Practice Test B Flashcards
which of the following TCP/IP protocols is located at the process/application layer?
ethernet, SMTP, UDP, ICMP
SMTP
ethernet is located at the network access DoD model layer
ICMP is located at the internet DoD model layer
UDP is located at the host-to-host DoD model layer
which version of the mac OS introduced siri on the desktop, integrated apple pay, new Apple file system, and better graphics capabilities?
mac OS, Mac OS 7.6, OS X, Mac OS X
mac OS
what video resolution does the HDMI 2.1 version support?
4 and 8k
2 and 4k
8 and 16k
4 and 6k
4 and 8k
HDMI 2.1 (nov 2017) has a data rate of 48 Gbps, supports 4k and 8k video at 120Hz refresh rate
which of the following is a plan for action in the event of a problem?
redundancy, contingency plan, disaster recovery plan, replication
contingency plan
what is a common compression format file extension seen on UNIX and Linux computers?
.gz .rar .dmg .iso
.gz
.rar format was introduced by WinRaR
you receive a message that the software you’re activating in your computer is not genuine. this is an example of which of the following security threats?
dumpster diving
password cracking
license theft
social engineering
license theft
which of the following file formats is used to execute multiple commands from the windows command prompt within one file?
.bat .msi .prog .exe
.bat
.msi is used for the installation and removal of software within windows
which of the following thermostats allows to set the temp based on time and day and have been around for more than 20 years?
programmable thermostat
manual thermostat
wireless thermostat
smart thermostat
programmable thermostat
which of the following outlines the structure of the database, such as what tables and fields are included?
logical schema
physical schema
primary key
forms
logical schema
physical schema is the actual tables, columns and relationships created in the RDBMS
a primary key specifically is what?
a record in a table
a schema in a database
a table in a schema
a field in a table
a field in a table
which hard drive connector will give you the greatest speed?
SATA, PATA, AGP, PCIe
SATA
AGP and PCIe are expansion slot types
which of the following is a TCP/IP standard used to auto config IP based hosts that are unable to reach a DCHP server using the 169.254.x.x IP address range with a subnet mask of 255.255.0.0
DoD
DNS
NAT
APIPA
APIPA
DoD is a four layer networking model upon which the basis for the tcp/ip protocol suite was developed
DNS servers resolve host names to IP addresses
NAT is a service run on a router that translates private IP addresses into a public IP address so you can get on the internet
your sys admin warns you of a new virus threat. this particular virus changes forms to avoid detection by antivirus software. what type of virus is it?
polymorphic
stealth
phage
multipartite
polymorphic assume different forms
multipartite attack your system in multiple ways
phage alters other programs and databases
stealth attempts to avoid detection by masking itself from apps
which of the following software based security threats conceals themselves on the host OS, allowing for full control access of the computer at a later date?
worm, virus, keylogger, rootkit
rootkit
keylogger - records every keystroke then uses that data for identifying theft
virus - used to cause damage and or disruption
worm - used to transmit malware
you are using Internet Explorer. you want to browse a website that should not be stored in your browsing history. what should you do?
use InPrivate
use Incognito
login as someone else to browse the site
configure independent browsing
use InPrivate
which of the following are basic functions of an operating system? choose three:
providing antivirus protection
creating a structure for data management
monitoring system health
coordinating hardware components
creating a structure for data management
monitoring system health
coordinating hardware components
what external storage connection type requires the external hard drive to supply its own power?
firewire, usb, thunderbolt, eSATA
eSATA
which command is used to create queries in a relational database?
SELECT, FIND, SEEK, SEARCH
SELECT
which of the following statements is NOT true of the liquid cooling method?
a) its expensive and requires less familiar components
b) its more efficient and much quieter
c) it moves the heat away form the heat sink immediately
d) it uses a special water block to conduct heat away from the processor
c) it moves the heat away form the heat sink immediately
this is true of AIR cooling, not water cooling
you have a system with 3 hdd’s in which you want to implement a RAID array with parity. which of the following RAID levels will you use to accomplish the task?
RAID 10, RAID 5, RAID 0, RAID 1
RAID 5
RAID 10 needs a min of 4 disks in two disk mirrored blocks
RAID 1 is mirroring or duplexing
RAID 0 implements striping
which of the following file systems are associated with the Linux operating system? choose all that apply:
HFS, NTFS, ext3, XFS
XFS and ext3
HFS is mac OS X
NTFS is Win
which of the following wireless security options is based on the advanced encryption standard (AES) and therefore is the most secure option available on wireless routers today?
WEP, TKIP, WPA2, WPA
WPA2 is based on AES and is the most secure. it uses CCMP (counter mode CBC-MAC protocol), which is a protocol based on the AES security algorithm.
WPA uses TKIP and is an improvement on WEP
WEP is the least secure and vulnerable due to the nature of static keys and weaknesses in the encryption algorithms.
TKIP is an older encryption standard used by the old WPA standard.
which of the following do NOT pose an availability concern to your company’s data? choose two:
denial of service, dumpster diving, snooping, power out
dumpster diving, snooping
availability threats include denial of service, power outage, hardware failure, destruction, and service outage
snooping and dumpster diving are confidentiality concerns
which of the following connector types are used by printer to work? choose all that apply:
firewire, parallel, rj-11, PS/2, USB
firewire, parallel and usb
rj-11 used by a modem
PS/2 used by keyboard
which of the following services makes it possible for you to type in a website name such as google.com and have your computer find the website?
APIPA, DHCP, DNS, NAT
DNS (domain name system) resolves host names, such as those found on the internet, into IP addresses. without DNS you would need to type in the IP of every website you wanted to visit.
DHCP auto assigns TCP/IP config info to clients
NAT runs on your router and handles the translation of private, nonroutable IP addresses into public IP addresses
APIPA is a TCP/IP standard used to auto config IP based hosts that are unable to reach a DHCP server
creating a website that masquerades as a legit secure site but actually steals users’ info is :
phishing
spoofing
license theft
dumpster diving
spoofing
phishing is a form of social engineering where an attacker sends an email asking for personal info to use in an attack.
in which of the following OS’s is the new version auto downloaded to the system with no user intervention needed when any update is published?
Chrome, Mac OS, Linux, Windows
chrome