CMIT 202 Practice A questions and answers with solutions 2025
What technology is used to connect a wireless speaker to a mobile device? - ANSWER Bluetooth. (is a wireless technology that operates in the 2.4 GHz range to attach wireless devices near a mobile device. Which of the following wireless standards can operate at both 2.4 GHz and 5.0 GHz? - ANSWER 802.11n (can operate at both 2.4 GHz and 5.0 GHz. A user is trying to use her company-issued smartphone as a mobile pay device, and it isn't working. Which of the following components is missing from the smart phone? - ANSWER NFC Chip (it allows for communication between devices when they are within 2 inches of each other. Mobile pay service utilize this chip for communication between the phone and the pay device.) A computer company has been hired to support a person who sells crafts at trade shows and fairs. The company must configure all device and train the user a part of the contract and sale. Which technology should the technician recommend and configure for the handing of secure wireless payments? - ANSWER NFC (wireless payments are commonly handled using near field communication Where is the wireless antenna usually located inside a laptop? - ANSWER In the display (The wireless antenna is in the display portion of the laptop. Along with the display's ribbon cable, it passes into the main hardware part of the laptop through one of the hinges. When removing a display from a laptop, the antenna wires need to be disconnected from the motherboard. You are working with a software vendor who recommends that your company use a Type 1 hypervisor to run their product. Which of these is a Type 1 hypervisor? - ANSWER VMware ESXI ( only this one is a Type 1 hypervisor. Oracle VirtualBox and VMware Player are Type 2 hypervisors. Windows 11 is not a hypervisor.) A user is trying to run Hyper-V on his computer, and it's not working. Which of the following should you verify? - ANSWER Virtualization Support (The CPU on the system must support virtualization, and it must be enabled in the BIOS/UEFI to run 64-bit virtual machines. Hyper-V is Microsoft virtualization software. CPU speed, cores, and RAM are all important factors in being able to handle the running of the virtual machines optimally but without visualization support enabled, all those are irrelevant factors. ) Which network device would most likely be used to implement network security policies? - ANSWER Firewall (it operates on access control lists(ACLs), which are security rules that permit or deny specific types of traffic based on a company's security policies.)
Written for
- Institution
- Cmit
- Course
- Cmit
Document information
- Uploaded on
- December 30, 2024
- Number of pages
- 11
- Written in
- 2024/2025
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cmit 202 practice a questions and answers with sol
Also available in package deal