Main Flashcards

1
Q

Examples of USB ports that can be found on mobile devices include: (Select 3 answers)

A

USB-C
Mini-USB
Micro-USB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following are ways of creating a wireless/cellular data network by using a mobile device? (Select 3 answers)

A

Hotspot
Tethering
Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following describe IMAP? [2]

A

Offers improved functionality in comparison to POP3

Serves the same function as POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

POP3S uses: [3]

A

Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
TCP port 995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the characteristic features of the secure version of IMAP (IMAPS)? [3]

A

Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
TCP port 993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the basic settings required for configuring a POP3 connection?

A

POP3 server name
POP3 username
Password
TCP port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

POP3 is used for:

A

Email retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following can be used to describe the features of Solid-State Drives (SSDs)? [3]

A

Relatively high device cost
Lower capacity in comparison to magnetic drives
High performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are characteristic features of traditional magnetic drives? [3]

A

Low device cost
High capacity
Low performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following sizes is the most common magnetic hard disk drive form factor used in laptops?

A

2.5 inch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are SSD form factors used in laptop computers? [2]

A
  1. 8 inch

2. 5 inch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following memory module form factors are used in laptop computers? [2]

A

SODIMM

MicroDIMM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of expansion card enables communication on 802.11 networks?

A

WLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A laptop’s Bluetooth module enables communication over:

A

WPAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of expansion card that enables communication over a cellular network is called a:

A

WWAN card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of laptop expansion slot characterized by a much smaller form factor when compared to its desktop counterpart is known as:

A

mini PCIe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of power jack can be found on a laptop case?

A

DC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the characteristic features of an OLED display? [3]

A

Works without backlight
Lower light output (brightness) in comparison to LCDs
Better contrast ratio and color representation in comparison to LCDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the basic settings required for configuring an IMAP connection? [4]

A

TCP port 143
IMAP server name
IMAP username
Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MIME stands for:

A

Multipurpose Internet Mail Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following can be used as a reference during a mobile device update process?

A

PRI (Product Release Instructions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection with the right cell phone tower is called:

A

PRL (Preffered Roaming List)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A unique number used to identify a mobile network phone user is a:

A

IMSI (International mobile subscriber identity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following are examples of universal connection types that enable mobile device synchronization?

IEEE 802.11
USB-C
Cellular
Bluetooth
IEEE 802.3
A

All

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Telnet: [3]

A

Provides username & password authentication
Transmits data in an unencrypted form
Enables remote login and command execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

POP3 and IMAP are used to:

A

Retrieve mail from a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is a Microsoft-proprietary remote-access protocol providing users with a graphical interface that allows them to connect to another computer on a network?

A

RDP (Remote Desktop Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following is used when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN?

A

NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following are characteristic features of SMB/CIFS? [2]

A

Provides shared access to files, directories, and devices

Used mainly by computers running Microsoft Windows operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following protocols permits automated discovery of networked services on Local Area Networks (LANs)?

A

SLP (Service Location Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is a file sharing network protocol?

RDP
SSH
AFP
SLP

A

AFP (AppleTalk Filing Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

LDAP is an example of a:

A

Directory access protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A type of protocol used in network management systems to monitor network-attached devices is called:

A

SNMP (Simple Network Management Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which port enables FTP’s Data Connection to send file data?

A

TCP Port 20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

FTP’s Control Connection for administering a session is established through:

A

TCP Port 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

SSH protocol runs on:

A

TCP Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which TCP port2 does Telnet use?

A

TCP Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

TCP port 25 is used by:

A

SMTP (Simple Mail Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which UDP port is assigned to DNS?

A

UDP Port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

TCP port 80 is assigned to:

A

Hypertext Transfer Protocol (HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

POP3 uses what port:

A

TCP port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which TCP port number is assigned to IMAP?

A

TCP Port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which port is used by HTTPS

A

TCP Port 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A network technician wishes to use an RDP client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection?

A

TCP port 3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following port numbers are reserved for NetBIOS services? [3]

A

137
138
139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Port 445 is used by: [2]

A

SMB (Server Message Block)

CIFS (Common Internet File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which port number is used by SLP:

A

427

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

AFP runs by default on TCP port:

A

548

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Describe the differences between TCP and UDP for the following:

  • Connection
  • Reliability
  • ACKs
  • Usage
A
TCP
Formal connection
Reliable (Resends)
Yes
Where data needs to be received
UDP
none
No
No
Live Streaming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is a non-ephemeral port

A

Permanent ports

0 - 1,023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the protocol for SENDING email

A

SMTP
Simple Mail Transfer Protocol
TCP 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is DSL

A

Digital subscriber line, transmit digital data over telephone lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is SSID

A

Service set identifier, name of the network name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is MAC

A

Media access control, the physical hardware address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A device designed to filter and transfer IP packets between dissimilar types of computer networks is called a:

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which device improves network performance by dividing a given network segment into separate collision domains?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A network switch with configuration features that can be modified via a user interface is a:

A

Managed switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

An infrastructure device designed for connecting wireless/wired client devices to a network is known as a

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Network connections implemented with the use of a cable modem take advantage of: [3]

A
  • Cabling that carries TV signals
  • Coaxial cabling
  • Shared bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which of the following describe characteristics of DSL modems? [3]

A
  • Dedicated bandwidth
  • Twisted-pair copper cabling
  • Telephone lines
62
Q

Network bridge decisions are made with:

A

Software

63
Q

Network switch decisions are made with:

A

Hardware (ASIC)

64
Q

A simple device consisting of multiple connector blocks and ports used for cable management is a:

A

Patch panel

65
Q

Whatdedicated device is designed to supply power to PoE equipment?

A

Injector

66
Q

What is the function of FTP?

A

File exchange

67
Q

An SNMP Agent receives requests on UDP port:

A

161

68
Q

An SNMP management station receives SNMP notifications on which UDP port?

A

162

69
Q

A network switch is sometimes refferred to as a multiport bridge T/F

A

True

70
Q

Which wireless security protocol has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws?

A

WEP (Wired Equivalent Privacy)

71
Q

What purpose best describes the disabling of an SSID broadcast?

A

It makes a WLAN harder to discover

72
Q

Wi-Fi Protected Setup (WPS) simplifies the configuration of new wireless networks by enabling non-technical users to easily set up new networks, configure network security settings and add new devices to an existing network. However, due to its known security vulnerabilities, WPS is not recommended and should be disabled. T/F

A

True

73
Q

Which is the best method to secure a small network lacking an authentication server?

A

WPA2-PSK

74
Q

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and is not recommended because of its vulnerabilities. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard that offers the strongest security of the three. T/F

A

True

75
Q

What are the characteristic features of a WPA/WPA2 Enterprise mode? [2]

A
  • Suitable for large corporate networks

- Requires RADIUS authentication server

76
Q

Setting up a wireless network to operate on a non-overlapping channel allows multiple networks to coexist in the same area without causing interference. T/F

A

True

77
Q

Which IEEE standard provides the basis for implementing most modern WLANs?

A

IEEE 802.11

78
Q

Describe characteristics of IEEE 802.11a wireless standard [2]

A
  • 5.0 GHz frequency band

- Maximum data signaling rate of 54 Mbps

79
Q

What are the characteristic features of the IEEE 802.11b wireless standard? [2]

A
  • 2.4 GHz frequency range

- Maximum data signaling rate of 11 Mbps

80
Q

What are the characteristic features of the IEEE 802.11g wireless standard? [2]

A
  • 2.4 GHz frequency range

- Maximum data signaling rate of 54 Mbps

81
Q

The IEEE 802.11g standard is backwards compatible with:

A

802.11b

82
Q

What are the characteristic features of the IEEE 802.11n wireless standard? [4]

A
  • 2.4 GHz frequency range
  • 5.0 GHz frequency band
  • Maximum data signaling rate of 600 Mbps
  • Multiple Input / Multiple Output (MIMO)
83
Q

The IEEE 802.11n standard offers backward compatibility with: [3]

A
  • 802.11a
  • 802.11b
  • 802.11g
84
Q

Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams. T/F

A

True

85
Q

Describe features of the IEEE 802.11ac wireless standard [3]

A
  • 5.0 GHz frequency band
  • Maximum data signaling rate of up to 6.77 Gbps
  • Multi-User Multiple Input / Multiple Output (MU-MIMO)
86
Q

Which frequency bands can be used by IEEE 802.11 networks?

A
  • 2.4 GHz

- 5.0 GHz

87
Q

What is the channel bandwidth specified in the IEEE 802.11a standard?

A

20 MHz

88
Q

What is the channel bandwidth used in 802.11b networks?

A

22 MHz

89
Q

Which of the following channel bandwidths is specified in the IEEE 802.11g standard?

A

20 MHz

90
Q

The term “Channel bonding” refers to a technique that allows for combining adjacent channels to increase the amount of available bandwidth. T/F

A

True

91
Q

The IEEE 802.11n standard specifies available channel bandwidth options of: [2]

A
  • 20 MHz

- 40 MHz

92
Q

The IEEE 802.11ac standard specifies available channel bandwidth options of: [4]

A
  • 20 MHz
  • 40 MHz
  • 80 MHz
  • 160 MHz
93
Q

Which of the following channel options would allow three Wireless Access Points (WAPs) to be set up on non-overlapping channels? [3]

A

1 , 6, 11

94
Q

Which wireless technology enables identification and tracking of tags attached to objects?

A

RFID (Radio-Frequency identification)

95
Q

Long Term Evolution (LTE) is a wireless communications standard for mobile devices and wireless hotspots. LTE is much faster than the older generation of 2G and 3G cellular networks. Both LTE and its later upgrade, LTE-Advanced (LTE-A), are often marketed as 4G standards. T/F

A

True

96
Q

Which wireless network type has a design that uses mesh topology?

A

WMN (Wireless mesh network)

97
Q

What is WiMAX?

A

Worldwide Interoperability for Microwave Access, long-distance line-of-sight Internet service

98
Q

What are characteristic features of satellite Internet connections? [3]

A
  • High signal latency
  • Weather inteference
  • Relatively high cost compared to terrestrial links
99
Q

Which tool should be used to attach an RJ-45 connector to a twisted-pair Ethernet cable?

A

Crimper

100
Q

Which tool should be used to locate a cable in a cabling bundle, or to trace individual wires in a cable?

A

Toner and probe kit

101
Q

What is the function of a Time-Domain Reflectometer (TDR)?

A

Finding breaks in copper network cables

102
Q

An Optical Time-Domain Reflectometer (OTDR) is a type of specialized cable tester that locates faults and breaks in fiber-optic cabling. T/F

A

True

103
Q

Which of the following tools is used to verify that the electrical connections of wires in a cable are correct?

A

Cable tester

104
Q

When troubleshooting problems with a Network Interface Card (NIC), which of the following tools can be used to test connector pins on the NIC’s port?

A

Loopback plug

105
Q

Which of the following tools is used to attach network cables to a patch panel?

A

Punchdown tool

106
Q

Which of the following is a type of diagnostic tool used for measuring the strength of a wireless signal?

A

Wi-Fi analyzer

107
Q

The main functions of a Basic Input/Output System (BIOS) are to perform initial hardware checks after a computer is powered on and to start up an Operating System (OS). T/F

A

True

108
Q

Which of the following are a series of basic hardware diagnostic tests performed by a startup BIOS after a computer is powered on?

A

POST (Power On Self Test)

109
Q

Which MS Windows utility provides access to basic information about a computer’s BIOS?

A

Msinfo32.exe

110
Q

A computer’s BIOS interface can be accessed by pressing

A

The key set by the motherboard manufacturer for accessing BIOS configuration interface during boot

111
Q

BIOS configuration settings can be set to factory defaults by: [3]

A
  • Using a jumper on the motherboard
  • Reseating the CMOS battery on the motherboard
  • Choosing the default configuration option in the BIOS interface
112
Q

Which of the following is a feature of UEFI? (Unified Extensible Firmware Interface) [6]

A
  • Mouse Support
  • DRM support
  • GUI mode
  • Secure boot
  • Designed as a replacement for BIOS
  • Network access
113
Q

After completing initial diagnostic procedures and allocating system resources, a startup BIOS program checks for information about secondary storage devices that might contain the OS. The list of devices and the order in which they should be checked can be found and arranged in the CMOS setup utility. This option is commonly referred to as a:

A

Boot sequence

114
Q

In modern PCs, BIOS contents are stored in: [2]

A
  • EEPROM

- Flash memory

115
Q

BIOS updates are performed in order to: [3]

A
  • Repair damaged BIOS
  • Provide support for new types of attached hardware
  • Fix known programming errors discovered in the current BIOS version
116
Q

Aborted BIOS update can damage the motherboard and render the computer unusable. T/F

A

True

117
Q

What kind of user permission restrictions can be set in BIOS? [2]

A
  • User password required to proceed when the computer is powered on
  • Password-restricted access to the BIOS setup utility (Supervisor password)
118
Q

Chassis intrusion detection is an option that can be enabled/disabled in BIOS setup utilities that come equipped with this feature. Coupled with a hardware sensor mounted inside a computer case, it can be used to check whether the case was opened and display a notification alert during next boot. T/F

A

True

119
Q

A BIOS configuration interface provides a wide range of advanced hardware-related options. In modern PCs, depending on the specific BIOS type and version, these options might typically include:

A
  • Viewing a detailed information related to CPU, RAM, and HDDs
  • Enabling/disabling integrated hardware interfaces, such as USB, Audio, NIC, TPM, or integrated graphics controllers
  • Configuring the parameters of CPU, RAM, and HDDs
  • Enabling/disabling certain functionalities, e.g. virtualization support
120
Q

Which type of password provides the highest level of permissions in BIOS?

A

Supervisor

121
Q

A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in the OS), which sends tracking signals that enable location and recovery of a stolen device. The other component is a Persistence Module, which restores the Application Agent and allows it to survive reinstallation of an operating system or reformatting of the hard drive. The highest level of security offered by LoJack can be achieved when Persistence Module resides in the:

A

Computer’s BIOS

122
Q

The UEFI functionality designed to prevent loading of malware and/or unauthorized OSs is called:

A

Secure Boot

123
Q

The CMOS battery located on a computer’s motherboard allows for maintaining the correct time and date information stored in CMOS RAM. In older computer systems, the CMOS battery also allowed for maintaining the BIOS configuration settings stored in CMOS RAM. T/F

A

True

124
Q

What could help when troubleshooting a system that attempts to boot to an incorrect device? [2]

A
  • Disconnecting any USB thumb drives

- Checking BIOS settings for boot order

125
Q

For best performance, a custom workstation designed for virtualization tasks needs [3]

A
  • Large, fast hard drive
  • Maximum RAM
  • Maximum CPU cores
126
Q

Which of the following are examples of Hardware-Assisted Virtualization (HAV) technologies? [2]

A
  • VT-x

- AMD-V

127
Q

The term “VM sprawl” is used to describe a situation in which large number of deployed virtual machines lack proper administrative controls. T/F

A

True

128
Q

The term “VM escape” refers to the process of breaking out of the boundaries of a guest operating system installation to access the primary hypervisor controlling all the virtual machines on the host machine. T/F

A

True

129
Q

Which of the following security measures can be used to prevent VM sprawl? [2]

A
  • Usage audit

- Asset documentation

130
Q

Which of the following can be used as countermeasures against VM escape? [2]

A
  • Sandboxing

- Patch management

131
Q

In virtualization technology, a software program that manages multiple operating systems (or multiple instances of the same operating system) on a single computer system is called a:

A

Hypervisor

132
Q

Describe disadvantages of virtualization? [2]

A
  • Performance is degraded by having multiple virtual machines that run on a single host and share hardware resources
  • Hardware used for hosting virtual machines becomes a single point of failure
133
Q

Which of the following refers to a cloud computing delivery model in which clients, instead of buying hardware and software, rent computing resources from suppliers who own and maintain all the necessary equipment and software?

A

IaaS

134
Q

A cloud computing service model offering remote access to applications based on a monthly or annual subscription fee is called:

A

SaaS

135
Q

Which of the following cloud service types would be the best option for a web developer intending to create an app?

A

PaaS

136
Q

Name the cloud computing deployment model in which the cloud infrastructure is provisioned for open use by the general public?

A

Public cloud

137
Q

A hybrid cloud is a type of cloud deployment model consisting of two or more interlinked cloud infrastructure types (private, community, or public.) T/F

A

True

138
Q

Which of the following is a cloud computing feature that allows computing resources to be automatically allocated in response to demand?

A

Rapid elasticity

139
Q

Which of the following is a cloud computing feature that allows consumers to control the volume and type of computing resources used?

A

On-demand self-service

140
Q

In cloud computing, the practice of grouping together computing resources and making them available for shared access for multiple consumers is referred to as:

A

Resource pooling

141
Q

A remote server hosting a virtualized user OS is an example of:

A

VDI (Virtual desktop infrastructure)

142
Q

Describe the characteristics of a persistent VDI: [2]

A
  • Each user runs their own copy of virtual desktop

- At the end of a session, user data and personal settings are saved

143
Q

Describe the characteristics of a non-persistent VDI: [2]

A
  • At the end of a session, a user desktop reverts to its original state
  • Virtual desktop is shared among multiple users
144
Q

What is SIEM

A

Security information and event management

145
Q

What is the default gateway

A

The router that allows you to communicate outside of your local subnet

146
Q

How many bits in a byte

A

8

147
Q

How many bits / bytes is an IPv6 address

A

128bit / 16bytes

148
Q

What is a VLAN

A

Virtual LAN, logically separated network inside of switch.

Can only see what is on the vlan even though it is the same switch

149
Q

What is a cable modem (4)

A
  • Provides broadband
  • different traffic types
  • DOCSIS
  • High speed networking
150
Q

What is dialup

A

Sending data over voice telephone lines