1101 Cont. Cont. Flashcards
The display technology most commonly used in modern laptops
LCD
Which of the following are Flash Drives?
- USB Drive
- Hard Disk Drive
- Thumb Drive
- Solid State Drive
- Optical Drive
USB Drive and Thumb Drive
Which of the following use Flash Memory?
- USB Drive
- Hard Disk Drive
- Solid State Drive
- Magnetic Disk Drive
- Optical Drive
USB Drive and Solid State Drive
What were the two primary cellular, but incompatible, 2G and 3G transmission systems before LTE?
CDMA and GSM
(Code Division Multiple Access) and (Global System for Mobile Communications)
What is a security feature used in the Bluetooth device pairing process?
PIN Codes
SSH
A security protocol for logging into a remote server.
Secure SHell
SSH provides an encrypted session for transferring files and executing server programs on all platforms. Also serving as a secure client/server connection for applications such as database access and email, SSH supports a variety of authentication methods.
SNMP
A widely used network monitoring and control protocol.
Simple Network Management Protocol
Data are passed from SNMP agents, which are hardware and/or software processes reporting activity in each network device (hub, router, bridge, etc.) to the workstation console used to oversee the network. The agents return information contained in a MIB (Management Information Base), which is a data structure that defines what is obtainable from the device and what can be controlled (turned off, on, etc.). Originating in the Unix community, SNMP has become widely used on all major platforms.
LDAP
A protocol used to access a directory listing in a TCP/IP network.
Lightweight Directory Access Protocol
LDAP is used to query network directories, email servers and other information repositories. It is a sibling protocol to HTTP and FTP and uses the ldap:// prefix in its URL.
CIFS
The file sharing protocol used in Windows.
Common Internet File System
It evolved out of the SMB (Server Message Block) protocol in DOS, which is why the terms CIFS/SMB and SMB/CIFS are commonly used. The word “Internet” in CIFS does not refer to the global Internet but to generic internetworking.
The two most popular programming interfaces (API) from the IETF that enable a user’s email program to access the mail server.
Email clients such as Outlook, Mail, Eudora and Thunderbird are typically configured to retrieve mail via one or the other.
POP3 and IMAP4
Post Office Protocol 3 and Internet Message Access Protocol 4
POP3 or IMAP4?
(ANSWER) is a simple system with limited selectivity. Incoming messages and attachments are downloaded when users check their mail, and (ANSWER) is typically configured to delete the messages on the server after downloading. If the user opts to not delete them, the messages will download again the next time mail is checked.
POP3
POP3 or IMAP4?
(ANSWER) has more options than (THE OTHER ONE). For example, it can download only the message headers, which have only to/from addresses and subject. An essential option in the early days of dial-up, the user then chooses which messages and attachments to download. (ANSWER) also keeps the messages on the mail server in synchronization with the downloaded messages in the client. Users can then decide when and which messages to delete on the server.
IMAP4
An IEEE standard for powering network devices via Ethernet cable. Also known as “Power-over-Ethernet” (PoE), the (BLANK) specification provides 48 volts over 4-wire or 8-wire twisted pair.
802.3af
An IEEE standard for High Power over Ethernet (PoE+). The (BLANK) specification provides 25.5 watts of power compared to the 15.4 watts of (BLANK).
802.3at
An IEEE standard for a higher Power over Ethernet (PoE) rating, also known as PoE++, UPoE, or 4PPoE.
802.3bt
A device that connects two LAN segments together. They are inserted into the network to keep traffic contained within the segments to improve performance.
Bridge
Equipment from the telephone company that terminates its optical fibers at the customer’s premises. Using electricity from the customer’s AC source, it converts the incoming optical signals into electrical signals for telephone, TV and Internet.
ONT
Optical Network Terminal
This occurs when a switch’s physical interface repeatedly goes up and down within a short period of time.
Port Flapping
The use of multiple transmitters and receivers (multiple antennas) on wireless devices for improved performance.
MIMO
Multiple Input/Multiple Output
When two transmitters and two or more receivers are used, two simultaneous data streams can be sent, which double the data rate. Multiple receivers alone allow greater distances between devices. For example, the IEEE 802.11n (Wi-Fi) wireless standard uses MIMO to increase speed to 100 Mbps and beyond, doubling at minimum the 802.11a and 11g rates. MIMO antennas are also used in WiMAX and LTE.
MU-MIMO
Multiuser-MIMO (Multiple Input/Multiple Output)
A multi-transmitter/receiver technology (MIMO) that supports multiple wireless users simultaneously. Contrast with SU-MIMO (Single User-MIMO).
Unlicensed wireless frequency bands are radio waves that can be used without filing with the Federal Communications Commission (FCC). The FCC has designated several frequency bands for unlicensed use, including…
900 MHz, 2.4 GHz, and 5.8 GHz
An authentication method that enables signing an outbound email message with digital signature
DKIM
DomainKeys Identified Mail
The commands and functions used to print a job on a network printer.
Printing Protocol
It manages the submission of print jobs by maintaining queues and controlling the transfer of their contents to the printer. It also enables the user to determine the capabilities of the printer and the status of the job and be able to cancel it.
Which of these are examples of Printing Protocols?
1. LPR/LPD ==== 2. ONT 3. WISP ======= 4. PostScript 5. PAP ======== 6. CDFS 7. QMS ======== 8. SNMP 9. LDAP ======= 10. NDPS 11. MIMO ====== 12. JetDirect 13. PRL ======= 14. PCL 15. IPP ======= 16. MU-MIMO
LPR/LPD, PAP, QMS, NDPS, JetDirect and IPP
1, 5, 7, 10, 12, 15
In a network using subnets, (BLANK) refers to a network device that enables exchange of data between hosts residing in different subnets.
Default Gateway
How many bits is an IPv4 address and what characters does it use?
32 bits
Decimal Numbers
A Decimal Number is a number expressed in base 10. (0, 1, 2, 3, 4, 5, 6, 7, 8, 9)
What are the three Private IP Address ranges?
Class A = 10.X.X.X
Class B = 172.16.X.X
Class C = 192.168.X.X
X = Any number from 0 to 255
Which of these IP Addresses are Public and which are Private?
8.8.8.8
192.168.1.1
172.217.35.124
203.0.113.178
172.16.0.1
8.8.8.8=========Public
192.168.1.1=====Private
172.217.35.124==Public
203.0.113.178===Public
172.16.0.1======Private
WISP
An Internet service provider (ISP) that transmits wireless. Using Wi-Fi or other radio frequencies licensed by the government, WISPs provide “last mile” connectivity directly to homes and businesses.
Wireless Internet Service Provider
Carriers such as AT&T and Verizon are technically “mobile WISPs;” however, they are generally called “cellular carriers” or “mobile carriers.” In contrast, “fixed wireless WISPs” mount antennas on tall buildings with line of sight to their customers or to other antennas that relay the signals around obstacles. WISPs became popular in rural and outlying areas, because they were the only high-speed Internet connection available; however, they are also deployed in urban areas and compete with the major ISPs.
What Tool Would You Use?
Optimizing your home WiFi network by finding the least crowded channel, troubleshooting connection issues due to interference.
WiFi Analyzer
Which of these IP Addresses are Public and which are Private?
192.0.2.44
10.0.0.1
1.1.1.1
172.31.255.255
192.168.255.255
192.0.2.44=======Public
10.0.0.1=========Private
1.1.1.1==========Public
172.31.255.255===Private
192.168.255.255==Private
What Tool Would You Use?
Identifying unknown devices on a network, troubleshooting connectivity issues, visualizing the network topology, and managing network infrastructure.
Network Mapper
What is the maximum number of devices that can be attached to a PC through a single PATA cable?
2
Platters of a magnetic hard drive spin at a rate measured in…
Revolutions per minute (rpm)
HDD max rpm?
15,000 rpm
A logical device interface used for accessing non-volatile memory storage devices attached via PCIe is known as…
NVMe
NonVolatile Memory express
A UEFI functionality designed to prevent the loading of malware and unauthorized OSs is called…
Secure Boot
True or False?
BIOS/UEFI passwords improve the security of a PC. These low-level passwords may, for example, prevent unauthorized users to proceed when the computer is powered on (Supervisor password), or restrict the scope of changes a user can make in the BIOS/UEFI interface (User password).
Why?
False
The security provided by BIOS/UEFI passwords is relatively weak. These passwords can be bypassed or reset by experienced attackers through various methods, such as removing the CMOS battery, using jumper pins on the motherboard, or exploiting vulnerabilities in the BIOS/UEFI firmware.
Which type of password provides the highest level of permissions in BIOS?
Supervisor
A CPU design based on instruction set that tries to improve speed by utilizing relatively few and simple instructions is referred to as…
There are 2 answers
RISC and ARM
An Intel-proprietary technology that splits a single CPU core into two virtual cores that can be used simultaneously by an OS is called…
Hyper-threading
SSD Form Factors
M.2 and mSATA
Which 3 hardware interfaces can SSDs use?
NVMe, SATA, and PCIe
The file system used on the first CD-ROMs
CDFS
Compact Disc File System
Which type of cabling takes advantage of the 19-pin Type A connector?
HDMI
How many rows and how many pins does a Video Graphics Array (VGA) connector have?
Three-rows
15-pins
How many pins does a SATA power connector have?
15 pins
How many pins does a SATA data cable connector have?
7 pins
How many pins does a PATA cable connector have?
40 pins
There are two types of PATA cables based on the number of wires they use. What are they?
40 wires
80 wires
A specific length of cable for sale that is terminated at each end with a plug. Any telephone, audio, video or Ethernet cable with connectors at both ends is this type.
Patch Cable
A (BLANK) cable is a type of twisted pair cable that is used in local area networks to connect a computer to a network hub such as a router. This type of cable is an alternative to wireless connections where one or more computers access a router through a wireless signal.
Straight-through
On a Straight-through cable, the wired pins match. Straight-through cables use one wiring standard: both ends use T568A wiring standard or both ends use T568B wiring standard.
A (BLANK) Ethernet cable is a type of Ethernet cable used to connect computing devices together directly. It is most often used to connect two devices of the same type: e.g. two computers (via network interface controller) or two switches to each other.
Crossover
Unlike straight through cable, the RJ45 crossover cable uses two different wiring standards: one end uses the T568A wiring standard, and the other end uses the T568B wiring standard. The internal wiring of Ethernet crossover cables reverses the transmit and receive signals.
Straight Through vs Crossover Cable, which do you choose?
- Switch to router
- Switch to switch
- Switch to PC
- Hub to server
- Router Ethernet port to PC NIC
- Straight-through
- Crossover
- Straight-through
- Straight-through
- Crossover
Which of the following are features exclusive to UEFI and not in BIOS?
- Mouse support
- Keyboard support
- Overclocking
- DRM support
- Fan speed control
- GUI mode
- Passwords
- Secure Boot
- Boot from USB
Mouse support, DRM support, GUI mode, and Secure Boot
HDD vs SSD
Generally more expensive per gigabyte
SSD
HDD vs SSD
Larger storage capacities available
HDD
HDD vs SSD
Slower access times
HDD
HDD vs SSD
More durable
SSD
HDD vs SSD
Requires more power
HDD
HDD vs SSD
Quieter operation
SSD
SAS
- What does it stand for?
- What is it?
- Point-to-point or Multipoint?
- Serial Attached SCSI
- A standard hardware interface for storage drives
- Point-to-point
DDR3
- Maximum clock speed?
- Maximum transfer rate?
- Number of pins?
- 1,200 MHz
- 2,400 MT/s
- 240
DDR4
- Maximum clock speed?
- Maximum transfer rate?
- Number of pins?
- 1,600 MHz
- 3,200 MT/s
- 284
DDR5
- Maximum clock speed?
- Maximum transfer rate?
- Number of pins?
- 3,200 MHz
- 6,400 MT/s
- 288
What are the two most common punch blocks?
A type of terminal strip used to connect telephone or data lines to each other.
66 Block
110 Block
The 66 block has been widely used for splicing 25 pairs of telephone wires together. Evolving from the 66 block for voice is the 110 block for data, which is made up of rows of four IDCs that are used to splice pairs together.
What must be done when installing two PATA drives on a single cable?
Each drive must be configured with a jumper to designate it as a primary drive (Device 0) or secondary drive (Device 1). The “cable select” jumper setting option automatically configures the drive as Device 0 or Device 1 according to its position on the cable.
What is the Data Transfer Rate of SATA 1.0
In MB/s
150 MB/s
Also known as SATA I
What is the Data Transfer Rate of SATA 2.0
In MB/s
300 MB/s
Also known as SATA II or SATA 3G
What is the Data Transfer Rate of SATA 3.0
In MB/s
600 MB/s
Also known as SATA III or SATA 6G
What is the Data Transfer Rate of SATA 3.2
In MB/s
600 MB/s
Also known as SATA Express
RS-232
Recommended Standard-232
A TIA/EIA standard for serial transmission. Although employed for numerous other purposes, the RS-232 serial port was widely used on earlier personal computers prior to USB.
What are the 3 types of coaxial cable?
RG-__
RG-6, RG-58, and RG-59
Maximum length of a copper Thunderbolt cable
3 meters (10 ft)
Maximum length of an optical Thunderbolt cable
60 meters (200 ft)
Data Rate of Thunderbolt Gen 1
In GB/s
10 GB/s
Data Rate of Thunderbolt Gen 2
In GB/s
20 GB/s
Data Rate of Thunderbolt Gen 3
In GB/s
40 GB/s
Data Rate of Thunderbolt Gen 4
In GB/s
40 GB/s
Data Rate of Thunderbolt Gen 5
In GB/s
80 GB/s
SATA Maximum Length
1 meter (3.3 feet)
USB 2.0
Data Transfer Speed
Maximum Cable Length
In Mbps
480 Mbps
5 meters (16.4 feet)
USB 3.0
Data Transfer Speed
Maximum Cable Length
In Gbps
5 Gbps
3 meters (9.8 feet)
USB 3.1
Data Transfer Speed
Maximum Cable Length
In Gbps
10 Gbps
3 meters (9.8 feet)
USB 3.2
Data Transfer Speed
Maximum Cable Length
In Gbps
20 Gbps
0.8 meter (2.6 feet)
USB 4
Data Transfer Speed
Maximum Cable Length
In Gbps
40 Gbps
0.8 meter (2.6 feet)
What is the maximum length of an ethernet cable?
100 m (328 ft.)
What is 1000Base-T?
What is it’s IEEE standard clacification?
802.___
Gigabit Ethernet
802.3ab
What is 10GBase-T?
What is it’s IEEE standard clacification?
802.___
10 Gigabit Ethernet
802.3an
Name the IEEE Standard
Wi-Fi 1
802.11b
Name the IEEE Standard
Wi-Fi 2
802.11a
Name the IEEE Standard
Wi-Fi 3
802.11g
Name the IEEE Standard
Wi-Fi 4
802.11n
Name the IEEE Standard
Wi-Fi 5
802.11ac
Name the IEEE Standard
Wi-Fi 6
802.11ax
Customers pay for the exact amount of a product or service they use. This model is similar to paying for utilities like electricity or water.
Metered Service
The amount of resources used by an individual or organization is analyzed and measured. This can be used for billing or to limit over-use.
Measured Service
Which of the following is an example of on-premises VDI solution?
- Software as a Service (SaaS)
- Local server hosting virtualized OS
- Desktop as a Service (DaaS)
- Remote server hosting virtualized OS
2. Local server hosting virtualized OS