1101 Cont. Cont. Flashcards

1
Q

The display technology most commonly used in modern laptops

A

LCD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following are Flash Drives?

  1. USB Drive
  2. Hard Disk Drive
  3. Thumb Drive
  4. Solid State Drive
  5. Optical Drive
A

USB Drive and Thumb Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following use Flash Memory?

  1. USB Drive
  2. Hard Disk Drive
  3. Solid State Drive
  4. Magnetic Disk Drive
  5. Optical Drive
A

USB Drive and Solid State Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What were the two primary cellular, but incompatible, 2G and 3G transmission systems before LTE?

A

CDMA and GSM

(Code Division Multiple Access) and (Global System for Mobile Communications)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a security feature used in the Bluetooth device pairing process?

A

PIN Codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSH

A

A security protocol for logging into a remote server.

Secure SHell

SSH provides an encrypted session for transferring files and executing server programs on all platforms. Also serving as a secure client/server connection for applications such as database access and email, SSH supports a variety of authentication methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SNMP

A

A widely used network monitoring and control protocol.

Simple Network Management Protocol

Data are passed from SNMP agents, which are hardware and/or software processes reporting activity in each network device (hub, router, bridge, etc.) to the workstation console used to oversee the network. The agents return information contained in a MIB (Management Information Base), which is a data structure that defines what is obtainable from the device and what can be controlled (turned off, on, etc.). Originating in the Unix community, SNMP has become widely used on all major platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LDAP

A

A protocol used to access a directory listing in a TCP/IP network.

Lightweight Directory Access Protocol

LDAP is used to query network directories, email servers and other information repositories. It is a sibling protocol to HTTP and FTP and uses the ldap:// prefix in its URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIFS

A

The file sharing protocol used in Windows.

Common Internet File System

It evolved out of the SMB (Server Message Block) protocol in DOS, which is why the terms CIFS/SMB and SMB/CIFS are commonly used. The word “Internet” in CIFS does not refer to the global Internet but to generic internetworking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The two most popular programming interfaces (API) from the IETF that enable a user’s email program to access the mail server.

Email clients such as Outlook, Mail, Eudora and Thunderbird are typically configured to retrieve mail via one or the other.

A

POP3 and IMAP4

Post Office Protocol 3 and Internet Message Access Protocol 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

POP3 or IMAP4?

(ANSWER) is a simple system with limited selectivity. Incoming messages and attachments are downloaded when users check their mail, and (ANSWER) is typically configured to delete the messages on the server after downloading. If the user opts to not delete them, the messages will download again the next time mail is checked.

A

POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

POP3 or IMAP4?

(ANSWER) has more options than (THE OTHER ONE). For example, it can download only the message headers, which have only to/from addresses and subject. An essential option in the early days of dial-up, the user then chooses which messages and attachments to download. (ANSWER) also keeps the messages on the mail server in synchronization with the downloaded messages in the client. Users can then decide when and which messages to delete on the server.

A

IMAP4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An IEEE standard for powering network devices via Ethernet cable. Also known as “Power-over-Ethernet” (PoE), the (BLANK) specification provides 48 volts over 4-wire or 8-wire twisted pair.

A

802.3af

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An IEEE standard for High Power over Ethernet (PoE+). The (BLANK) specification provides 25.5 watts of power compared to the 15.4 watts of (BLANK).

A

802.3at

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An IEEE standard for a higher Power over Ethernet (PoE) rating, also known as PoE++, UPoE, or 4PPoE.

A

802.3bt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A device that connects two LAN segments together. They are inserted into the network to keep traffic contained within the segments to improve performance.

A

Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Equipment from the telephone company that terminates its optical fibers at the customer’s premises. Using electricity from the customer’s AC source, it converts the incoming optical signals into electrical signals for telephone, TV and Internet.

A

ONT

Optical Network Terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This occurs when a switch’s physical interface repeatedly goes up and down within a short period of time.

A

Port Flapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The use of multiple transmitters and receivers (multiple antennas) on wireless devices for improved performance.

A

MIMO

Multiple Input/Multiple Output

When two transmitters and two or more receivers are used, two simultaneous data streams can be sent, which double the data rate. Multiple receivers alone allow greater distances between devices. For example, the IEEE 802.11n (Wi-Fi) wireless standard uses MIMO to increase speed to 100 Mbps and beyond, doubling at minimum the 802.11a and 11g rates. MIMO antennas are also used in WiMAX and LTE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MU-MIMO

A

Multiuser-MIMO (Multiple Input/Multiple Output)

A multi-transmitter/receiver technology (MIMO) that supports multiple wireless users simultaneously. Contrast with SU-MIMO (Single User-MIMO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Unlicensed wireless frequency bands are radio waves that can be used without filing with the Federal Communications Commission (FCC). The FCC has designated several frequency bands for unlicensed use, including…

A

900 MHz, 2.4 GHz, and 5.8 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An authentication method that enables signing an outbound email message with digital signature

A

DKIM

DomainKeys Identified Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The commands and functions used to print a job on a network printer.

A

Printing Protocol

It manages the submission of print jobs by maintaining queues and controlling the transfer of their contents to the printer. It also enables the user to determine the capabilities of the printer and the status of the job and be able to cancel it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of these are examples of Printing Protocols?

1. LPR/LPD ==== 2. ONT
3. WISP ======= 4. PostScript
5. PAP ======== 6. CDFS
7. QMS ======== 8. SNMP
9. LDAP ======= 10. NDPS
11. MIMO ====== 12. JetDirect
13. PRL ======= 14. PCL
15. IPP ======= 16. MU-MIMO
A

LPR/LPD, PAP, QMS, NDPS, JetDirect and IPP

1, 5, 7, 10, 12, 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In a network using subnets, (BLANK) refers to a network device that enables exchange of data between hosts residing in different subnets.

A

Default Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How many bits is an IPv4 address and what characters does it use?

A

32 bits

Decimal Numbers

A Decimal Number is a number expressed in base 10. (0, 1, 2, 3, 4, 5, 6, 7, 8, 9)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the three Private IP Address ranges?

A

Class A = 10.X.X.X
Class B = 172.16.X.X
Class C = 192.168.X.X

X = Any number from 0 to 255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of these IP Addresses are Public and which are Private?

8.8.8.8
192.168.1.1
172.217.35.124
203.0.113.178
172.16.0.1

A

8.8.8.8=========Public
192.168.1.1=====Private
172.217.35.124==Public
203.0.113.178===Public
172.16.0.1======Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

WISP

A

An Internet service provider (ISP) that transmits wireless. Using Wi-Fi or other radio frequencies licensed by the government, WISPs provide “last mile” connectivity directly to homes and businesses.

Wireless Internet Service Provider

Carriers such as AT&T and Verizon are technically “mobile WISPs;” however, they are generally called “cellular carriers” or “mobile carriers.” In contrast, “fixed wireless WISPs” mount antennas on tall buildings with line of sight to their customers or to other antennas that relay the signals around obstacles. WISPs became popular in rural and outlying areas, because they were the only high-speed Internet connection available; however, they are also deployed in urban areas and compete with the major ISPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What Tool Would You Use?

Optimizing your home WiFi network by finding the least crowded channel, troubleshooting connection issues due to interference.

A

WiFi Analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of these IP Addresses are Public and which are Private?

192.0.2.44
10.0.0.1
1.1.1.1
172.31.255.255
192.168.255.255

A

192.0.2.44=======Public
10.0.0.1=========Private
1.1.1.1==========Public
172.31.255.255===Private
192.168.255.255==Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What Tool Would You Use?

Identifying unknown devices on a network, troubleshooting connectivity issues, visualizing the network topology, and managing network infrastructure.

A

Network Mapper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the maximum number of devices that can be attached to a PC through a single PATA cable?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Platters of a magnetic hard drive spin at a rate measured in…

A

Revolutions per minute (rpm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

HDD max rpm?

A

15,000 rpm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A logical device interface used for accessing non-volatile memory storage devices attached via PCIe is known as…

A

NVMe

NonVolatile Memory express

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A UEFI functionality designed to prevent the loading of malware and unauthorized OSs is called…

A

Secure Boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

True or False?

BIOS/UEFI passwords improve the security of a PC. These low-level passwords may, for example, prevent unauthorized users to proceed when the computer is powered on (Supervisor password), or restrict the scope of changes a user can make in the BIOS/UEFI interface (User password).

Why?

A

False

The security provided by BIOS/UEFI passwords is relatively weak. These passwords can be bypassed or reset by experienced attackers through various methods, such as removing the CMOS battery, using jumper pins on the motherboard, or exploiting vulnerabilities in the BIOS/UEFI firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which type of password provides the highest level of permissions in BIOS?

A

Supervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A CPU design based on instruction set that tries to improve speed by utilizing relatively few and simple instructions is referred to as…

There are 2 answers

A

RISC and ARM

41
Q

An Intel-proprietary technology that splits a single CPU core into two virtual cores that can be used simultaneously by an OS is called…

A

Hyper-threading

42
Q

SSD Form Factors

A

M.2 and mSATA

43
Q

Which 3 hardware interfaces can SSDs use?

A

NVMe, SATA, and PCIe

44
Q

The file system used on the first CD-ROMs

A

CDFS

Compact Disc File System

45
Q

Which type of cabling takes advantage of the 19-pin Type A connector?

46
Q

How many rows and how many pins does a Video Graphics Array (VGA) connector have?

A

Three-rows

15-pins

47
Q

How many pins does a SATA power connector have?

48
Q

How many pins does a SATA data cable connector have?

49
Q

How many pins does a PATA cable connector have?

50
Q

There are two types of PATA cables based on the number of wires they use. What are they?

A

40 wires

80 wires

51
Q

A specific length of cable for sale that is terminated at each end with a plug. Any telephone, audio, video or Ethernet cable with connectors at both ends is this type.

A

Patch Cable

52
Q

A (BLANK) cable is a type of twisted pair cable that is used in local area networks to connect a computer to a network hub such as a router. This type of cable is an alternative to wireless connections where one or more computers access a router through a wireless signal.

A

Straight-through

On a Straight-through cable, the wired pins match. Straight-through cables use one wiring standard: both ends use T568A wiring standard or both ends use T568B wiring standard.

53
Q

A (BLANK) Ethernet cable is a type of Ethernet cable used to connect computing devices together directly. It is most often used to connect two devices of the same type: e.g. two computers (via network interface controller) or two switches to each other.

A

Crossover

Unlike straight through cable, the RJ45 crossover cable uses two different wiring standards: one end uses the T568A wiring standard, and the other end uses the T568B wiring standard. The internal wiring of Ethernet crossover cables reverses the transmit and receive signals.

54
Q

Straight Through vs Crossover Cable, which do you choose?

  1. Switch to router
  2. Switch to switch
  3. Switch to PC
  4. Hub to server
  5. Router Ethernet port to PC NIC
A
  1. Straight-through
  2. Crossover
  3. Straight-through
  4. Straight-through
  5. Crossover
55
Q

Which of the following are features exclusive to UEFI and not in BIOS?

  1. Mouse support
  2. Keyboard support
  3. Overclocking
  4. DRM support
  5. Fan speed control
  6. GUI mode
  7. Passwords
  8. Secure Boot
  9. Boot from USB
A

Mouse support, DRM support, GUI mode, and Secure Boot

56
Q

HDD vs SSD

Generally more expensive per gigabyte

57
Q

HDD vs SSD

Larger storage capacities available

58
Q

HDD vs SSD

Slower access times

59
Q

HDD vs SSD

More durable

60
Q

HDD vs SSD

Requires more power

61
Q

HDD vs SSD

Quieter operation

62
Q

SAS

  1. What does it stand for?
  2. What is it?
  3. Point-to-point or Multipoint?
A
  1. Serial Attached SCSI
  2. A standard hardware interface for storage drives
  3. Point-to-point
63
Q

DDR3

  1. Maximum clock speed?
  2. Maximum transfer rate?
  3. Number of pins?
A
  1. 1,200 MHz
  2. 2,400 MT/s
  3. 240
64
Q

DDR4

  1. Maximum clock speed?
  2. Maximum transfer rate?
  3. Number of pins?
A
  1. 1,600 MHz
  2. 3,200 MT/s
  3. 284
65
Q

DDR5

  1. Maximum clock speed?
  2. Maximum transfer rate?
  3. Number of pins?
A
  1. 3,200 MHz
  2. 6,400 MT/s
  3. 288
66
Q

What are the two most common punch blocks?

A type of terminal strip used to connect telephone or data lines to each other.

A

66 Block

110 Block

The 66 block has been widely used for splicing 25 pairs of telephone wires together. Evolving from the 66 block for voice is the 110 block for data, which is made up of rows of four IDCs that are used to splice pairs together.

67
Q

What must be done when installing two PATA drives on a single cable?

A

Each drive must be configured with a jumper to designate it as a primary drive (Device 0) or secondary drive (Device 1). The “cable select” jumper setting option automatically configures the drive as Device 0 or Device 1 according to its position on the cable.

68
Q

What is the Data Transfer Rate of SATA 1.0

In MB/s

A

150 MB/s

Also known as SATA I

69
Q

What is the Data Transfer Rate of SATA 2.0

In MB/s

A

300 MB/s

Also known as SATA II or SATA 3G

70
Q

What is the Data Transfer Rate of SATA 3.0

In MB/s

A

600 MB/s

Also known as SATA III or SATA 6G

71
Q

What is the Data Transfer Rate of SATA 3.2

In MB/s

A

600 MB/s

Also known as SATA Express

72
Q

RS-232

Recommended Standard-232

A

A TIA/EIA standard for serial transmission. Although employed for numerous other purposes, the RS-232 serial port was widely used on earlier personal computers prior to USB.

73
Q

What are the 3 types of coaxial cable?

RG-__

A

RG-6, RG-58, and RG-59

74
Q

Maximum length of a copper Thunderbolt cable

A

3 meters (10 ft)

75
Q

Maximum length of an optical Thunderbolt cable

A

60 meters (200 ft)

76
Q

Data Rate of Thunderbolt Gen 1

In GB/s

77
Q

Data Rate of Thunderbolt Gen 2

In GB/s

78
Q

Data Rate of Thunderbolt Gen 3

In GB/s

79
Q

Data Rate of Thunderbolt Gen 4

In GB/s

80
Q

Data Rate of Thunderbolt Gen 5

In GB/s

81
Q

SATA Maximum Length

A

1 meter (3.3 feet)

82
Q

USB 2.0

Data Transfer Speed

Maximum Cable Length

In Mbps

A

480 Mbps

5 meters (16.4 feet)

83
Q

USB 3.0

Data Transfer Speed

Maximum Cable Length

In Gbps

A

5 Gbps

3 meters (9.8 feet)

84
Q

USB 3.1

Data Transfer Speed

Maximum Cable Length

In Gbps

A

10 Gbps

3 meters (9.8 feet)

85
Q

USB 3.2

Data Transfer Speed

Maximum Cable Length

In Gbps

A

20 Gbps

0.8 meter (2.6 feet)

86
Q

USB 4

Data Transfer Speed

Maximum Cable Length

In Gbps

A

40 Gbps

0.8 meter (2.6 feet)

87
Q

What is the maximum length of an ethernet cable?

A

100 m (328 ft.)

88
Q

What is 1000Base-T?

What is it’s IEEE standard clacification?

802.___

A

Gigabit Ethernet

802.3ab

89
Q

What is 10GBase-T?

What is it’s IEEE standard clacification?

802.___

A

10 Gigabit Ethernet

802.3an

90
Q

Name the IEEE Standard

Wi-Fi 1

91
Q

Name the IEEE Standard

Wi-Fi 2

92
Q

Name the IEEE Standard

Wi-Fi 3

93
Q

Name the IEEE Standard

Wi-Fi 4

94
Q

Name the IEEE Standard

Wi-Fi 5

95
Q

Name the IEEE Standard

Wi-Fi 6

96
Q

Customers pay for the exact amount of a product or service they use. This model is similar to paying for utilities like electricity or water.

A

Metered Service

97
Q

The amount of resources used by an individual or organization is analyzed and measured. This can be used for billing or to limit over-use.

A

Measured Service

98
Q

Which of the following is an example of on-premises VDI solution?

  1. Software as a Service (SaaS)
  2. Local server hosting virtualized OS
  3. Desktop as a Service (DaaS)
  4. Remote server hosting virtualized OS
A

2. Local server hosting virtualized OS