DIT CERTIFICATION TEST UPDATED ACTUAL Questions and CORRECT Answers
1 view 0 purchase
Course
DIT CERTIFICATION
Institution
DIT CERTIFICATION
DIT CERTIFICATION TEST UPDATED
ACTUAL Questions and CORRECT
Answers
What is cloud computing? - CORRECT ANSWER- the practice of using a network of
remote servers hosted on the Internet to store, manage, and process data, rather than a local
server or a personal computer.
What is ontology? -...
DIT CERTIFICATION TEST UPDATED
ACTUAL Questions and CORRECT
Answers
What is cloud computing? - CORRECT ANSWER- ✔✔the practice of using a network of
remote servers hosted on the Internet to store, manage, and process data, rather than a local
server or a personal computer.
What is ontology? - CORRECT ANSWER- ✔✔The study of how a particular knowledge
domain, or system, is organized. An ontology is the product of an ontological study.
what is the job of a network engineer? - CORRECT ANSWER- ✔✔To focus on the design,
implementation, delivery and support of network components, policies and procedures used
by an organization. Network engineers are responsible for configuring and testing network
devices, and setting up and maintaining the network infrastructure.
What is MTA? - CORRECT ANSWER- ✔✔A messaging component that routes, delivers and
receives e-mail.
Whats is a MDA (Mail Delivery Agent)? - CORRECT ANSWER- ✔✔An e-mail server
program that receives sent messages and delivers them to their proper destination mailbox.
What does POP3 servers do? - CORRECT ANSWER- ✔✔POP3 servers receive and hold
incoming e-mail messages in the appropriate mailbox on the server until users log on
(authenticate themselves with a user name and password) and download their mail. Once
messages are downloaded, they are removed from the server
what do IMAP servers do? - CORRECT ANSWER- ✔✔IMAP server receives and holds your
messages. When you log on with your user name and password, you can read a message on
the server, or you can view just the heading and the sender of the message and decide
whether to download it.
what is a mail client also refered to as? - CORRECT ANSWER- ✔✔MAIL USER AGENT
,Because file attachments may contain malicious code that can be used to damage or infiltrate
systems, your company routinely scans all file attachments in incoming e-mail. Where does
attachment scanning take place? - CORRECT ANSWER- ✔✔At the server, usually just after
the message has been received via SMTP
A domain name consists of letters (and sometimes numbers) separated by periods. Which of
the following is the host name component of a domain name? - CORRECT ANSWER-
✔✔The left-side component of the domain name, which categorizes domains into groups by
server name
Which of the following is a Web-based seminar or training session that is typically
interactive, enabling participants to communicate with the presenter and with each other via
online chat? - CORRECT ANSWER- ✔✔Web conference
Kim is using the YouTube graphics-editing application that she accesses via the Internet
through her browser. Kim does not own the application, nor can she download it. She is able
to use the application any time she needs to edit graphics. Although she does not have to pay
for the access, she does notice advertisements, which appear on the sidebar of the
application's interface. The application Kim is using may be classified as which of the
following? - CORRECT ANSWER- ✔✔Software as a Service (SaaS)
Cloud computing is a computing paradigm in which? - CORRECT ANSWER- ✔✔users are
able to access software and services run by servers that reside on the Internet.
Cloud computing is software services that are provided over the Internet. Which of the
following IT job roles should be most familiar with cloud computing software, infrastructure
and platform services? - CORRECT ANSWER- ✔✔Server administrator
What is restricted from downloading to the user's system when you configure browser
security levels? - CORRECT ANSWER- ✔✔active content
Which of the following is true regarding smartphones and PIM applications? - CORRECT
ANSWER- ✔✔Smartphone PIM applications are designed to work in tandem with traditional
desktop or laptop computers.
What could be a disadvantage for you to choose open-source, and thus a compelling enough
reason to purchase the licensed software instead of using the open-source solution? -
, CORRECT ANSWER- ✔✔Maintenance of an open-source solution relies on developers who
volunteer to work on the code.
What term is used to describe a software application that is secretly placed on a user's system
to gather information and relay it to outside parties, usually for advertising purposes? -
CORRECT ANSWER- ✔✔Spyware
How many mail servers does the use of e-mail involve? - CORRECT ANSWER- ✔✔Two --
incoming mail is handled by one server using Post Office Protocol (POP) or Internet Message
Access Protocol (IMAP), and outgoing mail is handled by another server using Simple Mail
Transfer Protocol (SMTP).
How does a LAN differ from a WAN? - CORRECT ANSWER- ✔✔A LAN spans a confined
geographic area, whereas a WAN consists of multiple LANs.
When you sign in to your instant messaging (IM) service, your online status is advertised (or
published) to the people on your contacts list. What does this scenario represent? -
CORRECT ANSWER- ✔✔Presencing
Non-repudiation is the security principle of providing proof that a transaction occurred
between identified parties. Which of the following can you use to enforce non-repudiation in
an electronic data transfer? - CORRECT ANSWER- ✔✔Digital signiture
Which technology can companies use to maximize processing power while protecting
privacy and sensitive materials? - CORRECT ANSWER- ✔✔Peer-to-peer networks on the
Internet (P2P)
Intranets and extranets can both be considered subsets of the Internet. Which statement best
describes the difference between intranets and extranets? - CORRECT ANSWER-
✔✔Intranets are used within corporations by employees, whereas extranets are used by
corporations for non-public customer support.
Pretty Good Privacy (PGP) and Gnu Privacy Guard (GPG) are both used to encrypt? -
CORRECT ANSWER- ✔✔e-mail messages and their attachments
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.