Term
|
Definition
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network. |
|
|
Term
|
Definition
When using static IP addressing, software automatically configures the network connection on each device. |
|
|
Term
|
Definition
Wireless networks are either public, unsecured hotspots or private, secured hotspots. |
|
|
Term
|
Definition
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. |
|
|
Term
|
Definition
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure. |
|
|
Term
|
Definition
A WLAN covers a large geographical area and is made up of many smaller networks. |
|
|
Term
|
Definition
A half duplex connection allows a device to send and receive, but not at the same time. |
|
|
Term
|
Definition
Phone cords are a type of twisted-pair cable and use an RJ-45 connector. |
|
|
Term
|
Definition
10Base5 cabling runs at speeds up to 1 Gbps and distances to 500 meters. |
|
|
Term
|
Definition
A punchdown tool is used to wire twisted-pair cabling to a keystone jack. |
|
|
Term
|
Definition
On the IE General tab you can block cookies. |
|
|
Term
|
Definition
The default value of the security level in IE is Medium-high. |
|
|
Term
|
Definition
To use Remote Desktop, the computer you access remotely can be running Windows 7 Home Premium or Windows 7 Professional. |
|
|
Term
|
Definition
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected. |
|
|
Term
|
Definition
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network. |
|
|
Term
|
Definition
On a peer-to-peer network, authentication is the responsibility of the domain. |
|
|
Term
|
Definition
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. |
|
|
Term
|
Definition
After initially installing Windows 7, you need to disable the Guest account so nobody can use it. |
|
|
Term
|
Definition
Using Group Policy, you can set security policies to help secure a workstation. |
|
|
Term
|
Definition
It’s usually a good idea to run several anti-malware programs at the same time on your computer. |
|
|
Term
|
Definition
Notebooks use the same technology as desktops except they use less power and take up less space. |
|
|
Term
|
Definition
Notebook computer cases tend to be similar to one another, and components in notebook systems tend to be interchangeable among manufacturers. |
|
|
Term
|
Definition
In a notebook, replacing the motherboard probably means you’ll need to fully disassemble the entire notebook except the LCD assembly. |
|
|
Term
|
Definition
Sometimes, a notebook LCD panel, including the entire cover and hinges, is considered a single field replaceable unit, and sometimes components within the LCD assembly are considered an FRU. |
|
|
Term
|
Definition
A all-in-one computer uses the same size components as desktop computers and components like the motherboard can be replaced with any off-the-shelf component. |
|
|
Term
|
Definition
What is the name of a 32-bit or 128-bit number that is used to identify a device? |
|
|
Term
|
Definition
Which type of IP address is configured by a server when a device first initiates a connection to the network? |
|
|
Term
|
Definition
Which is used to identify the network portion and the host portion of an IP address? |
|
|
Term
|
Definition
Which protocol makes a connection, checks whether the data is received, and resends it if it is not? |
|
|
Term
|
Definition
The solution for securing private data traveling over a public network, such as the Internet, is a _________. |
|
|
Term
Server Message Block (SMB) |
|
Definition
Which TCP/IP protocol is used by Windows to share files and printers on a network? |
|
|
Term
|
Definition
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network. |
|
|
Term
|
Definition
What is used to identify a wireless access point? |
|
|
Term
|
Definition
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network? |
|
|
Term
|
Definition
What type of IP address should be configured on a wireless access point so that it can always be located by the devices that it serves? |
|
|
Term
|
Definition
Which of the following network types covers a large campus or city? |
|
|
Term
|
Definition
Which physical topology uses a centralized device to manage traffic on the network? |
|
|
Term
|
Definition
What type of network can you set up to share files if you have two laptops with wireless NICs but there is no Wi-Fi hotspot available? |
|
|
Term
|
Definition
Which network technology that is used to connect to the Internet has a maximum speed of 44 Mbps, uses dedicated lines, and is used by large companies? |
|
|
Term
a. you share the cable infrastructure with your neighbors |
|
Definition
Which of the following is true about cable Internet? a. you share the cable infrastructure with your neighbors b. you need filters on every phone jack c. fiber optic cabling is required d. provides up to 2.3 Mbps of bandwidth |
|
|
Term
|
Definition
What should you choose in the properties of a network connection so that Windows will use the best possible speed and duplex mode? |
|
|
Term
|
Definition
Which feature should you configure on a network adapter to control which applications have priority on the network? |
|
|
Term
|
Definition
What type of device do you need if you want to connect two network segments together such as a wireless network and a wired network? |
|
|
Term
|
Definition
What device should you consider if you want to have access to hard drives via an Ethernet connection? |
|
|
Term
|
Definition
Which of the following cabling systems uses fiber-optic cable? a.10GBaseT b.1000BaseFX c.10Base2 d.10Base5 |
|
|
Term
c. to test a network cable |
|
Definition
Under what circumstance might you use a loopback plug? a. to test a USB port b. to capture network packets c. to test a network cable d. to find the max speed of a connection |
|
|
Term
|
Definition
Which of the following provides multiple network ports for cables that converge in an electrical closet? a. patch panel b. RJ-45 jack c. terminal adapter d. loopback port |
|
|
Term
b. the twists reduce crosstalk |
|
Definition
Which of the following is a reason that there are twists in the wires used for network cabling? a. the twists increase the cable strength b. the twists reduce crosstalk c. the twists make it easier to punchdown the cable d. the twists reduce the amount of copper needed |
|
|
Term
check the indicator lights |
|
Definition
What’s the first thing you should do to troubleshoot a network problem related to hardware? |
|
|
Term
b. disable file downloads |
|
Definition
Which of the following is a task you CAN’T do from the IE General tab? a. change the home page b. disable file downloads c. delete browsing history d. manage the IE cache |
|
|
Term
|
Definition
If you want to be able to power up a computer remotely, what feature should you use? a. QoS b. RDP c. RemoteApp d. WoL |
|
|
Term
b. all policies are applied before the logon screen appears |
|
Definition
Which of the following is NOT true about Group Policy? a. policies can be applied to a computer b. all policies are applied before the logon screen appears c. Group Policy is available in Windows Professional edition d. you can set the QoS level for an application using Group Policy |
|
|
Term
c. rights are assigned to accounts |
|
Definition
Which statements is true about controlling access to folders and files? a. permissions refer to the tasks an account is allowed to do in the system b. account configuration should keep in mind the principle of highest privilege c. rights are assigned to accounts d. in Windows, accounts have no rights assignments until you configure them |
|
|
Term
a. a user account can belong to only one group at a time |
|
Definition
Which of the following is NOT true about user accounts and groups? a. a user account can belong to only one group at a time b. by default, standard users accounts belong to the Users group c. Guest group has limited rights on the system d. Backup Operators group can restore any files regardless of the group’s permissions to those files |
|
|
Term
|
Definition
Which built-in group might Windows automatically assign a user account to when determining its permissions? |
|
|
Term
|
Definition
When all users on a network require the same access to all resources, what type of network model should you use? |
|
|
Term
a. private data for each user should be kept in their C:\Users folder |
|
Definition
Which of the following is true about which folders to use to hold shared data when working with a workgroup? a. private data for each user should be kept in their C:\Users folder b. all users have access to the folders in the C:\Users folder c. C:\Users\Public should only be used by the Guest account d. Only Administrators and Guest have access to C:\Users\Public |
|
|
Term
NTFS on NTFS volumes only |
|
Definition
Which type of permission should you set to control access to files and folders by local and network users? |
|
|
Term
a. if both permissions are used, the least restrictive permission between the two applies |
|
Definition
Which is NOT true about using share and NTFS permissions? a. if both permissions are used, the least restrictive permission between the two applies b. if NTFS permissions conflict between a user and group the least restrictive permission applies c. when you copy a file, the file takes on the permissions of the destination folder d. inherited permissions pass from parent folder to child file or folder |
|
|
Term
|
Definition
Which NTFS permission(s) should you assign if the user should be able to create folders and files and open files to read data, but not delete files. |
|
|
Term
|
Definition
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path? |
|
|
Term
|
Definition
What keystroke should you press to get a logon window if you don’t use the welcome screen? |
|
|
Term
a. it is disabled by default |
|
Definition
Which of the following is true about the Guest account in Windows 7? a. it is disabled by default b. it automatically has a complex password c. you cannot rename it d. it has administrative access |
|
|
Term
c. by default, accounts with a blank password cannot logon remotely |
|
Definition
Which of the following is true about passwords. a. it’s best to write your password down so you don’t get locked out of your computer b. passwords cannot be longer than 14 characters c. by default, accounts with a blank password cannot logon remotely d. letters and numbers are allowed, but no symbols such as ‘@’ or ‘!’ |
|
|
Term
b an encrypted file moved to an unencrypted folder remains encrypted |
|
Definition
Which of the following is true about the Windows Encrypted File System? a. files can be marked for encryption, but not folders b. an encrypted file moved to an unencrypted folder remains encrypted c. EFS only works on NTFS and FAT32 d. you need to download special software to use EFS |
|
|
Term
c. you can use gpedit.msc to see if any policies conflict |
|
Definition
Which of the following is NOT true about using Group Policy on business and professional editions of Windows? a. you can rename default user accounts b. you can require user accounts to have non-blank passwords c. you can use gpedit.msc to see if any policies conflict d. you can disable logon scripts |
|
|
Term
a TPM chip on the motherboard |
|
Definition
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? |
|
|
Term
|
Definition
If you don’t want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? a. Windows POP technology b. the BIOS c. a feature available on some DVD drives d. your USB keyboard |
|
|
Term
|
Definition
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? |
|
|
Term
|
Definition
An RFID badge is related to which type of authentication method? |
|
|
Term
|
Definition
A privacy filter is used for what aspect of security? |
|
|
Term
|
Definition
Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive? a. ATA Secure Erase b. low-level format c. degausser d. magnetic data filter |
|
|
Term
|
Definition
You should beware of a person attempting to use your computer after you step away from it, a term referred to as____________? |
|
|
Term
|
Definition
Which type of malware hides in the MBR program of a hard drive? |
|
|
Term
|
Definition
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? |
|
|
Term
|
Definition
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7? a. fixmbr b. bootrec /fixmbr c. fixboot d. bootrec /fixboot |
|
|
Term
|
Definition
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use? |
|
|
Term
d. netbooks have fewer features than notebooks |
|
Definition
Which of the following is true about notebooks, netbooks, and all-in-one computers? a. all-in-one computers have the computer case and keyboard built together b. a tablet PC is just another name for a notebook computer c. notebooks are always less powerful than desktops d. netbooks have fewer features than notebooks |
|
|
Term
|
Definition
Which of the following is a reason notebooks and notebook parts typically cost more than comparable desktop PCs and components? a. they are faster b. they are more compact c. they use more power d. parts are more generic |
|
|
Term
c. on all models, the hard drive is always in the same place |
|
Definition
Which of the following is NOT true about notebook computers? a. different models have unique cases b. components tend to not be interchangeable c. on all models, the hard drive is always in the same place d. they use less power than desktops |
|
|
Term
a. the OS is preinstalled at the factory |
|
Definition
Which of the following is true about notebook computer software? a. the OS is preinstalled at the factory b. they use a standard version of the OS c. you can buy off-the-shelf diagnostic software d. no drivers are required for notebook devices |
|
|
Term
in a recovery partition on the hard drive |
|
Definition
Where are you likely to find a copy of the OS build, diagnostic software, and preinstalled applications on a notebook computer if you need to restore the system to its factory state? |
|
|
Term
d. when traveling, pack the notebook tightly in a suitcase, between soft clothing |
|
Definition
Which of the following is NOT among the guidelines for handling and caring for a notebook computer? a. don’t hold a notebook by the lid b. make sure the network location is Public before connecting to the Internet c. don’t leave a notebook in a cold or hot car d. when traveling, pack the notebook tightly in a suitcase, between soft clothing |
|
|
Term
|
Definition
Which of the following is NOT a typical button or key combination function on a notebook computer? a. screen brightness b. CPU speed c. dual displays d. Wi-Fi on/off |
|
|
Term
|
Definition
hich PCMCIA standard uses the 32-bit PCI bus standards and has a bumpy strip on the edge? |
|
|
Term
|
Definition
Which ACPI power-saving state turns off the processor, hard drive, and monitor, but leaves all other devices on? |
|
|
Term
for serious repairs and it is under warranty |
|
Definition
Under what circumstance should you always return a notebook to the manufacturer? |
|
|
Term
a. connect it to a port replicator, if available |
|
Definition
Which of the following is NOT a recommended action you should take before replacing or upgrading a component in a notebook? a. connect it to a port replicator, if available b. back up data if the computer is working c. remove cards and disconnect external devices d. remove the battery and unplug the AC adapter |
|
|
Term
|
Definition
Which type of memory are you likely to find in today’s laptops? |
|
|
Term
|
Definition
Which type of hard drive is most likely found in a notebook computer? |
|
|
Term
b. once you’ve learned to service one, it’s the same for all notebooks |
|
Definition
Which of the following is NOT true about working on a notebook computer in general? a. you should follow the same ESD precautions as on desktops b. once you’ve learned to service one, it’s the same for all notebooks c. you need different tools than you need for desktop maintenance d. on newer notebooks, hard drive replacement is fairly easy |
|
|
Term
you may be able to replace an expansion card without extensive disassembly |
|
Definition
Which of the following is true about expansion cards in a notebook computer? a. most use standard PCI Express slots but not PCI slots b. Mini PCI Express cards are bigger than Mini PCI cards c. you may be able to replace an expansion card without extensive disassembly d. all Wi-Fi cards are built-in and cannot be replaced |
|
|
Term
notebook processors will typically have a heatsink and fan |
|
Definition
Which of the following is true about replacing the processor on a notebook computer? a. notebook processors don’t need thermal compound b. you’ll need a soldering iron for most notebooks c. notebook processors will typically have a heatsink and fan d. the same sockets are used by most desktop computers |
|
|
Term
connect it to an external monitor |
|
Definition
What is a fast way to determine if the problem is with the LCD panel or the video controller on a notebook computer? |
|
|
Term
|
Definition
Which of the following is NOT a consideration for a flickering or dim video display? a. verify Windows settings b. adjust the LCD brightness c. adjust the refresh rate d. no drivers are installed |
|
|
Term
|
Definition
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network |
|
|
Term
|
Definition
a program that AV software recognizes to be potentially harmful or potentially unwanted |
|
|
Term
|
Definition
a code used to identify and authenticate a person or organization sending data over a network |
|
|
Term
|
Definition
type of smart card that contains authentication information |
|
|
Term
|
Definition
software installed on a computer that produces pop-up ads using your browser |
|
|