 of 40
2.5 Points
You are the network administrator for a school system. Your
boss informs you that she is thinking of implementing a BYOD
program. She asks you if there are any disadvantages to BYOD.
What do you tell her?
A. BYOD is far more expensive than the organization’s
supplying the computers.
B. BYOD is currently not supported by the Windows operating
system.
C. BYOD is more difficult to support and manage for the IT
department.
D. BYOD networks are not able to stop broadcasts from slowing
down the network.
Reset Selection
Question 14 of 40
2.5 Points
Your boss wants you to start making your own Ethernet cables
to save the company money. What type of connectors will you
need to order to make them?
A. NIC
B. E5
C. RJ11
D. RJ45
Question 15 of 40
2.5 Points
You are studying at the library and someone at your table has
some great study material. Both of you have an iPad with you.
You decide to network your computers together to exchange
files. What type of network have the two of you created?
A. Client/server
B. HomeGroup
C. Apple Domain
D. Ad-hoc
Question 16 of 40
2.5 Points
You boot up a computer that has had network issues and
immediately look at its ARP cache to see what MAC addresses
it has resolved recently. You find out that the cache has very
few addresses in it. How could this be?
A. The ARP cache was cleared when the computer was shut
down.
B. The ARP cache is cleared every 15 minutes by default.
C. The HTTP protocol has become corrupted.
D. The computer has a virus attacking the ARP cache.
Question 17 of 40
2.5 Points
The computers in your network are configured to automatically
receive an IP address but they are not getting them. Which
server has most likely failed?
A. Domain Controller
B. DNS
C. Proxy
Question 18 of 40
2.5 Points
Wendy calls the help desk and reports that she is unable to
access her files that are stored on the server. The network is a
Windows Domain with Active Directory. Wendy is logged on
locally to her workstation that runs Windows 8. You remote into
her machine and you can ping the file server. What is most
likely the problem?
A. She is being denied access to the files on the domain server.
B. The NIC on her workstation is failing to do ARP requests.
C. The switch her workstation is connected to isn’t working.
Question 19 of 40
2.5 Points
Which of these devices can completely stop broadcasts from
being passed on across the network?
A. An access point
B. A router
C. A switch
Question 20 of 40
2.5 Points
Some of the users in one part of the building can’t pull up your
company’s intranet site in their browsers. The site comes up on
your machine. You remote into their machines and attempt to
PING the server that hosts the site and it fails. This is an
example of a:
A. software problem.
B. driver problem.
C. connectivity problem.
Question 21 of 40
2.5 Points
Look at the following URL and identify which part of it is
optional if you wanted to type it into a web browser.
http://www.microsoft.com/windows8
A. http://
B. www.
C. Microsoft
Question 22 of 40
2.5 Points
Where does a Gateway Antivirus scan for viruses?
A. On the system volume of client computers
B. On the system volume of a server
C. Within incoming web packets
D. On the application volume of a server
Reset Selection
Question 23 of 40
2.5 Points
Your brother just lost his job and wants to build an online
profile with a social media site geared at possible employers
and HR recruiters. He asks you if you have a suggestion as to
where to go. What do you tell him?
A. WordPress
B. LinkedIn
C. Facebook
D. Flickr
Question 24 of 40
2.5 Points
You want to configure less stringent security settings for your
organization’s internal portal site for Internet Explorer. Which
zone will you select for this endeavor?
A. Internet
B. LAN
C. Trusted Sites
D. Local Intranet
Question 25 of 40
2.5 Points
You need to obtain a public certificate for your new e-
commerce site. Where would you go to apply for a trusted
certificate?
A. Verisign.com
B. Wordpress.com
C. Megaproxy.com
D. Youtube.com
Question 26 of 40
2.5 Points
You need to choose a location within your network to install a
web filter to keep your users out of undesirable websites. Which
server would be ideal to host it?
A. A web-hosting server
B. A DNS server
C. A proxy server
D. An Active Directory server
Reset Selection
Question 27 of 40
2.5 Points
Where are the Connection settings located within the Firefox
browser options?
A. General
B. Content
C. Advanced
D. Privacy
Question 28 of 40
2.5 Points
Which version of IP offers users nearly limitless IP addresses?
A. IPv2
B. IPV4
C. IPv6
D. IPv8
Reset Selection
Question 29 of 40
2.5 Points
You still have some XP computers in the network you manage.
What is the highest version of Internet Explorer that you can
run on those computers?
A. IE 7
B. IE 8
C. IE 9
D. IE 10
Question 30 of 40
2.5 Points
You want to bundle your telephone and Internet services into
one package from your local phone company. What type of
Internet connection will they be offering?
A. DSL
B. Ethernet
C. T3
D. Cable
Question 31 of 40
2.5 Points
You are an online training company and stream a lot of training
videos from your location so your upload speed is just as
important as download speed. Which type of Internet connection
would be best for this situation?
A. SDSL
B. IDSL
C. RADSL
D. ADSL
Reset Selection
Question 32 of 40
2.5 Points
You can integrate __________ with a Wordpress site to help
make the creation of a blog easier and more uniform.
A. IP addresses
B. Templates
C. Domain names
D. Web 1.0
Reset Selection
Question 33 of 40
2.5 Points
What is the maximum upload speed you can get on an ISDL
Internet connection?
A. 56 KB per second
B. 128 KB per second
C. 144 KB per second
D. 100 MB per second
Reset Selection
Question 34 of 40
2.5 Points
Where do you access the setting configurations for a Proxy
server within IE?
A. LAN Settings
B. WAN settings
C. Network settings
D. General settings
Reset Selection
Question 35 of 40
2.5 Points
You have been hired to advise a local non-for-profit agency in
your area about designing a web presence for them. They first
need a domain name. What type of domain extension should
they specify?
A. .com
B. .pub
C. .org
D. .info
Reset Selection
Question 36 of 40
2.5 Points
You want to configure IE 9 so that your browsing history is
deleted every time you exit the web browser. Which tab within
Internet Options contains this setting?
A. Home
B. General
C. Advanced
D. Security
Question 37 of 40
2.5 Points
Which of the options below identifies the server that hosts your
personal website so that users can find it over the Internet?
A. Domain name
B. IP address
C. DNS name
D. DNS address
Reset Selection
Question 38 of 40
2.5 Points
The Internet shopping cart is an example of which version of
the web?
A. Web 1.0
B. Web 2.0
C. Web 3.0
D. Web 4.0
Question 39 of 40
2.5 Points
Which of the applications below is designed to help a user
bypass enforced web-filtering policies?
A. Ultrasurf
B. Opera
C. DNS
D. WordPress
Reset Selection
Question 40 of 40
2.5 Points
You are staying at a hotel and you need to use the computers
that are offered to guests in the business center. The computers
run Windows 7 and use IE 9 as the default browser. The
network policy at the hotel prevents guests from accessing
Internet Options. You do not want other hotel guests who may
use the computer after you to know where you went on the
Internet. Which feature below will prevent users from viewing
your Internet history?
A. Enable Protected Mode
B. Pop-up Blocker
C. Internet Security Zone
D. InPrivateBrowsing
Question 1 of 205.0 PointsWhat is the primary limitation o.docx

Question 1 of 205.0 PointsWhat is the primary limitation o.docx

  • 1.
    Question 1 of20 5.0 Points What is the primary limitation of free versions of antivirus applications? A. They don’t protect in real time. B. They only perform quick scans. C. They cannot scan the Windows directory. D. They only install on 64-bit operating systems. Reset Selection Question 2 of 20 5.0 Points Which selection below lists two operating systems that include BitLocker? A. Windows XP Professional and Windows 7 Professional B. Vista Ultimate and Windows 8 Enterprise
  • 2.
    C. Windows 7Professional and Windows 8 Professional D. Windows 7 Ultimate and Windows 8 Professional Reset Selection Question 3 of 20 5.0 Points You own a laptop with Windows 8 installed on it. How is someone able to access your files by installing another copy of Windows 8? A. Use BitLocker with the new OS to copy and paste the files to a USB drive. B. Use the Administrator account of the new OS to take ownership of the files. C. Decrypt the files using the encryption key of the new OS on the system volume. D. Decrypt the files using the newly installed certificate from the new OS. Reset Selection Question 4 of 20 5.0 Points
  • 3.
    Your mom’s computeris running extremely slow. She asks you what might be causing this. Which of the options below is not a reason for her slow performance? A. A fragmented volume B. Spyware C. A bad printer driver D. Not enough memory Reset Selection Question 5 of 20 5.0 Points Your AV software is unable to detect a recent virus that has infected your computer. You want to download another AV application to see if it can detect the virus. Which application below will do this? A. CCleaner B. Disk Cleanup C. MalwareBytes
  • 4.
    D. Auslogics DiskDefrag Reset Selection Question 6 of 20 5.0 Points Why is it best to run AV scans when the computer isn’t being utilized? A. The scans consume resources and can impede computer performance. B. Executable files can’t be scanned if a user is using them within an application. C. The Windows directory can’t be scanned if the computer is being used. D. AV applications can only do full scans if the computer is in safe mode. Reset Selection Question 7 of 20 5.0 Points What type of hard drive does not require defragging? A. A hard drive for a server
  • 5.
    B. A harddrive for a 64-bit operating system C. A solid-state drive hosting Windows 7 D. An SCSI drive hosting Server 2008 Reset Selection Question 8 of 20 5.0 Points Which statement below is not true about EFS? A. It can only be implemented on an NTFS partition. B. It requires a user to type in a PIN. C. It is supported by the Windows operating system. D. It doesn’t require TPM compatibility. Reset Selection Question 9 of 20 5.0 Points You are configuring the local firewall for your Windows 8 computer. Which types of rules should you create for your computer?
  • 6.
    A. Inbound rulesonly B. Outbound rules only C. Neither inbound nor outbound rules D. Both inbound and outbound rules Reset Selection Question 10 of 20 5.0 Points Which of the events below would automatically create a new restore point on your Windows 8 computer? A. Deleting the temporary files B. Installing a new printer C. Downloading music files D. Creating a new Internet favorite Reset Selection Question 11 of 20 5.0 Points
  • 7.
    What is alimiting factor of EFS when compared to BitLocker? A. It only works on 32-bit operating systems. B. It only works with a public certificate. C. It only works under the Administrator account. D. It only works at the file or folder level. Reset Selection Question 12 of 20 5.0 Points Which of the actions below will not create more room on your hard drive? A. Defragging your hard drive B. Uninstalling an application C. Deleting temporary Internet files D. Deleting image and video files Reset Selection
  • 8.
    Question 13 of20 5.0 Points You want to run CHKDSK and have it repair any errors it identifies, if possible. What is the command you would type? A. CHKDSK /f B. CHKDSK /r C. CHKDSK /e D. CHKDSK /RD Reset Selection Question 14 of 20 5.0 Points In order for BitLocker to protect the System Volume without the aid of an external drive, your computer must: A. be 32-bit. B. host a virtualized enabled BIOS. C. be TPM-compatible.
  • 9.
    D. have aUSB 3.0 interface. Reset Selection Question 15 of 20 5.0 Points A spyware application is consuming a lot of memory on your Windows 7 computer. You want to end this process. Where can you do this from? A. From the Processes tool in the Control Panel B. From the Process tab in Task Manager C. From the Performance tab in Task Manager D. From the Windows Defrag console Reset Selection Question 16 of 20 5.0 Points Your computer is once again out of hard drive space and you want to see which folders are consuming the most space on your hard drive. Which application below will do this? A. Ccleaner
  • 10.
    B. TreeSize C. MalwareBytes D.Auslogics Disk Defrag Reset Selection Question 17 of 20 5.0 Points Which type of Windows updates below is strictly security- related? A. Critical B. Optional C. Recommended D. Service Pack Reset Selection Question 18 of 20 5.0 Points You have a Windows 2000 computer that has no built-in firewall so you are looking for a third-party firewall to install. Which of the selections below will accommodate this?
  • 11.
    A. CCleaner B. ZoneAlarm C.Microsoft Security Essential D. MalwareBytes Reset Selection Question 19 of 20 5.0 Points You run a Defrag utility on your computer to see if you need to defrag your system volume. What fragmentation level represents a threshold at which point you need to defrag it? A. 3% B. 5% C. 10% D. 15%
  • 12.
    Reset Selection Question 20of 20 5.0 Points Which of the instances below is an example of a Trojan horse? A. An attachment in an email that is really a malicious file B. A link in an email that downloads a virus C. An executable file that replicates throughout the network D. A computer game that creates a backdoor into your computer Reset Selection Question 1 of 40 2.5 Points You are trying to network two laptops together using an Ethernet cable but it isn’t working. Which of the following selections might explain why it isn’t working? A. You are using an outdated CAT 3 cable. B. You are using a straight-through cable.
  • 13.
    C. You areusing a crossover cable. D. The wireless is interfering with the signal. Question 2 of 40 2.5 Points You want to use a terminal emulation program to terminal into a series of Cisco routers. You will be managing these devices remotely. What protocol should you use? A. FTP B. FTPS C. SSH D. Telnet Question 3 of 40 2.5 Points You need to know the MAC address of a Windows 8 computer. How can you accomplish this?
  • 14.
    A. Look inthe system properties. B. Type ipconfig at a command prompt. C. Type ipconfig/all at a command prompt. D. Type arp –m at a command Question 4 of 40 2.5 Points You are advising one of your neighbors about the HomeGroup feature of Microsoft. He wants to make sure that all of his computers support this feature. Which one of the operating systems below does not support HomeGroup? A. Windows 7 B. Windows RT C. Windows Vista D. Windows 8 Reset Selection
  • 15.
    Question 5 of40 2.5 Points You are unpacking and setting up workstations for a local school system. The school system has given you cables to connect the computers to the network once they are set up in the classrooms. You connect one end of the cables into the built-in NIC cards. What will you plug the other end into? A. A router B. The MDF C. The IDF D. A drop Question 6 of 40 2.5 Points Your boss tells you that he wants you to upgrade the network to a Domain. What type of server will you need to create in order to accomplish this? A. A DNS Server B. A Domain Controller
  • 16.
    C. A ProxyServer D. An Ad-hoc server Reset Selection Question 7 of 40 2.5 Points Which of the selections below is an example of a LAN? A. The Internet B. A fiber link connecting different Internet providers C. A network within a single building location D. A network comprised of offices in multiple states Question 8 of 40 2.5 Points Your Windows 8 computer is DHCP enabled. You want to find out what the IP address is for it. How do you do this? A. Type IP /? at a command prompt.
  • 17.
    B. Type IPCONFIGat a command prompt. C. Look at the manual settings of the Network Interface Card. Question 9 of 40 2.5 Points Your boss it trying to console into an old switch that he found in storage and wants to configure it. He asks you to describe what the serial port would look like. What do you tell him? A. Look for a male connector with 7 pins. B. Look for a female connector that accommodates 7 pins. C. Look for a male connector with 9 pins. Question 10 of 40 2.5 Points Port 25 is currently closed on your firewall. What does this mean?
  • 18.
    A. Computers can’tget the correct time. B. Users can’t telnet outside of the network. C. Users can’t RDP outside of the network. Question 11 of 40 2.5 Points If you PING a device, you are using the __________ protocol. A. ICMP B. POP3 C. DHCP D. IP Question 12 of 40 2.5 Points Your boss wants you to get certified in the area of managing and routing switches and routers. Which of the IT certifications below would satisfy this requirement?
  • 19.
    A. Microsoft MCP B.Microsoft MCSE C. Cisco CCP D. Cisco CCNA Question 13 of 40 2.5 Points You are the network administrator for a school system. Your boss informs you that she is thinking of implementing a BYOD program. She asks you if there are any disadvantages to BYOD. What do you tell her? A. BYOD is far more expensive than the organization’s supplying the computers. B. BYOD is currently not supported by the Windows operating system. C. BYOD is more difficult to support and manage for the IT department.
  • 20.
    D. BYOD networksare not able to stop broadcasts from slowing down the network. Reset Selection Question 14 of 40 2.5 Points Your boss wants you to start making your own Ethernet cables to save the company money. What type of connectors will you need to order to make them? A. NIC B. E5 C. RJ11 D. RJ45 Question 15 of 40 2.5 Points You are studying at the library and someone at your table has some great study material. Both of you have an iPad with you. You decide to network your computers together to exchange
  • 21.
    files. What typeof network have the two of you created? A. Client/server B. HomeGroup C. Apple Domain D. Ad-hoc Question 16 of 40 2.5 Points You boot up a computer that has had network issues and immediately look at its ARP cache to see what MAC addresses it has resolved recently. You find out that the cache has very few addresses in it. How could this be? A. The ARP cache was cleared when the computer was shut down. B. The ARP cache is cleared every 15 minutes by default. C. The HTTP protocol has become corrupted.
  • 22.
    D. The computerhas a virus attacking the ARP cache. Question 17 of 40 2.5 Points The computers in your network are configured to automatically receive an IP address but they are not getting them. Which server has most likely failed? A. Domain Controller B. DNS C. Proxy Question 18 of 40 2.5 Points Wendy calls the help desk and reports that she is unable to access her files that are stored on the server. The network is a Windows Domain with Active Directory. Wendy is logged on locally to her workstation that runs Windows 8. You remote into her machine and you can ping the file server. What is most likely the problem?
  • 23.
    A. She isbeing denied access to the files on the domain server. B. The NIC on her workstation is failing to do ARP requests. C. The switch her workstation is connected to isn’t working. Question 19 of 40 2.5 Points Which of these devices can completely stop broadcasts from being passed on across the network? A. An access point B. A router C. A switch Question 20 of 40 2.5 Points Some of the users in one part of the building can’t pull up your company’s intranet site in their browsers. The site comes up on your machine. You remote into their machines and attempt to PING the server that hosts the site and it fails. This is an
  • 24.
    example of a: A.software problem. B. driver problem. C. connectivity problem. Question 21 of 40 2.5 Points Look at the following URL and identify which part of it is optional if you wanted to type it into a web browser. http://www.microsoft.com/windows8 A. http:// B. www. C. Microsoft Question 22 of 40 2.5 Points
  • 25.
    Where does aGateway Antivirus scan for viruses? A. On the system volume of client computers B. On the system volume of a server C. Within incoming web packets D. On the application volume of a server Reset Selection Question 23 of 40 2.5 Points Your brother just lost his job and wants to build an online profile with a social media site geared at possible employers and HR recruiters. He asks you if you have a suggestion as to where to go. What do you tell him? A. WordPress B. LinkedIn C. Facebook D. Flickr
  • 26.
    Question 24 of40 2.5 Points You want to configure less stringent security settings for your organization’s internal portal site for Internet Explorer. Which zone will you select for this endeavor? A. Internet B. LAN C. Trusted Sites D. Local Intranet Question 25 of 40 2.5 Points You need to obtain a public certificate for your new e- commerce site. Where would you go to apply for a trusted certificate? A. Verisign.com B. Wordpress.com
  • 27.
    C. Megaproxy.com D. Youtube.com Question26 of 40 2.5 Points You need to choose a location within your network to install a web filter to keep your users out of undesirable websites. Which server would be ideal to host it? A. A web-hosting server B. A DNS server C. A proxy server D. An Active Directory server Reset Selection Question 27 of 40 2.5 Points Where are the Connection settings located within the Firefox browser options?
  • 28.
    A. General B. Content C.Advanced D. Privacy Question 28 of 40 2.5 Points Which version of IP offers users nearly limitless IP addresses? A. IPv2 B. IPV4 C. IPv6 D. IPv8 Reset Selection Question 29 of 40 2.5 Points You still have some XP computers in the network you manage.
  • 29.
    What is thehighest version of Internet Explorer that you can run on those computers? A. IE 7 B. IE 8 C. IE 9 D. IE 10 Question 30 of 40 2.5 Points You want to bundle your telephone and Internet services into one package from your local phone company. What type of Internet connection will they be offering? A. DSL B. Ethernet C. T3
  • 30.
    D. Cable Question 31of 40 2.5 Points You are an online training company and stream a lot of training videos from your location so your upload speed is just as important as download speed. Which type of Internet connection would be best for this situation? A. SDSL B. IDSL C. RADSL D. ADSL Reset Selection Question 32 of 40 2.5 Points You can integrate __________ with a Wordpress site to help make the creation of a blog easier and more uniform. A. IP addresses
  • 31.
    B. Templates C. Domainnames D. Web 1.0 Reset Selection Question 33 of 40 2.5 Points What is the maximum upload speed you can get on an ISDL Internet connection? A. 56 KB per second B. 128 KB per second C. 144 KB per second D. 100 MB per second Reset Selection Question 34 of 40 2.5 Points Where do you access the setting configurations for a Proxy server within IE?
  • 32.
    A. LAN Settings B.WAN settings C. Network settings D. General settings Reset Selection Question 35 of 40 2.5 Points You have been hired to advise a local non-for-profit agency in your area about designing a web presence for them. They first need a domain name. What type of domain extension should they specify? A. .com B. .pub C. .org D. .info Reset Selection
  • 33.
    Question 36 of40 2.5 Points You want to configure IE 9 so that your browsing history is deleted every time you exit the web browser. Which tab within Internet Options contains this setting? A. Home B. General C. Advanced D. Security Question 37 of 40 2.5 Points Which of the options below identifies the server that hosts your personal website so that users can find it over the Internet? A. Domain name B. IP address C. DNS name D. DNS address
  • 34.
    Reset Selection Question 38of 40 2.5 Points The Internet shopping cart is an example of which version of the web? A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0 Question 39 of 40 2.5 Points Which of the applications below is designed to help a user bypass enforced web-filtering policies? A. Ultrasurf B. Opera
  • 35.
    C. DNS D. WordPress ResetSelection Question 40 of 40 2.5 Points You are staying at a hotel and you need to use the computers that are offered to guests in the business center. The computers run Windows 7 and use IE 9 as the default browser. The network policy at the hotel prevents guests from accessing Internet Options. You do not want other hotel guests who may use the computer after you to know where you went on the Internet. Which feature below will prevent users from viewing your Internet history? A. Enable Protected Mode B. Pop-up Blocker C. Internet Security Zone D. InPrivateBrowsing