CNET 157 Final
Your local ISP has provided you with a dedicated line that has a Committed Information Rate of 1.54 Mbps. What does this mean?
1.54 Mbps is the guaranteed minimum transmission rate.
Which of the following is something X.25 does NOT offer?
144 Mbps maximum throughput
How many disks are needed to implement a RAID 1 + 0?
4
You recently completed a network overhaul over the weekend. Everything seems to be functioning properly until you receive a swarm of help desk support requests, all originating from one specific floor in your building. After a few minutes on the phone with those affected, you determine that no one has indicator lights active on their NICs. What is the most likely problem?
A network switch is powered off.
What does the ping message "Destination host unreachable" message mean?
An ARP reply was not received.
Select the true statement regarding analog and digital signals.
Analog signals vary over time continually and can be represented by a sine wave, while digital signals are binary 1s and 0s using voltage levels.
The company you work for currently has ISDN service in place. Your supervisor wishes to know what sort of ISDN service is being used so that better alternatives can be considered. He tells you that the service has two B-Channels and a D-Channel. What ISDN format do you have?
Basic Rate Interface (BRI)
Almost immediately after a server migration project, employees are complaining that they can't reach the Internet. You sit down at a machine and try to ping a well-known website using the host name, which fails. You then try to ping a known public IP address, which succeeds. What is most likely the problem?
DNS settings are incorrect
Which edition of Windows Server should you consider if you want to run many virtual instances of Windows Server with Hyper-V on the server?
Datacenter
You receive a phone call from a co-worker telling you that "the network is down." Just as you are about to look into the issue, you receive several more phone calls from other co-workers. Using the problem-solving process, what must be done first to effectively troubleshoot the issue?
Define the problem and scope.
Which standard feature on NTFS-formatted disks encrypts individual files and uses a certificate matching the user account of the user who encrypted the file?
EFS
You have been asked to store a file with personal information on it. You need to be sure that only your user account can access the file, even if other user account have been granted permissions or if the disk is stolen. What standard NTFS feature can you use?
EFS
What can be used to secure data on disk drives?
EFS BitLocker TrueCrypt
routing protocol category in which the routing protocol is used to exchange routing information between autonomous systems
EGP
Which of the following file systems supports file and folder permissions? (Choose all that apply.)
EXT3 NTFS
What tool would you use to view error messages that are generated by system services or applications?
Event viewer
What category of routing protocol is used to route packets between autonomous systems?
Exterior Gateway Protocol or EGP
A rootkit is a self-replicating program that masks itself as a useful program but is actually a type of malware. T/F
False
A router is a CSU/DSU device. T/F
False
A security policy should clearly state the desired rules, even of they cannot be enforced. T/F
False
Network Control Protocol is responsible for the setup of a PPP connection, as well as the termination of a connection when it has ended. T/F
False
T/F A single ping message with a long response time is a definite indication of a problem.
False
T/F All network switches require substantial configuration before they can be put into operation in a network.
False
T/F Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.
False
T/F Failing to document your network makes you indispensable.
False
T/F For enterprise servers, or servers accessed around the clock, SATA disks are preferred over SAS disks.
False
T/F If you want to create a device that can open and close a valve on a pipe using automation, you should use a CPS.
False
T/F In order to multitask, a computer must have two or more processors.
False
T/F In the problem-solving process, you should always devise a solution to the problem you are facing prior to determining the scope of the problem.
False
T/F More VLANs mean fewer logical networks, so the network is less complex.
False
T/F Mutual authentication requires the identities of one of parties involved in a communication session to be verrified
False
T/F T-Carrier lines only require a CSU/DSU on the customer's side of the connection.
False
T/F The Internet of Things is composed primarily of desktop and laptop computers that have a wireless interface.
False
T/F The applications for IoT in transportation are very limited and not worth exploring.
False
T/F Using Performance Monitor, performance monitoring can be scheduled for later analysis, but cannot be tracked in real time.
False
T/F When a disk is formatted, it is impossible to recover the data that was on the disk.
False
T/F While group accounts make managing user rights and permissions more cumbersome, using them is a best practice.
False
T/F. Windows can be installed on an extended partition that has been formatted with the NTFS file system.
False
Which type of network might be used to connect utility network nodes together?
Field Area Network
listens to satellite signals
GPS
When dealing with permissions in Linux, what are the three user types that can be assigned permissions? (Choose three.)
Group Other Owner
Which of the following is NOT typically a question that needs to be answered to determine the cause of poor performance on a network?
Have any personnel been recently replaced?
If you want to write software for an IoT project, what type of application should you install?
IDE
allows you to write, edit, debug, and prepare programs for upload
IDE
used to discover breaches in security
IDS
routing protocol category in which the routing protocol is used to exchange routing information within an autonomous system
IGP
Which protocol works by establishing an association between two communicating devices and can use a preshared key for authentication?
IPsec
Which term has as its hallmark intelligent, connected, highly computerized, and data-driven systems?
Industry 4.0
In which special identity group does a user become a member when the user logs onto a computer locally?
Interactive
Which of the following us NOT a true statement regarding the function of a switch? A) It determines the path used based on the destination IP address B) it sends broadcast frames out all connected ports except the port where the frame was received C) Each port on a switch represents a separate collision domain D) Switches have the ability to operate in full-duplex mode
It determines the path used based on the destination IP address
Which Windows domain-based protocol provides mutual authentication between devices?
Kerberos
What directory service protocol is used by Active Directory and also supported by Linux?
LDAP
Which type of sensor can be used to cause an event to occur when the sun comes up?
LDR
emits light when an electrical current is applied to its conductors
LED
Your colleagues are discussing the operation of a device in which packets are routed between VLANs on the device rather than having to exit the device to be routed. What type of device are they most likely descussing?
Layer 3 switch
Which of the following are standard NTFS permissions?
List Folder Contents Read Write
Which of the following is considered a LPWA network technology?
LoRaWAN
What combination will you find in a switching table?
MAC address/switch port number
Which statement about Multiprotocol Label Switching (MPLS) is true?
MPLS works with any Network layer protocol.
What type of network is used in the utility industry to wirelessly collect data from utility meters and can reach distances of dozens of kilometers?
NAN
What process, available on most routers, will help improve security by replacing the internal IP address of the transmitting device with a public IP address?
NAT
What is the native file-sharing protocol in Linux?
NFS
Which IoT technology is based on the same cellular technology used in most mobile phones?
Narrowband IoT
Which one of the following is NOT a typical SONET data rate?
OC-128
What is a common link-state routing protocol?
Open Shortest Path First or OSPF
detects changes in infrared light caused by a moving object
PIR
Which of the following terms describes the category of cloud computing in which a customer develops applications using development tools and infrastructure provided by the service provider?
Platform as a service
Which technology is a fault tolerant feature provided by a server OS? (Choose all that apply.)
RAID server clustering hot-swappable devices
Which device can be described as a single-board computer?
Raspberry Pi
Which of the following is NOT a Linux native file system?
ReFS
You have been asked to install a VPN remote access solution using Windows Server. What do you need to install?
Routing and Remote Access Service (RRAS)
Which protocol does Windows use by default for file sharing?
SMB
Which of the following protocols is NOT used for Windows 10 VPN connections?
SMTP
Which VPN implementation typically needs no additional firewall configuration to be allowed access through the firewall?
SSTP
You have four switches, A, B, C, and D. Switch A is connected to Switch C and Switch B is connected to switch D. Furthermore, Switch A and B are connected and Switch C and D are connected. One of the connections is in blocking mode. What protocol must be running on the switches?
STP
a category of cloud computing in which a customer pays for the use of applications that run on a service provider's network
SaaS
Which cloud computing category refers to the use of software hosted on a service provider's network, and is usually subscription based?
Software as a service
designed to stop switching loops
Spanning Tree Protocol
Although a frame relay connection is established in much the same way that a T1 connection is, which of the following is an important distinction between the two technologies?
T1 uses point to point, while frame relay makes use of virtual circuits.
measures the total cable length
TDR
The trial-and-error method should NOT be used under which of the following situations?
The device you're troubleshooting is currently in use on the network.
Your current backup schedule involves incremental backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?
The full backup must be restored first, followed by all incremental backups in sequential order leading up to the day of failure.
Your current backup schedule involves differential backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?
The last full backup should be restored first, followed by the last successful differential backup prior to the drive failure.
If the minimum password length on a Windows system is set to zero, what does that mean?
The user can use a blank password.
What is the signaling method used to allocate time slots for each channel in a T-carrier line called?
Time Division Multiplexing (TDM)
A modem is a device that allows a computer, which works with digital information, to communicate over lines that use analog signals. T/F
True
ATM is a cell-based packet-switching technology in which the cells are of a fixed length rather than typical packet-based systems that use variable length packets. T/F
True
Frame relay is a PVC packet-switching technology that offers WAN communication over a fast, reliable, digital link. It was developed from X.25 and ISDN technology. T/F
True
How the network resources are to be used should be clearly defined in a (an) acceptable use policy. T/F
True
If a portion of a T-Carrier line is used for one purpose and a different portion for another purpose, the line has been fractionalized. T/F
True
T/F A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users.
True
T/F A RAID 1 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data.
True
T/F A breadboard is laid out in a grid pattern, with a series of rows of interconnected holes (called tie points) into which you can plug component headers and wires.
True
T/F A bus is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
True
T/F A data collector set specifies the performance counters you want to monitor, how often to monitor them, and the time period.
True
T/F A distance vector protocol sends updates to its neighbors that include the contents of its routing table.
True
T/F A honeypot is configured to entice attackers and allows administrators to get information about the attack techniques being used
True
T/F A knowledge base is a searchable database containing descriptions of problems and errors along with known solutions, if any.
True
T/F A logon script is a set of commands stored in a file that are executed when a users logs on to a Windows domain.`
True
T/F A microcontroller development board usually comes with pin headers to allow it to plug into a breadboard to give easy access to the I/O ports without having to solder connections.
True
T/F A proximity sensor doesn't require physical contact to be activated.
True
T/F A switch that is configured to use the Spanning Tree Protocol will place a port in blocking mode of sending traffic to it may cause a switching loop.
True
T/F A type 1 hypervisor runs directly on the host computer's hardware.
True
T/F A user logs on to the network from a different computer than they normally use, and they still have the same desktop as usual. This user's profile is called a roaming profile.
True
T/F As a network administrator, it is a good idea to have a performance baseline, a collection of performance data from a time when the network is performing normally, which can be used as a point of reference.
True
T/F Domain local groups can be used to assign permissions to resources only in the domain in which the group is created.
True
T/F If you are working with breadboards, you'll want an assortment of jumper wires.
True
T/F If you can't ping the default default, you won't be able to send packets outside your local LAN.
True
T/F If you want to make permanent connections in your IoT design, you'll need a soldering iron.
True
T/F In Windows, printer pooling allows a single printer to represent two or more print devices.
True
T/F Multiprotocol Label Switching (MPLS) supports both IPv4 and IPv6, as well as other network layer protocols.
True
T/F On Windows, a service is a program that runs in the background and provides support for other processes.
True
T/F One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC filtering.
True
T/F Packet switched WANs use virtual circuits to ensure that packets are delivered reliably and at the agreed-on bandwidth level.
True
T/F Permissions define the level of access a user has to the file system, ranging from read access to full control.
True
T/F Protocol analyzers can help solve problems from the Data Link layer up to the Application layer.
True
T/F RAID and server clustering are just two of the fault tolerant features found in many server operating systems.
True
T/F Routers can be used to control network access by inspecting the source and destination address information of packets.
True
T/F Someone who wants to send encrypted data must acquire a digital certificate from a certification authority
True
T/F Special identity FAT 16 don't appear as object in Active Directory Users and Computers but they can be assigned permissions and rights.
True
T/F The kernel is a software layer that sits just above the computer hardware.
True
T/F The number of "things" connected to the Internet numbers in the 10s of billions.
True
T/F The tracert command is used to determine the path between two devices.
True
T/F To collect data about the surrounding environment, you need sensors.
True
T/F When a switch receives a broadcast frame, it floods the frame out all ports.
True
T/F When a user enters his username and password to log on to a machine, he is invoking the process of authentication.
True
T/F With a warm site, you just need to load the most current data from backup and you're ready to go.
True
The CPE must be able to send data in the correct format onto the connection that makes up the local loop and receives data coming from that connection. T/F
True
You are the network administrator for a company. The company's policy is that the users are allowed to set their own passwords but that they must change their password every 30 days. You have just received a call from a user who can't log on because she forgot her password. After you change her password, which of the password options listed would you set in the user's account so that she will have to change the password when she logs on using the password you assigned?
User must change password at next logon
Which of the following virtualization products uses a type 2 hypervisor?
VMware Workstation
Which of the following is NOT a good practice for performing upgrades?
Wait three months before upgrading a new release.
Which of the following are case sensitive? (Choose all that apply.)
Windows password Linux logon name Linux password
Which home automation technology is a mesh technology that is used for smart locks, lighting, and security systems?
Z-Wave
You have several network devices that support SNMP and RMON. What type of network troubleshooting tool should you use to take advantage of those capabilities?
a network monitor
If you want to build a smart-glove that responds based on the direction and speed a user moves their hand, what sensor should you use?
accelerometer
Which of the following is a function typically provided by the centralized management of a server-based network? (Choose all that apply.)
account management user authentication and authorization security policy management
provides automated movement, such as turning a valve to open or close a pipe
actuator
What is the name of the value assigned to a routing protocol to indicate its reliability compared with other routing protocols that might be in use on the same router?
administrative distance
What type of policy defines the methods involved when a user sign in to the network?
authentication
permits access to computer, bypasses normal authentication
backdoor
a backup designed to allow restoring the system disk directly from backup media without having to install the OS and backup software first
bare metal restore backup
can be divided up into four primary partitions
basic disk
You have been asked to create a file that will contain a series of Windows command-prompt commands that automate the creation of a VPN client that connects to your company VPN server. What type of file should you create?
batch file
used to measure or detect some property of living things
biometric sensor
The partition that contains the Windows OS files is known as the what type of partition?
boot
Which of the following consists of the policies, procedures, and resources required to ensure that a business can continue to function after a major catastrophe that renders the site unable to operate?
business continuity
What type of sensor is used to allow a smart phone screen respond to touch?
capacitive
What would an Asynchronous Transfer Mode (ATM) network be best suited for?
carrying voice, data, and time-sensitive information
In Linux, what is the command for viewing a file's contents on the screen?
cat
Employees in the Sales department need to be able to access the sales share on the file server. They will need to have the ability to create files, read them, and make corrections or additions. Which of the following share permissions should the group be given?
change
documenting and managing network changes, including IP addressing and moving devices
change management
The plain old telephone service is a good example of what kind of WAN technology?
circuit switched
What storage solution involves a third-party company that provides off-site hosting of data?
cloud-based storage
a guaranteed minimum transmission rate offered by the service provider
committed information rate
What has occurred when all routers in a network have accurate information after a change in the network?
convergence
What type of multitasking did older OSs use, which allowed a process to monopolize the CPU's time until the process had completed its own task?
cooperative
What is the fastest switching mode?
cut-through
frame is sent to the destination port immediately after reading the destination and source MAC address
cut-through switching
tightly integrates computers, physical machinery, and data to make more efficient, reliable, and intelligent devices
cyber-physical systems
the device that sends data to (and receives data from) the local loop, usually a CSU/DSU or modem
data circuit terminating equipment (DCE)
Which of the following is true about a hot site?
data is synchronized
the device that passes data from the customer LAN to the DCE, usually a router
data terminal equipment (DTE)
You have purchased a network-based IDS. You have been tasked with deploying the device in a location where the entire network can be protected. Where should you deploy it?
demilitarized zone
monopolizes network services or network bandwidth
denial of service
Which of the following is NOT true about Ethernet WANs?
difficult to integrate into LANs
documents used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority
digital certificates
Which of the following is a service NOT usually found on a client operating system?
directory service
Which disk arrangement is fault tolerant and uses half of your disk space for fault tolerance?
disk mirroring
Which disk configuration does not provide fault tolerance?
disk striping
In which type of routing protocol is a router's routing table copied to neighboring routers to share internetwork information?
distance-vector protocol
sends entire routing table to all routers at a scheduled time
distance-vector protocol
What type of disk is required if you want to access additional features such as disk spanning?
dynamic
can be used to create a RAID
dynamic disk
Which feature of bare-metal virtualization products allows virtual resources to be allocated on demand to meet application requirements?
dynamic provisioning
When processing of collected data occurs where the sensors are located, what type of processing is this?
edge processing
In which type of system are you most likely to find a microcontroller?
embedded
examples include a controller for a robot arm, a traffic signal, or a weather monitoring system
embedded system
Which facet of securing access to network data makes data unusable to anyone except authorized users?
encryption
Which industry sector uses IoT technologies to deploy smart grids?
energy
a step in the troubleshooting process in which the technician must call in more experienced technicians
escalation
can only be divided into logical drives
extended partition
Part of SONET's flexibility comes from its ability to be arranged in several different physical topologies. Which of the following is NOT a possible SONET topology?
fault tolerant bus
inspects packets as they go into and out of the network
firewall
A router's final task when handling a packet is to send the packet onto its next and possibly final destination; this is referred to as packet _____.
forwarding
Which switching method reads a minimum of 64-bytes of an Ethernet frame before forwarding the frame?
fragment-free
damaged frames do not get forwarded
fragment-free switching
a point-to-point permanent virtual circuit (PVC) technology that offers WAN communications over a fast, reliable, digital packet-switching network
frame relay
Which type of sensor is most likely to be used in seismology and mining to detect ground movement?
geophone
You are creating a new group for the Sales department. All of the users that will be in this group will need to have access to the same resources. What scope would you use for this group?
global
Which statistic is most likely to be included in a network baseline report?
hard drive utilization
What type of device should you install as a decoy to lure potential attackers?
honeypot
You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware Workstation?
host-only
Which cloud computing category allows a company to quickly provision additional disk space?
hosted infrastructure
a business continually option in which a physical location has all the infrastructure in place and configured, and data is synchronized and up to date
hot site
You have just connected a brand new workstation to your local network. As per company policy, you have used a static IP configuration. However, all attempts to reach the Internet from the workstation fail. You have verified that you can communicate with servers and other workstations on the local network, and that you are the only one having an issue reaching the Internet. What is most likely the issue?
incorrectly configured gateway address
doesn't mark files as backed up
incremental backup
Which command will display the configured IP address, default gateway, and DNS servers for a Windows workstation?
ipconfig /all
Which of the following is a credential category used in multifactor authentication? (Choose all that apply.)
knowledge possession inheritence
sends the status of all its interface links to all other routers in the internetwork
link-state protocol
a device that distributes traffic for a network service to multiple servers that can provide that service
load balancer
defines a user's enironment
local profile
The tracert command would be best suited for which of the following tasks?
locating bottlenecks in an internetwork
malware that's activated when a particular event occurs
logic bomb
a time set aside for schedule updates, upgrades, and other network maintenance procedures
maintenance window
A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, when she logs off and logs back on, the desktop reverts to its original configuration. What type of user profile does this user have?
mandatory
In Windows, what are the two most common ways of accessing a shared folder? (Choose two.)
mapping a drive entering a UNC path
Which features does Bluetooth 5.1 add to existing Bluetooth technology?
mesh networking
value that tells routers the best path to the destination network
metric
On a router configures to use RIP, the number of routers a packet must travel through before it reaches its destination is called what?
metric hop count
a device computers use to convert digital signals to analog signals
modem
A junior network administrator tells you that he can ping a DNS server successfully using its IP address, but he has not tested domain name lookups. What utility on the command line would you suggest your colleague use next?
nslookup
software that runs on internetwork devices and prioritize packets
packet shaper
detects the presence and magnitude of light
photoresistor
A common guideline about network security is that if there's ____________ access to the equipment, there's no security.
physical
a remote access protocol that supports many protocols and is used to carry data over a variety of network connections
point to point protocol
You have been asked to determine what services are accessible on your network so you can close those that are not necessary. What tool should you use?
port scanner
Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive?
preboot execution environment
With ___________ multitasking, either the user or the OS can terminate a process that is monopolizing the CPU's time.
preemptive
Which form of authentication involves the exchange of a password-like key that must be entered on both devices?
preshared key
a series of letters, numbers, and special characters, much like a password, that both communicating devices use to authenticate each other's identity
preshared key
can be made the active partition
primary partition
Where are the waiting print jobs stored while they are waiting to be sent to the print device?
print queue
Access control lists can be configured based on what?
protocol TCP port souces IP address
What kind of software would you use to view and troubleshoot protocol-specific problems such as TCP retries caused by missed acknowledgments, or duplicate acknowledgments?
protocol analyzer
Which application would be considered a product of IoT?
real-time traffic information
Which component of a file-sharing client intercepts requests for resources and determines if the resource is local or remote?
redirector
You're the network administrator for a large bean-bag chair company. You are presenting to your supervisor several reasons to make use of cloud computing for handling data processing. Which answer would be a valid benefit of using cloud computing?
reduced physical plant costs
Which of the following is a benefit of data-driven manufacturing?
reduction of waste in material goods
action that a user can perform on a computer
rights
Whether your problem and proposed solution affects an entire network or just a few users, you must devise a ___________________ plan so that you can return things to their original state if the solution doesn't work.
rollback
instructions on how to undo an upgrade if problems occur
rollback plan
What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?
rootkit
What command issued from a command prompt will display the routing table in windows?
route print
When a router's interface is configured to connect with a switch trunk port to route packets between VLANs, what is this called?
router on a stick
Which of the following is NOT a typical function of a file system?
schedules processes and manages memory
What unit is used to divide the storage space on a disk drive?
sectors
a type of connector for terminating a T1 line that provides diagnostic testing for troubleshooting the connection
smart jack
Which technology is most likely to be associated with IoT?
smart watch
Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?
smurf attack
What is a partial copy of a VM that is used to restore it to a previous state?
snapshot
tightly wound coil of wire that creates a strong magnetic field when electricity is applied
solenoid
Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.
spyware
What can firewalls do to help ensure that a packet is denied if it's not part of an ongoing legitimate conversation?
stateful packet inspection
packets are denied on context as well as packet properties
stateful packet inspection
Which of the following would NOT typically be considered a goal of most IoT technologies?
store data
entire frame is read before forwarding it to the destination port
store-and-forwarding switching
What is true about WPA3? (Choose all that apply.)
strongest wireless encryption standard requires PMF backward compatible
a high-speed, baseband digital networking standard that specifies incrementally increasing data rates across fiber-optic links
synchronous optical network (SONET)
partition that contains the boot loader
system partition
If a Registry file or boot file becomes corrupted, which type of backup is usually all that's required to get the system running again?
system state
You are currently troubleshooting a network issue with your ISP's customer support agent. The agent requests that you open a command prompt and type ping 127.0.0.1. What does this accomplish?
tests that the local IP protocol is functioning
What is NOT a function that would be found in a managed switch?
the ability to transfer its switching table with neighboring switches
What is the local loop, or last mile?
the connection between the demarcation point and the CO
In Windows, what do rights define?
the types of actions a user can perform
What would be found in a router's routing table?
timestamp destination network next hop metric
issues an electrical signal on a wire, and a probe detects the signal
tone generator
configured to carry VLAN taffic
trunk port
What is created when a packet is encapsulated with additional headers to allow an encrypted packet to be correctly routed by Internet devices?
tunnel
To eliminate the potential problems caused by power fluctuations, especially on servers, you can install an _________________ power supply.
uninterruptible
power device that provides fault tolerance trough battery backup
uninterruptible power supply
What is NOT a guideline of a security policy?
uses legal terminology to protect the organization
How does a CPU perform multitasking?
using time slicing and context switching
a logical sequence of connections with bandwidth allocated for a specific transmission pathway
virtual circuit
spreads by replicating itself into programs or documents
virus
You have just installed a new disk and formatted it. You don't want to assign it a drive letter and you want to access it from your existing C: drive. What feature should you use?
volume mount points
What type of hacker uses a scanning device to find unsecured wireless networks and breaks into those networks?
wardriver
When would you most likely NOT choose to use a leased line connection?
when the link is only needed as a backup connection
In general, what level of security should use with your access points?
wireless encryption protocol
a self-contained, self-replicating program
worm