Practice Test B Flashcards

1
Q

which of the following TCP/IP protocols is located at the process/application layer?

ethernet, SMTP, UDP, ICMP

A

SMTP

ethernet is located at the network access DoD model layer
ICMP is located at the internet DoD model layer
UDP is located at the host-to-host DoD model layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

which version of the mac OS introduced siri on the desktop, integrated apple pay, new Apple file system, and better graphics capabilities?

mac OS, Mac OS 7.6, OS X, Mac OS X

A

mac OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what video resolution does the HDMI 2.1 version support?

4 and 8k
2 and 4k
8 and 16k
4 and 6k

A

4 and 8k

HDMI 2.1 (nov 2017) has a data rate of 48 Gbps, supports 4k and 8k video at 120Hz refresh rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which of the following is a plan for action in the event of a problem?

redundancy, contingency plan, disaster recovery plan, replication

A

contingency plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a common compression format file extension seen on UNIX and Linux computers?

.gz .rar .dmg .iso

A

.gz

.rar format was introduced by WinRaR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

you receive a message that the software you’re activating in your computer is not genuine. this is an example of which of the following security threats?

dumpster diving
password cracking
license theft
social engineering

A

license theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

which of the following file formats is used to execute multiple commands from the windows command prompt within one file?

.bat .msi .prog .exe

A

.bat

.msi is used for the installation and removal of software within windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which of the following thermostats allows to set the temp based on time and day and have been around for more than 20 years?

programmable thermostat
manual thermostat
wireless thermostat
smart thermostat

A

programmable thermostat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

which of the following outlines the structure of the database, such as what tables and fields are included?

logical schema
physical schema
primary key
forms

A

logical schema

physical schema is the actual tables, columns and relationships created in the RDBMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a primary key specifically is what?

a record in a table
a schema in a database
a table in a schema
a field in a table

A

a field in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which hard drive connector will give you the greatest speed?

SATA, PATA, AGP, PCIe

A

SATA

AGP and PCIe are expansion slot types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which of the following is a TCP/IP standard used to auto config IP based hosts that are unable to reach a DCHP server using the 169.254.x.x IP address range with a subnet mask of 255.255.0.0

DoD
DNS
NAT
APIPA

A

APIPA

DoD is a four layer networking model upon which the basis for the tcp/ip protocol suite was developed

DNS servers resolve host names to IP addresses

NAT is a service run on a router that translates private IP addresses into a public IP address so you can get on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

your sys admin warns you of a new virus threat. this particular virus changes forms to avoid detection by antivirus software. what type of virus is it?

polymorphic
stealth
phage
multipartite

A

polymorphic assume different forms

multipartite attack your system in multiple ways
phage alters other programs and databases
stealth attempts to avoid detection by masking itself from apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which of the following software based security threats conceals themselves on the host OS, allowing for full control access of the computer at a later date?

worm, virus, keylogger, rootkit

A

rootkit

keylogger - records every keystroke then uses that data for identifying theft
virus - used to cause damage and or disruption
worm - used to transmit malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

you are using Internet Explorer. you want to browse a website that should not be stored in your browsing history. what should you do?

use InPrivate
use Incognito
login as someone else to browse the site
configure independent browsing

A

use InPrivate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

which of the following are basic functions of an operating system? choose three:

providing antivirus protection
creating a structure for data management
monitoring system health
coordinating hardware components

A

creating a structure for data management
monitoring system health
coordinating hardware components

17
Q

what external storage connection type requires the external hard drive to supply its own power?

firewire, usb, thunderbolt, eSATA

A

eSATA

18
Q

which command is used to create queries in a relational database?

SELECT, FIND, SEEK, SEARCH

A

SELECT

19
Q

which of the following statements is NOT true of the liquid cooling method?
a) its expensive and requires less familiar components
b) its more efficient and much quieter
c) it moves the heat away form the heat sink immediately
d) it uses a special water block to conduct heat away from the processor

A

c) it moves the heat away form the heat sink immediately

this is true of AIR cooling, not water cooling

20
Q

you have a system with 3 hdd’s in which you want to implement a RAID array with parity. which of the following RAID levels will you use to accomplish the task?

RAID 10, RAID 5, RAID 0, RAID 1

A

RAID 5

RAID 10 needs a min of 4 disks in two disk mirrored blocks
RAID 1 is mirroring or duplexing
RAID 0 implements striping

21
Q

which of the following file systems are associated with the Linux operating system? choose all that apply:

HFS, NTFS, ext3, XFS

A

XFS and ext3

HFS is mac OS X
NTFS is Win

22
Q

which of the following wireless security options is based on the advanced encryption standard (AES) and therefore is the most secure option available on wireless routers today?

WEP, TKIP, WPA2, WPA

A

WPA2 is based on AES and is the most secure. it uses CCMP (counter mode CBC-MAC protocol), which is a protocol based on the AES security algorithm.

WPA uses TKIP and is an improvement on WEP
WEP is the least secure and vulnerable due to the nature of static keys and weaknesses in the encryption algorithms.
TKIP is an older encryption standard used by the old WPA standard.

23
Q

which of the following do NOT pose an availability concern to your company’s data? choose two:

denial of service, dumpster diving, snooping, power out

A

dumpster diving, snooping

availability threats include denial of service, power outage, hardware failure, destruction, and service outage

snooping and dumpster diving are confidentiality concerns

24
Q

which of the following connector types are used by printer to work? choose all that apply:

firewire, parallel, rj-11, PS/2, USB

A

firewire, parallel and usb

rj-11 used by a modem
PS/2 used by keyboard

25
Q

which of the following services makes it possible for you to type in a website name such as google.com and have your computer find the website?

APIPA, DHCP, DNS, NAT

A

DNS (domain name system) resolves host names, such as those found on the internet, into IP addresses. without DNS you would need to type in the IP of every website you wanted to visit.

DHCP auto assigns TCP/IP config info to clients
NAT runs on your router and handles the translation of private, nonroutable IP addresses into public IP addresses
APIPA is a TCP/IP standard used to auto config IP based hosts that are unable to reach a DHCP server

26
Q

creating a website that masquerades as a legit secure site but actually steals users’ info is :

phishing
spoofing
license theft
dumpster diving

A

spoofing

phishing is a form of social engineering where an attacker sends an email asking for personal info to use in an attack.

27
Q

in which of the following OS’s is the new version auto downloaded to the system with no user intervention needed when any update is published?

Chrome, Mac OS, Linux, Windows

A

chrome