1.
Which of the following layers involves using a CAT5e cable on a LAN?
Correct Answer
A. pHysical
Explanation
The correct answer is Physical. The physical layer of the OSI model is responsible for the actual transmission and reception of data over a network. It deals with the physical aspects of the network, such as the cables, connectors, and network interface cards. Using a CAT5e cable on a LAN is a physical layer activity as it determines the physical medium through which the data is transmitted.
2.
Use of a fingerprint or retina scan to authenticate to a system instead of typing a password is an example of which of the following authentication methods?
Correct Answer
C. Biometric
Explanation
The use of a fingerprint or retina scan to authenticate to a system is an example of a biometric authentication method. Biometric authentication relies on unique physical or behavioral characteristics of an individual, such as fingerprints or retina patterns, to verify their identity. This method provides a higher level of security compared to traditional password-based authentication, as it is difficult to replicate or fake these biometric traits.
3.
For this question, decide whether the action makes it likely or unlikely that the trainer Which of the following conditions is MOST likely to place a device out of compliance with a company's policy requirements.
Correct Answer
D. End-user has modified the default OS of the device
4.
Which of the following frequencies is assigned to WiFi?
Correct Answer
B. 2.4 GHZ
Explanation
WiFi is assigned to the frequency of 2.4 GHz. This frequency is commonly used for wireless communication and is specifically allocated for WiFi networks. It allows for high-speed data transmission and is capable of penetrating walls and other obstacles, making it suitable for indoor and short-range wireless connections.
5.
Mark, a user, contacts the helpdesk stating his keyboard is not functioning on his mobile device. After the technician has fully resolved the issue, which of the following should be completed?
Correct Answer
D. Document the findings
Explanation
After the technician has fully resolved the issue, it is important to document the findings. This is necessary to keep a record of the problem that occurred and how it was resolved. Documenting the findings helps in maintaining a reference for future troubleshooting or if similar issues arise again. It also helps in tracking patterns or trends in technical problems and their solutions.
6.
Betty, an employee, is planning to travel internationally. Which of the following should an administrator perform FIRST to confirm Betty’s mobile device will function in the destination country?
Correct Answer
A. Contact the cellular provider
Explanation
To ensure that Betty's mobile device will function in the destination country, the administrator should contact the cellular provider first. The cellular provider will be able to provide information on international roaming services, network compatibility, and any necessary settings or configurations that may be required for the device to work in the destination country. By contacting the cellular provider, Betty can avoid any potential issues or disruptions with her mobile device while traveling internationally.
7.
Jerome, a user, reports that his wireless Internet connection seems slow, and he suspects it is being used by unauthorized persons. Which of the following should be implemented to help secure the wireless connection?
Correct Answer
B. WPA2
Explanation
To help secure the wireless connection, implementing WPA2 is the correct answer. WPA2 (Wi-Fi Protected Access 2) is a security protocol that provides stronger encryption and authentication methods compared to its predecessor, WPA. It helps prevent unauthorized access to the wireless network by requiring users to enter a password or passphrase before connecting. WPA2 is considered more secure and recommended for protecting wireless connections against potential threats and unauthorized usage.
8.
A network administrator notices an unusual volume of mobile device traffic going out over FTP to one particular unknown location. Which of the following ports should be blocked?
Correct Answer
D. 21
Explanation
Port 21 should be blocked because it is the standard port for FTP (File Transfer Protocol). By blocking this port, the network administrator can prevent the mobile devices from establishing FTP connections and sending data to the unknown location, thereby mitigating the unusual volume of traffic.
9.
Franck, a user, is being blocked from a website on his mobile device that is needed for him to do his job. Which of the following is the BEST course of action for the network administrator to take in order to allow this website?
Correct Answer
B. Whitelist the site
Explanation
The best course of action for the network administrator is to whitelist the site. Whitelisting the site means allowing access to the specific website that Franck needs for his job, while still maintaining the content filter in place. This ensures that Franck can access the necessary website without compromising the overall security and filtering measures in the network.
10.
When Mary, a user, moves between locations in a building she loses connectivity. The administrator takes a survey on the building floors and realizes that while moving from one location to the other the signal fades then comes back again. Which of the following is the BEST explanation?
Correct Answer
D. The issue is related to attenuation
Explanation
The best explanation for Mary losing connectivity while moving between locations in the building is that the issue is related to attenuation. Attenuation refers to the weakening or loss of signal strength as it travels through obstacles or over distance. In this case, as Mary moves from one location to another, the signal fades and then comes back again, indicating that there is a loss of signal strength due to attenuation. This could be caused by physical barriers or distance between Mary and the wireless access point.