Mobile and Operating Systems

At a recent LAN party, some players were complaining about lag. What is the most likely cause?
The Operating Systems were are incompatible
Server hard drive storage is insufficient
Lack of memory for some client computers
Insufficient bandwidth on local network
How is data best secured when using a USB stick?
The data is encrypted
The USB stick is stored securely
The USB’s lock is engaged at all times
The data is password protected
What is the primary purpose of a security audit?
To identify all authorised users
To monitor how often passwords are changed
To identify system vulnerabilities
To monitor availability of the system
Banking cash machines, also known as ATMs, typically use which one of the following platforms?
Virtualisation
Mobile
Desktop
Server
Which of the following technologies allows multiple operating systems to be hosted on the same device?
Networking
Multitasking
Virtualisation
Multithreading
Which of the following does antivirus software primarily protect against?
Port scanning
Adware
Spyware
Trojans
What is typically used to close down ports in order to prevent network attacks?
Anti-malware software
Anti-spyware software
Antivirus software
Software firewall
What is an Inkjet printer classed as?
A storage device
A processor
An input device
An output device
Which one of the following best defines an operating system?
The interface between the computer and the network
The interface between the BIOS and the hardware
The interface between the user and the peripherals
The interface between the user and applications
When configuring a laptop to use an UEEE 802.3 network, which connector is most likely to be used?
Coaxial cable
RJ45 cable
Fibre cabling
USB-C
When accessing a remote website, what configuration details are essential?
Default gateway and DNS server address
DNS server address and MAC address
MAC address and NetBIOS name
Default gateway and NetBIOS name
Which of the following is classified as application software?
Word processor
Software firewall
Performance monitor
Raid disk manager
Before carrying out work on a computer device, what health and safety measures should be carries out first?
Conduct a risk assessment
Ensure equipment is disconnected from the mains
Use Personal Protective Equipment (PPE)
Wear anti-static strap
A laptop is being connected an access point. Which of the following security standard(s) is the most secure?
WEP
WEP and WPA2
WPS
WPA2
What type of network technology is typically configured to connect securely, over the internet, to a company’s internal network?
VPN
TCP/IP
VLAN
HTTPS
Which test confirms that a device is configured for the end user to access the business network?
Log on as administrator and use Ipconfig
Ask the user to log onto the device
Open the command prompt and use pathping
Use another device to remotely log in
Which test is the most appropriate to use on a new backup server?
Penetration
Failover
Load
Blackbox
Which of the following is the most secure authentication protocol used when providing remote support?
CHAP
PEAP
EAP
RTP
A member of the sales team has called requesting urgent access to the business costing spreadsheet. Which of the following is likely to be the correct procedure?
Tell the user to send an email requesting information
Tell the user to gain permission from the sales director
Give the user access as sales are critical for business
Tell the user they cannot have access as they are not on the list
After recording the findings of an end-to-end test of a configured platform, what is the next step in the process?
Release the platform to production
Analyse the results
Install user data
Take the corrective action
On looking at the process table on the computer, a technician notices that an application is always running even after reboot. The application is only used occasionally and is consuming significant resources. Which of the following should the technician do to best address the issue?
Defragment the hard drive
Scan the system for malware
Disable the application from the auto-start
Shut the application
Which of the following best describes the condition for an immediate remote wipe of a mobile device?
The device must be on, it must have WiFi connection and it does not need an active SIM card
The device must be on, it must have a data connection and it contains and active SIM card
The device must be on, no data connection is required and it contains and active SIM card
The device can be off to be wiped when it has a data connection and contains an active SIM card
What must be considered to prevent hackers when providing remote desktop access?
Whether the TCP port should be changed
Whether anti-malware software needs to be installed
Whether the fixed TCP port needs further authentication
Whether a firewall is needed
When would a virtual keyboard be typically used?
When using cloud services regularly
When the computer only has one working sub port
When the user is physically impaired
When the user is visually impaired
What type of file is a browser typically used to opening?
.exe
.doc
.msi
.html
What is the best reason to install specific software on a user’s device in order to provide remote support?
To ensure the user is able to work more flexibly
To comply with the company’s BYOD policy
To ensure the company can monitor user activity
To comply with the Data Protection Act
Which data is most likely to be included as part of a disaster recovery policy for mobile devices?
Operating system
Applications
Contact list
Photos
What is the main purpose of multi-factor authentication?
To provide users with permission to use resources
To audit user’s activity
To strengthen security when identifying users
To allocate specific resources to users
Six users need access to a folder. Which of the following describes the best way to achieve this?
Grant each of the six users permission to access the folder
Grant access to all six users by adding them to the administrators group
Add the six users to a group and give the group permissions
Write a batch file to copy the required data to each of the six users
Which of the following is most likely to be a breach of a business acceptable use policy?
Downloading application updates over a business network
Claiming expenses for using an individual mobile device
Using a file share application over a business network
Backing up a mobile device data over a business network
{"name":"Mobile and Operating Systems", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"At a recent LAN party, some players were complaining about lag. What is the most likely cause?, How is data best secured when using a USB stick?, What is the primary purpose of a security audit?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker