Question
click below
click below
Question
Normal Size Small Size show me how
Stack #4308967
Question | Answer |
---|---|
What is the common color for the USB 3.0 connector for Standard A receptacles and Plugs? | blue |
What type of memory is used in the Solid-State Drive (SSD) as storage? | Flash memory |
Where is the BIOS originally stored in a standard PC? | Read Only Memory (ROM) |
What is a complete copy of everything stored on a physical optical disc called? | ISO image |
What is the minimum requirement for hard disk drive capacity in Windows 10? | 16 GB for 32-bit OS or 20 GB for 64-bit OS |
Where do Windows device drivers store? | Registry |
What is the volt rating of the RED wire in a power supply? | +5V |
What is a network cable where one end is T568-A while the other is T568-B configuration? | Cross-over |
What does a cross and red indicator signify in Windows 7 when there is a LAN connection? | Problem with the LAN driver |
Which hardware component can connect over a computer network? | Network Interface Card |
What is a networking device that forwards data packets between computer networks? | Router |
What does WI-FI stand for? | IEEE.802.11 |
What is a collection of devices connected together in one physical location called? | Local Area Network (LAN) |
What type of network interconnects multiple local area networks? | Wide Area Network (WAN) |
What is a computer program used to prevent, detect, and remove possible threats to the system? | Anti-virus software |
What is a network where two or more PCs are connected and share resources without going through a separate server computer? | Peer to peer network |
What IP address is used by the virtual machine to communicate over the physical network? | provider address |
What type of version protects unauthorized network access by utilizing a set-up password? | WPA2-Personal |
What consists of user matrices and capability tables that govern the rights and privileges of users? | Access control list |
What occurs when an attacker or trusted insider steals data from a computer system and demands compensation for its return? | Information extortion |
What monitors the initial security accreditation of an information system for tracking changes? | Continuous Assessment |
What service in Windows Server enables administrators to migrate data to lower cost and tape media on file servers? | Remote storage service |
What application group contains a Client Access point and at least one application specific resource? | Cluster |
What utility tool tests whether a particular host is reachable across an IP network? | Ping |
Which key is not appropriate to enter BIOS setup? | F5 |
What enables users of Windows to correct any problems preventing them from booting up normally? | Safe mode |
What starts up recovery options in a computer that essentially boots into the recovery partition of the main hard drive? | Repair computer |
What can a single physical hard drive divide into? | Multiple logical hard drives |
What are the two types of interface used to communicate between the hard drive and the computer motherboard? | Advanced Technology Attachment (ATA) and Serial Advanced Technology Attachment (SATA) |
What is the spider-like interconnection in millions of pieces of information located on computers around cyberspace? | World wide web |
What compound is used to prevent overheating of the CPU? | Thermal paste |
What is the maximum cable length for USB 2.0? | 5 meters |
What software program is stored in Read Only Memory (ROM)? | Firmware |
What is a disc image also known as? | ISO image |
What is the minimum hardware requirement of the computer RAM for Windows 10? | 1 GB for 32-bit or 2 GB for 64-bit |
What is the volt rating of the YELLOW wire in a power supply? | +12V |
What are Yost cable, CISCO cable, and console cable also known as? | Roll-over |
What does a yellow color indicator signify in Server 2008 for Local Area Network (LAN) connection? | No connectivity |
How many lights does the Light Emitting Diode (LED) in Network Interface Card (NIC) have? | 2 |
What is Port Forwarding in network address translation (NAT)? | Redirects a communication request from one address and port number combination to another |
What is the alternative for wired connection that uses radio frequencies to send signals between devices and a router? | Wireless Fidelity |
What is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area? | Campus Area Network |
What term applies to the interconnection of LAN in a city into 5 to 50 kilometers? | Metropolitan Area Network |
Who is assigned to monitor the network security, operation, and network users? | Network Administrator |
What is used to store user documents with a large amount of memory and storage space? | File server |
What type of version verifies network users through a server and requires a more complicated setup but provides additional security? | WPA2-Enterprise |
What is a way to identify a specific process to which an Internet or other network message is forwarded when it arrives at a server? | Port number |
What is an automated software program that executes certain commands when it receives a specific input? | Bot |
What enables administrators to configure storage thresholds on particular sets of data stored on server NTFS volumes? | System Quota |
What feature in Windows Server provides the ability to migrate workloads between a source and target cluster? | Failover |
What log files record performance statistics based on various performance objects and instances available in Performance Monitor? | Counter Logs |
What recovery console command examines the volume for errors and repairs it? | Chkdsk |
What is the state of a computer system if it is functional? | Normal booting |
What Windows update downloads and installs the latest version? | Windows 10 |
What is the physically damaged cluster of storage on the hard drive? | Bad sector |
What occurs when two or more devices are connected with the same IP address in a computer network? | IP address conflict |
What storage device should be replaced if frequent error messages appear while moving files and booting up the operating system? | Hard disk |
What recovery console command writes a new master boot record on the hard disk drive? | Fixmbr |
What type of server allows the central administration and management of network users and network resources? | Directory server |
What is an information asset suffering damage, unintended modification, or disclosure? | Loss |
What is the network security standard that tries to make connections between a router and wireless devices faster and easier? | WPS |
Which of the following is the most efficient in transferring larger files? | File transfer protocol |
What technique is used to gain unauthorized access to a computer, wherein the intruder sends messages with a source IP address? | Spoofing |
What enables administrators to define the types of files that can be saved within a Windows volume and folder? | File screening |
What second clustering technology provides corresponding client requests across several servers with replicated configurations? | Network Load Balancing |
What is a host or domain name lookup tool? | Ns lookup |
What is the problem if a computer's time and date keeps resetting even after fixing it in the BIOS? | CMOS battery failure |
What tool is used for checking the condition of the hard drive? | Crystal Disk Info |
What is a task to do after planning to fix the network? | Implementing the solution |
What is the process of scanning, identifying, diagnosing, and resolving problems in software called? | Software troubleshooting |
What is the maximum cable length for USB 3.0 using a non-twisted pair wire? | 3 meters |
M.2 is a form factor for what? | Storage media |
What kind of chip stores the settings in the BIOS? | CMOS |
What is used as a substitute for an actual disc, allowing users to run software without loading a CD or DVD? | ISO file |
What Windows edition has a program capable of restricting other users from accessing certain programs? | Windows Ultimate |
In what folder can device drivers be found? | System32 |
What is the ideal voltage range on the hot wires of a Molex connector? | RED = 5V, Yellow = 12V |
What type of Ethernet cable is used to connect computers to hubs and switches? | Straight thru |
What is a network interface controller also known as? | LAN Card |
What class of IP address is 192.168.0.1? | Class C |
What type of router is designed to operate in the Internet backbone? | Core |
What allows defining a list of devices and only allowing those devices on a Wi-Fi network? | MAC Filtering |
What allows users to move around the coverage area while maintaining a network connection? | Wireless Local Area Network |
What is an enterprise-level heterogeneous backup and recovery suite? | NetBackup |
What is a 24 pin USB connector system with a rotationally symmetrical connector? | Universal Serial Bus (USB) C Thunderbolt |
What facilitates communication between the CPU and other devices in the system? | Chipset |
What option in the BIOS/UEFI is used to overclock a computer? | North Bridge |
What is the minimum byte capacity of a bootable flash drive for Windows 10? | 8GB |
What is the minimum RAM requirement of Server 2012 R2? | 512MB |
In Windows 7, where is Windows Update and Security located? | Settings |
What voltages does the ATX12V P1 connector provide for the motherboard? | 3.3V, 5V, 12V |
What is defined as a structured network cabling system standard for commercial buildings? | ANSI/TIA-568 |
In networking, what refers to pieces of related information transferred through a network? | Connection |
What class of IP addressing is 172.16.10.1? | Class B |
What type of router enables an internal network to connect to an external network? | Edge |
What pertains to the maximum data transfer rate of a network for the internet? | Bandwidth |
What type of high-speed network is composed of hosts and interconnects using various technology/topology? | Local Area Network |
What acts like a border router to connect corporate sites to wired access lines? | Customer Premises Equipment (CPE) |
What is the process of recognizing a user’s identity called? | Authentication |
What type of server occupies a large portion of computing territory between the database server and end user? | Application Server |
In the context of security, what is a privilege or assigned permission for the use of computer data or resources? | Access |
What media type of 10-megabit Ethernet uses broadband coaxial cable for a maximum length of 3600 meters? | 10Base-36 |
What is a network security system that monitors and controls incoming and outgoing network traffic? | Firewall |
What term is used to refer to when a system is unavailable? | Downtime |
Which command is used to certify the peer name resolution in Active Directory? | NSLOOKUP |
What Active Directory protocol is used to access data from a database? | Lightweight Directory Access Protocol (LDAP) |
Which command displays the measures and various real-time statistics on the system’s performance? | View current activity |
What type of peripheral card has a media access control address? | Network interface card |
What is the main patch panel that links to every telecommunication room inside a building called? | Vertical cross-connect |
What is an enclosed or semi-enclosed channel that protects, routes, and hides cables and wires? | Raceway |
What material is slid before crimping both ends of a patch cable to reduce strain? | Boot |
What test verifies the operation of a communication device by sending and receiving data from the same port? | Loopback test |
What networking tool monitors and intercepts traffic over the computer network? | Packet analyzer |
What is the resistance reading of an open wire? | Infinite ohms |
What is the interface standard for a serial bus for high-speed communications? | Firewire |
What microchip manages data communication between a CPU and a motherboard? | Input/output controller hub |
What setup option in UEFI/BIOS allows security settings to perform tasks such as locating the device? | Lo Jack |
What is a text-based command used for creating a bootable flash drive? | Disk-part |
What is the minimum RAM requirement of Server 2008 R2? | 512MB |
In Windows 7, what indicates that a video driver has not been installed? | Only standard video is displayed |
What is the voltmeter reading of a shorted diode? | Zero volt |
What is the process of joining two cable ends together called? | Cable splicing |
What is a hardware device that enables connecting serial devices across a network? | Terminal server |
What class of IP addressing is 10.10.10.1? | Class A |
How many devices can connect to a wireless router? | 250 |
What device acts as a bridge between wireless clients and a wired network? | Access point |
What is a logical subnetwork that groups a collection of devices from the same network switch? | Virtual local area network |
What is the time lapse between data sent and when received called? | Latency |
What means pushing a component to its limits and extremes? | Stress test |
What type of server enables large numbers of users to exchange information near instantaneously? | Real-time communication server |
What ensures that information and programs are changing only in a specified and authorized manner? | Integrity |
What command-line network utility displays network connections for TCP and routing tables? | Netstat |
What set of rules describes how software and hardware should interact within a network? | Communications protocol |
What attack includes the execution of viruses, worms, Trojan horses, and active web scripts? | Malicious code |
What set of rules is used for transferring files on the World Wide Web? | Hypertext transfer protocol (HTTP) |
What is the traditional method used to access server data and using the server message block protocol over TCP/IP? | Windows folder sharing |
What two command-line utilities used to export and import active directory object information? | Ldifde.exe and csvde.exe |
A node in a computer network that allows data to flow from one discrete network to another | Gateway |
What electrical quantities measured when performing continuity testing of twisted pair cable? | Resistance |
What type of backup used in hard drive, disc, flash drive, and external drive that are housed on site? | Local backup |
What recovery tool in Windows fixes and scans computer problem that prevents computer from booting repeatedly? | Startup repair |
Is used to run commands for troubleshooting unbootable operating system | Windows recovery environment |
need to discharge electrically before the replacement of parts? | Capacitor |
The most current wireless networking standard and can communicate with the older network standards. | 802.11 n |