Certiport IC3 Living Online - IC3_GS4_LO Exam Practice Test

Adam, a novice Web user, is getting a large number of unsolicited commercial emails on his email address. He suspects that these emails are spam. Which of the following steps can he take to stop spam? Each correct answer represents a complete solution. Choose all that apply.
Correct Answer: B,D
Explanation: (Only visible to ExamsLabs members)
Which of the following cookie attributes is required to generate a cookie?
Correct Answer: A
Explanation: (Only visible to ExamsLabs members)
Which of the following IEEE standards defines Ethernet and the use of copper cabling in a network?
Correct Answer: D
Explanation: (Only visible to ExamsLabs members)
Which of the following elements of security means that data should only be available to authorized users?
Correct Answer: A
Explanation: (Only visible to ExamsLabs members)
Maria works as a Security Administrator for Company Inc. The company has a Windows-based network. Maria has been assigned a project to configure cookie settings in Internet Explorer 8. For which of the following purposes can a cookie be used? Each correct answer represents a complete solution. Choose all that apply.
Correct Answer: A,C,D
Explanation: (Only visible to ExamsLabs members)
Mark the MT-RJ connector in the image given below.
Correct Answer:

Explanation: The image displays the following connectors:
MT-RJ: The MT-RJ connector is the most recent type of small form factor fiber optic connector. The MT-RJ fiber connector is less than half the size of the SC duplex connector and transceiver, so it doubles the port density of fiber-optic LAN equipment. The connector is a 2-fiber connector and takes up no more room than an RJ-45 jack.

Fiber-LC: The LC connector was developed to meet the need for small and easier-to-use fiber optic connectors. The LC connector reduces space required on panels by 50%.

RJ-45: RJ-45 is a type of connector similar to an RJ-11 telephone connector, but it is larger in size because it has eight conductors. The unshielded twisted-pair (UTP) and shielded twisted-pair (STP) connections use RJ-45 connectors in computer networks.
You work as a Data Helpdesk Technician for Bluewells Inc. The company has a Windows-based network. You use Microsoft Outlook as the default mail client for accessing e-mails. You have given your e-mail address on the Web for receiving information on new technologies. You start receiving unwanted e-mail from various websites after registering. Which of the following terms refer to such types of unwanted e-mail? Each correct answer represents a complete solution. Choose all that apply.
Correct Answer: B,C
Explanation: (Only visible to ExamsLabs members)
Which of the following devices is used to convert digital signals to analog signals for transmission across a network?
Correct Answer: A
Explanation: (Only visible to ExamsLabs members)
A web search engine is designed to search for information on the World Wide Web. The search results are usually presented in a list of results and are commonly called hits. Which of the following steps are performed by a web search engine? Each correct answer represents a part of the solution.
Choose all that apply.
Correct Answer: B,C,D
Explanation: (Only visible to ExamsLabs members)
A protocol is a set of rules which is used by computers to communicate with each other across a network. Which of the following are the key features of a protocol? Each correct answer represents a part of the solution. Choose three.
Correct Answer: A,B,D
Explanation: (Only visible to ExamsLabs members)