
220-1001 uC 04062021
Authored by Jose Manuel Rios
Computers
University
Used 21+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
68 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following networking devices is used to implement network security policies for an environment?
Gateway
Firewall
Repeater
Switch
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is used primarily to manage sensors such as fitness trackers, medical devices, and watches?
Bluetooth
Z-Wave
RFID
ANT+
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following charging and data ports has a non-directional connector?
USB Micro-B
USB Type-A
USB Type-C
USB Micro-A
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Smith, a technician, needs to configure a wireless network for a company. Which wireless standard can he choose to get 600 Mbps bandwidth over either the 2.4 GHz or 5 GHz frequency spectrum?
802.11n
802.11b
802.11g
802.11a
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You want to connect to resources from an offsite location while ensuring the traffic is secured. Which of the following will you use to gain access to the secure network?
NAT
DHCP
VPN
SMTP
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a series of system checks performed during the initial bootup of a computer system?
Hyper-threading
SFC
POST
MBR
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a technology through which one or more simulated computers run within a physical computer?
Virtual private network
Virtual local area network
Virtualization
Demilitarized zone
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?