
A+ 1101 PM Review Day 8
Authored by Wolfgang Velasco
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Both Apple and Samsung have released their own versions of contactless mobile payment solutions. For example, Apple Pay allows users to place their iPhone or Apple Watch within an inch of a credit card machine at a store to make a payment. Which of the following wireless technologies do these types of payment systems rely upon?
Answer explanation
NFC, or near-field communication, is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another.
2.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
You are connecting a laptop to a brand-new digital high-definition TV. Unfortunately, the laptop is a little outdated and only has an analog display output. Which of the following adapters could you use to convert the signal from analog to digital for use with the new television?
Answer explanation
To convert from analog to digital, you need a VGA (analog) to DVI-D (digital) adapter.
3.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
What RAID level requires at least three hard disks to operate?
Answer explanation
RAID 5 uses block-level striping with distributed parity, requiring at least three disks to ensure redundancy
4.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following is an example of a valid IPv4 address?
Answer explanation
An IPv4 address is written in dotted decimal notation, such as 192.168.1.254.
5.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A workstation shows a "bootable device not found" error, and the hard drive is not recognized in UEFI. What is the likely cause?
Answer explanation
If properly cabled but unrecognized, the hard drive has likely failed.
6.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following is the MOST dangerous type of threat when using virtualization?
Answer explanation
VM escape is the biggest threat in virtualized systems, where malware on a guest OS can jump to another guest or the host. Keeping hypervisor code up-to-date is essential to mitigate this risk. Other issues like VM sprawl and rogue VMs are less critical.
7.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
WolfTech utilizes a strong authentication model for all of its internal services. If an employee needs to access one of the company's internal applications, they use their username, a password, and a one-time code texted to their smartphone to log in. Which of the following types of authentication is this known as?
Answer explanation
Multifactor Authentication (MFA) combines at least two factors: something you know (password) and something you have (one-time code).
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?