Real Study Card 3 Flashcards

1
Q

What is the purpose of Secure Boot?

A

To prevent malicious and unauthorized apps from loading into the Operating System (OS) during the startup process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What tool is used to verify that a server rack is properly grounded?

A

Multimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RF

A

Radio Frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which service charges its users based on the actual usage of the service resources on an hourly or monthly basis?

A

Metered Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which page description language substitutes speed for higher quality?

A

PostScript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which page description language substitutes substitutes higher quality for speed?

A

Printer Control Language (PCL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PS

A

PostScript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PCL

A

Printer Control Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPP

A

Internet Printing Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A specialized internet protocol for communicating between client devices and printers using the Hypertext Transfer Protocol (HTTP) for data transport.

A

Internet Printing Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which printer setting allows the gathering and arranging of individual sheets or other printed components into a pre-determined sequence? (Printing pages 1, 2, 3, before printing the second copy)

A

Collate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a foul odor indicative of?

A

Distended Capacitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a burning smell indicative of?

A

A bad Power Supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What takes a whole Hypertext Transfer Protocol (HTTP) request from a client, checks it, then forwards it to its destination computer on the internet?

A

Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Prevents unauthorized access to you computer by blocking ports and programs.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Can be used to filter content and websites from reaching a user

A

Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Is used to host and control access to shared files and folders for the organization

A

File Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A server configured with a range of IP addresses to lease

A

Dynamic Host Configuration Protocol (DHCP) server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A server that hosts the database of domain dames and the IP addresses mapped to those names

A

Domain Name System (DNS) server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A server or network appliance used t prevent users from being overwhelmed with spam or junk mail

A

Spam Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A server that collects diagnostic and monitoring data from the hosts and network devices across a given network

A

Syslog Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A server that accepts requests through Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS) for a webpage and delivers the webpage and other requests to the user

A

Web Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DIMM

A

Dual In-Line Memory Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DDR

A

Double Data Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is used to describe scalable provisioning or the capability to provide scalable cloud computing services?
Rapid Elasticity
26
Which printer configuration setting controls the size of the paper used for the print job?
Tray
27
BSOD
Blue Screen of Death
28
MAC
Media Access Control
29
DDoS
Distributed Denial of Service (an attack)
30
POST
Power On Self Test
31
POTS
Plain Old Telephone Service
32
What DNS record is used to associate one domain name as an alias of another? (like beta.diontraining.com and www.diontraining.com referring to the same website)
CNAME
33
What occurs when a router takes request from the internet for a particular application and sends them to a designated host on the local area network?
Port Forwarding
34
NAS
Network Attached Storage
35
IOPS
Input/Output Operations Per Second
36
A measurement of performance used to compare a Hard Disk Drive (HDD) and a Solid-State Drive (SSD)
Input/Output Operations Per Second (IOPS)
37
MFA
Multifactor Authentication
38
SSO
Single Sign-On
39
What does a single beep commonly indicate during the Power On Self Test (POST)
A successful completion of the Power On Self Test (POST)
40
A process when file fragments are put together to speed up file access.
Defragging
41
What can be done to speed up boot time (if needed)?
Defragment the hard drive
42
What are the seven steps of a laser printer's imaging process?
1. Processing 2. Charging 3. Exposing 4. Developing 5. Transferring 6. Fusing 7. Cleaning
43
::1 is an example of a ________ address.
IPv6
44
ECC memory
Error Correcting Code
45
A type of system memory that has built-in error correcting security
Error Correcting Code (ECC)
46
_______ means that a bad HDD can be removed and replaced while the server runs, which prevents downtime.
Hot-Swappable
47
DKIM
DomainKeys Identified Mail
48
Provides a cryptographic authentication mechanism.
DomainKeys Identified Mail (DKIM)
49
SPF
Sender Policy Framework
50
Uses a Domain Name Service (DNS) record published by an organization hosting an email service and identifies the hosts authorized to send emails from that domain.
Sender Policy Framework (SPF)
51
DMARC
Domain-Based Message Authentication, Reporting, and Conformance
52
Ensures that DomainKeys Identified Mail (DKIM) and Sender Policy Framework (SPF) are being utilized effectively
Domain-Based Message Authentication, Reporting, and Conformance (DMARC)
53
When printed pages have a dust-like coating , what component needs to be replaced?
Fuser
54
How does a Dynamic Host Configuration Protocol (DHCP) reservation work?
By matching a Media Access Control (MAC) address to an Internet Protocol (IP) address within the Dynamic Host Configuration Protocol scope.
55
PXE
Preboot Execution Environment
56
Allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator
Preboot Execution Environment (PXE)
57
Allows windows to reduce ot turn off the power supplied to hardware components to save energy
Power Management
58
What would you use to configure Preboot Execution Environment (PXE) to set up remote imaging on a computer?
Basic Input/Output SYstem (BIOS) boot options
59
What would you use to configure Preboot Execution Environment (PXE) to set up remote imaging on a computer?
Basic Input/Output System (BIOS) boot options
60
Which type of internet connection is terminated at a local switching center and requires a different media type between the switching center and the end customer?
DSL
61
DSL
Digital Subscriber Line
62
ACL
Access Control List
63
A network security device designed to prevent systems or traffic from unauthorized access. Uses Access Control Lists (ACLs) to prevent unauthorized access.
Firewall
64
A list that shows which traffic or devices should be allowed into or denied from accessing the network
Access Control List (ACL)
65
IDF
Intermediate Distribution Frame
66
A free-standing or wall-mounted rack for managing and interconnecting a telecommunications cable end-user devices and the Main Distribution Frame (MDF)
Intermediate Distribution Frame
67
MDF
Main Distribution Frame
68
Which Cat cables top speed are 10 Gbps?
Cat 6a Cat 7 Cat 7a
69
Which Cat cables top speed are 1 Gbps?
Cat 5e Cat 6
70
A protocol that operated at the transport layer to provide connection-oriented, guaranteed delivery of packets.
Transmission Control Protocol (TCP)
71
TFTP
Trivial File Transfer Protocol
72
SSH
Secure Shell
73
A protocol used for remote administration and file copying. (Port 22) Uses authenticated and encrypted sessions for communication.
Secure Shell (SSH)
74
Why should you disable scheduled defragmentation of a Solid-State Drive?
To increase the lifespan of the Solid-State Drive
75
TPM
Trusted Platform Module
76
PAM
Pluggable Authentication Module
77
FDE
Full Disk Encryption
78
AES
Advanced Encryption System
79
A hardware-based cryptographic processing component that is a part of the motherboard
Trusted Platform Module (TPM)
80
A device that looks like a USB thumb drive and is used as a software key in cryptography
Pluggable Authentication Module (PAM)
81
A cryptographic algorithm
Advanced Encryption System (AES)
82
What type of monitor uses fluorescent backlight?
TFT LCD
83
What is the most commonly used key used to enter the BIOS/UEFI boot order menu?
F12
84
What technology combines the functionality of a firewall, malware scanner, ad other security appliances into one device?
Unified Threat Management (UTM)