Chapter’s 8, 9, &10 Flashcards
What type of device centralizes security management?
UTM
Firewall
IPS
IDS
UTM
You’re setting up a virtual machine for one of your customers who needs a legacy OS to run software for a paper-cutting machine in an envelope factory. Windows 10 64-bit is the host OS. The legacy client OS requires a minimum 1 GB of RAM and the software running on it requires a minimum of 2 GB of RAM. What is the absolute minimum RAM needed on the virtual machine?
5 GB
1 GB
4 GB
10 GB
5 GB
Which port is used to transfer mail between mail servers on a network?
23
110
143
25
25
Which cloud feature allows users to immediately get additional storage space as needed?
Rapid elasticity
Resource pooling
Instant access
Measured service
Rapid elasticity
Which type of hypervisor is also called a bare metal hypervisor?
Type 3
Any type, depending on how it’s installed
Type 1
Type 2
Type 1
Your company has decided to host its own website and maintain DNS on site. How many DNS servers are needed?
Depends on the network size
Three
One
Two
Two
What is the name of the file on a DNS server that stores records?
Internet file
Zone file
Hosts file
LMHOSTS
Zone file
Which feature of clouds do cloud providers use to appropriately charge clients?
Resource pooling
Metered service
Rapid elasticity
On-demand self-service
Metered service
Your friend is a software developer. They have Windows 10 Pro installed on their SOHO computer. They are creating an application that needs to run smoothly on both Windows and Linux machines, so it will need to be tested in both of those environments. What would be the best solution for your friend?
Two separate machines
Dual-boot system
Virtual machines on their PC
Windows 10 sandbox
Virtual machines on their PC
Using client-side virtualization, how many operating systems can be running on your computer at one time?
Only limited by available resources
Six
Two
Three
Only limited by available resources
A coworker is having a problem with their laptop and has asked you to fix it. When an external keyboard is plugged in, the laptop works just fine, but without it strange characters appear on the screen when typing. Which of the following are likely causes? (Choose two.)
The laptop needs to be replaced.
The driver is corrupted and needs to be updated/replaced.
The ribbon cable is partially disconnected and needs to be reseated.
There is debris under the keys.
The driver is corrupted and needs to be updated/replaced.
The ribbon cable is partially disconnected and needs to be reseated.
What should you use with a laptop to avoid frequent insertion and removal of external input and video devices?
KVM switch
PDA
Docking station
Port adapter
Docking station
Where is the best place to find the laptop service manual?
Inside the case
Manufacturer’s website
On the laptop’s hard drive
On the DVD that came with the laptop
Manufacturer’s website
Your customer has an iPhone 8 and wants to read and write NFC tags with it. What advice will you give them? (Choose two.)
Their iPhone will only work with Apple Pay.
iPhone 12 and iPhone 13 can read NFC tags simply by holding the phone over the tag.
They need to upgrade to iPhone X to write NFC tags.
With iOS 13 or better on their device, they’ll be able to read and write NFC tags using a third-party app.
iPhone 12 and iPhone 13 can read NFC tags simply by holding the phone over the tag.
With iOS 13 or better on their device, they’ll be able to read and write NFC tags using a third-party app.
Which LCD component is responsible for providing brightness?
Inverter
Backdrop
Screen
Backlight
Backlight