Things wrong on Mock Exams Flashcards

1
Q

Do OLED displays have brighter or dimmer brightness in comparison to LEDs?

A

Dimmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A ______ display does not need a backlight

A

OLED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a docking station

A

Something that plugs into a laptop to provide additional functionality. You plug the laptop into the docking station, and the docking station into your peripherals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the difference between a docking station and port replicator

A

Docking stations tend to be proprietary and docking stations tend to have less features and peripheral ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an expansion slot

A

An expansion slot refers to any of the slots on a motherboard that can hold an expansion card to expand the computer’s functionality, like a video card, network card, or sound card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the device used to extend an internet signal without quality loss

A

A repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a network bridge
What layer is it
Does it typically have more or less connections than a switch

A

A device used to connect two network segments together as though they were all on the same network. This includes broadcast and collision domains.
Level 2
Switches typically have more connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If someone says they have a cable modem, what is it safe to assume they use between TP, Fiber, or Coax.

A

Coax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a collision domain

A

A network in which two computer’s data can collide on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What device can be used to avoid network collissions

A

Switches, as they create a point to point connection with the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the name of the feature that enables ethernet over powerlines. Not POE.

A

Power-line communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of uPnP

A

Automatic configuration and discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name three wifi security standards and then rank them best to worst

A

WEP, WPA, WPS
Wifi protected access is best
Wifi protected setup sucks but is second
Wired equivalent privacy is bayd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SNAT

A

Mapping a single, routable IP address to a single internal machine on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What Ghz is 802.11b

A

2.4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the speed and ghz of 802.11ac

A

5.0, 6.77 gbps

17
Q

What is a wi-fi channel and how many do 2.4 and 5.0 ghz have

A

Within the bands of 2.4Ghz and 5.0 Ghz, there are channels.
2.4 has 11 - 20 mhz
5.0 has 45 - 20, 40, 80 mhz
When multiple networks run on the same channel, it can cause interference. Likewise, being on a channel close to another active channel can also cause interference.

All in all, it’s best to keep far away from other channels.

18
Q

What is channel bonding

A

This is when you combine multiple channels to gain more bandwidth for your network

19
Q

What is wifi channel overlapping

A

wifi channels, despite being different channels, overlap somewhat.

See here
https://reolink.com/blog/5-8ghz-wireless-security-camera/
Look for the “humps”

Because some channels overlap more than others, it is suggested not to use them. The ones on either end and middle are usually the better picks.

20
Q

Which would use wider and thinner channels between 2.4 and 5.0

A

2.4 would need thinner due to there not being many channels and therefore more overlap. (20mhz)
5.0 would need thicker channel thickness due to there being 45 channels and therefore less overlap chance. (20,40,80)

21
Q

Which would use wider and thinner channels between 2.4 and 5.0

A

2.4 would need thinner due to there not being many channels and therefore more overlap. (20mhz)
5.0 would need thicker channel thickness due to there being 45 channels and therefore less overlap chance. (20,40,80)

22
Q

A client is unable to access any servers on their network, or the internet at large. You know it isn’t a wiring, wifi or server issue. All other computers on the network are working just fine. What hardware issue could cause this? (Not the NIC)

A

Cmos battery dead. Incorrect time settings can cause internet shutdowns.

23
Q

What is the first thing to do if someone calls up and says their computer won’t even power on?

A

Removing all plugged in peripherals and devices from the computer.

24
Q

A client calls up, unable to see their computer on their monitor. You go through some troubleshooting and find the cables are all fine. What’s the next thing to try?

A

Check the monitor input channel

25
Q

Which of these support video AND audio?

S/PDIF
DVI
VGA
HDMI
DisplayPort
A

DisplayPort
HDMI

26
Q

What speed is usb 3.2

A

USB 3 - 5 gbps
3.1 10gbps
3.2 40 gbps

27
Q

What is the cable lengths of:
Low-speed
Full-Speed
High-speed
SuperSpeed

A

Low-speed 3
Full-Speed 5
High-speed 5
SuperSpeed 3

28
Q

On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.

A MDM policy
B Login script
C Group Policy
D Directory permissions

A

B Login script

29
Q

Which of the following statements are true? (Select 2 answers)

NTFS permissions apply only to local users
NTFS permissions can be applied only on a folder level
NTFS permissions apply to both network and local users 
NTFS permissions can be applied to a folder or individual file
A

NTFS permissions apply to both network and local users
NTFS permissions can be applied to a folder or individual file

30
Q

What is DLP (security term)

A

DLP, or Data Loss Prevention, is a cybersecurity solution that detects and prevents data breaches. Since it blocks extraction of sensitive data, organizations use it for internal security and regulatory compliance.

31
Q

What is an important thing to do when you are re-mapping someone’s drive?

A

Ask if they’ve changed their password recently. If so, clear their windows credential cache.