When troubleshooting network connectivity, what tool can be used to check the reachability of a remote host and measure round-trip times?
choices: DHCP, NSlookup, Ping, ARP
Ping
Which protocol is used for translating human-readable domain names into IP addresses and is crucial for web browsing?
choices: HTTP, FTP, DNS, SNMP
DNS
What protocol is used for securely accessing a remote server or network through a command-line interface?
choices: SSH, SMTP, POP3, DHCP
SSH
Which network type typically covers the smallest area, connecting devices within a short range, such as between a smartphone and a Bluetooth headset?
choices: WAN, WLAN, PAN, CAN
PAN
Which WAN protocol is widely used in telecommunications and offers a dedicated connection with consistent bandwidth?
choices: MPLS, VDSL, ISDN, P2P
ISDN
What WAN device typically connects multiple branch offices together, providing secure communication and access to centeralized resources?
choices: Load Balancer, Proxy Server, VPN Concentrator, Gateway
VPN Concentrator
In networking, what is the primary function of a hub?
choices: Broadcast data to all devices in a LAN, Analyze and forward data based on MAC addresses, Route traffic between different networks, Manage IP addresses for devices
Broadcast data to all devices in a LAN
What type of device operates at Layer 4 (transport Layer) of the OSI model, providing translation between private and public IP addresses?
choices: Hub, Switch, Router, NAT device
NAT device
In Quality of Service (QoS) management, what is the purpose of traffic shaping?
choices: Priortizing network traffic, Blocking unwanted websites, Controlling the flow of network data to meet specific criteria, increasing network speed
Controlling the flow of network data to meet specific criteria
Which command is commonly used in network troubleshooting to discover the route taken by packets across an IP network?
choices: TraceRoute, PortScan, PING, ARP
TraceRoute
Which of the following devices provides the portability of a mobile phone and functionality of a laptop/desktop?
choices: Tablet, GPS unit, E-reader, Fitness monitor
Tablet
A user brings in a smarphone for repair. The device is unable to send/receive calls or connect to WiFi. All applications on the device are working unless they require connectivity. Which of the following is MOST likely causing the problem?
choices: Airplane mode, Tethering, Disabled hotspot, VPN
Airplane mode
A human resources manager requests wireless APs to be set up for the office. A server will manage the wireless settings, and authorized devices should be able to access confidential records over WiFi. Which of the following settings should be configured to meet the requiements?
choices: WPA2 encryption/ UPnP/ and blocklisting, WPA encryption/ infrastructure mode /and MAC filtering, WPA2 encryption/ infastructure mode, and QoS
WPA encryption, infrastructure mode, and MAC filtering
Which of the following echnologies can be used for wireless payments?
choices: NFC, Bluetooth, IR, LTE
NFC
Which of the following connector types can be plugged into a device both right-side up and upside down?
choices: USB, USC-C, Mini-USB, Micro-USB
USB-C
A user wants to build a computer with a high-end CPu, plenty of RAM, and a high-end graphics card for online gaming. The user wants to verify that the graphics card is compatitble with the motherboard. Which of the following connection types would the user most likely utilize to connect the video card to the motherboard?
choices: PCIe, ISA, AGP, USB
PCIe
Which of the following perifpheral types is MOST likely to be used to input actions into a PC?
choices: Webcam, Mouse, Monitor, Optical dirve
Mouse
Which of the following resource types would be BEST suited to saving photographs from a mobile device with limited on-board storage?
choices: Cloud file services, Virtual desktop, Off-site email, Resource pooling
Cloud file services
An engineer’s workstation experiences a BSOD whenever loading very large CAD files to modify. Which of the following troubleshooting steps should a technician take to isolate the issue?
choices: Install addictional RAM rated at the fastest speed the motherboard will support, Perform a hard drive scan to idenity and lock out any bad sectors from use, Run a memory test to verify all memory addresses can be reliably written to and read from, Increase the size of the swap file to ensure adequate virtual memory is available
Run a memory test to verify all memory addresses can be reliably written to and read from
A user is unable to browse internet websites. A technician runs ipconfig and sees the following output:
* IP address….192.168.0.31
* Subnet mask…..255.255.255.0
* Default gateway…..192.168.0.254
The technician pings the gateway and gets a reply. The technician then pings an external IP address and also gets a reply. Which of the following commands would MOST likely resolve the issue?
choices: Netstat -nbt, netsh int ip reset, ipconfig/flushdns, nslookup 192.168.0.254
ipconfig/flshdns
Which of the following is the BEST use-case scernario for a Chome OS device?
choices: Web browsing and email, Photo and video editing, Application development, Database queries
Web browsing and email
A technicain implements a Group Policy change and needs to apply it without restarting the workstation. Which of the following commands can be used to accomplish this task?
choices: gpupdate, gpresult, netstat, Dism
gpupdate
An end user has requested assitance from the help desk to install new video editing software. The user wants to create serveral .wma files. Which of the follwoing should the help desk consider before installing the software?
choices: Disk space, Network connection, Aspect ratio, Power supply
Disk space
A new security requirement for logging on to a company network has been put in place for all users. Which of the following should a systems adminstratro enforce to BEST meet this requirement? (select TWO)
choices: Strong passwords, Folder redirection, Email filtering, Multifactor authentication, Remote desktop, Antimalware
Strong passwords, Multifactor authentication