CMIT 202 Practice B
questions and answers
2024
When would a technician use RDP?
When remotely accessing a
Windows computer
Remote Desktop Protocol (RDP) is used to connect
to a remote Windows computer.
Which of the following wireless security
protocols is least secure?
WEP
WEP is the first and least secure wireless security
protocol. WPA and WPA2 have been developed
since WEP was created and are much better
options than WEP. For encryption
WPA2 uses AES, which is the strongest algorithm
available.
Which of the following would be the best
options for preventing the theft of laptops?
Door locks
Equipment locks
An equipment lock is used to lock a laptop to a
desk when it is in use to mitigate the risk of
,someone walking by and taking the laptop.
When laptops are not in use, they should be locked
away in locking cabinets or behind locked doors to
prevent theft. Motion sensors and CCTV (closed-
circuit TV), which are helpful, don't prevent
anything; rather, they provide detection. USB locks
prevent USB ports from being used.
Which technique would most likely be used on a
hard drive being removed from a corporate
computer that a technician is going to use as a
replacement drive for another computer in the
future?
Drive wipe
Some hard drive manufacturers have a utility that
rewrites the drive with all 1s or all Os to prevent
data remnants from being recovered. A drive wipe
utility could use a number of techniques to remove
data. Not all drive wipe utilities are guaranteed to
be effective on drives that contain highly sensitive
data.
What should an organization require when an
outside company provides a service for shredding
and disposal of sensitive corporate documents?
Certificate of Destruction
An outside company should provide a certificate of
destruction or proof of incineration (when the
documents have been destroyed by fire) as part of
the service of sensitive document disposal.
What macOS tool is used to search for
files,directories, or contacts?
,Spotlight
Spotlight is used to search files, directories,
contacts, e-mail, and the web.
Keychain is used to manage passwords;
Keychain Access is a utility for securely managing
saved passwords.
Mission Control allows management of all
application windows and virtual desktops.
Explorer is a Windows file management
application.
Which of these are reasons why a security
certificate may be flagged as invalid by a browser?
Self-signed
Expired
A digital security certificate may be invalid if it is
not issued by a trusted certificate authority, if the
issuer is unknown, if it is self-signed, or if it is
expired or not yet valid. All certificates contain a
public key. The nationality of the certificate
authority is not an issue. Certificates are
independent of any operating system.
What Windows command is used to list files and
subdirectories?
Dir
The dir command is used to list files and
subdirectories in Windows. In Linux, use ls.
There is no Windows show command. pwd is used
in Linux to display the current working directory
path.
, A smartphone that is four years old can
barely keep a charge in its battery for a single day.
The phone runs hot, and the case is slightly
swollen. What do you suspect is wrong with it?
Battery has reached end-of-life
Leaving apps open uses very little extra battery
power. Incorrect settings may be a factor, and
malware can cause a battery to drain quicker than
normal, but since the battery is 4+ years old, the
most likely problem is that the battery needs to be
replaced, especially because it is running hot and
it is swollen.
A user reports that her PC doesn't work.
Which of the following would be the best question
to ask the user?
What isn't working on the computer?
"Not working" is very vague; the first step is to get
more details, using language that the user will
understand. The user may not understand terms
such as UPS, BYOD, motherboard, or power supply.
What security measure would prevent a hard drive
from being accessed by someone who removes it
from the computer in which it is installed?
BitLocker
Bitlocker encrypts the entire drive so that it cannot
be accessed outside of the computer on which it
was installed and encrypted. Various types of
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller GUARANTEEDSUCCESS. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $15.99. You're not tied to anything after your purchase.