| Question | Answer |
| What is the common color for the USB 3.0 connector for Standard A receptacles and Plugs? | blue |
| What type of memory is used in the Solid-State Drive (SSD) as storage?
| Flash memory |
| Where is the BIOS originally stored in a standard PC? | Read Only Memory (ROM) |
| What is a complete copy of everything stored on a physical optical disc called? | ISO image |
| What is the minimum requirement for hard disk drive capacity in Windows 10?
| 16 GB for 32-bit OS or 20 GB for 64-bit OS |
| Where do Windows device drivers store?
| Registry |
| What is the volt rating of the RED wire in a power supply? | +5V |
| What is a network cable where one end is T568-A while the other is T568-B configuration? | Cross-over |
| What does a cross and red indicator signify in Windows 7 when there is a LAN connection?
| Problem with the LAN driver |
| Which hardware component can connect over a computer network? | Network Interface Card |
| What is a networking device that forwards data packets between computer networks? | Router |
| What does WI-FI stand for?
| IEEE.802.11 |
| What is a collection of devices connected together in one physical location called? | Local Area Network (LAN) |
| What type of network interconnects multiple local area networks? | Wide Area Network (WAN) |
| What is a computer program used to prevent, detect, and remove possible threats to the system?
| Anti-virus software |
| What is a network where two or more PCs are connected and share resources without going through a separate server computer? | Peer to peer network |
| What IP address is used by the virtual machine to communicate over the physical network? | provider address |
| What type of version protects unauthorized network access by utilizing a set-up password? | WPA2-Personal |
| What consists of user matrices and capability tables that govern the rights and privileges of users?
| Access control list |
| What occurs when an attacker or trusted insider steals data from a computer system and demands compensation for its return? | Information extortion |
| What monitors the initial security accreditation of an information system for tracking changes? | Continuous Assessment |
| What service in Windows Server enables administrators to migrate data to lower cost and tape media on file servers? | Remote storage service |
| What application group contains a Client Access point and at least one application specific resource?
| Cluster |
| What utility tool tests whether a particular host is reachable across an IP network? | Ping |
| Which key is not appropriate to enter BIOS setup?
| F5 |
| What enables users of Windows to correct any problems preventing them from booting up normally? | Safe mode |
| What starts up recovery options in a computer that essentially boots into the recovery partition of the main hard drive? | Repair computer |
| What can a single physical hard drive divide into? | Multiple logical hard drives |
| What are the two types of interface used to communicate between the hard drive and the computer motherboard?
| Advanced Technology Attachment (ATA) and Serial Advanced Technology Attachment (SATA) |
| What is the spider-like interconnection in millions of pieces of information located on computers around cyberspace? | World wide web |
| What compound is used to prevent overheating of the CPU? | Thermal paste |
| What is the maximum cable length for USB 2.0? | 5 meters |
| What software program is stored in Read Only Memory (ROM)?
| Firmware |
| What is a disc image also known as?
| ISO image |
| What is the minimum hardware requirement of the computer RAM for Windows 10? | 1 GB for 32-bit or 2 GB for 64-bit |
| What is the volt rating of the YELLOW wire in a power supply? | +12V |
| What are Yost cable, CISCO cable, and console cable also known as?
| Roll-over |
| What does a yellow color indicator signify in Server 2008 for Local Area Network (LAN) connection? | No connectivity |
| How many lights does the Light Emitting Diode (LED) in Network Interface Card (NIC) have? | 2 |
| What is Port Forwarding in network address translation (NAT)?
| Redirects a communication request from one address and port number combination to another |
| What is the alternative for wired connection that uses radio frequencies to send signals between devices and a router? | Wireless Fidelity |
| What is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area?
| Campus Area Network |
| What term applies to the interconnection of LAN in a city into 5 to 50 kilometers?
| Metropolitan Area Network |
| Who is assigned to monitor the network security, operation, and network users? | Network Administrator |
| What is used to store user documents with a large amount of memory and storage space? | File server |
| What type of version verifies network users through a server and requires a more complicated setup but provides additional security? | WPA2-Enterprise |
| What is a way to identify a specific process to which an Internet or other network message is forwarded when it arrives at a server? | Port number |
| What is an automated software program that executes certain commands when it receives a specific input?
| Bot |
| What enables administrators to configure storage thresholds on particular sets of data stored on server NTFS volumes?
| System Quota |
| What feature in Windows Server provides the ability to migrate workloads between a source and target cluster?
| Failover |
| What log files record performance statistics based on various performance objects and instances available in Performance Monitor? | Counter Logs |
| What recovery console command examines the volume for errors and repairs it?
| Chkdsk |
| What is the state of a computer system if it is functional? | Normal booting |
| What Windows update downloads and installs the latest version?
| Windows 10 |
| What is the physically damaged cluster of storage on the hard drive? | Bad sector |
| What occurs when two or more devices are connected with the same IP address in a computer network?
| IP address conflict |
| What storage device should be replaced if frequent error messages appear while moving files and booting up the operating system? | Hard disk |
| What recovery console command writes a new master boot record on the hard disk drive?
| Fixmbr |
| What type of server allows the central administration and management of network users and network resources?
| Directory server |
| What is an information asset suffering damage, unintended modification, or disclosure?
| Loss |
| What is the network security standard that tries to make connections between a router and wireless devices faster and easier?
| WPS |
| Which of the following is the most efficient in transferring larger files?
| File transfer protocol |
| What technique is used to gain unauthorized access to a computer, wherein the intruder sends messages with a source IP address?
| Spoofing |
| What enables administrators to define the types of files that can be saved within a Windows volume and folder? | File screening |
| What second clustering technology provides corresponding client requests across several servers with replicated configurations? | Network Load Balancing |
| What is a host or domain name lookup tool?
| Ns lookup |
| What is the problem if a computer's time and date keeps resetting even after fixing it in the BIOS? | CMOS battery failure |
| What tool is used for checking the condition of the hard drive?
| Crystal Disk Info |
| What is a task to do after planning to fix the network? | Implementing the solution |
| What is the process of scanning, identifying, diagnosing, and resolving problems in software called? | Software troubleshooting |
| What is the maximum cable length for USB 3.0 using a non-twisted pair wire? | 3 meters |
| M.2 is a form factor for what?
| Storage media |
| What kind of chip stores the settings in the BIOS?
| CMOS |
| What is used as a substitute for an actual disc, allowing users to run software without loading a CD or DVD?
| ISO file |
| What Windows edition has a program capable of restricting other users from accessing certain programs?
| Windows Ultimate |
| In what folder can device drivers be found?
| System32 |
| What is the ideal voltage range on the hot wires of a Molex connector? | RED = 5V, Yellow = 12V |
| What type of Ethernet cable is used to connect computers to hubs and switches? | Straight thru |
| What is a network interface controller also known as? | LAN Card |
| What class of IP address is 192.168.0.1?
| Class C |
| What type of router is designed to operate in the Internet backbone?
| Core |
| What allows defining a list of devices and only allowing those devices on a Wi-Fi network? | MAC Filtering |
| What allows users to move around the coverage area while maintaining a network connection? | Wireless Local Area Network |
| What is an enterprise-level heterogeneous backup and recovery suite?
| NetBackup |
| What is a 24 pin USB connector system with a rotationally symmetrical connector? | Universal Serial Bus (USB) C Thunderbolt |
| What facilitates communication between the CPU and other devices in the system?
| Chipset |
| What option in the BIOS/UEFI is used to overclock a computer? | North Bridge |
| What is the minimum byte capacity of a bootable flash drive for Windows 10? | 8GB |
| What is the minimum RAM requirement of Server 2012 R2? | 512MB |
| In Windows 7, where is Windows Update and Security located?
| Settings |
| What voltages does the ATX12V P1 connector provide for the motherboard? | 3.3V, 5V, 12V |
| What is defined as a structured network cabling system standard for commercial buildings?
| ANSI/TIA-568 |
| In networking, what refers to pieces of related information transferred through a network? | Connection |
| What class of IP addressing is 172.16.10.1?
| Class B |
| What type of router enables an internal network to connect to an external network? | Edge |
| What pertains to the maximum data transfer rate of a network for the internet? | Bandwidth |
| What type of high-speed network is composed of hosts and interconnects using various technology/topology? | Local Area Network |
| What acts like a border router to connect corporate sites to wired access lines? | Customer Premises Equipment (CPE) |
| What is the process of recognizing a user’s identity called?
| Authentication |
| What type of server occupies a large portion of computing territory between the database server and end user? | Application Server |
| In the context of security, what is a privilege or assigned permission for the use of computer data or resources?
| Access |
| What media type of 10-megabit Ethernet uses broadband coaxial cable for a maximum length of 3600 meters?
| 10Base-36 |
| What is a network security system that monitors and controls incoming and outgoing network traffic?
| Firewall |
| What term is used to refer to when a system is unavailable?
| Downtime |
| Which command is used to certify the peer name resolution in Active Directory? | NSLOOKUP |
| What Active Directory protocol is used to access data from a database?
| Lightweight Directory Access Protocol (LDAP) |
| Which command displays the measures and various real-time statistics on the system’s performance?
| View current activity |
| What type of peripheral card has a media access control address? | Network interface card |
| What is the main patch panel that links to every telecommunication room inside a building called? | Vertical cross-connect |
| What is an enclosed or semi-enclosed channel that protects, routes, and hides cables and wires?
| Raceway |
| What material is slid before crimping both ends of a patch cable to reduce strain? | Boot |
| What test verifies the operation of a communication device by sending and receiving data from the same port? | Loopback test |
| What networking tool monitors and intercepts traffic over the computer network? | Packet analyzer |
| What is the resistance reading of an open wire? | Infinite ohms |
| What is the interface standard for a serial bus for high-speed communications?
| Firewire |
| What microchip manages data communication between a CPU and a motherboard? | Input/output controller hub |
| What setup option in UEFI/BIOS allows security settings to perform tasks such as locating the device? | Lo Jack |
| What is a text-based command used for creating a bootable flash drive?
| Disk-part |
| What is the minimum RAM requirement of Server 2008 R2? | 512MB |
| In Windows 7, what indicates that a video driver has not been installed? | Only standard video is displayed |
| What is the voltmeter reading of a shorted diode? | Zero volt |
| What is the process of joining two cable ends together called?
| Cable splicing |
| What is a hardware device that enables connecting serial devices across a network? | Terminal server |
| What class of IP addressing is 10.10.10.1?
| Class A |
| How many devices can connect to a wireless router?
| 250 |
| What device acts as a bridge between wireless clients and a wired network? | Access point |
| What is a logical subnetwork that groups a collection of devices from the same network switch? | Virtual local area network |
| What is the time lapse between data sent and when received called?
| Latency |
| What means pushing a component to its limits and extremes?
| Stress test |
| What type of server enables large numbers of users to exchange information near instantaneously? | Real-time communication server |
| What ensures that information and programs are changing only in a specified and authorized manner? | Integrity |
| What command-line network utility displays network connections for TCP and routing tables?
| Netstat |
| What set of rules describes how software and hardware should interact within a network?
| Communications protocol |
| What attack includes the execution of viruses, worms, Trojan horses, and active web scripts?
| Malicious code |
| What set of rules is used for transferring files on the World Wide Web? | Hypertext transfer protocol (HTTP) |
| What is the traditional method used to access server data and using the server message block protocol over TCP/IP? | Windows folder sharing |
| What two command-line utilities used to export and import active directory object information? | Ldifde.exe and csvde.exe |
| A node in a computer network that allows data to flow from one discrete network to another | Gateway |
| What electrical quantities measured when performing continuity testing of twisted pair cable? | Resistance |
| What type of backup used in hard drive, disc, flash drive, and external drive that are housed on site? | Local backup |
| What recovery tool in Windows fixes and scans computer problem that prevents computer from booting repeatedly? | Startup repair |
| Is used to run commands for troubleshooting unbootable operating system | Windows recovery environment |
| need to discharge electrically before the replacement of parts? | Capacitor |
| The most current wireless networking standard and can communicate with the older network standards. | 802.11 n |