Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

cts 220 fall 2011

study for final exam

QuestionAnswer
_________ proves who someone is who they say the are Authentication
What is another term for junk mail? Spam
______ hides in executable files. Virus
what is the language used to communicate with printers developed by Adobe? Post Script
how long does the fuser usually last in a laser printer? 45,000 pages
when cleaning a printer, if you take the inkjet nozzles out, how long can you leave them out without problems? 30 mins
printer _______is updated by downloading the update from the manufacturer website. firmware
what do you check for recorded events regarding the printer? event viewer
when talking about the number of bits that can be transmitted over a network at a time is? Bandwidth
what is the actual speed of the network called? throughput
what high speed network technology that can be used in other mediums? broadband
what offers moderate protection when connected to a private network? private profile
what lets you read info from the internet namespace by requesting info about dns resolutions from a dns server? nslookup
what is a computer called that intercepts requests that a client makes of a server? proxy server
what type of attack eaves drops on data in transit and may even change the data? man in the middle
what is used to communicate over the internet? voip
level of success of internet communications? quality of service
when using nslookup, when you know the ip address, what type of lookup is that? reverse
when you make-up a word that contains a word with several spaces allowed: passphrase
when you try to get people to give out private info: social engineering
when you put a dollar sign at the end of a file name creates a? hidden share
what is the command you use to encrypt, decrypt when the key is lost: cipher
for a standalone computer that is not kind of domain, the efs creates a ___ digital cert to use for the encryption: self signed
certificates are managed by a? certificate management console
when you cant access an encrypted file, you may be able to recover the file using: recovery certificate
latency measured by the round trip to a destination and back true
when you have an on-demand broadband connection, does it require a username and pass every time you want to connect? yes
what type of networking technology uses a dedicated line from your isp to your business or home? fiber optic
if you want to know what the dns server knows about a domain name, what is the command you use? nslookup
if you have 4 dotted decimals like 255.255.0.0, what is this called? subnet mask
what does ping mean ? sends an echo request to a remote computer
if you have malware that loads before the boot process is complete, what is this called? rootkit
what is the most common virus that is spread by e-mail called? macro virus
if a client server application is used, you have software and hardware firewalls, will all that stuff allow access for that client server application? false
in windows when you control security to folders, permissions are assigned to users or groups? True
allowing users full control of a folder is always required by the job? false
if you set permissions manually for a sub-folder, does that override inherited permissions? yes
A notebook considered a blackbox to computer technicians? no or false
when connecting to a network, windows assume static ip addressing? false
If security features are enabled on a motherboard, what controls these things? bios
Which card inserted into a laptop looks like a credit card? pc card
When all work is saved to the harddrive but the system receives a trickle of power, is called? hybrid sleep
if there is a brightness problem on a laptop, normally governed by what piece of hardware? backlight
Created by: npenley