reviewer Flashcards

(149 cards)

1
Q

What is the common color for the USB 3.0 connector for Standard A receptacles and
plugs?

A

Blue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of memory used in the Solid State Drive (SSD) as storage?

A

Flash memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is originally, where the BIOS stored in a standard PC

A

Read Only Memory (ROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is a complete copy of everything stored on a physical optical disc

A

ISO image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the minimum requirement for hard disk drive capacity in Windows 10?

A

16 GB for 32-bit OS or 20 GB for 64-bit OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where do Windows device drivers store?

A

Registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the volt rating of the RED wire in a power supply?

A

+5V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is a network cable where one end is T568-A while the other is T568-B configuration

A

Cross-over

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Windows 7, when LAN connection has a cross and red indicator signifies that there is

A

Problem with the LAN driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following hardware components can connect over a computer network?

A

Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

. It is a networking device that forwards data packets between computer networks.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WI-FI is a trademarked phrase, which means

A

IEEE.802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is a collection of devices connected together in one physical location

A

Local Area Network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A type of network that interconnects multiple local area network

A

Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A computer program used to prevent, detect and remove possible threats to the system

A

Anti-virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is a two or more PC are connected and share resources without going through a
separate server computer

A

Peer to peer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What IP address used by the virtual machine to communicate over the physical
network?

A

Provider address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of version that protects unauthorized network access by utilizing a set-up
password?

A

WPA2-Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

consists of the user matrices, and capability tables that govern the rights and privileges
of users.

A

Access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It occurs when an attacker or trusted insider steals data from a computer system and
demands compensation for its return

A

Information extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

It monitors the initial security accreditation of an information system for tracking of
changes

A

Continuous Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What services in Windows Server that enables administrators to migrate data to a lower
cost and tape media on file servers?

A

Remote storage service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What application group that contains a Client Access point and with at least one
application specific resource?

A

Virtual cluster server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A utility tool that test whether a particular host is reachable across an IP network

A

Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which of the following keys is not appropriate to enter BIOS setup?
F5
26
What enables users of Windows that corrects any problems preventing from booting up normally?
Safe mode
27
What starts up recovery options in a computer that essentially boot into the recovery partition of the main hard drive?
Repair computer
28
A single physical hard drive can divide into multiple ___ hard drives
Logical
29
What are the two types of interface used to communicate between the hard drive and the computer motherboard?
Advanced Technology Attachment (ATA) and Serial Advanced Technology Attachment (SATA)
30
What is the spider-like interconnection in millions of pieces of information located on computers around the cyber space?
World wide web
31
A compound used to prevent overheating of CPU
Thermal paste
32
What is the maximum cable length for USB 2.0?
5 meters
33
What software program stores into a Read Only Memory (ROM)?
Firmware
34
Disc image also know as
ISO image
35
What is the minimum hardware requirements of the computer RAM, for Windows 10?
1 gigabyte (GB) for 32-bit or 2 GB for 64-bit
36
An extension of Microsoft management console used to manage hardware devices including device drivers
Device Manager
37
What is the volt rating of the YELLOW wire in a power supply?
+12V
38
A Yost cable, CISCO cable and a console cable also known as
Roll-over
39
. In Server 2008, Local Area Network (LAN) connection icon in a yellow color indicator signifies
no connectivity
40
Light Emitting Diode (LED) in Network Interface Card (NIC) has __ lights
2
41
Port __ is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another.
Forwarding
42
. What is the alternative for wired connection that uses radio frequencies to send signals between devices and a router?
Wireless Fidelity
43
is a computer network made up of an interconnection of local area network (LANs) within a limited geographical area, e.g. corporate buildings
Campus Area Network
44
What term applies to the interconnection of LAN in a city into 5 to 50 kilometers?
Metropolitan Area Network
45
Who is assign to monitor the network security, operation and network users?
Network Administrator
46
is used to store the user documents with a large amount of memory and storage space
File server
47
What type of version that verifies network users through a server and requires a more complicated setup, but provides additional security?
WPA2-Enterprise
48
is a way to identify a specific process to which an Internet or other network message forwarded when it arrives at a server.
Port number
49
An automated software program that executes certain commands when it receives a specific input is
Bot
50
enables administrators to configure storage thresholds on particular sets of data stored on server NTFS volumes
File System Quota
51
What feature in Windows Server provides the ability to migrate workloads between a source and target cluster?
Failover
52
What log files that record performance statistics based on the various performance objects and instances available in Performance Monitor?
Counter Logs
53
The recovery console command that examines the volume for errors and repairs it.
Chkdsk
54
The computer system is functional if it is in
Normal booting
55
What windows update that downloads and installs latest version?
Fully automatic
56
What is the physically damaged cluster of storage on the hard drive?
Bad sector
57
It occurs when two or more devices connected with the same IP address in a computer network.
IP address conflict
58
What storage device should replace if frequent error messages appear while moving files and booting up operating system?
Hard disk
59
What recovery consoles commands that writes a new master boot record on the hard disk drive?
fixmbr
60
What is the maximum cable length for USB 3.0 using a non-twisted pair wire?
3 meters
61
. M.2 is a form factor for
Storage drive
62
What kind of chip stores the settings in the BIOS?
Real Time Clock/Non Volatile Random Access memory (RTC/NVRAM) chip
63
It is used as a substitute for actual disc, allowing users to run software without having to load a CD or DVD
ISO file
64
What Windows edition has a program capable of restricting other users to access certain programs in a computer?
Windows Ultimate
65
In what folder that the device driver can be found?
System32
66
An ideal voltage range on the hotwires of a Molex connector?
Red = 5V, Yellow = 5 V
67
What Ethernet cable used to connect computers to hubs & switches?
Straight-thru
68
A network interface controller also known a
LAN Card
69
What class of IP address is 192.168.0.1?
Class C
70
A router that is design to operate in the Internet backbone
Core
71
allows to define a list of devices and only allow those devices on Wi-Fi network
MAC Address Filtering
72
What type of network that connects through signals, e.g. infrared?
Wireless Personal Area Network
73
allows users to move around the coverage area in a line of sight while maintaining a network connection
Wireless Local Area Network
74
is an enterprise-level heterogeneous backup and recover suite
NetBackup
75
A type of server that allows the central administration and management of network users and network resources.
Directory server
76
is an information asset suffering damage, unintended modification or disclosure
Loss
77
The network security standard that tries to make connections between a router and wireless devices faster and easier.
WPS
78
Which of the following is the most efficient in transferring larger files?
File transfer protocol
79
What technique used to gain unauthorized access to computer, wherein the intruder send messages with a source IP address?
Spoofing
80
It enables administrators to define the types of the file that can save within a Windows volume and folder.
File screening
81
What second clustering technology provides by corresponding client requests across several servers with replicated configurations?
Network Load Balancing
82
What log files that conserves disk space by ensuring that the performance log file will not continue growing over certain limits?
Circular logging
83
A __ should be upgraded to receive and transmit strong signals to and from other computer
Network card
84
A protocol that provides quick, automatic and central management for the distribution of IP addresses within a network
Dynamic host control protocol (DHCP)
85
What command-line tool used to find the IP address that corresponds to a host or domain name?
Nslookup
86
What is the problem of a computer if the time and date keeps on resetting even after fixing in the BIOS?
CMOS battery failure
87
A tool used for checking the condition of the hard drive with signs like “Good”, “Caution” or “Bad”
CrystalDiskInfo
88
A task to do after planning to fix the network is
Implementing the solution
89
A process of scanning, identifying, diagnosing and resolving problems, errors and bugs in software
Software troubleshooting
90
is a 24 pin USB connector system with a rotationally symmetrical connector
Universal Serial Bus (USB) C Thunderbolt
91
It facilitates communication between the CPU and other devices in the system
Chipset
92
What option in the BIOS/UEFI used to overclock computer?
Voltage basic input output system
93
Minimum byte capacity of a bootable flash drive for windows 10 is
8GB
94
What is the minimum RAM requirement of Server 2012 R2?
512MB
95
In windows 7, windows update and security is located in
Settings
96
What voltages that ATX12V P1 connector provides for the motherboard?
3.3V, 5V, 12V
97
defined as structured network cabling system standards for commercial buildings, and between buildings in campus environments.
ANSI/TIA-568
98
In networking, __ refers to pieces of related information that are transferred through a network
Connection
99
What class of IP addressing is 172.168.10.1
Class B
100
What type of router that enables and internal network to connect to external network?
Edge
101
What pertains to the maximum data transfer rate of a network for internet connection?
Bandwidth
102
What type of a high-speed network/subnetwork that composed of hosts and interconnects using a variety of technology/topology?
Storage area network
103
It acts like a border router to connect corporate sites to wired access lines.
Customer premises equipment (CPE)
104
is a process of recognizing a user’s identity
Authentication
105
A type of server that occupies a large portion of computing territory between the database server and end user.
Application server
106
In the context of security, __ is a privilege or assigned permission for the use of computer data or resources.
Access
107
What media types of 10-megabit Ethernet that compose of broadband coaxial cable carrying multiple baseland channels for a maximum length of 3600 meters?
10Base-36
108
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall
109
What term used to refer when a system in unavailable?
Downtime
110
Which of the following commands used to certify the peer name resolution in Active Directory?
NSLOOKUP
111
What active directory protocol used to access data from a database?
Lightweight directory access protocol (LDAP)
112
Which of the following displays the measures and various real-time statistics on the system’s performance?
View current activity
113
What type of peripheral card having media access control address?
Network interface card
114
Which of the following is a term for the main patch panel that links to every telecommunication room inside the building?
Vertical cross-connect
115
An enclosed or semi-enclosed channel that protects, routers and hides cables and wires
Raceway
116
A material that slid before crimping both ends of a patch cable and acts to reduce strain in a cable.
Boot
117
What test verifies the operation of communication device by sending and receiving data from the same port?
Loopback test
118
What networking tool that monitors and intercepts traffic over the computer network?
Packet analyzer
119
Resistance reading of an open wire is
Infinite ohms
120
is an interface standard for a serial bus for high-speed communications also referred as Institute of Electrical and Electronics Engineers (IEEE) 1394 interface
Firewire
121
A microchip to manage data communication between a CPU and a motherboard.
Input/output controller hub
122
A setup option in Unified Extensible Firmware Interface (UEFI)/Basic Input Output System (BIOS) that allows security settings to perform such tasks as locating the device.
LoJack
123
A text based command used for creating bootable flash drive
Diskpart
124
What is the minimum Random Access Memory (RAM) requirement of Server 2008 R2?
512MB
125
In Windows 7, an indicator tells that a video driver has not installed.
Only standard video is displayed
126
A volt meter reading of a shorted diode
Zero volt
127
is the process of joining two cable ends together
Cable splicing
128
What is a hardware device that enables to connect serial devices across a network?
Terminal server
129
What class of IP addressing is 10.10.10.1?
Class A
130
How many device can connect to a wireless router?
250
131
A device that acts as a bridge between wireless clients and wired network is
Access point
132
A logical subnetwork that groups collection of devices from the same network switch.
Virtual local area network
133
It is the time lapse between data sent and when received, it can have a big impact on performance
Latency
134
which means pushing component to its limits and extremes
Stress test
135
What type of server that enables large numbers users to exchange information near instantaneously and formerly known as internet relay chat (IRC) servers?
Real-time communication server
136
It ensures that information and programs are changing only in a specified and authorized manner
Integrity
137
What command-line network utility that displays networks connections for TCP and routing tables?
Netstat
138
What set of rules that describe how software and hardware should interact within a network?
Communications protocol
139
What attach includes the execution of viruses, worms, Trojan horses, and active web scripts with the intent to destroy or steal information?
Malicious code
140
Set of rules for transferring files such as text, graphic images, sound, video and other multimedia files, on the World Wide Web (WWW).
Hypertext transfer protocol (HTTP)
141
What is the traditional method used to access server data and using the server message block protocol over TCP/IP?
Windows folder sharing
142
What two command-line utilities used to export and import active directory object information?
Ldifde.exe and csvde.exe
143
A node in a computer network that allows data to flow from one discrete network to another
Gateway
144
What electrical quantities measured when performing continuity testing of twisted pair cable?
Resistance
145
What type of backup used in hard drive, disc, flash drive and external drive that are housed on site?
Local backup
146
What recovery tool in Windows fixes and scans computer problem that prevents computer from booting repeatedly?
Startup repair
147
used to run commands for troubleshooting unbootable operating system.
Windows recovery environment
148
Which of the following electronic components need to discharge electrically before the replacement of parts?
Capacitor
149
The most current wireless networking standard and can communicate with the older network standards.
802.11n