Final Exam Practice – Flashcards

Unlock all answers in this set

Unlock answers
question
You are setting up a broadband connection for your home computer. A UTP cable is used to connect to the cable modem. What does the other end of the UTP cable connect to?
answer
Network interface card (NIC)
question
Which software enables multiple connections to the Internet to go through one protected PC?
answer
Proxy server
question
What kind of cable does broadband cable use to provide high-speed Internet access?
answer
Regular cable TV cables
question
How many lines does the Basic Rate Interface (BRI) setup use?
answer
One
question
What is the unit of measurement, also known as one cycle per second, that expresses the speed of phone lines?
answer
Baud
question
What component in the computer converts individual serial bits of data into 8-bit parallel data that the PC can understand?
answer
Universal Asynchronous Receiver/Transmitter (UART)
question
What port number is used by HTTPS?
answer
443
question
Tier 1 and Tier2 providers lease their Internet connections to ____.
answer
Internet service providers (ISPs)
question
What is the amount of time a packet takes to get to its destination called?
answer
Latency
question
What should you check if your Web browser refuses to run a Java program?
answer
Security settings
question
Dial-up links to the Internet use PPP. What is PPP?
answer
A protocol
question
What are encrypted tunnels that create private networks through the Internet called?
answer
VPNs
question
What port number is used for sending e-mail?
answer
25
question
The Internet was designed to survive failures. What model does it use to achieve this?
answer
Decentralized
question
What allows you to give anyone control of your desktop through an e-mail invitation?
answer
Remote Assistance
question
What allows you to make voice calls over a computer network?
answer
VoIP
question
What port numbers are used by FTP?
answer
20 and 21
question
The Integrated Services Digital Network (ISDN) sends telephone transmissions across what type of lines?
answer
Digital
question
What special protocol do news servers use?
answer
NNTP
question
What service provides the structure for the World Wide Web?
answer
Hypertext Transfer Protocol (HTTP)
question
The Internet consists of millions of computers all over the world interwoven together through long-distance, high-speed, fiber-optic networks. What are these called?
answer
Backbones
question
Almost all ____ modems connect to a PCI or PCI Express expansion bus slot inside the PC.
answer
Internal
question
Broadband cable typically offers speeds of 1-10 Mbps for upload. What is the typical speed for download?
answer
6-50+ Mbps
question
What device converts analog signals to digital and vice versa, enabling computers to talk to each other via standard commercial telephone lines?
answer
Modem
question
Which of the following transfers data via analog signals?
answer
Telephone wire
question
What is the router to which you connect at the ISP called?
answer
Default gateway
question
What tool enables multiple computers to use the Internet connection provided by one computer on the network?
answer
Internet Connection Sharing (ICS)
question
What provides the basic software structure for communication on the Internet?
answer
TCP/IP
question
What effectively hides all of your computers and makes them appear invisible to other computers on the Internet?
answer
NAT
question
What type of signal does a computer use to communicate?
answer
Digital
question
Which servers provide Web sites and Web pages that users can access?
answer
Web
question
What is the most widely used standard for receiving e-mail?
answer
POP3
question
You want to allow ActiveX controls to run when you visit a Web site. What would you configure?
answer
Security settings of your web browser
question
At what frequency range do the 802.11b- and 802.11g-based wireless technologies operate?
answer
2.4 GHz
question
What is the speed at which the 802.11g wireless technology transfers data?
answer
54 Mbps
question
Which of the following provides a security improvement in WPA addresses over WEP?
answer
EAP
question
What allows you to specifically allow or deny access to a WAP?
answer
MAC filtering
question
Where should you look for WAP firmware updates?
answer
Manufacturer's Web site
question
What is the maximum capacity for data transfer between infrared devices?
answer
4 Mbps
question
At what frequency range does the 802.11a-based wireless technology operate?
answer
5 GHz
question
What type of wireless network can quickly be used to share files, folders, and printers without a WAP?
answer
Ad hoc
question
What wireless technology is often used to connect headsets to smartphones?
answer
Bluetooth
question
Which of the following wireless networking standards supports data throughput of up to 11 Mbps?
answer
802.11b
question
What WPA/WPA2 encryption version uses a RADIUS server for secure authentication?
answer
WPA/WPA2-Enterprise
question
What device centrally connects wireless network nodes in the same way that a hub or switch connects wired Ethernet PCs?
answer
Wireless access point
question
What is the maximum distance of a Class 3 Bluetooth device?
answer
1 meter
question
What is the theoretical maximum range of the 802.11a wireless networking standard?
answer
150 feet
question
What is a very small wireless network preconfigured to do a specific job called?
answer
PAN
question
What 802.11n feature increases its range and speed?
answer
MIMO
question
Most WAPs support filtering in which data packets that do not contain the appropriate address are rejected. What kind of address is filtered?
answer
MAC
question
What is the central connection point for a wireless network working in infrastructure mode?
answer
WAP
question
Today, which of the following is not considered a good security practice when setting up a WAP?
answer
Enable WEP encryption.
question
Assuming the wireless NIC is able to pass packets, what would you check next to resolve connectivity issues?
answer
Wireless configuration utility
question
Which of the following represents a security improvement in WPA2 over WEP and WPA?
answer
AES
question
What is another name for the Service Set Identifier parameter?
answer
Network name
question
What method do wireless networks use to determine if other nodes are currently broadcasting?
answer
CSMA/CA
question
What WAP settings should be adjusted in an environment with overlapping Wi-Fi signals?
answer
Channel and frequency
question
What is the gain from a typical WAP?
answer
2 dB
question
What should you check first when troubleshooting wireless connectivity issues?
answer
Wireless NIC link light
question
What is the standard straight-wire omnidirectional wireless antenna called?
answer
Dipole
question
How many bits does WEP encryption use to scramble data packets?
answer
40
question
What enables you to connect to the Internet through a PDA, cell phone, or smartphone?
answer
Cellular wireless network
question
What frequencies does 802.11n use?
answer
2.4 and 5 GHz
question
Which of the following provides data speeds up to 1 Gbps?
answer
CAT 5e
question
What do most fiber Ethernet networks use?
answer
62.5/125 multimode cable
question
What are the IP addresses 169.254.0.1 to 169.254.255.254 used for?
answer
APIPA link-local addresses
question
What central connection box is used in Ethernet star bus networks?
answer
Switch
question
What are the two TIA/EIA standards for connecting RJ-45 connectors to the UTP cable?
answer
568A and 568B
question
What is the default subnet mask for Class C addresses?
answer
255.255.255.0
question
What type of topologies are star ring and star bus considered?
answer
Hybrid
question
What kind of cable is most commonly used in 10/100/1000BaseT Ethernet star bus topology networks?
answer
UTP
question
What box would you check in the Windows Vista Map Network Drive dialog box to reconnect a mapped network folder at logon?
answer
Reconnect at logon
question
Of the following, which standard uses UTP cabling?
answer
1000BaseT
question
What should you enter at a command prompt to see all of your TCP/IP settings?
answer
IPCONFIG /ALL
question
What is the standard connector used for UTP Ethernet installations?
answer
RJ-45
question
Which operating systems install both IPv4 and IPv6 by default?
answer
Windows Vista and Windows 7
question
What connector is used to connect 10Base5 to a PC's network card?
answer
15-pin DB
question
Which type of cable is shielded to protect from EMI?
answer
STP
question
How many host nodes are supported on a single Class C network?
answer
254
question
What type of cable can be used to connect two systems together without using a hub or switch?
answer
Crossover
question
What is the default subnet mask for Class A addresses?
answer
255.0.0.0
question
How many bits make up a complete MAC address?
answer
48
question
What command would you use to map a share to a drive letter on a computer?
answer
NET USE
question
At what layer of the OSI model does the IP protocol handle IP addressing?
answer
Network
question
What identifies a PC on a network?
answer
IP address
question
Which device is used to perform a loopback test on a NIC?
answer
Loopback plug
question
Which of the following utilities shows the route that a packet takes to get to its destination?
answer
TRACERT
question
Which of the following utilities enables a machine to check whether or not it can communicate with another machine?
answer
Ping
question
What is used to map IP addresses to corresponding domain names?
answer
DNS
question
What is the full UNC path for a machine named SERVER2 sharing its C: drive as HOMEBASE?
answer
SERVER2HOMEBASE
question
After entering IPCONFIG at a command prompt, you notice you are using an IP address in the 169.254.0.1 to 169.254.255.254 address range. What is most likely the reason you were assigned one of these addresses?
answer
The DHCP server is down.
question
Which is not a fiber connector?
answer
BNC-T
question
Which Ethernet technology supports speeds up to 1 Gbps?
answer
1000BaseT
question
The dye-sublimation printing technique is an example of what method of color printing?
answer
CMYK
question
What Control Panel applet is used to manage printers and faxes in Windows XP?
answer
Printers and Hardware
question
When a thermal printhead passes over the film ribbon, what melts onto the paper?
answer
Wax
question
A laser printer creates an image of dots and holds it in memory before printing it. What is this image of dots called?
answer
Raster
question
How are dots put onto the surface of paper from a direct thermal printer?
answer
Burned
question
You are printing from a dot-matrix printer and notice the characters look chopped off at the top. What should you try adjusting?
answer
Printhead
question
In laser printers, what component applies a positive charge to the paper, drawing the negatively charged toner particles to the paper?
answer
Transfer corona
question
What causes dark ghosting on printed pages?
answer
A damaged drum
question
What is heated by tiny resistors or electroconductive plates at the end of each tube in an inkjet printer?
answer
Ink
question
During the laser printer process, after the erase lamp exposes the entire surface of the photosensitive drum to light, what happens to the photosensitive coating?
answer
It becomes conductive.
question
What's the standard that defines backward-compatible, high-speed, bidirectional parallel ports?
answer
IEEE 1284
question
Assuming a printer is in good working order and online, what should check next if nothing prints?
answer
Print spooler
question
How is laser printer resolution measured?
answer
Dots per inch
question
What does the primary corona wire charge?
answer
Drum
question
In a laser printer, what must be done to the drum to make it receptive to new images?
answer
Charged
question
Toner particles are composed mostly of ____, allowing them to be melted to the page.
answer
plastic
question
What are 9-pin dot-matrix printers generically called?
answer
Draft
question
What kind of printing usually results from an empty toner cartridge?
answer
Blank
question
What charges the paper in a laser printer?
answer
Transfer corona
question
What kind of printer creates an image on paper by physically striking an ink ribbon against the paper's surface?
answer
Impact
question
A standard parallel cable used for older printers has a DB-25 connector on one end. What type of connector is on the other end?
answer
Centronics
question
Which of the following printers transfer data to the printer one character or one line at a time?
answer
Impact
question
Why do laser printers usually use a laser as the light source?
answer
Because of the precision
question
What kind of printer is used with multipart forms such as with point-of-sale machines?
answer
Dot-matrix
question
The toner in a laser printer is a fine powder. This powder is made up of plastic particles bonded to what other types of particles?
answer
Iron
question
What type of printer works by ejecting ink through tiny tubes?
answer
Inkjet
question
What needs to be vacuumed or replaced periodically in a laser printer?
answer
Ozone filter
question
In a laser printer, what are the pressure roller and heated roller used for?
answer
To fuse the toner to the paper
question
What kind of printer uses a grid of tiny pins, also known as printwires, to strike an inked printer ribbon and produce images on paper?
answer
Dot-matrix
question
In a laser printer, what is used to write a positive image on the surface of the drum?
answer
Laser
question
What kind of chip is used by a laser printer to translate the raster image sent to the printer into commands for the laser?
answer
RIP
question
How many separate power supplies do laser printers typically have?
answer
At least two
question
What is the fuser assembly in a laser printer almost always separate from?
answer
Toner cartridge
question
Which of the following printers use heat or a mechanical method to move ink onto paper?
answer
Inkjet
question
What should be added to a laser printer to resolve a memory overflow problem?
answer
RAM
question
What kind of printer relies on a photoconductive process?
answer
Laser
question
What should you do if your dot-matrix printer output is covered with dots and small smudges?
answer
Clean the platen.
question
At the beginning of the laser printing process, what is cleaned?
answer
Photosensitive drum
question
The term sublimation means to cause something to change from a solid into a(n) ____ form and then back into a solid.
answer
vapor
question
What kind of printers tend to have problems with ink drying out inside the nozzles when the printer is not used for a period?
answer
Inkjet
question
How much data can the highest capacity Blu-ray Disc store?
answer
50 GB
question
An 8x4x32x CD-RW drive reads at a speed of ____.
answer
32x
question
What is the storage capacity of a single-layer Blu-ray Disc?
answer
25 GB
question
If the floppy drive is installed on the middle connector, which drive letter is it assigned?
answer
B:
question
What is the storage capacity of a DVD-18 DVD-ROM?
answer
15.90 GB
question
Which of the following is a group of compression standards for both audio and video?
answer
Moving Picture Experts Group (MPEG)
question
Be sure to orient the colored stripe on the side of the floppy cable to ____ on the motherboard floppy controller.
answer
pin 1
question
Which of the following is not a valid standard for recordable DVD?
answer
DVD-RAM
question
What is the device that is used to read a floppy disk?
answer
Floppy drive
question
What is the speed of High-Speed USB 2.0?
answer
480 Mbps
question
What is the storage capacity of the present day 3½-inch floppy disk?
answer
1.44 MB
question
DVD-ROM is the DVD-equivalent of the standard ____ data format.
answer
CD-ROM
question
Conventionally, if there is only one floppy drive, which drive letter should it be assigned?
answer
A:
question
What can be used to read different USB cards?
answer
Card reader
question
Which of the following is a complete copy of a CD that can be burned to another CD to make a duplicate?
answer
ISO file
question
What kind of memory do USB drives use?
answer
Flash
question
What will happen if the floppy drive cable is installed backward when installing a floppy drive?
answer
The floppy drive will not work.
question
While booting, most PCs will first look for an operating system in the ____ drive.
answer
A:
question
In Windows 2000, a user must edit the ____ to turn off the Autoplay option.
answer
Registry
question
By default, which Windows version allows you to burn music and data directly to disc?
answer
Windows Vista
question
What is USB flash memory typically known as?
answer
Thumb drives
question
What are the two Blu-ray Disc writable formats?
answer
BD-R and BD-RE
question
What is the DVD Region Code for the U.S.A. and Canada?
answer
Region 1
question
CD-ROM drives use a ____ and mirrors to read the data off a CD-ROM.
answer
laser
question
All modern CD-R drives allow you to burn additional data onto a CD-R disc until the disc is full. What are these called?
answer
Multisession drives
question
CD-ROMs store data using ____ burned into a glass master CD-ROM with a powerful laser.
answer
microscopic pits
question
ATAPI CD-ROMs have regular ____ PATA (IDE) connectors and master/slave jumpers.
answer
40-pin
question
You may need to change the ____ in CMOS to install a new OS from the installation media.
answer
Boot order
question
Which of the following would prove more damaging to a CD-RW?
answer
Scratching the top of a disc
question
The inability of the source device to keep up with the burner is known as _____.
answer
buffer underrun
question
Which is not a valid Secure Digital card type or form?
answer
SDLC
question
The key preventive maintenance performed on floppy drives is ____.
answer
cleaning
question
Sally is a member of multiple groups. A file has been granted different permissions to the different groups. What is Sally's effective permission?
answer
Combined permissions of all groups
question
To make sure antivirus programs are as useful as possible, what should be updated regularly?
answer
Signatures
question
What is it called when a hacker goes through the garbage looking for information?
answer
Dumpster diving
question
What type of program runs in the background on your PC, sending information about your browsing habits to the company that installed it on your system?
answer
Spyware
question
Which authentication method sends passwords in clear text?
answer
PAP
question
To lock down security settings on a single computer in a workgroup, what would you use?
answer
Local Security Settings
question
Together, what are viruses, Trojans, and worms called?
answer
Malware
question
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?
answer
Virus
question
What could a computer use to determine a user's identity with the most authority?
answer
Biometric device
question
A user has a credit card-sized card used to prove her identity with a PIN. What is this card called?
answer
Smart card
question
What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)?
answer
Trojan
question
What is it called when you move data from one PC to a newer PC?
answer
Migration
question
What type of program isn't destructive by itself but leaches bandwidth in networks?
answer
Grayware
question
What can be used to create entries in the Security log whenever a user logs on?
answer
Success logging
question
Which of the following is not considered grayware?
answer
Phishing
question
How does a computer determine who can or should access it?
answer
Authentication
question
What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?
answer
Worm
question
What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically called?
answer
Phishing
question
What word describes the process of cleaning up after a virus infection?
answer
Remediation
question
What type of virus attempts to change its signature to prevent detection by antivirus programs?
answer
Polymorph
question
To lock down security settings on a single computer in a domain, what would you use?
answer
Group Policy
question
What is Microsoft's encryption method of choice for providing transparent encryption between the server and the client?
answer
IPSec
question
What is the process of using or manipulating people inside the networking environment to gain access to that network from the outside?
answer
Social engineering
question
What is it called when a user accesses resources in an unauthorized way?
answer
Unauthorized access
question
Physical security, authentication, the file system, users and groups, and security policies combine to make what?
answer
Access control
question
Antivirus programs can passively monitor your computer's activity. In this mode, what are they called?
answer
Virus shields
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New