Real Study Card 3 Flashcards

1
Q

What is the purpose of Secure Boot?

A

To prevent malicious and unauthorized apps from loading into the Operating System (OS) during the startup process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What tool is used to verify that a server rack is properly grounded?

A

Multimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RF

A

Radio Frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which service charges its users based on the actual usage of the service resources on an hourly or monthly basis?

A

Metered Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which page description language substitutes speed for higher quality?

A

PostScript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which page description language substitutes substitutes higher quality for speed?

A

Printer Control Language (PCL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PS

A

PostScript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PCL

A

Printer Control Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPP

A

Internet Printing Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A specialized internet protocol for communicating between client devices and printers using the Hypertext Transfer Protocol (HTTP) for data transport.

A

Internet Printing Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which printer setting allows the gathering and arranging of individual sheets or other printed components into a pre-determined sequence? (Printing pages 1, 2, 3, before printing the second copy)

A

Collate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a foul odor indicative of?

A

Distended Capacitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a burning smell indicative of?

A

A bad Power Supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What takes a whole Hypertext Transfer Protocol (HTTP) request from a client, checks it, then forwards it to its destination computer on the internet?

A

Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Prevents unauthorized access to you computer by blocking ports and programs.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Can be used to filter content and websites from reaching a user

A

Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Is used to host and control access to shared files and folders for the organization

A

File Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A server configured with a range of IP addresses to lease

A

Dynamic Host Configuration Protocol (DHCP) server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A server that hosts the database of domain dames and the IP addresses mapped to those names

A

Domain Name System (DNS) server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A server or network appliance used t prevent users from being overwhelmed with spam or junk mail

A

Spam Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A server that collects diagnostic and monitoring data from the hosts and network devices across a given network

A

Syslog Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A server that accepts requests through Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS) for a webpage and delivers the webpage and other requests to the user

A

Web Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DIMM

A

Dual In-Line Memory Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DDR

A

Double Data Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is used to describe scalable provisioning or the capability to provide scalable cloud computing services?

A

Rapid Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which printer configuration setting controls the size of the paper used for the print job?

A

Tray

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

BSOD

A

Blue Screen of Death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

MAC

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DDoS

A

Distributed Denial of Service (an attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

POST

A

Power On Self Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

POTS

A

Plain Old Telephone Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What DNS record is used to associate one domain name as an alias of another? (like beta.diontraining.com and www.diontraining.com referring to the same website)

A

CNAME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What occurs when a router takes request from the internet for a particular application and sends them to a designated host on the local area network?

A

Port Forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

NAS

A

Network Attached Storage

35
Q

IOPS

A

Input/Output Operations Per Second

36
Q

A measurement of performance used to compare a Hard Disk Drive (HDD) and a Solid-State Drive (SSD)

A

Input/Output Operations Per Second (IOPS)

37
Q

MFA

A

Multifactor Authentication

38
Q

SSO

A

Single Sign-On

39
Q

What does a single beep commonly indicate during the Power On Self Test (POST)

A

A successful completion of the Power On Self Test (POST)

40
Q

A process when file fragments are put together to speed up file access.

A

Defragging

41
Q

What can be done to speed up boot time (if needed)?

A

Defragment the hard drive

42
Q

What are the seven steps of a laser printer’s imaging process?

A
  1. Processing
  2. Charging
  3. Exposing
  4. Developing
  5. Transferring
  6. Fusing
  7. Cleaning
43
Q

::1 is an example of a ________ address.

A

IPv6

44
Q

ECC memory

A

Error Correcting Code

45
Q

A type of system memory that has built-in error correcting security

A

Error Correcting Code (ECC)

46
Q

_______ means that a bad HDD can be removed and replaced while the server runs, which prevents downtime.

A

Hot-Swappable

47
Q

DKIM

A

DomainKeys Identified Mail

48
Q

Provides a cryptographic authentication mechanism.

A

DomainKeys Identified Mail (DKIM)

49
Q

SPF

A

Sender Policy Framework

50
Q

Uses a Domain Name Service (DNS) record published by an organization hosting an email service and identifies the hosts authorized to send emails from that domain.

A

Sender Policy Framework (SPF)

51
Q

DMARC

A

Domain-Based Message Authentication, Reporting, and Conformance

52
Q

Ensures that DomainKeys Identified Mail (DKIM) and Sender Policy Framework (SPF) are being utilized effectively

A

Domain-Based Message Authentication, Reporting, and Conformance (DMARC)

53
Q

When printed pages have a dust-like coating , what component needs to be replaced?

A

Fuser

54
Q

How does a Dynamic Host Configuration Protocol (DHCP) reservation work?

A

By matching a Media Access Control (MAC) address to an Internet Protocol (IP) address within the Dynamic Host Configuration Protocol scope.

55
Q

PXE

A

Preboot Execution Environment

56
Q

Allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator

A

Preboot Execution Environment (PXE)

57
Q

Allows windows to reduce ot turn off the power supplied to hardware components to save energy

A

Power Management

58
Q

What would you use to configure Preboot Execution Environment (PXE) to set up remote imaging on a computer?

A

Basic Input/Output SYstem (BIOS) boot options

59
Q

What would you use to configure Preboot Execution Environment (PXE) to set up remote imaging on a computer?

A

Basic Input/Output System (BIOS) boot options

60
Q

Which type of internet connection is terminated at a local switching center and requires a different media type between the switching center and the end customer?

A

DSL

61
Q

DSL

A

Digital Subscriber Line

62
Q

ACL

A

Access Control List

63
Q

A network security device designed to prevent systems or traffic from unauthorized access. Uses Access Control Lists (ACLs) to prevent unauthorized access.

A

Firewall

64
Q

A list that shows which traffic or devices should be allowed into or denied from accessing the network

A

Access Control List (ACL)

65
Q

IDF

A

Intermediate Distribution Frame

66
Q

A free-standing or wall-mounted rack for managing and interconnecting a telecommunications cable end-user devices and the Main Distribution Frame (MDF)

A

Intermediate Distribution Frame

67
Q

MDF

A

Main Distribution Frame

68
Q

Which Cat cables top speed are 10 Gbps?

A

Cat 6a
Cat 7
Cat 7a

69
Q

Which Cat cables top speed are 1 Gbps?

A

Cat 5e
Cat 6

70
Q

A protocol that operated at the transport layer to provide connection-oriented, guaranteed delivery of packets.

A

Transmission Control Protocol (TCP)

71
Q

TFTP

A

Trivial File Transfer Protocol

72
Q

SSH

A

Secure Shell

73
Q

A protocol used for remote administration and file copying. (Port 22) Uses authenticated and encrypted sessions for communication.

A

Secure Shell (SSH)

74
Q

Why should you disable scheduled defragmentation of a Solid-State Drive?

A

To increase the lifespan of the Solid-State Drive

75
Q

TPM

A

Trusted Platform Module

76
Q

PAM

A

Pluggable Authentication Module

77
Q

FDE

A

Full Disk Encryption

78
Q

AES

A

Advanced Encryption System

79
Q

A hardware-based cryptographic processing component that is a part of the motherboard

A

Trusted Platform Module (TPM)

80
Q

A device that looks like a USB thumb drive and is used as a software key in cryptography

A

Pluggable Authentication Module (PAM)

81
Q

A cryptographic algorithm

A

Advanced Encryption System (AES)

82
Q

What type of monitor uses fluorescent backlight?

A

TFT LCD

83
Q

What is the most commonly used key used to enter the BIOS/UEFI boot order menu?

A

F12

84
Q

What technology combines the functionality of a firewall, malware scanner, ad other security appliances into one device?

A

Unified Threat Management (UTM)