Final Test Mistakes Flashcards
Where is non-volatile data stored?
Hard Disk
How large is a full-sized hard disk?
3.5”
Where is volatile data stored?
RAM
With this type of display, each diode supplies its own light.
OLED
This email protocol allows you to create folders and manage your emails on the server
IMAP (Internet Message Access Protocol)
What does S/MIME stand for?
Secure/Multipurpose Internet Mail Extensions
What does PRL stand for?
Preferred Roaming List (cellular phones)
What does EIR stand for?
Extended Information Rate
This is traditionally a layer 2 device and allows VLANs to be created.
Switch
This protocol is used for secure remote connectivity for configuration.
SSH (Secure Shell)
This is good if you want to run services inside your network but don’t have a public IP address to the device.
Port Forwarding
This takes private IP addressing and translates to public IP addressing and vice versa, depending on traffic flow.
NAT (Network Address Translation)
With this technology, we can create personal area networks.
Bluetooth
This technology is widely used for IoT devices in the home/SOHO.
Zigbee
This is a security device used to alert admins of abnormal activity on a network segment or host system.
IDS (Intrusion Detection System)
This is a communication standard for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network, not really used much today for broadband.
ISDN (Integrated Service Digital Network)
If you are looking for a one-stop-shop security device, this might fit the need.
UTM (Unified Threat Management)
This type of tool is used to attach ends to an unshielded twisted pair.
Crimper
This tool allows admins to securely connect a UTP cable to a network rack device.
Punchdown