Volume 1 Flashcards

0
Q

What part of client systems includes the physical aspect of computers, telecommunications, and other devices, to include the interconnect devices?

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What entails how we communicate and manage data?

A

Information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What devices are mostly small, lightweight, and designed for mobile use?

A

Handhelds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any hardware added to a computer that expands its capabilities is referred to as a/an

A

Peripheral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not one of the three types of interfaces?

A. Graphical
B. Hardware
C. Software
D. User

A

A. Graphical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The transfer of eight bits of data simultaneously through eight separate lines in a single cable is a function of a

A

Parallel port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What program translates commands between a device and the programs that use the device?

A

Driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The term used to refer to the process of launching the operating system is the

A

Boot strap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What program sets up the divisions of memory that hold the operating system, user information and applications?

A

The bootstrap loader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What describes how a computer finds a specific byte it is looking for in memory?

A

Memory addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many bits long are the addresses that computer instructions work with?

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of memory stores configuration information, and is used by the BIOS during system boot up?

A

Complementary metal-oxide semiconductor memory (CMOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of memory is non-volatile, considered permanent, and is also called firmware in reference to the data and instructions stored?

A

Read only memory (ROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This type of memory is blank and instructions can be placed on permanently.

A

Programmable ROM (PROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of memory is used to duplicate frequently used information stored elsewhere or computed earlier, because the original data is time consuming to retrieve or to compute?

A

Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which term describes that data is whole or complete?

A. Driver
B. Parity Bit
C. Data Integrity
D. Error Correction

A

C. Data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which is a very simple example of an error detecting code?

A

Parity bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What data integrity method is used in high end personal computers and file servers?

A

Error correction code memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Reading and storing a document on a hard disk or some other storage medium for processing at a more convenient time is called

A

Spooling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A spooled print job be several times larger than the printed document size because of the conversion to the

A

Printer’s language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A static Internet protocol address on a network printer during hardware configuration is used for

A

Print job locating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Printer hardware configuration via the web is done through

A

Hypertext transfer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What type of printer software configuration option requires a new port to be created?

A

TCP/IP printing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of these is not a prominent characteristic of an operating system?

A. The operational environment
B. The way it processes
C. The user interface
D. Multitasking

A

B. The way it processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the below is not a type of computer user interface?

A. Application driven interface
B. Command driven interface
C. Graphical user interface
D. Menu driven interface

A

A. Application driven interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which hardware requirement is defined as the model and the clock speed of the CPU?

A

Processing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What should be done after anything else, once the operating system installation is complete?

A

Install antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The specifications that should be met, if not exceeded, to ensure a computer is compatible as well as powerful enough to run an operating system without constant problems is for the computer to have the minimum

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are minor software updates or improvements called?

A

Patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the simplest and most efficient way to duplicate a computer software, with no loss of files or configurations within the programs?

A

Imaging software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How many byte sectors is a hard disk divided into?

A

512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The first sector at the beginning of a hard drive is called the master

A

Boot record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A formatted disk partition that is used for a particular file system is called

A

A volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which file system is the best choice for data storage if the server is a dedicated Windows server?

A

NTFS (new technology file system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

By default, the first domain controller in active directory service is a

A

Global catalog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of these is a disadvantage of client-server networks?

A. A high level of security can be implemented at the server
B. Users are relieved of the burden of managing resources
C. Managing servers requires a dedicated staff
D. More powerful resources can be shared

A

C. Managing servers requires a dedicated staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What type of remote network provides a private tunnel through public cloud (the Internet)?

A

Virtual private network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What physical structure component is a collection of Internet protocol subnet ranges?

A

Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What form of remote network access is often the only choice for rural or remote access?

A

Dial-Up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What does Wi-Fi use to carry network signals to the network access point?

A

Radio Waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What item below is not found in he Active Directory structure?

A. Domains
B. Objects
C. Forests
D. Wi-Fi

A

D. Wi-Fi

41
Q

What is configured to provide or deny users access to service on a local computer or on the local network/domain?

A

Profile

42
Q

User accounts are uniquely identified by the

A

SID (Security Identifier)

43
Q

Groups in active directory are directory

A

Objects

44
Q

Members of this group have full control of the server or individual workstations and can assign user rights and access control permissions.

A

Local Administrators

45
Q

Which item resides on a domain controller and provides access to network resources throughout the domain?

A

Domain Groups

46
Q

What is used to organize different types of accounts into manageable units?

A

A Group

47
Q

What is installed on a computer to act as the interface between the computer and network?

A

NIC (Network Interface Card)

48
Q

What is the unique identification number a NIC provides to a personal computer?

A

MAC Address

49
Q

How many connector interfaces does a NIC provide for network cables?

A

4

50
Q

What software activates the actual transmission and receipt of data over the network?

A

Network interface drivers

51
Q

Which information is not required when configuring TCP/IP?

A. Domain name system server address
B. Media Access Control Address
C. Internet protocol address
D. Administrator access

A

B. Media Access Control Address

52
Q

What stores print jobs in a print queue until a printer becomes available?

A

Print Server

53
Q

Which is not a transmission medium for a wireless local area network?

A. Microwaves
B. Fiber optics
C. Radio
D. Light

A

B. Fiber optics

54
Q

On a network, what system manages network resources, allows other resources to be shared across the network, and provides the security necessary in a multi-user environment?

A

NOS (Network Operating System)

55
Q

In a network environment, what may be responsible for all or some of the network operational tasks?

A

Server

56
Q

What are the two major ways to implement a client server network?

A

Thick/Thin

57
Q

What access control uses segregation of duties and security screening for users?

A

Administrative

58
Q

The public key infrastructure component that would be necessary if the private key of a keyholder was compromised is referred to as the certificate

A

Revocation

59
Q

What is an electronic credit card-like device that establishes your credentials when doing business or other transactions on the Internet?

A

Digital certificate

60
Q

How does a router send information to the Internet on a wireless network?

A

An Ethernet connection

61
Q

What device receives information from the Internet and translates it into a radio signal and sends it to the computer’s wireless adapter?

A

Router

62
Q

What piece of equipment is at the core of most Wi-Fi networks?

A

Router/access point

63
Q

If this security feature is enabled on a wireless network, access points or routers perform additional checks, helping prevent network break-ins.

A

MAC filtering

64
Q

What drives faster processing speeds and increases the power of many computers and communication devices?

A

Nanotechnology

65
Q

How much power does a NAND drive require?

A

<2 watts

66
Q

What technology involves the capture and storage of a distinctive, measurable characteristic, feature, or trait of an individual for later recognition by automated means?

A

Biometrics

67
Q

Which is not a valid form of identity management?

A. Iris
B. Hair
C. Palm
D. Voice

A

B. Hair

68
Q

What protocol provides an almost unlimited number of Internet protocol addresses?

A

IPv6

69
Q

Which is not a basic function of antivirus programs?

A. Removal
B. Scanning
C. Detection
D. Vaccination

A

B. Scanning

70
Q

Who centrally manages the Air Force server updates that keep your workstation antivirus software current?

A

Air Force network operations center (AFNOC)

71
Q

Which patch will prevent exploitation and remove or mitigate any threat’s capability to exploit a specific vulnerability in an asset, and is the primary method of fixing vulnerabilities in software?

A

Software patch

72
Q

What item is a means by which Windows products are updated and kept current?

A

Security packs

73
Q

Which Air Force instruction governs software use?

A

33-114

74
Q

With a software license agreement, who has the full rights to the software and its further distribution and reproduction?

A

The publisher

75
Q

What is an essential tool for any client systems technician to find software approved for use on an Air Force network?

A

Evaluated/approved product list (E/APL)

76
Q

What is one of the best habits a client systems technician can form in order to save time, effort and prevent mistakes?

A

Getting organized

77
Q

Which logical troubleshooting step would include classifying the problem as hardware or software related?

A

Isolate the problem

78
Q

The most common hardware diagnostic tool is the

A

Loopback plug

79
Q

In network troubleshooting, any event that has a negative effect on the service of the network is referred to as a

A

Fault

80
Q

The action that involves localization and identification of irregularities that cause a fault to be registered is referred to as fault

A

Diagnosis

81
Q

Which item is not a good practice in helping with future troubleshooting?

A. Remembering every step taken
B. Knowing your network
C. Documentation
D. Gathering facts

A

A. Remembering every step taken

82
Q

Within how many bytes of a transmission should a network interface card sense a collision?

A

64 bytes

83
Q

What function enables the higher layer protocol data units to fit into the lower layer PDU for transmission across the network?

A

Fragmentation

84
Q

Which is not a way in which round trip delay can be determined?

A

Maximum delay

85
Q

Which alarm category in the network management system indicates a warning?

A

Cyan

86
Q

Which type of network is often called the GigE network?

A

1000 BaseT

87
Q

What percentage of all network problems occur at the data link and physical layers of the open systems interconnect reference model?

A

60%

88
Q

What piece of test equipment can help verify connectivity and identify shorts, reversed, crossed or split pairs on a network?

A

Local-area network tester

89
Q

What tool can launch individual troubleshooting/configuration programs and other utilities having to do with networking, video display, printers, sound, and email configuration on an operating system?

A

Control Panel

90
Q

Which tool lists all installed device drivers and their status, find hardware components that are not functioning properly or two devices that are in conflict on an operating system (OS)?

A

Device manager

91
Q

This operating system tool allows the viewing of the number of sent packets, status, total connection time, and speed of a network.

A

Network connections

92
Q

Which fault isolation technique may entail checking the cable connections as well as reseating devices and checking all switches and settings for devices?

A

Check hardware devices

93
Q

When troubleshooting after a system failure, this step is a last resort effort when all other avenues have been exhausted.

A

Remove and replace the operating system

94
Q

This practice using tapes, electronic vaulting, or mirrored disks and should be done regularly.

A

Data backup

95
Q

Which media has a storage capacity of gigabyte (GB) - terabyte (TB), has a slow to moderate speed and is moderately expensive?

A

Tape

96
Q

Which backup type is not clear archive flags once the backup job is complete?

A

Differential

97
Q

Which cleaning process overwrites all addressable locations with binary zeros, then binary ones, and overwrites all addressable locations with any character on sealed disk drives, hard disks and drives?

A

Clearing

98
Q

Which item is not an optical storage media?

A. CD-ROM
B. Core optical disk
C. Worm optical disk
D. Erasable optical disk

A

B. Core optical disk

99
Q

This is an authorized method of cleaning and sanitizing many types of magnetic media.

A

Overwrite