Term
What type of motherboards use a riser card for providing expansion slots? |
|
Definition
|
|
Term
What is another (and official) name for IDE and EIDE drives? |
|
Definition
|
|
Term
What port is commonly used to connect a keyboard and a mouse? |
|
Definition
|
|
Term
What expansion port is always used for a high-speed, high-resolution, 3-D graphics video adapter? |
|
Definition
|
|
Term
What port is considered the fastest and supports a number of external devices for a laptop as well as for desktops? |
|
Definition
|
|
Term
What typ of PC Cards are commonly used for devices such as network adapters, sound cards, and modems in laptops? |
|
Definition
|
|
Term
What ACPI-defined power states the standby mode in Windows? |
|
Definition
|
|
Term
What operating system is distributed as open source and does not have a standard GUI? |
|
Definition
|
|
Term
What file permission is not a standard NTFS permission but a special permission? |
|
Definition
|
|
Term
How can you create an ERD for a Windows XP Professional computer? |
|
Definition
|
|
Term
How much voltage is discharged from the EP drum in a laser printer by the laser beam that scans the drum with the information about the image? |
|
Definition
|
|
Term
What form of measure is used to represnt the printing speed of a dot-matrix printer? |
|
Definition
|
|
Term
Which of the following processes help deposit the toner from the EP drum onto paper? |
|
Definition
|
|
Term
What type of cables is most expensive in terms of cost, installation, and maintenance? |
|
Definition
|
|
Term
Give and example of an IP address that is used a loopback. |
|
Definition
|
|
Term
What protocol is responsible for addressing hosts in a TCP/IP-based network? |
|
Definition
|
|
Term
What troublshooting utility is common to all operating systems and is used for testing connectivity of two hosts on a network? |
|
Definition
|
|
Term
What authentication technologies utilzes a challenge text? |
|
Definition
|
|
Term
What method provides an outer layer of security for shared folders stored on an NTFS volume? |
|
Definition
|
|
Term
What is the best method for preventing social engineering attacks? |
|
Definition
|
|
Term
What acontains essential information about the handling, storage, and safe disposal of hazardous chemicals? |
|
Definition
|
|
Term
You have been asked to install an IDE disk to a personal computer. This will be the only disk in the computer connected to the primary channel. How would you set the jumper? |
|
Definition
|
|
Term
What method can be used to test a 10/100 Mbps network port built on the motherboard without connecting it to the network? |
|
Definition
|
|
Term
What is considered to be the fastes port and is commonly used on laptops? |
|
Definition
|
|
Term
Which wireless IEEE standard uses a radio frquency of 2.4 GHz with a data transfer speed of 11 Mbps? |
|
Definition
|
|
Term
What part in a laser printer is used to transfer a high positive voltage to charge the paper? |
|
Definition
|
|
Term
Which of the following printers is usitable for pringint multipart invoices? |
|
Definition
|
|
Term
What port cannot be used to connect a canner? |
|
Definition
|
|
Term
What type of cable is not prone to electromagnetic interferences? |
|
Definition
|
|
Term
What component of an IP address is used to distinguish the network address from a host address? |
|
Definition
|
|
Term
What device connects different network segments and uses tables to create a map of the network topology? |
|
Definition
|
|
Term
Which network topology does not allow yo to add or remove computers without affecting the network? |
|
Definition
|
|
Term
What authentication method uses the physical characteristics of a user to verify identity? |
|
Definition
|
|
Term
What media access method is utized in 802.11b wireless networks? |
|
Definition
|
|
Term
What type of network is configured in dual rings to provide fault tolerance? |
|
Definition
|
|
Term
What is the maximum length of a UTP cable segment in a 10BastT star network? |
|
Definition
|
|
Term
What term correctly describes the loss of signal while it travels down a particular medium? |
|
Definition
|
|
Term
What effects the performance of an 802.11b network? |
|
Definition
|
|
Term
What network devices forwards the data it receives on a port to all other connected ports? |
|
Definition
|
|
Term
What devices is used in Token Ring networks as the central device? |
|
Definition
|
|
Term
What protocol uses a MAC address as part of the host address? |
|
Definition
|
|
Term
What protocol does not depend on addresses or numbers to identify computers on a network? |
|
Definition
|
|
Term
What protocol suites includes the Routing Table Maintnenance protocol (RTMP)? |
|
Definition
|
|
Term
At what layer of the OSI network model does a network adapter work? |
|
Definition
|
|
Term
One of the netowrk administrators in your company has asked you to block port 23 on the router. What service is he asking you to block? |
|
Definition
|
|
Term
What protocol is used to secure HTTP transactions on the Internet? |
|
Definition
|
|
Term
What protocol can be used to secure remote access connections when they are established through the Internet? |
|
Definition
|
|
Term
What is the total bandwidth of an ISDN BRI connection when both data channels are used? |
|
Definition
|
|
Term
You need to allow only secure Internet traffic in and out of your company network. What port would you open on the firewall? |
|
Definition
|
|
Term
You are using five 80 GB hard disks in your files server to confiure RAID-5. What will be the maximum copacity of the disk after the configuration is complete? |
|
Definition
|
|
Term
What do you call a power outage that lasts for a long period of time? |
|
Definition
|
|
Term
What utility would yu use when a Windows XP user in not able to connect using computer names? |
|
Definition
|
|
Term
What utility us used on a Linux system to verify TCP/IP configuration? |
|
Definition
|
|
Term
What authentication method is used with timestamped session tickets? |
|
Definition
|
|
Term
What is known as a label-based access control method and is hardcoded into a device? |
|
Definition
|
|
Term
What has the necessary privileges to assign permissions to a shared resource when the discretionary access control method is used? |
|
Definition
The owner of the Resource |
|
|
Term
An e-commerce web site is using digital certificates. Which part of authentication, access control, and auditing (AAA) is provided by these certificates? |
|
Definition
|
|
Term
What transport protocol is used by TACACS+? |
|
Definition
|
|
Term
You have decided to used WEP for securing the wireless network segment in the organization. What describes the user who wants to connect to the secure network? |
|
Definition
|
|
Term
You have decided to implement IPSec protocol to provide secure end-to-end communication to remote access clients. In what mode should you implement this protocol? |
|
Definition
|
|
Term
Identify the 802.1x method that can be used for mutual authentication of the supplicant and the authenticator. |
|
Definition
|
|
Term
What authentication methods are defined by the 802.11 wireless standard? (2) |
|
Definition
|
|
Term
You have installed an intrusion detection system on one of the production servers to monitor malicious activities of applications and users only on that server. What kind of IDS is this? |
|
Definition
|
|
Term
What is the main weakness of sysmmetric encryption algorithms? |
|
Definition
|
|
Term
What is used to allow users to access resources on different servers in the domain when they log on to their computers? |
|
Definition
|
|
Term
State the range of Class A IPs. |
|
Definition
|
|
Term
State the range of Class B IPs. |
|
Definition
|
|
Term
State the range of Class C IPs. |
|
Definition
|
|
Term
State the range of Class D IPs. |
|
Definition
224.0.0.0-239.255.255.255 |
|
|
Term
What are Class E IPs used for? |
|
Definition
Experimental and reserved for future testing purposes. |
|
|
Term
What are Class D IPs used for? |
|
Definition
Multicasting Applications |
|
|