C10 Online Exam 3_05 Score 100%

Question 1 of 20
5.0 Points
Why isn't 802.1X a good choice for home-based wireless networks?

    A. It only creates open wireless connections.
    B. It requires an authentication server.
    C. Its encryption is too easy to hack.
    D. It requires multiple access points.

Question 2 of 20
5.0 Points
Your boss calls you from his home to use the VPN connection you configured for him on his laptop. He has traditionally depended on Remote Desktop to access the server. Your boss tells you that the VPN connection shows that it is connected but the server's desktop is not appearing on his screen. What do you tell him?

    A. The firewall on his home router must be blocking the remote connection.
    B. His ISP must not allow encrypted connections through their network.
    C. He must be running Windows 8 which doesn't support VPN.
    D. VPN doesn't bring up a remote desktop on the local computer.

Question 3 of 20
5.0 Points
You have set up Remote Desktop for the company server running Server 2008 so that your users can RDP in from their XP workstations. Users are calling you saying that they are being denied the ability to remote in. What is the most likely reason?

    A. XP does not support Remote Desktop by default.
    B. Network Level Authentication is being enforced on the RDP connection.
    C. Server 2008 does not support Remote Desktop by default.
    D. Remote Desktop only works through a web browser over the Internet.

Question 4 of 20
5.0 Points
You have a Bluetooth headset that integrates with your computer so that you can talk to partners through Microsoft Lync. This is an example of what type of wireless networking?

    A. WLAN
    B. WPAN
    C. WMAN
    D. WWIRE

Question 5 of 20
5.0 Points
Your boss wants you to configure his laptop so that he can access the company network when he is on the road. You suggest a VPN connection to him. He is very concerned about security and asks you how secure VPN is. What do you tell him?

    A. Only mouse clicks and keyboard commands are transferred over the connection.
    B. All traffic that flows between the laptop and VPN server is encrypted.
    C. All of the tasks your boss will do will be on the desktop of the remote computer.
    D. VPN integrates with NTFS so that only secure files are opened and modified.

Question 6 of 20
5.0 Points
Your sister is considering purchasing a tablet computer that utilizes RT as the operating system. She asks you if RT is any different from her Windows 8 desktop she has at home. What do you tell her?

    A. Unlike her Windows 8 PC, RT does not have a tile-based interface.
    B. RT is an Android-based operating system so it is completely different.
    C. RT isn't touch-enabled so it is a poor choice for a tablet.
    D. She won't be able to install regular Windows application on RT.

Question 7 of 20
5.0 Points
Your boss wants you to devise a way for remote contractors to be able to access the server desktop. There is one stipulation, however, in that your boss wants to ensure that the local user can see everything that the remote contractor is doing in real time. What do you suggest?

    A. Install TeamViewer on the server.
    B. Configure a VPN connection on the server.
    C. Install GoToMyPC on the server.
    D. Configure RDP within the server's web browser.

Question 8 of 20
5.0 Points
When you connect to a remote VPN server with your laptop running Windows 8, what key item is your computer allocated?

    A. The desktop of the VPN server
    B. The desktop of the logon server
    C. An IP address from the remote network
    D. A web browser with an SSL connection

Question 9 of 20
5.0 Points
Your boss calls you from the road. She is trying to connect to the local hotel guest wireless network but there is a yellow shield displayed beside that particular wireless selection. She is asking you what that shield means. What do you tell her?

    A. It means the connection is not being broadcasted.
    B. It means the connection is an open connection.
    C. It means her wireless card doesn't support that connection.
    D. It means the wireless connection requires a password.

Question 10 of 20
5.0 Points
You are the IT Manager for a school system. You just went with a new application that teachers will use to record the attendance of their students as well as their grades. The application is hosted by a third party, and teachers access the application through their web browsers. This is an example of what type of cloud computing?

    A. Infrastructure as a Service
    B. Network as a Service
    C. Platform as a Service Windows 8 can't find a driver for the scanner
    D. Software as a Service

Question 11 of 20
5.0 Points
How does fractional employment differ from the traditional full-time job model of today?

    A. Fractional employment demands complete mathematical skills.
    B. A work unit in fractional employment is a project or task, not a job.
    C. Fractional employment only employs people from outside the United States.
    D. Fractional employment is exclusively for IT workers.

Question 12 of 20
5.0 Points
Your company is trying to get out of the responsibility of purchasing and hosting its own hardware so it won't have to finance or manage a datacenter anymore. Your boss has told you that you need to install an operating system on all of the cloud-based servers. This is an example of what type of cloud computing?

    A. Infrastructure as a Service
    B. Network as a Service
    C. Platform as a Service
    D. Software as a Service

Question 13 of 20
5.0 Points
Which of the operating systems below is able to join a domain?

    A. Microsoft Surface Pro
    B. Microsoft Surface RT
    C. Google Android
    D. iPad

Question-14
Your brother is a video producer and is looking to buy some sort of new computing device. He needs a lot of memory and processing power to edit the digital videos he works with. He also has a lot of external equipment he needs to connect to the computer, such as double monitors. Which type of computing device would you recommend to him to purchase?

    A. A laptop
    B. A tablet
    C. A PC
    D. A netbook

Question 15 of 20
5.0 Points
Which of the following is a proper use of the application, NetStumbler?

    A. Finding rogue access points within your network
    B. Managing multiple access points within a large network
    C. Disguising designated broadcast SSIDs on your network
    D. Creating open-ended wireless connections for easy access

Question 16 of 20
5.0 Points
Your mom wants to purchase a computer. She has heard about how the Windows 8 operating system is best-geared for a touch-enabled computing device. What type of computer do you recommend that she purchase?

    A. A laptop
    B. A tablet
    C. A PC
    D. A netbook

Question 17 of 20
5.0 Points
You have purchased an Apple desktop computer and want to set it up so that you can access your computer desktop when you are on the road. How might you do this?

    A. Install Remote Desktop for Apple on your desktop.
    B. Install Apple+ VPN on your desktop.
    C. Configure your desktop for Platform as a Service.
    D. Install the GoToMyPC client on your desktop.

Question 18 of 20
5.0 Points
Making a phone call through Lync from your laptop using only your headset is an example of:

    A. a PBX phone connection.
    B. an encrypted phone conversation.
    C. a legacy phone conversation.
    D. a peer-to-peer phone conversation.

Question 19 of 20
5.0 Points
You are configuring a wireless connection on your home router. Because you live in an apartment complex, the security level of the connection is paramount. Which wireless option below is the most secure?

    A. SSID
    B. WEP
    C. WPA
    D. WPA2

Question 20 of 20
5.0 Points
In order for your laptop to make a wireless connection, it must first find an available __________ to connect to.

    A. SSID
    B. VPN
    C. RSAT
    D. WEP