CompTIA Operational Procedure 2

0%

The file extensions listed below are organized into categories. Which category solely applies to mobile technology files?

Correct! Wrong!

Correct answer: apk, exe, iPA, prc, adb

apk – Android Application Package File
exe – Executable Files
iPA –iOS App Store Package
prc – Palm Resource Compiler
jad – Java Application Descriptor
adb – Android Debug Bridge
Aapt – Android Asset Packing Tool







Which of the algorithms below is a symmetric-key algorithm?

Correct! Wrong!

Correct answer: DES

Identify typical issues encountered by testers while performing mobile testing in Cloud Computing.

Correct! Wrong!

Correct answer: Issues with internet access, lock-in, and the subscription model

Government policy is not an issue in this case. Blackouts and poor salaries are not regarded as difficulties. Time Zones and language barriers are not relevant.

When Eddie overhears his IT manager arguing with a network administrator about how to properly dispose of computer equipment as he prepares to leave work for the day, what should you tell him? You explain how the administrator may easily refer to the safety data page (SDS) when the IT manager summons you to examine disposal instructions. The IT manager then inquires as to who is in charge of the SDS.

Correct! Wrong!

Correct answer: OSHA

A chronological record outlining persons in possession of an evidence is referred to as ___________ in forensic processes.

Correct! Wrong!

Correct answer: Chain of custody

A chronological record outlining persons in possession of an evidence is referred to as a chain of custody.

Which of the following protocols was created as a secure alternative to Telnet?

Correct! Wrong!

Correct answer: SSH

In the event that Ivan is cleaning out one of the old printers with a shop vacuum in the back room at work, what kind of vacuum should he use? You tell Ivan to stop using the shop vacuum as soon as you walk in, warning him that he could damage the printer components.

Correct! Wrong!

Correct answer: specialized anti-static vacuum

To clean the inside of a printer, which of the following tools would be used? (Choose all of the options that apply.)

Please select 2 correct answers

Correct! Wrong!

Correct answer: Can of compressed air & Toner vacuum

Many individuals currently receive a large number of photos and video files on their mobile devices. Where should they store/save the files, in your opinion?

Correct! Wrong!

Correct answer: Cloud File Storage services

Cloud storage is a resource with an unlimited capacity that you may use remotely online, either for free or for a price. Google Drive, iDrive, and other similar services are examples.

If an engineer is looking for a Python script in a computer's documents folder, what file extension should he or she look for?

Correct! Wrong!

Correct answer: .py

Differentiate between a Simulator and an Emulator in terms of mobile network

Correct! Wrong!

Correct answer: An emulator is based on hardware and software

Emulation is a system that acts precisely like something else, whereas simulation is a system that behaves similarly to something else.

What is the first step in successful incident response after an event report has been filed?

Correct! Wrong!

Correct answer: Confirm that a failure occurred.

The first step is to confirm that an incident has happened or is happening right now. You can go on to the next phase of the incident response procedure after you've recognized this.

The executives have been contemplating how to avoid a repetition of a recent power outage that knocked the company offline for 30 minutes. During the planning and design stages, they enlist your help as an IT expert. According to one CEO, how can you tell how much a surge suppressor can withstand? So, what are your options for responding to him?

Correct! Wrong!

Correct answer: joule rating

The ability of a suppressor to handle a surge will be measured in joules. A higher rating in this area indicates that you'll be able to protect yourself more successfully from higher line voltages.

The elements of the first response in circumstances , where users are identified in violation of policies pertaining to forbidden content or conduct should include: (Choose all of the options that apply.)

Please select 3 correct answers

Correct! Wrong!

Correct answer: Preservation of data and devices, Reporting via the appropriate channels, Identifying the issue

The following is a description of a device used to safeguard electrical devices from large voltage fluctuations:

Correct! Wrong!

Correct answer: Surge suppressor

You work as an IT consultant for a company in a coastal area that is subject to storms and flooding on occasion. The continuation of business operations is important because of your company's location. Which of the following plans focuses on minimizing the impact of a disaster on workers, customers, and IT systems?

Correct! Wrong!

Correct answer: Business continuity

Which of the following is a criterion for reliability?

Correct! Wrong!

Correct answer: MTBF

MTBF is a measure of reliability.

An employee in the research department was surfing the web when the host was infected with Malware.
Which log, as a technician, is most likely to reveal the source of the infection?

Correct! Wrong!

Click for next FREE CompTIA Test
CompTIA Mobile Practice Test #1

Premium Tests $49/mo
FREE November-2024