random Flashcards

1
Q

what is router

A

it is a gateway device that is installed b/w two vlans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a hub

A

there is no intelligence in interconnection functions, whatever is recived onone port is repeated on the other port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is wireless access point

A

connects directly to wired network and then uses wireless connection to provide wifi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is unmanaged switch

A

switch operates out-of-the-box without any setup or configuration by switching network traffic based on MAC addresses and putting each switch port into its own collision domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

which ports are used by the NetBIOS protocol to share files and printers on a Windows network?

A

NetBIOS/NetBT operates on TCP/UDP ports 137 and 139.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. cat3

2.Category 5e / Cat 5e

A
  1. 10 Mbps and a distance of up to 100 meters.
  2. It can support speeds up to 1 Gbps and a distance of up to 100 meters.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is network interface card used for ?

A

A network interface card is an expansion card that enables a PC to connect to a LAN. Network interface cards are also referred to as network adapters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a cryptographic authentication mechanism to positively identify an organisation as the authorised sender of email for a particular domain name

A

DomainKeys Identified Mail (DKIM) provides a cryptographic authentication mechanism. This can replace or supplement SPF (sender policy framework). To configure DKIM, the organisation uploads a public key as a TXT record in the DNS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is pre boot execution environment (PXE)

A

To configure a computer to utilize the PXE boot option, you need to configure it under the BIOS boot option. The Preboot Execution Environment (PXE) is an industry-standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is secure boot

A

Secure boot is a security system offered by UEFI that is designed to prevent a computer from being hijacked by malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is unified threat management

A

A Unified Threat Management (UTM) appliance enforces a variety of security-related measures, combining the work of a firewall, malware scanner, and intrusion detection/prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a page description language

A

Both the printer control language (PCL) and PostScript (PS) are page description languages, but PS produces higher quality outputs. The printer control language (PCL) is a page description language used to tell printers how to properly layout and print the contents of a document on a page. PCL is a common printing language that is supported by many different printer manufacturers. PostScript (PS) is the page description language used in the electronic publishing and desktop publishing business. PCL is faster to print than PS. PS is slower but produces higher quality outputs. The Internet Printing Protocol (IPP) is a specialized Internet protocol for communication between client devices and printers (or print servers) using the HTTP protocol for data transport.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

trusted platform module

A

Trusted platform module (TPM) technology helps keep PCs secure by offering hardware-level protection against malware and sophisticated cyberattacks. TPM technology can be embedded into modern CPUs and “securely store[s] artifacts used to authenticate the platform.”2 The artifacts TPMs protect range from passwords to certificates to fingerprints—any important information users want securely stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is line printer deamon

A

it is a protocol used to print something remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly