Stack #4308967 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
| Question | Answer |
| What is the common color for the USB 3.0 connector for Standard A receptacles and Plugs? | blue |
| What type of memory is used in the Solid-State Drive (SSD) as storage? | Flash memory |
| Where is the BIOS originally stored in a standard PC? | Read Only Memory (ROM) |
| What is a complete copy of everything stored on a physical optical disc called? | ISO image |
| What is the minimum requirement for hard disk drive capacity in Windows 10? | 16 GB for 32-bit OS or 20 GB for 64-bit OS |
| Where do Windows device drivers store? | Registry |
| What is the volt rating of the RED wire in a power supply? | +5V |
| What is a network cable where one end is T568-A while the other is T568-B configuration? | Cross-over |
| What does a cross and red indicator signify in Windows 7 when there is a LAN connection? | Problem with the LAN driver |
| Which hardware component can connect over a computer network? | Network Interface Card |
| What is a networking device that forwards data packets between computer networks? | Router |
| What does WI-FI stand for? | IEEE.802.11 |
| What is a collection of devices connected together in one physical location called? | Local Area Network (LAN) |
| What type of network interconnects multiple local area networks? | Wide Area Network (WAN) |
| What is a computer program used to prevent, detect, and remove possible threats to the system? | Anti-virus software |
| What is a network where two or more PCs are connected and share resources without going through a separate server computer? | Peer to peer network |
| What IP address is used by the virtual machine to communicate over the physical network? | provider address |
| What type of version protects unauthorized network access by utilizing a set-up password? | WPA2-Personal |
| What consists of user matrices and capability tables that govern the rights and privileges of users? | Access control list |
| What occurs when an attacker or trusted insider steals data from a computer system and demands compensation for its return? | Information extortion |
| What monitors the initial security accreditation of an information system for tracking changes? | Continuous Assessment |
| What service in Windows Server enables administrators to migrate data to lower cost and tape media on file servers? | Remote storage service |
| What application group contains a Client Access point and at least one application specific resource? | Cluster |
| What utility tool tests whether a particular host is reachable across an IP network? | Ping |
| Which key is not appropriate to enter BIOS setup? | F5 |
| What enables users of Windows to correct any problems preventing them from booting up normally? | Safe mode |
| What starts up recovery options in a computer that essentially boots into the recovery partition of the main hard drive? | Repair computer |
| What can a single physical hard drive divide into? | Multiple logical hard drives |
| What are the two types of interface used to communicate between the hard drive and the computer motherboard? | Advanced Technology Attachment (ATA) and Serial Advanced Technology Attachment (SATA) |
| What is the spider-like interconnection in millions of pieces of information located on computers around cyberspace? | World wide web |
| What compound is used to prevent overheating of the CPU? | Thermal paste |
| What is the maximum cable length for USB 2.0? | 5 meters |
| What software program is stored in Read Only Memory (ROM)? | Firmware |
| What is a disc image also known as? | ISO image |
| What is the minimum hardware requirement of the computer RAM for Windows 10? | 1 GB for 32-bit or 2 GB for 64-bit |
| What is the volt rating of the YELLOW wire in a power supply? | +12V |
| What are Yost cable, CISCO cable, and console cable also known as? | Roll-over |
| What does a yellow color indicator signify in Server 2008 for Local Area Network (LAN) connection? | No connectivity |
| How many lights does the Light Emitting Diode (LED) in Network Interface Card (NIC) have? | 2 |
| What is Port Forwarding in network address translation (NAT)? | Redirects a communication request from one address and port number combination to another |
| What is the alternative for wired connection that uses radio frequencies to send signals between devices and a router? | Wireless Fidelity |
| What is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area? | Campus Area Network |
| What term applies to the interconnection of LAN in a city into 5 to 50 kilometers? | Metropolitan Area Network |
| Who is assigned to monitor the network security, operation, and network users? | Network Administrator |
| What is used to store user documents with a large amount of memory and storage space? | File server |
| What type of version verifies network users through a server and requires a more complicated setup but provides additional security? | WPA2-Enterprise |
| What is a way to identify a specific process to which an Internet or other network message is forwarded when it arrives at a server? | Port number |
| What is an automated software program that executes certain commands when it receives a specific input? | Bot |
| What enables administrators to configure storage thresholds on particular sets of data stored on server NTFS volumes? | System Quota |
| What feature in Windows Server provides the ability to migrate workloads between a source and target cluster? | Failover |
| What log files record performance statistics based on various performance objects and instances available in Performance Monitor? | Counter Logs |
| What recovery console command examines the volume for errors and repairs it? | Chkdsk |
| What is the state of a computer system if it is functional? | Normal booting |
| What Windows update downloads and installs the latest version? | Windows 10 |
| What is the physically damaged cluster of storage on the hard drive? | Bad sector |
| What occurs when two or more devices are connected with the same IP address in a computer network? | IP address conflict |
| What storage device should be replaced if frequent error messages appear while moving files and booting up the operating system? | Hard disk |
| What recovery console command writes a new master boot record on the hard disk drive? | Fixmbr |
| What type of server allows the central administration and management of network users and network resources? | Directory server |
| What is an information asset suffering damage, unintended modification, or disclosure? | Loss |
| What is the network security standard that tries to make connections between a router and wireless devices faster and easier? | WPS |
| Which of the following is the most efficient in transferring larger files? | File transfer protocol |
| What technique is used to gain unauthorized access to a computer, wherein the intruder sends messages with a source IP address? | Spoofing |
| What enables administrators to define the types of files that can be saved within a Windows volume and folder? | File screening |
| What second clustering technology provides corresponding client requests across several servers with replicated configurations? | Network Load Balancing |
| What is a host or domain name lookup tool? | Ns lookup |
| What is the problem if a computer's time and date keeps resetting even after fixing it in the BIOS? | CMOS battery failure |
| What tool is used for checking the condition of the hard drive? | Crystal Disk Info |
| What is a task to do after planning to fix the network? | Implementing the solution |
| What is the process of scanning, identifying, diagnosing, and resolving problems in software called? | Software troubleshooting |
| What is the maximum cable length for USB 3.0 using a non-twisted pair wire? | 3 meters |
| M.2 is a form factor for what? | Storage media |
| What kind of chip stores the settings in the BIOS? | CMOS |
| What is used as a substitute for an actual disc, allowing users to run software without loading a CD or DVD? | ISO file |
| What Windows edition has a program capable of restricting other users from accessing certain programs? | Windows Ultimate |
| In what folder can device drivers be found? | System32 |
| What is the ideal voltage range on the hot wires of a Molex connector? | RED = 5V, Yellow = 12V |
| What type of Ethernet cable is used to connect computers to hubs and switches? | Straight thru |
| What is a network interface controller also known as? | LAN Card |
| What class of IP address is 192.168.0.1? | Class C |
| What type of router is designed to operate in the Internet backbone? | Core |
| What allows defining a list of devices and only allowing those devices on a Wi-Fi network? | MAC Filtering |
| What allows users to move around the coverage area while maintaining a network connection? | Wireless Local Area Network |
| What is an enterprise-level heterogeneous backup and recovery suite? | NetBackup |
| What is a 24 pin USB connector system with a rotationally symmetrical connector? | Universal Serial Bus (USB) C Thunderbolt |
| What facilitates communication between the CPU and other devices in the system? | Chipset |
| What option in the BIOS/UEFI is used to overclock a computer? | North Bridge |
| What is the minimum byte capacity of a bootable flash drive for Windows 10? | 8GB |
| What is the minimum RAM requirement of Server 2012 R2? | 512MB |
| In Windows 7, where is Windows Update and Security located? | Settings |
| What voltages does the ATX12V P1 connector provide for the motherboard? | 3.3V, 5V, 12V |
| What is defined as a structured network cabling system standard for commercial buildings? | ANSI/TIA-568 |
| In networking, what refers to pieces of related information transferred through a network? | Connection |
| What class of IP addressing is 172.16.10.1? | Class B |
| What type of router enables an internal network to connect to an external network? | Edge |
| What pertains to the maximum data transfer rate of a network for the internet? | Bandwidth |
| What type of high-speed network is composed of hosts and interconnects using various technology/topology? | Local Area Network |
| What acts like a border router to connect corporate sites to wired access lines? | Customer Premises Equipment (CPE) |
| What is the process of recognizing a user’s identity called? | Authentication |
| What type of server occupies a large portion of computing territory between the database server and end user? | Application Server |
| In the context of security, what is a privilege or assigned permission for the use of computer data or resources? | Access |
| What media type of 10-megabit Ethernet uses broadband coaxial cable for a maximum length of 3600 meters? | 10Base-36 |
| What is a network security system that monitors and controls incoming and outgoing network traffic? | Firewall |
| What term is used to refer to when a system is unavailable? | Downtime |
| Which command is used to certify the peer name resolution in Active Directory? | NSLOOKUP |
| What Active Directory protocol is used to access data from a database? | Lightweight Directory Access Protocol (LDAP) |
| Which command displays the measures and various real-time statistics on the system’s performance? | View current activity |
| What type of peripheral card has a media access control address? | Network interface card |
| What is the main patch panel that links to every telecommunication room inside a building called? | Vertical cross-connect |
| What is an enclosed or semi-enclosed channel that protects, routes, and hides cables and wires? | Raceway |
| What material is slid before crimping both ends of a patch cable to reduce strain? | Boot |
| What test verifies the operation of a communication device by sending and receiving data from the same port? | Loopback test |
| What networking tool monitors and intercepts traffic over the computer network? | Packet analyzer |
| What is the resistance reading of an open wire? | Infinite ohms |
| What is the interface standard for a serial bus for high-speed communications? | Firewire |
| What microchip manages data communication between a CPU and a motherboard? | Input/output controller hub |
| What setup option in UEFI/BIOS allows security settings to perform tasks such as locating the device? | Lo Jack |
| What is a text-based command used for creating a bootable flash drive? | Disk-part |
| What is the minimum RAM requirement of Server 2008 R2? | 512MB |
| In Windows 7, what indicates that a video driver has not been installed? | Only standard video is displayed |
| What is the voltmeter reading of a shorted diode? | Zero volt |
| What is the process of joining two cable ends together called? | Cable splicing |
| What is a hardware device that enables connecting serial devices across a network? | Terminal server |
| What class of IP addressing is 10.10.10.1? | Class A |
| How many devices can connect to a wireless router? | 250 |
| What device acts as a bridge between wireless clients and a wired network? | Access point |
| What is a logical subnetwork that groups a collection of devices from the same network switch? | Virtual local area network |
| What is the time lapse between data sent and when received called? | Latency |
| What means pushing a component to its limits and extremes? | Stress test |
| What type of server enables large numbers of users to exchange information near instantaneously? | Real-time communication server |
| What ensures that information and programs are changing only in a specified and authorized manner? | Integrity |
| What command-line network utility displays network connections for TCP and routing tables? | Netstat |
| What set of rules describes how software and hardware should interact within a network? | Communications protocol |
| What attack includes the execution of viruses, worms, Trojan horses, and active web scripts? | Malicious code |
| What set of rules is used for transferring files on the World Wide Web? | Hypertext transfer protocol (HTTP) |
| What is the traditional method used to access server data and using the server message block protocol over TCP/IP? | Windows folder sharing |
| What two command-line utilities used to export and import active directory object information? | Ldifde.exe and csvde.exe |
| A node in a computer network that allows data to flow from one discrete network to another | Gateway |
| What electrical quantities measured when performing continuity testing of twisted pair cable? | Resistance |
| What type of backup used in hard drive, disc, flash drive, and external drive that are housed on site? | Local backup |
| What recovery tool in Windows fixes and scans computer problem that prevents computer from booting repeatedly? | Startup repair |
| Is used to run commands for troubleshooting unbootable operating system | Windows recovery environment |
| need to discharge electrically before the replacement of parts? | Capacitor |
| The most current wireless networking standard and can communicate with the older network standards. | 802.11 n |
Created by:
asleep