100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CMIT 202 Practice B Exam Questions And 100% Correct Answers $9.99   Add to cart

Exam (elaborations)

CMIT 202 Practice B Exam Questions And 100% Correct Answers

 2 views  0 purchase
  • Course
  • CMIT 202
  • Institution
  • CMIT 202

CMIT 202 Practice B Exam Questions And 100% Correct Answers...

Preview 3 out of 24  pages

  • October 12, 2024
  • 24
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CMIT 202
  • CMIT 202
avatar-seller
Braxton
CMIT 202 Practice B Exam Questions And
100% Correct Answers


When would a tech use RDP? - ANSWER When remotely accessing a

Windows computer



RDP is an easy way to connect to a remote computer running Windows.

Which of the following wireless security

protocols is least secure? - ANSWER WEP

WEP was the first of the wireless security protocols and the least secure. Since the
creation of WEP, WPA and WPA2 have been developed and are considerably superior to
WPA. For encryption

WPA2 uses AES, which is the strongest algorithm available.



Which of the following would be the best

options for preventing the theft of laptops? - ANSWER Door locks

Equipment locks

An equipment lock is used to lock a laptop to a desk when it is in use in order to prevent
someone from walking by and taking the laptop.

Laptops should be locked away when not in use in a locking cabinet or behind locked
doors to prevent theft. Motion sensors and CCTV ction systems, on the other hand, allow
nothing to prevent but give detection. USB locks prevent the use of USB ports.



Of the following, which would be the most likely action to be performed to a hard drive
by a technician who is removing it from a corporate computer to use as a replacement
drive in another computer at some point in the future? ANSWER Drive wipe

Utilities from the key vendors of hard drives exist that rewrite the drive with all 1s or all
Os to prevent remnants from being recovered. There are a number of techniques a drive
wipe utility could use to remove data. Not all drive wipe utilities are guaranteed to be

,effective on drives that contain highly sensitive data.



What does an organization need if an outside company performs the service for
shredding and disposal of sensitive corporate documents? - ANSWER Certificate of
Destruction

The outside company should provide a certificate of destruction or proof of incineration,
where the documents have been destroyed by fire as part of sensitive document
disposal.



What macOS utility does Apple provide to perform searches for files, directories, or
contacts? - ANSWER Spotlight

Spotlight is used to search files, directories, contacts, e-mail, and the web

Keychain is used to manage passwords;

Keychain Access is a utility for securely managing saved passwords.

Mission Control allows management of all application windows and virtual desktops.

Explorer is a Windows file management application.

Which of these are valid reasons why a security

certificate may be flagged as invalid by a browser? - ANSWER Self-signed

Expired

A digital security certificate will be invalid if it's issued from other than a trusted
certificate authority, an unknown issuer, a self-issued signer, or if the date on the
certificate is expired or not yet valid. All certificates carry a public key. The nationality
of the certificate authority is not an issue. Certificates are independent of any operating
system.



What is the command in Window to list files and subdirectories? ANS Dir

In Windows, the dir command is used to list files and subdirectories. In Linux, use ls.

There is no Windows show command. In Linux, the pwd command stands for print
working directory and prints the path of current working directory.



A four-year-old smartphone may

, can barely hold a charge on its battery for a single day. The phone runs hot and the case
is slightly swollen. What do you think is wrong with it? - ANSWER Battery has reached
end-of-life



Leaving applications open takes very little more battery power. Faulty settings might be
a culprit, and malware can also drain a battery quicker than it should, but given the age
of the battery - 4+, the most probable issue here is to replace the battery itself,
especially given that it is running hot and swollen.



A user claims that her PC doesn't work.

Which of the following is a good question to ask the customer? ANSWER What is not
working on the computer?



"Not working" is an exceptionally vague statement; the first order of business is to
narrow it down, with questions phrased in terminology the customer is likely to
understand. The customer might be unfamiliar with UPS, BYOD, motherboard, or power
supply.



What security feature prevents a hard drive from being accessed by an individual who
has physically removed it from the installed computer? ANSWER BitLocker



Bitlocker encrypts the entire drive to the point that, since its installation and encryption
on a computer, the drive cannot be accessed outside of that computer. The different
types of authentication, in this regard, are irrelevant because this act of taking the hard
drive out from the PC is itself an attempt to bypass the need for authentication.



What type of network environment is best for a company that has 30 computers and
needs the following: wired and wireless access, file server, networked printer,
centralized authentication in order to be able to sign on to any computer, shared folders
across network, and a networked scanner? ANSWER Domain

Workgroup networks are utilized in small networks that range between 2 to 20
computers. Files, printers, and other devices are shared across these types of
networks. A network domain is utilized when the network is larger in size, has a file
server, and everyone is required to authenticate to the server. VPNs are created so that
individuals can securely connect to a company from a remote location across an

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Braxton. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

83100 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart