Real Study Card 3 Flashcards
What is the purpose of Secure Boot?
To prevent malicious and unauthorized apps from loading into the Operating System (OS) during the startup process
What tool is used to verify that a server rack is properly grounded?
Multimeter
RF
Radio Frequency
Which service charges its users based on the actual usage of the service resources on an hourly or monthly basis?
Metered Services
Which page description language substitutes speed for higher quality?
PostScript
Which page description language substitutes substitutes higher quality for speed?
Printer Control Language (PCL)
PS
PostScript
PCL
Printer Control Language
IPP
Internet Printing Protocol
A specialized internet protocol for communicating between client devices and printers using the Hypertext Transfer Protocol (HTTP) for data transport.
Internet Printing Protocol
Which printer setting allows the gathering and arranging of individual sheets or other printed components into a pre-determined sequence? (Printing pages 1, 2, 3, before printing the second copy)
Collate
What is a foul odor indicative of?
Distended Capacitor
What is a burning smell indicative of?
A bad Power Supply
What takes a whole Hypertext Transfer Protocol (HTTP) request from a client, checks it, then forwards it to its destination computer on the internet?
Proxy Server
Prevents unauthorized access to you computer by blocking ports and programs.
Firewall
Can be used to filter content and websites from reaching a user
Proxy Server
Is used to host and control access to shared files and folders for the organization
File Server
A server configured with a range of IP addresses to lease
Dynamic Host Configuration Protocol (DHCP) server
A server that hosts the database of domain dames and the IP addresses mapped to those names
Domain Name System (DNS) server
A server or network appliance used t prevent users from being overwhelmed with spam or junk mail
Spam Gateway
A server that collects diagnostic and monitoring data from the hosts and network devices across a given network
Syslog Server
A server that accepts requests through Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS) for a webpage and delivers the webpage and other requests to the user
Web Server
DIMM
Dual In-Line Memory Module
DDR
Double Data Rate
What is used to describe scalable provisioning or the capability to provide scalable cloud computing services?
Rapid Elasticity
Which printer configuration setting controls the size of the paper used for the print job?
Tray
BSOD
Blue Screen of Death
MAC
Media Access Control
DDoS
Distributed Denial of Service (an attack)
POST
Power On Self Test
POTS
Plain Old Telephone Service
What DNS record is used to associate one domain name as an alias of another? (like beta.diontraining.com and www.diontraining.com referring to the same website)
CNAME
What occurs when a router takes request from the internet for a particular application and sends them to a designated host on the local area network?
Port Forwarding
NAS
Network Attached Storage
IOPS
Input/Output Operations Per Second
A measurement of performance used to compare a Hard Disk Drive (HDD) and a Solid-State Drive (SSD)
Input/Output Operations Per Second (IOPS)
MFA
Multifactor Authentication
SSO
Single Sign-On
What does a single beep commonly indicate during the Power On Self Test (POST)
A successful completion of the Power On Self Test (POST)
A process when file fragments are put together to speed up file access.
Defragging
What can be done to speed up boot time (if needed)?
Defragment the hard drive
What are the seven steps of a laser printer’s imaging process?
- Processing
- Charging
- Exposing
- Developing
- Transferring
- Fusing
- Cleaning
::1 is an example of a ________ address.
IPv6
ECC memory
Error Correcting Code
A type of system memory that has built-in error correcting security
Error Correcting Code (ECC)
_______ means that a bad HDD can be removed and replaced while the server runs, which prevents downtime.
Hot-Swappable
DKIM
DomainKeys Identified Mail
Provides a cryptographic authentication mechanism.
DomainKeys Identified Mail (DKIM)
SPF
Sender Policy Framework
Uses a Domain Name Service (DNS) record published by an organization hosting an email service and identifies the hosts authorized to send emails from that domain.
Sender Policy Framework (SPF)
DMARC
Domain-Based Message Authentication, Reporting, and Conformance
Ensures that DomainKeys Identified Mail (DKIM) and Sender Policy Framework (SPF) are being utilized effectively
Domain-Based Message Authentication, Reporting, and Conformance (DMARC)
When printed pages have a dust-like coating , what component needs to be replaced?
Fuser
How does a Dynamic Host Configuration Protocol (DHCP) reservation work?
By matching a Media Access Control (MAC) address to an Internet Protocol (IP) address within the Dynamic Host Configuration Protocol scope.
PXE
Preboot Execution Environment
Allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator
Preboot Execution Environment (PXE)
Allows windows to reduce ot turn off the power supplied to hardware components to save energy
Power Management
What would you use to configure Preboot Execution Environment (PXE) to set up remote imaging on a computer?
Basic Input/Output SYstem (BIOS) boot options
What would you use to configure Preboot Execution Environment (PXE) to set up remote imaging on a computer?
Basic Input/Output System (BIOS) boot options
Which type of internet connection is terminated at a local switching center and requires a different media type between the switching center and the end customer?
DSL
DSL
Digital Subscriber Line
ACL
Access Control List
A network security device designed to prevent systems or traffic from unauthorized access. Uses Access Control Lists (ACLs) to prevent unauthorized access.
Firewall
A list that shows which traffic or devices should be allowed into or denied from accessing the network
Access Control List (ACL)
IDF
Intermediate Distribution Frame
A free-standing or wall-mounted rack for managing and interconnecting a telecommunications cable end-user devices and the Main Distribution Frame (MDF)
Intermediate Distribution Frame
MDF
Main Distribution Frame
Which Cat cables top speed are 10 Gbps?
Cat 6a
Cat 7
Cat 7a
Which Cat cables top speed are 1 Gbps?
Cat 5e
Cat 6
A protocol that operated at the transport layer to provide connection-oriented, guaranteed delivery of packets.
Transmission Control Protocol (TCP)
TFTP
Trivial File Transfer Protocol
SSH
Secure Shell
A protocol used for remote administration and file copying. (Port 22) Uses authenticated and encrypted sessions for communication.
Secure Shell (SSH)
Why should you disable scheduled defragmentation of a Solid-State Drive?
To increase the lifespan of the Solid-State Drive
TPM
Trusted Platform Module
PAM
Pluggable Authentication Module
FDE
Full Disk Encryption
AES
Advanced Encryption System
A hardware-based cryptographic processing component that is a part of the motherboard
Trusted Platform Module (TPM)
A device that looks like a USB thumb drive and is used as a software key in cryptography
Pluggable Authentication Module (PAM)
A cryptographic algorithm
Advanced Encryption System (AES)
What type of monitor uses fluorescent backlight?
TFT LCD
What is the most commonly used key used to enter the BIOS/UEFI boot order menu?
F12
What technology combines the functionality of a firewall, malware scanner, ad other security appliances into one device?
Unified Threat Management (UTM)