We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7
IDENTIFICATION
___________________1. Which IP address allows a virtual machine to connect over a
physical network? Private Address ___________________2. Where was the BIOS originally stored in early PCs? Read- Only (ROM) ___________________3. Where can you find the Windows Update and security options in Windows 7? Setting ___________________4. What voltages does the ATX12V P1 connector supply to the motherboard? 3.3 V, 5V, 12V ___________________5. What standard defines a structured cabling system for commercial buildings and connections between buildings in campus settings? ANSI/TIA-568 ___________________6. What is the wireless alternative to a wired connection that uses radio frequencies to send signals between devices and a router? Wireless Fidelity ___________________7. What do you call a computer network formed by interconnecting local area networks (LANs) within a limited geographical area, such as corporate buildings? Campus Area Network ___________________8. What term describes a complete copy of everything stored on an optical disc? ISO Image ___________________9. Which of these networks connects multiple local area networks? Wide Area Network (WAN) ___________________10. What software is used to detect and eliminate threats to the system? Anti-virus software ___________________11. What type of network version verifies users through a server, requiring a more complex setup while providing enhanced security? -WPA2- Enterprise ___________________12. Which command-line tool is used to determine the IP address that matches a given host or domain name? Nslookup ___________________13. What protocol provides automated and centralized management for distributing IP addresses on a network? Dynamic Host Control Protocol (DHCP) ___________________14. What process involves scanning, identifying, diagnosing, and fixing problems in software? Debugging ___________________15. What identifies a specific process to which a network message is directed when it arrives at a server? Port Number ___________________16. What is the name of the red wire voltage in a power supply? +5v ___________________17. What is the required minimum storage capacity for Windows 10? 16GB for 32-bit or 20 GB for 64-bit OS ___________________18. What version of network security uses passwords to prevent unauthorized access? WPA2-Personal ___________________19. What device needs to be upgraded to send and receive strong signals between computers? Network Card ___________________20. What term describes an information asset that has suffered damage, unintended changes, or unauthorized exposure? Loss ___________________21. What issue might a computer have if its time and date keep resetting even after adjustments in the BIOS? CMOS Battery Failure ___________________22. In Windows 7, what does a red cross on the LAN icon indicate? LAN driver issue ___________________23. What type of network connects two or more PCs without going through a server? Peer to peer Network ___________________24. What do matrices and capability tables govern? Access Control List ___________________25. Which memory is used in Solid-State Drives (SSDs) for storage? Flash Memory ___________________26. In networking, what term describes a set of related information transferred across a network? Packet ___________________27. What class does the IP address 172.168.10.1 belong to? Class B ___________________28. Which IP address does a virtual machine use to communicate over the physical network? Private Address ___________________29. What is the voltage rating of the yellow wire in a power supply? +12v ___________________30. How many lights does the Light Emitting Diode (LED) in a Network Interface Card (NIC) have? 2 ___________________31. What method allows you to create a list of devices permitted to connect to a Wi-Fi network? Core ___________________32. What type of network allows users to maintain a connection while moving within a specified area? MAC Address Filtering ___________________33. What is a 24-pin USB connector system that features a rotationally symmetrical design? Extreme Universal Serial Bus (USB) ___________________34. What component enables communication between the CPU and other devices within the system? Bus ___________________35. What color is commonly associated with a USB 3.0 connector? blue ___________________36. Where are Windows device drivers stored? Registry ___________________37. What happens when someone steals data and demands compensation for its return? Data Extortion ___________________38. What is a network cable called with T568-A at one end and T568-B at the other? Cross Over cable ___________________39. What is the meaning of the trademark "Wi-Fi"? IEEE 802.11 ___________________40. Which networking device forwards data between networks? Router ___________________41. What hardware allows computers to connect to a network? Network Interface Card ___________________42. What term describes the application of network address translation (NAT) that redirects communication requests from one address and port number to another? Forwarding ___________________43. In Server 2008, what does a yellow color indicator on the Local Area Network (LAN) connection icon signify? No connectivity ___________________44. What is the name of the Microsoft management console extension used to manage hardware devices, including drivers? Device Manager ___________________45. What is the term for a collection of devices in one physical location? Local Area Network (LAN) ___________________46. What is the maximum allowable length for a USB 2.0 cable? 5 meters ___________________47. Who is responsible for monitoring network security, operations, and users? Network Administrator ___________________48. What is the first step to take after planning to resolve a network issue? Implementing the Solution ___________________49. What kind of router is designed to function in the Internet backbone? Bridge ___________________50. What clustering technology distributes client requests across multiple servers with replicated setups? Network Load Balancing ___________________51. What do you call an automated software program that executes commands upon receiving specific inputs? Bot ___________________52. What is another name for a disc image? ISO Image ___________________53. What compound is used to prevent the CPU from overheating? Thermal Paste ___________________54. What type of server is used for storing user documents with a large amount of memory and storage space? File Server ___________________55. What term refers to the interconnection of LANs in a city spanning 5 to 50 kilometers? Metropolitan Area Network ___________________56. What is the name for a Yost cable, Cisco cable, and Console cable? Roll-Over ___________________57. Which software program is stored in Read-Only Memory (ROM)? Firmware ___________________58. What are the minimum RAM requirements for a computer running Windows 10? 1 gigabyte (GB) for 32-bit or 2 GB for 64-bit ___________________59. Which protocol is the most efficient for transferring large files? File Transfer Protocol ___________________60. What tool assesses the condition of a hard drive, indicating status as "Good," "Caution," or "Bad"? CrystalDisk Info ___________________61. What network security standard aims to speed up connections between routers and wireless devices? WPS ___________________62. What method is used to gain unauthorized access to computers by sending messages with a forged source IP address? Spoofing ___________________63. Which type of server facilitates central management of network users and resources? Directory Server ___________________64. What type of log file helps conserve disk space by limiting the growth of performance log files? Circular Logging ___________________65. What enables administrators to specify which types of files can be saved in a Windows folder? File Classification Instruction ___________________66. What is the name of the enterprise-level backup and recovery software suite? NetBackUp ___________________67. Which type of network connects devices using signals like infrared? Wireless Personal Area Network ___________________68. In BIOS/UEFI, which option is used to enable overclocking of the computer? Voltage Basic Input Output System (BIOS) ___________________69. What is the minimum byte capacity required for a bootable flash drive when installing Windows 10? 8GB ___________________70. What is the minimum RAM requirement for Server 2012 R2? 2GB ___________________71. What type of router connects an internal network to an external network? Edge ___________________72. What term refers to the maximum data transfer rate for an internet connection? Bandwidth ___________________73. What type of high-speed network or subnetwork consists of hosts interconnected using various technologies and topologies? Local Area Network ___________________74. What device acts as a border router connecting corporate sites to wired access lines? Customer Premises Equipment (CPE) ___________________75. What process involves verifying a user‛s identity? AUTHENTICATION ___________________76. What type of server occupies a significant portion of the computing space between the database server and the end user? Application Server ___________________77. In security contexts, what term refers to the privileges or permissions assigned for accessing computer data or resources? Access ___________________78. What type of media used in 10-megabit Ethernet consists of broadband coaxial cable carrying multiple baseband channels and has a maximum length of 3,600 meters? 10BASE-5 ___________________79. What network security system monitors and regulates incoming and outgoing network traffic based on pre-established security rules? Firewall ___________________80. What term is used to describe a system that is not currently available? Downtime ___________________81. What is the minimum byte capacity required for a bootable flash drive when installing Windows 10? 8GB ___________________82. What component enables communication between the CPU and other devices within the system? Bus ___________________83. What standard defines a structured cabling system for commercial buildings and connections between buildings in campus settings? ANSI/TIA-568 ___________________84. What process involves verifying a user‛s identity? Authentication ___________________85. What is a 24-pin USB connector system that features a rotationally symmetrical design? Extreme Universal Serial Bus (USB) ___________________86. What class does the IP address 172.168.10.1 belong to? Class B ___________________87. Where can you find the Windows Update and security options in Windows 7? Control Panel > System and Security > Windows Update ___________________88. What voltages does the ATX12V P1 connector supply to the motherboard? 3.3V, 5V, 12V ___________________89. In networking, what term describes a set of related information transferred across a network? ___________________90. What type of high-speed network or subnetwork consists of hosts interconnected using various technologies and topologies? Local Area Network (LAN) or Metropolitan Area Network (MAN) ___________________91. What term refers to the maximum data transfer rate for an internet connection? Bandwidth ___________________92. What reading would you get from a voltmeter when checking a shorted diode? Zero Volt ___________________93. What term describes ensuring that data is changed only in authorized ways? Integrity ___________________94. In Windows 7, what indicator shows that a video driver has not been installed? Only standard video is displayed ___________________95. What interface standard, also known as IEEE 1394, is used for high-speed communication and is often referred to as a serial bus? Firewire ___________________96. What device serves as a bridge between wireless clients and a wired network? Access Point ___________________97. What hardware device allows serial devices to connect across a network? Terminal Server ___________________98. What network security system monitors and regulates incoming and outgoing network traffic based on pre-established security rules? Firewall ___________________99. What type of router connects an internal network to an external network? Gateway Router or Edge Router ___________________100. What device acts as a border router connecting corporate sites to wired access lines? Border Router ___________________101. What type of server occupies a significant portion of the computing space between the database server and the end user? Application Server ___________________102. What is the minimum RAM requirement for Windows Server 2008 R2? 1GB ___________________103. Which text-based command is used to create a bootable flash drive? Diskpart ___________________104. In security contexts, what term refers to the privileges or permissions assigned for accessing computer data or resources? ___________________105. What media type used in 10-megabit Ethernet consists of broadband coaxial cable carrying multiple baseband channels and has a maximum length of 3,600 meters? 10BASE-5 ___________________106. What term is used to describe a system that is not currently available? Downtime ___________________107. In BIOS/UEFI, which option is used to enable overclocking of the computer? Voltage Basic Input Output System (BIOS) ___________________108. What is the minimum RAM requirement for Server 2012 R2? 2GB ___________________109. What microchip manages data communication between the CPU and motherboard? Input/Output Controller Hub ___________________110. What type of attack involves executing viruses, worms, and other malicious scripts with the intent to harm or steal information? Malicious Code ___________________111. What is the term for a logical subnetwork that groups devices connected to the same network switch? Virtual Local Area Network ___________________112. What process involves joining two cable ends together? Cable Splicing ___________________113. What is the term for the time delay between when data is sent and when it is received? Latency ___________________114. What term refers to a set of rules that govern the interaction between software and hardware in a network? Communication Protocol ___________________115. Which option in UEFI/BIOS allows for security features such as tracking and locating the device? LoJack ___________________116. What type of server, previously known as Internet Relay Chat (IRC) Servers, allows users to exchange information in real-time? Real Time Communication Server ___________________117. What term describes pushing a system component to its operational limits? Stress Test ___________________118. How many devices can typically connect to a wireless router? 250 ___________________119. The IP address 10.10.10.1 belongs to which IP address class? CLASS A ___________________120. Which command-line utility displays active network connections and TCP routing tables? Netstart