0% found this document useful (0 votes)
19 views

Reviewer Identification 1 120 Items Answer Key

Uploaded by

Jay Macz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Reviewer Identification 1 120 Items Answer Key

Uploaded by

Jay Macz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

IDENTIFICATION

___________________1. Which IP address allows a virtual machine to connect over a


physical network? Private Address
___________________2. Where was the BIOS originally stored in early PCs? Read-
Only (ROM)
___________________3. Where can you find the Windows Update and security
options in Windows 7? Setting
___________________4. What voltages does the ATX12V P1 connector supply to the
motherboard? 3.3 V, 5V, 12V
___________________5. What standard defines a structured cabling system for
commercial buildings and connections between buildings in campus settings?
ANSI/TIA-568
___________________6. What is the wireless alternative to a wired connection that
uses radio frequencies to send signals between devices and a router? Wireless Fidelity
___________________7. What do you call a computer network formed by
interconnecting local area networks (LANs) within a limited geographical area, such as
corporate buildings? Campus Area Network
___________________8. What term describes a complete copy of everything stored
on an optical disc? ISO Image
___________________9. Which of these networks connects multiple local area
networks? Wide Area Network (WAN)
___________________10. What software is used to detect and eliminate threats to
the system? Anti-virus software
___________________11. What type of network version verifies users through a
server, requiring a more complex setup while providing enhanced security?
-WPA2- Enterprise
___________________12. Which command-line tool is used to determine the IP
address that matches a given host or domain name? Nslookup
___________________13. What protocol provides automated and centralized
management for distributing IP addresses on a network? Dynamic Host Control
Protocol (DHCP)
___________________14. What process involves scanning, identifying, diagnosing, and
fixing problems in software? Debugging
___________________15. What identifies a specific process to which a network
message is directed when it arrives at a server? Port Number
___________________16. What is the name of the red wire voltage in a power supply?
+5v
___________________17. What is the required minimum storage capacity for Windows
10? 16GB for 32-bit or 20 GB for 64-bit OS
___________________18. What version of network security uses passwords to prevent
unauthorized access? WPA2-Personal
___________________19. What device needs to be upgraded to send and receive
strong signals between computers? Network Card
___________________20. What term describes an information asset that has
suffered damage, unintended changes, or unauthorized exposure? Loss
___________________21. What issue might a computer have if its time and date keep
resetting even after adjustments in the BIOS? CMOS Battery Failure
___________________22. In Windows 7, what does a red cross on the LAN icon
indicate? LAN driver issue
___________________23. What type of network connects two or more PCs without
going through a server? Peer to peer Network
___________________24. What do matrices and capability tables govern? Access
Control List
___________________25. Which memory is used in Solid-State Drives (SSDs) for
storage? Flash Memory
___________________26. In networking, what term describes a set of related
information transferred across a network? Packet
___________________27. What class does the IP address 172.168.10.1 belong to?
Class B
___________________28. Which IP address does a virtual machine use to communicate
over the physical network? Private Address
___________________29. What is the voltage rating of the yellow wire in a power
supply? +12v
___________________30. How many lights does the Light Emitting Diode (LED) in a
Network Interface Card (NIC) have? 2
___________________31. What method allows you to create a list of devices
permitted to connect to a Wi-Fi network? Core
___________________32. What type of network allows users to maintain a connection
while moving within a specified area? MAC Address Filtering
___________________33. What is a 24-pin USB connector system that features a
rotationally symmetrical design? Extreme Universal Serial Bus (USB)
___________________34. What component enables communication between the CPU
and other devices within the system? Bus
___________________35. What color is commonly associated with a USB 3.0
connector? blue
___________________36. Where are Windows device drivers stored? Registry
___________________37. What happens when someone steals data and demands
compensation for its return? Data Extortion
___________________38. What is a network cable called with T568-A at one end and
T568-B at the other? Cross Over cable
___________________39. What is the meaning of the trademark "Wi-Fi"? IEEE 802.11
___________________40. Which networking device forwards data between networks?
Router
___________________41. What hardware allows computers to connect to a network?
Network Interface Card
___________________42. What term describes the application of network address
translation (NAT) that redirects communication requests from one address and port
number to another? Forwarding
___________________43. In Server 2008, what does a yellow color indicator on the
Local Area Network (LAN) connection icon signify? No connectivity
___________________44. What is the name of the Microsoft management console
extension used to manage hardware devices, including drivers? Device Manager
___________________45. What is the term for a collection of devices in one physical
location? Local Area Network (LAN)
___________________46. What is the maximum allowable length for a USB 2.0 cable?
5 meters
___________________47. Who is responsible for monitoring network security,
operations, and users? Network Administrator
___________________48. What is the first step to take after planning to resolve a
network issue? Implementing the Solution
___________________49. What kind of router is designed to function in the Internet
backbone? Bridge
___________________50. What clustering technology distributes client requests
across multiple servers with replicated setups? Network Load Balancing
___________________51. What do you call an automated software program that
executes commands upon receiving specific inputs? Bot
___________________52. What is another name for a disc image? ISO Image
___________________53. What compound is used to prevent the CPU from
overheating? Thermal Paste
___________________54. What type of server is used for storing user documents
with a large amount of memory and storage space? File Server
___________________55. What term refers to the interconnection of LANs in a city
spanning 5 to 50 kilometers? Metropolitan Area Network
___________________56. What is the name for a Yost cable, Cisco cable, and Console
cable? Roll-Over
___________________57. Which software program is stored in Read-Only Memory
(ROM)? Firmware
___________________58. What are the minimum RAM requirements for a computer
running Windows 10? 1 gigabyte (GB) for 32-bit or 2 GB for 64-bit
___________________59. Which protocol is the most efficient for transferring large
files? File Transfer Protocol
___________________60. What tool assesses the condition of a hard drive, indicating
status as "Good," "Caution," or "Bad"? CrystalDisk Info
___________________61. What network security standard aims to speed up
connections between routers and wireless devices? WPS
___________________62. What method is used to gain unauthorized access to
computers by sending messages with a forged source IP address? Spoofing
___________________63. Which type of server facilitates central management of
network users and resources? Directory Server
___________________64. What type of log file helps conserve disk space by limiting
the growth of performance log files? Circular Logging
___________________65. What enables administrators to specify which types of files
can be saved in a Windows folder? File Classification Instruction
___________________66. What is the name of the enterprise-level backup and
recovery software suite? NetBackUp
___________________67. Which type of network connects devices using signals like
infrared? Wireless Personal Area Network
___________________68. In BIOS/UEFI, which option is used to enable overclocking
of the computer? Voltage Basic Input Output System (BIOS)
___________________69. What is the minimum byte capacity required for a bootable
flash drive when installing Windows 10? 8GB
___________________70. What is the minimum RAM requirement for Server 2012
R2? 2GB
___________________71. What type of router connects an internal network to an
external network? Edge
___________________72. What term refers to the maximum data transfer rate for an
internet connection? Bandwidth
___________________73. What type of high-speed network or subnetwork consists of
hosts interconnected using various technologies and topologies? Local Area Network
___________________74. What device acts as a border router connecting corporate
sites to wired access lines? Customer Premises Equipment (CPE)
___________________75. What process involves verifying a user‛s identity?
AUTHENTICATION
___________________76. What type of server occupies a significant portion of the
computing space between the database server and the end user? Application Server
___________________77. In security contexts, what term refers to the privileges or
permissions assigned for accessing computer data or resources? Access
___________________78. What type of media used in 10-megabit Ethernet consists of
broadband coaxial cable carrying multiple baseband channels and has a maximum length
of 3,600 meters? 10BASE-5
___________________79. What network security system monitors and regulates
incoming and outgoing network traffic based on pre-established security rules?
Firewall
___________________80. What term is used to describe a system that is not currently
available? Downtime
___________________81. What is the minimum byte capacity required for a bootable
flash drive when installing Windows 10? 8GB
___________________82. What component enables communication between the CPU
and other devices within the system? Bus
___________________83. What standard defines a structured cabling system for
commercial buildings and connections between buildings in campus settings?
ANSI/TIA-568
___________________84. What process involves verifying a user‛s identity?
Authentication
___________________85. What is a 24-pin USB connector system that features a
rotationally symmetrical design? Extreme Universal Serial Bus (USB)
___________________86. What class does the IP address 172.168.10.1 belong to?
Class B
___________________87. Where can you find the Windows Update and security
options in Windows 7? Control Panel > System and Security > Windows Update
___________________88. What voltages does the ATX12V P1 connector supply to the
motherboard? 3.3V, 5V, 12V
___________________89. In networking, what term describes a set of related
information transferred across a network?
___________________90. What type of high-speed network or subnetwork consists of
hosts interconnected using various technologies and topologies? Local Area Network
(LAN) or Metropolitan Area Network (MAN)
___________________91. What term refers to the maximum data transfer rate for an
internet connection? Bandwidth
___________________92. What reading would you get from a voltmeter when checking
a shorted diode? Zero Volt
___________________93. What term describes ensuring that data is changed only in
authorized ways? Integrity
___________________94. In Windows 7, what indicator shows that a video driver has
not been installed? Only standard video is displayed
___________________95. What interface standard, also known as IEEE 1394, is used
for high-speed communication and is often referred to as a serial bus? Firewire
___________________96. What device serves as a bridge between wireless clients and
a wired network? Access Point
___________________97. What hardware device allows serial devices to connect
across a network? Terminal Server
___________________98. What network security system monitors and regulates
incoming and outgoing network traffic based on pre-established security rules?
Firewall
___________________99. What type of router connects an internal network to an
external network? Gateway Router or Edge Router
___________________100. What device acts as a border router connecting
corporate sites to wired access lines? Border Router
___________________101. What type of server occupies a significant portion of
the computing space between the database server and the end user? Application
Server
___________________102. What is the minimum RAM requirement for Windows
Server 2008 R2? 1GB
___________________103. Which text-based command is used to create a
bootable flash drive? Diskpart
___________________104. In security contexts, what term refers to the
privileges or permissions assigned for accessing computer data or resources?
___________________105. What media type used in 10-megabit Ethernet
consists of broadband coaxial cable carrying multiple baseband channels and has a
maximum length of 3,600 meters? 10BASE-5
___________________106. What term is used to describe a system that is not
currently available? Downtime
___________________107. In BIOS/UEFI, which option is used to enable
overclocking of the computer? Voltage Basic Input Output System (BIOS)
___________________108. What is the minimum RAM requirement for Server
2012 R2? 2GB
___________________109. What microchip manages data communication between
the CPU and motherboard? Input/Output Controller Hub
___________________110. What type of attack involves executing viruses,
worms, and other malicious scripts with the intent to harm or steal information?
Malicious Code
___________________111. What is the term for a logical subnetwork that groups
devices connected to the same network switch? Virtual Local Area Network
___________________112. What process involves joining two cable ends
together? Cable Splicing
___________________113. What is the term for the time delay between when
data is sent and when it is received? Latency
___________________114. What term refers to a set of rules that govern the
interaction between software and hardware in a network? Communication Protocol
___________________115. Which option in UEFI/BIOS allows for security
features such as tracking and locating the device? LoJack
___________________116. What type of server, previously known as Internet
Relay Chat (IRC) Servers, allows users to exchange information in real-time? Real
Time Communication Server
___________________117. What term describes pushing a system component to
its operational limits? Stress Test
___________________118. How many devices can typically connect to a wireless
router? 250
___________________119. The IP address 10.10.10.1 belongs to which IP address
class? CLASS A
___________________120. Which command-line utility displays active network
connections and TCP routing tables? Netstart

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy