PreAssessment Flashcards
what is the name of the component that controls communication between the processor and memory?
motherboard, chipset, cpu, expansion bus
chipset
chapt 2.3
you want to upgrade your computer to give it a faster boot time and more space for your files. what should you purchase?
ram, hdd, ssd, cpu
ssd
chapt 2.3
you are setting up a new wifi connection on your ipad. what is the first step in the process?
enter wirelss password
verify working of internet connection
verify wireless capabilities
locate ssid
turn on wifi
verify wireless capabilities
chapt 2.6
what is the name of the windows version in which the start button is introduced?
win 3.0
win 95
win xp
win 7
win 95
chapt 3.1
when creating a relational database, what is the name of the rules and structures?
forms
tables
schema
constraints
schema
chapt 5.2
david works as a database admin for aoeu. he wants to remove a column from an existing database. which of the following commands should he use to accomplish this task?
alter, delete, drop, remove
alter
chapt 5.3
you open your browser and type in google but your computer cant find the website. your neighbor’s computer finds it just fine what is most likely the cause?
incorrect dns config
incorrect dhcp config
incorrect wpa2 config
the website is down
incorrect dns config
chapt 2.7? explain basic networking concepts
you have created a new logo for your company and now you need to protect your logo from being copied. what should you get to protect the intellectual property?
trademark, copyright, patent, asset protection
trademark
a trademark is used to protect word, words or a symbol legally registered as representing a company or a product
copyright protects original works of authorship, such as books, songs, plays, movies, computer apps, and architectures
which of the following concerns includes replay attack?
confidentiality, integrity, availability, authentication
integrity
security
what type of malware is best known for carrying other malware as a payload?
virus, worm, trojan horse, rootkit
worm
security
a user has been accused of hacking into a server. which of the following would keep him from denying that he did it?
authenticity, integrity, irrevocability, non-repudiation
non repudiation
security
which of the following are considered device hardening techniques?
choose all that apply:
disabling bluetooth
requiring complex passwords
enabling single sign on
installing antispyware software
disabling bluetooth
requiring complex passwords
installing antispyware software
in which characteristic of the strong password does a password not appear in a dictionary?
unusual, complex, long
unusual
which of the following apps continuously runs in the background and analyzes the system and any programs when they’re opened or closed as well as any files that are opened or closed?
software firewall, antispyware app, antivirus app, antispam app
antivirus app
which of the following is the ability to lose a component or data and still have a functional system?
redundancy, replication, backup, fault tolerance
fault tolerance