Volume 1 Flashcards
What part of client systems includes the physical aspect of computers, telecommunications, and other devices, to include the interconnect devices?
Hardware
What entails how we communicate and manage data?
Information systems
What devices are mostly small, lightweight, and designed for mobile use?
Handhelds
Any hardware added to a computer that expands its capabilities is referred to as a/an
Peripheral
Which of the following is not one of the three types of interfaces?
A. Graphical
B. Hardware
C. Software
D. User
A. Graphical
The transfer of eight bits of data simultaneously through eight separate lines in a single cable is a function of a
Parallel port
What program translates commands between a device and the programs that use the device?
Driver
The term used to refer to the process of launching the operating system is the
Boot strap
What program sets up the divisions of memory that hold the operating system, user information and applications?
The bootstrap loader
What describes how a computer finds a specific byte it is looking for in memory?
Memory addressing
How many bits long are the addresses that computer instructions work with?
16
Which type of memory stores configuration information, and is used by the BIOS during system boot up?
Complementary metal-oxide semiconductor memory (CMOS)
What type of memory is non-volatile, considered permanent, and is also called firmware in reference to the data and instructions stored?
Read only memory (ROM)
This type of memory is blank and instructions can be placed on permanently.
Programmable ROM (PROM)
Which type of memory is used to duplicate frequently used information stored elsewhere or computed earlier, because the original data is time consuming to retrieve or to compute?
Cache
Which term describes that data is whole or complete?
A. Driver
B. Parity Bit
C. Data Integrity
D. Error Correction
C. Data integrity
Which is a very simple example of an error detecting code?
Parity bit
What data integrity method is used in high end personal computers and file servers?
Error correction code memory
Reading and storing a document on a hard disk or some other storage medium for processing at a more convenient time is called
Spooling
A spooled print job be several times larger than the printed document size because of the conversion to the
Printer’s language
A static Internet protocol address on a network printer during hardware configuration is used for
Print job locating
Printer hardware configuration via the web is done through
Hypertext transfer protocol
What type of printer software configuration option requires a new port to be created?
TCP/IP printing
Which of these is not a prominent characteristic of an operating system?
A. The operational environment
B. The way it processes
C. The user interface
D. Multitasking
B. The way it processes
Which of the below is not a type of computer user interface?
A. Application driven interface
B. Command driven interface
C. Graphical user interface
D. Menu driven interface
A. Application driven interface
Which hardware requirement is defined as the model and the clock speed of the CPU?
Processing power
What should be done after anything else, once the operating system installation is complete?
Install antivirus
The specifications that should be met, if not exceeded, to ensure a computer is compatible as well as powerful enough to run an operating system without constant problems is for the computer to have the minimum
Hardware
What are minor software updates or improvements called?
Patches
What is the simplest and most efficient way to duplicate a computer software, with no loss of files or configurations within the programs?
Imaging software
How many byte sectors is a hard disk divided into?
512
The first sector at the beginning of a hard drive is called the master
Boot record
A formatted disk partition that is used for a particular file system is called
A volume
Which file system is the best choice for data storage if the server is a dedicated Windows server?
NTFS (new technology file system)
By default, the first domain controller in active directory service is a
Global catalog
Which of these is a disadvantage of client-server networks?
A. A high level of security can be implemented at the server
B. Users are relieved of the burden of managing resources
C. Managing servers requires a dedicated staff
D. More powerful resources can be shared
C. Managing servers requires a dedicated staff
What type of remote network provides a private tunnel through public cloud (the Internet)?
Virtual private network (VPN)
What physical structure component is a collection of Internet protocol subnet ranges?
Site
What form of remote network access is often the only choice for rural or remote access?
Dial-Up
What does Wi-Fi use to carry network signals to the network access point?
Radio Waves
What item below is not found in he Active Directory structure?
A. Domains
B. Objects
C. Forests
D. Wi-Fi
D. Wi-Fi
What is configured to provide or deny users access to service on a local computer or on the local network/domain?
Profile
User accounts are uniquely identified by the
SID (Security Identifier)
Groups in active directory are directory
Objects
Members of this group have full control of the server or individual workstations and can assign user rights and access control permissions.
Local Administrators
Which item resides on a domain controller and provides access to network resources throughout the domain?
Domain Groups
What is used to organize different types of accounts into manageable units?
A Group
What is installed on a computer to act as the interface between the computer and network?
NIC (Network Interface Card)
What is the unique identification number a NIC provides to a personal computer?
MAC Address
How many connector interfaces does a NIC provide for network cables?
4
What software activates the actual transmission and receipt of data over the network?
Network interface drivers
Which information is not required when configuring TCP/IP?
A. Domain name system server address
B. Media Access Control Address
C. Internet protocol address
D. Administrator access
B. Media Access Control Address
What stores print jobs in a print queue until a printer becomes available?
Print Server
Which is not a transmission medium for a wireless local area network?
A. Microwaves
B. Fiber optics
C. Radio
D. Light
B. Fiber optics
On a network, what system manages network resources, allows other resources to be shared across the network, and provides the security necessary in a multi-user environment?
NOS (Network Operating System)
In a network environment, what may be responsible for all or some of the network operational tasks?
Server
What are the two major ways to implement a client server network?
Thick/Thin
What access control uses segregation of duties and security screening for users?
Administrative
The public key infrastructure component that would be necessary if the private key of a keyholder was compromised is referred to as the certificate
Revocation
What is an electronic credit card-like device that establishes your credentials when doing business or other transactions on the Internet?
Digital certificate
How does a router send information to the Internet on a wireless network?
An Ethernet connection
What device receives information from the Internet and translates it into a radio signal and sends it to the computer’s wireless adapter?
Router
What piece of equipment is at the core of most Wi-Fi networks?
Router/access point
If this security feature is enabled on a wireless network, access points or routers perform additional checks, helping prevent network break-ins.
MAC filtering
What drives faster processing speeds and increases the power of many computers and communication devices?
Nanotechnology
How much power does a NAND drive require?
<2 watts
What technology involves the capture and storage of a distinctive, measurable characteristic, feature, or trait of an individual for later recognition by automated means?
Biometrics
Which is not a valid form of identity management?
A. Iris
B. Hair
C. Palm
D. Voice
B. Hair
What protocol provides an almost unlimited number of Internet protocol addresses?
IPv6
Which is not a basic function of antivirus programs?
A. Removal
B. Scanning
C. Detection
D. Vaccination
B. Scanning
Who centrally manages the Air Force server updates that keep your workstation antivirus software current?
Air Force network operations center (AFNOC)
Which patch will prevent exploitation and remove or mitigate any threat’s capability to exploit a specific vulnerability in an asset, and is the primary method of fixing vulnerabilities in software?
Software patch
What item is a means by which Windows products are updated and kept current?
Security packs
Which Air Force instruction governs software use?
33-114
With a software license agreement, who has the full rights to the software and its further distribution and reproduction?
The publisher
What is an essential tool for any client systems technician to find software approved for use on an Air Force network?
Evaluated/approved product list (E/APL)
What is one of the best habits a client systems technician can form in order to save time, effort and prevent mistakes?
Getting organized
Which logical troubleshooting step would include classifying the problem as hardware or software related?
Isolate the problem
The most common hardware diagnostic tool is the
Loopback plug
In network troubleshooting, any event that has a negative effect on the service of the network is referred to as a
Fault
The action that involves localization and identification of irregularities that cause a fault to be registered is referred to as fault
Diagnosis
Which item is not a good practice in helping with future troubleshooting?
A. Remembering every step taken
B. Knowing your network
C. Documentation
D. Gathering facts
A. Remembering every step taken
Within how many bytes of a transmission should a network interface card sense a collision?
64 bytes
What function enables the higher layer protocol data units to fit into the lower layer PDU for transmission across the network?
Fragmentation
Which is not a way in which round trip delay can be determined?
Maximum delay
Which alarm category in the network management system indicates a warning?
Cyan
Which type of network is often called the GigE network?
1000 BaseT
What percentage of all network problems occur at the data link and physical layers of the open systems interconnect reference model?
60%
What piece of test equipment can help verify connectivity and identify shorts, reversed, crossed or split pairs on a network?
Local-area network tester
What tool can launch individual troubleshooting/configuration programs and other utilities having to do with networking, video display, printers, sound, and email configuration on an operating system?
Control Panel
Which tool lists all installed device drivers and their status, find hardware components that are not functioning properly or two devices that are in conflict on an operating system (OS)?
Device manager
This operating system tool allows the viewing of the number of sent packets, status, total connection time, and speed of a network.
Network connections
Which fault isolation technique may entail checking the cable connections as well as reseating devices and checking all switches and settings for devices?
Check hardware devices
When troubleshooting after a system failure, this step is a last resort effort when all other avenues have been exhausted.
Remove and replace the operating system
This practice using tapes, electronic vaulting, or mirrored disks and should be done regularly.
Data backup
Which media has a storage capacity of gigabyte (GB) - terabyte (TB), has a slow to moderate speed and is moderately expensive?
Tape
Which backup type is not clear archive flags once the backup job is complete?
Differential
Which cleaning process overwrites all addressable locations with binary zeros, then binary ones, and overwrites all addressable locations with any character on sealed disk drives, hard disks and drives?
Clearing
Which item is not an optical storage media?
A. CD-ROM
B. Core optical disk
C. Worm optical disk
D. Erasable optical disk
B. Core optical disk
This is an authorized method of cleaning and sanitizing many types of magnetic media.
Overwrite