CNET 157 Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Your local ISP has provided you with a dedicated line that has a Committed Information Rate of 1.54 Mbps. What does this mean?

1.54 Mbps is the guaranteed minimum transmission rate.

Which of the following is something X.25 does NOT offer?

144 Mbps maximum throughput

How many disks are needed to implement a RAID 1 + 0?

4

You recently completed a network overhaul over the weekend. Everything seems to be functioning properly until you receive a swarm of help desk support requests, all originating from one specific floor in your building. After a few minutes on the phone with those affected, you determine that no one has indicator lights active on their NICs. What is the most likely problem?

A network switch is powered off.

What does the ping message "Destination host unreachable" message mean?

An ARP reply was not received.

Select the true statement regarding analog and digital signals.

Analog signals vary over time continually and can be represented by a sine wave, while digital signals are binary 1s and 0s using voltage levels.

The company you work for currently has ISDN service in place. Your supervisor wishes to know what sort of ISDN service is being used so that better alternatives can be considered. He tells you that the service has two B-Channels and a D-Channel. What ISDN format do you have?

Basic Rate Interface (BRI)

Almost immediately after a server migration project, employees are complaining that they can't reach the Internet. You sit down at a machine and try to ping a well-known website using the host name, which fails. You then try to ping a known public IP address, which succeeds. What is most likely the problem?

DNS settings are incorrect

Which edition of Windows Server should you consider if you want to run many virtual instances of Windows Server with Hyper-V on the server?

Datacenter

You receive a phone call from a co-worker telling you that "the network is down." Just as you are about to look into the issue, you receive several more phone calls from other co-workers. Using the problem-solving process, what must be done first to effectively troubleshoot the issue?

Define the problem and scope.

Which standard feature on NTFS-formatted disks encrypts individual files and uses a certificate matching the user account of the user who encrypted the file?

EFS

You have been asked to store a file with personal information on it. You need to be sure that only your user account can access the file, even if other user account have been granted permissions or if the disk is stolen. What standard NTFS feature can you use?

EFS

What can be used to secure data on disk drives?

EFS BitLocker TrueCrypt

routing protocol category in which the routing protocol is used to exchange routing information between autonomous systems

EGP

Which of the following file systems supports file and folder permissions? (Choose all that apply.)

EXT3 NTFS

What tool would you use to view error messages that are generated by system services or applications?

Event viewer

What category of routing protocol is used to route packets between autonomous systems?

Exterior Gateway Protocol or EGP

A rootkit is a self-replicating program that masks itself as a useful program but is actually a type of malware. T/F

False

A router is a CSU/DSU device. T/F

False

A security policy should clearly state the desired rules, even of they cannot be enforced. T/F

False

Network Control Protocol is responsible for the setup of a PPP connection, as well as the termination of a connection when it has ended. T/F

False

T/F A single ping message with a long response time is a definite indication of a problem.

False

T/F All network switches require substantial configuration before they can be put into operation in a network.

False

T/F Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.

False

T/F Failing to document your network makes you indispensable.

False

T/F For enterprise servers, or servers accessed around the clock, SATA disks are preferred over SAS disks.

False

T/F If you want to create a device that can open and close a valve on a pipe using automation, you should use a CPS.

False

T/F In order to multitask, a computer must have two or more processors.

False

T/F In the problem-solving process, you should always devise a solution to the problem you are facing prior to determining the scope of the problem.

False

T/F More VLANs mean fewer logical networks, so the network is less complex.

False

T/F Mutual authentication requires the identities of one of parties involved in a communication session to be verrified

False

T/F T-Carrier lines only require a CSU/DSU on the customer's side of the connection.

False

T/F The Internet of Things is composed primarily of desktop and laptop computers that have a wireless interface.

False

T/F The applications for IoT in transportation are very limited and not worth exploring.

False

T/F Using Performance Monitor, performance monitoring can be scheduled for later analysis, but cannot be tracked in real time.

False

T/F When a disk is formatted, it is impossible to recover the data that was on the disk.

False

T/F While group accounts make managing user rights and permissions more cumbersome, using them is a best practice.

False

T/F. Windows can be installed on an extended partition that has been formatted with the NTFS file system.

False

Which type of network might be used to connect utility network nodes together?

Field Area Network

listens to satellite signals

GPS

When dealing with permissions in Linux, what are the three user types that can be assigned permissions? (Choose three.)

Group Other Owner

Which of the following is NOT typically a question that needs to be answered to determine the cause of poor performance on a network?

Have any personnel been recently replaced?

If you want to write software for an IoT project, what type of application should you install?

IDE

allows you to write, edit, debug, and prepare programs for upload

IDE

used to discover breaches in security

IDS

routing protocol category in which the routing protocol is used to exchange routing information within an autonomous system

IGP

Which protocol works by establishing an association between two communicating devices and can use a preshared key for authentication?

IPsec

Which term has as its hallmark intelligent, connected, highly computerized, and data-driven systems?

Industry 4.0

In which special identity group does a user become a member when the user logs onto a computer locally?

Interactive

Which of the following us NOT a true statement regarding the function of a switch? A) It determines the path used based on the destination IP address B) it sends broadcast frames out all connected ports except the port where the frame was received C) Each port on a switch represents a separate collision domain D) Switches have the ability to operate in full-duplex mode

It determines the path used based on the destination IP address

Which Windows domain-based protocol provides mutual authentication between devices?

Kerberos

What directory service protocol is used by Active Directory and also supported by Linux?

LDAP

Which type of sensor can be used to cause an event to occur when the sun comes up?

LDR

emits light when an electrical current is applied to its conductors

LED

Your colleagues are discussing the operation of a device in which packets are routed between VLANs on the device rather than having to exit the device to be routed. What type of device are they most likely descussing?

Layer 3 switch

Which of the following are standard NTFS permissions?

List Folder Contents Read Write

Which of the following is considered a LPWA network technology?

LoRaWAN

What combination will you find in a switching table?

MAC address/switch port number

Which statement about Multiprotocol Label Switching (MPLS) is true?

MPLS works with any Network layer protocol.

What type of network is used in the utility industry to wirelessly collect data from utility meters and can reach distances of dozens of kilometers?

NAN

What process, available on most routers, will help improve security by replacing the internal IP address of the transmitting device with a public IP address?

NAT

What is the native file-sharing protocol in Linux?

NFS

Which IoT technology is based on the same cellular technology used in most mobile phones?

Narrowband IoT

Which one of the following is NOT a typical SONET data rate?

OC-128

What is a common link-state routing protocol?

Open Shortest Path First or OSPF

detects changes in infrared light caused by a moving object

PIR

Which of the following terms describes the category of cloud computing in which a customer develops applications using development tools and infrastructure provided by the service provider?

Platform as a service

Which technology is a fault tolerant feature provided by a server OS? (Choose all that apply.)

RAID server clustering hot-swappable devices

Which device can be described as a single-board computer?

Raspberry Pi

Which of the following is NOT a Linux native file system?

ReFS

You have been asked to install a VPN remote access solution using Windows Server. What do you need to install?

Routing and Remote Access Service (RRAS)

Which protocol does Windows use by default for file sharing?

SMB

Which of the following protocols is NOT used for Windows 10 VPN connections?

SMTP

Which VPN implementation typically needs no additional firewall configuration to be allowed access through the firewall?

SSTP

You have four switches, A, B, C, and D. Switch A is connected to Switch C and Switch B is connected to switch D. Furthermore, Switch A and B are connected and Switch C and D are connected. One of the connections is in blocking mode. What protocol must be running on the switches?

STP

a category of cloud computing in which a customer pays for the use of applications that run on a service provider's network

SaaS

Which cloud computing category refers to the use of software hosted on a service provider's network, and is usually subscription based?

Software as a service

designed to stop switching loops

Spanning Tree Protocol

Although a frame relay connection is established in much the same way that a T1 connection is, which of the following is an important distinction between the two technologies?

T1 uses point to point, while frame relay makes use of virtual circuits.

measures the total cable length

TDR

The trial-and-error method should NOT be used under which of the following situations?

The device you're troubleshooting is currently in use on the network.

Your current backup schedule involves incremental backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?

The full backup must be restored first, followed by all incremental backups in sequential order leading up to the day of failure.

Your current backup schedule involves differential backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?

The last full backup should be restored first, followed by the last successful differential backup prior to the drive failure.

If the minimum password length on a Windows system is set to zero, what does that mean?

The user can use a blank password.

What is the signaling method used to allocate time slots for each channel in a T-carrier line called?

Time Division Multiplexing (TDM)

A modem is a device that allows a computer, which works with digital information, to communicate over lines that use analog signals. T/F

True

ATM is a cell-based packet-switching technology in which the cells are of a fixed length rather than typical packet-based systems that use variable length packets. T/F

True

Frame relay is a PVC packet-switching technology that offers WAN communication over a fast, reliable, digital link. It was developed from X.25 and ISDN technology. T/F

True

How the network resources are to be used should be clearly defined in a (an) acceptable use policy. T/F

True

If a portion of a T-Carrier line is used for one purpose and a different portion for another purpose, the line has been fractionalized. T/F

True

T/F A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users.

True

T/F A RAID 1 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data.

True

T/F A breadboard is laid out in a grid pattern, with a series of rows of interconnected holes (called tie points) into which you can plug component headers and wires.

True

T/F A bus is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.

True

T/F A data collector set specifies the performance counters you want to monitor, how often to monitor them, and the time period.

True

T/F A distance vector protocol sends updates to its neighbors that include the contents of its routing table.

True

T/F A honeypot is configured to entice attackers and allows administrators to get information about the attack techniques being used

True

T/F A knowledge base is a searchable database containing descriptions of problems and errors along with known solutions, if any.

True

T/F A logon script is a set of commands stored in a file that are executed when a users logs on to a Windows domain.`

True

T/F A microcontroller development board usually comes with pin headers to allow it to plug into a breadboard to give easy access to the I/O ports without having to solder connections.

True

T/F A proximity sensor doesn't require physical contact to be activated.

True

T/F A switch that is configured to use the Spanning Tree Protocol will place a port in blocking mode of sending traffic to it may cause a switching loop.

True

T/F A type 1 hypervisor runs directly on the host computer's hardware.

True

T/F A user logs on to the network from a different computer than they normally use, and they still have the same desktop as usual. This user's profile is called a roaming profile.

True

T/F As a network administrator, it is a good idea to have a performance baseline, a collection of performance data from a time when the network is performing normally, which can be used as a point of reference.

True

T/F Domain local groups can be used to assign permissions to resources only in the domain in which the group is created.

True

T/F If you are working with breadboards, you'll want an assortment of jumper wires.

True

T/F If you can't ping the default default, you won't be able to send packets outside your local LAN.

True

T/F If you want to make permanent connections in your IoT design, you'll need a soldering iron.

True

T/F In Windows, printer pooling allows a single printer to represent two or more print devices.

True

T/F Multiprotocol Label Switching (MPLS) supports both IPv4 and IPv6, as well as other network layer protocols.

True

T/F On Windows, a service is a program that runs in the background and provides support for other processes.

True

T/F One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC filtering.

True

T/F Packet switched WANs use virtual circuits to ensure that packets are delivered reliably and at the agreed-on bandwidth level.

True

T/F Permissions define the level of access a user has to the file system, ranging from read access to full control.

True

T/F Protocol analyzers can help solve problems from the Data Link layer up to the Application layer.

True

T/F RAID and server clustering are just two of the fault tolerant features found in many server operating systems.

True

T/F Routers can be used to control network access by inspecting the source and destination address information of packets.

True

T/F Someone who wants to send encrypted data must acquire a digital certificate from a certification authority

True

T/F Special identity FAT 16 don't appear as object in Active Directory Users and Computers but they can be assigned permissions and rights.

True

T/F The kernel is a software layer that sits just above the computer hardware.

True

T/F The number of "things" connected to the Internet numbers in the 10s of billions.

True

T/F The tracert command is used to determine the path between two devices.

True

T/F To collect data about the surrounding environment, you need sensors.

True

T/F When a switch receives a broadcast frame, it floods the frame out all ports.

True

T/F When a user enters his username and password to log on to a machine, he is invoking the process of authentication.

True

T/F With a warm site, you just need to load the most current data from backup and you're ready to go.

True

The CPE must be able to send data in the correct format onto the connection that makes up the local loop and receives data coming from that connection. T/F

True

You are the network administrator for a company. The company's policy is that the users are allowed to set their own passwords but that they must change their password every 30 days. You have just received a call from a user who can't log on because she forgot her password. After you change her password, which of the password options listed would you set in the user's account so that she will have to change the password when she logs on using the password you assigned?

User must change password at next logon

Which of the following virtualization products uses a type 2 hypervisor?

VMware Workstation

Which of the following is NOT a good practice for performing upgrades?

Wait three months before upgrading a new release.

Which of the following are case sensitive? (Choose all that apply.)

Windows password Linux logon name Linux password

Which home automation technology is a mesh technology that is used for smart locks, lighting, and security systems?

Z-Wave

You have several network devices that support SNMP and RMON. What type of network troubleshooting tool should you use to take advantage of those capabilities?

a network monitor

If you want to build a smart-glove that responds based on the direction and speed a user moves their hand, what sensor should you use?

accelerometer

Which of the following is a function typically provided by the centralized management of a server-based network? (Choose all that apply.)

account management user authentication and authorization security policy management

provides automated movement, such as turning a valve to open or close a pipe

actuator

What is the name of the value assigned to a routing protocol to indicate its reliability compared with other routing protocols that might be in use on the same router?

administrative distance

What type of policy defines the methods involved when a user sign in to the network?

authentication

permits access to computer, bypasses normal authentication

backdoor

a backup designed to allow restoring the system disk directly from backup media without having to install the OS and backup software first

bare metal restore backup

can be divided up into four primary partitions

basic disk

You have been asked to create a file that will contain a series of Windows command-prompt commands that automate the creation of a VPN client that connects to your company VPN server. What type of file should you create?

batch file

used to measure or detect some property of living things

biometric sensor

The partition that contains the Windows OS files is known as the what type of partition?

boot

Which of the following consists of the policies, procedures, and resources required to ensure that a business can continue to function after a major catastrophe that renders the site unable to operate?

business continuity

What type of sensor is used to allow a smart phone screen respond to touch?

capacitive

What would an Asynchronous Transfer Mode (ATM) network be best suited for?

carrying voice, data, and time-sensitive information

In Linux, what is the command for viewing a file's contents on the screen?

cat

Employees in the Sales department need to be able to access the sales share on the file server. They will need to have the ability to create files, read them, and make corrections or additions. Which of the following share permissions should the group be given?

change

documenting and managing network changes, including IP addressing and moving devices

change management

The plain old telephone service is a good example of what kind of WAN technology?

circuit switched

What storage solution involves a third-party company that provides off-site hosting of data?

cloud-based storage

a guaranteed minimum transmission rate offered by the service provider

committed information rate

What has occurred when all routers in a network have accurate information after a change in the network?

convergence

What type of multitasking did older OSs use, which allowed a process to monopolize the CPU's time until the process had completed its own task?

cooperative

What is the fastest switching mode?

cut-through

frame is sent to the destination port immediately after reading the destination and source MAC address

cut-through switching

tightly integrates computers, physical machinery, and data to make more efficient, reliable, and intelligent devices

cyber-physical systems

the device that sends data to (and receives data from) the local loop, usually a CSU/DSU or modem

data circuit terminating equipment (DCE)

Which of the following is true about a hot site?

data is synchronized

the device that passes data from the customer LAN to the DCE, usually a router

data terminal equipment (DTE)

You have purchased a network-based IDS. You have been tasked with deploying the device in a location where the entire network can be protected. Where should you deploy it?

demilitarized zone

monopolizes network services or network bandwidth

denial of service

Which of the following is NOT true about Ethernet WANs?

difficult to integrate into LANs

documents used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority

digital certificates

Which of the following is a service NOT usually found on a client operating system?

directory service

Which disk arrangement is fault tolerant and uses half of your disk space for fault tolerance?

disk mirroring

Which disk configuration does not provide fault tolerance?

disk striping

In which type of routing protocol is a router's routing table copied to neighboring routers to share internetwork information?

distance-vector protocol

sends entire routing table to all routers at a scheduled time

distance-vector protocol

What type of disk is required if you want to access additional features such as disk spanning?

dynamic

can be used to create a RAID

dynamic disk

Which feature of bare-metal virtualization products allows virtual resources to be allocated on demand to meet application requirements?

dynamic provisioning

When processing of collected data occurs where the sensors are located, what type of processing is this?

edge processing

In which type of system are you most likely to find a microcontroller?

embedded

examples include a controller for a robot arm, a traffic signal, or a weather monitoring system

embedded system

Which facet of securing access to network data makes data unusable to anyone except authorized users?

encryption

Which industry sector uses IoT technologies to deploy smart grids?

energy

a step in the troubleshooting process in which the technician must call in more experienced technicians

escalation

can only be divided into logical drives

extended partition

Part of SONET's flexibility comes from its ability to be arranged in several different physical topologies. Which of the following is NOT a possible SONET topology?

fault tolerant bus

inspects packets as they go into and out of the network

firewall

A router's final task when handling a packet is to send the packet onto its next and possibly final destination; this is referred to as packet _____.

forwarding

Which switching method reads a minimum of 64-bytes of an Ethernet frame before forwarding the frame?

fragment-free

damaged frames do not get forwarded

fragment-free switching

a point-to-point permanent virtual circuit (PVC) technology that offers WAN communications over a fast, reliable, digital packet-switching network

frame relay

Which type of sensor is most likely to be used in seismology and mining to detect ground movement?

geophone

You are creating a new group for the Sales department. All of the users that will be in this group will need to have access to the same resources. What scope would you use for this group?

global

Which statistic is most likely to be included in a network baseline report?

hard drive utilization

What type of device should you install as a decoy to lure potential attackers?

honeypot

You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware Workstation?

host-only

Which cloud computing category allows a company to quickly provision additional disk space?

hosted infrastructure

a business continually option in which a physical location has all the infrastructure in place and configured, and data is synchronized and up to date

hot site

You have just connected a brand new workstation to your local network. As per company policy, you have used a static IP configuration. However, all attempts to reach the Internet from the workstation fail. You have verified that you can communicate with servers and other workstations on the local network, and that you are the only one having an issue reaching the Internet. What is most likely the issue?

incorrectly configured gateway address

doesn't mark files as backed up

incremental backup

Which command will display the configured IP address, default gateway, and DNS servers for a Windows workstation?

ipconfig /all

Which of the following is a credential category used in multifactor authentication? (Choose all that apply.)

knowledge possession inheritence

sends the status of all its interface links to all other routers in the internetwork

link-state protocol

a device that distributes traffic for a network service to multiple servers that can provide that service

load balancer

defines a user's enironment

local profile

The tracert command would be best suited for which of the following tasks?

locating bottlenecks in an internetwork

malware that's activated when a particular event occurs

logic bomb

a time set aside for schedule updates, upgrades, and other network maintenance procedures

maintenance window

A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, when she logs off and logs back on, the desktop reverts to its original configuration. What type of user profile does this user have?

mandatory

In Windows, what are the two most common ways of accessing a shared folder? (Choose two.)

mapping a drive entering a UNC path

Which features does Bluetooth 5.1 add to existing Bluetooth technology?

mesh networking

value that tells routers the best path to the destination network

metric

On a router configures to use RIP, the number of routers a packet must travel through before it reaches its destination is called what?

metric hop count

a device computers use to convert digital signals to analog signals

modem

A junior network administrator tells you that he can ping a DNS server successfully using its IP address, but he has not tested domain name lookups. What utility on the command line would you suggest your colleague use next?

nslookup

software that runs on internetwork devices and prioritize packets

packet shaper

detects the presence and magnitude of light

photoresistor

A common guideline about network security is that if there's ____________ access to the equipment, there's no security.

physical

a remote access protocol that supports many protocols and is used to carry data over a variety of network connections

point to point protocol

You have been asked to determine what services are accessible on your network so you can close those that are not necessary. What tool should you use?

port scanner

Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive?

preboot execution environment

With ___________ multitasking, either the user or the OS can terminate a process that is monopolizing the CPU's time.

preemptive

Which form of authentication involves the exchange of a password-like key that must be entered on both devices?

preshared key

a series of letters, numbers, and special characters, much like a password, that both communicating devices use to authenticate each other's identity

preshared key

can be made the active partition

primary partition

Where are the waiting print jobs stored while they are waiting to be sent to the print device?

print queue

Access control lists can be configured based on what?

protocol TCP port souces IP address

What kind of software would you use to view and troubleshoot protocol-specific problems such as TCP retries caused by missed acknowledgments, or duplicate acknowledgments?

protocol analyzer

Which application would be considered a product of IoT?

real-time traffic information

Which component of a file-sharing client intercepts requests for resources and determines if the resource is local or remote?

redirector

You're the network administrator for a large bean-bag chair company. You are presenting to your supervisor several reasons to make use of cloud computing for handling data processing. Which answer would be a valid benefit of using cloud computing?

reduced physical plant costs

Which of the following is a benefit of data-driven manufacturing?

reduction of waste in material goods

action that a user can perform on a computer

rights

Whether your problem and proposed solution affects an entire network or just a few users, you must devise a ___________________ plan so that you can return things to their original state if the solution doesn't work.

rollback

instructions on how to undo an upgrade if problems occur

rollback plan

What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?

rootkit

What command issued from a command prompt will display the routing table in windows?

route print

When a router's interface is configured to connect with a switch trunk port to route packets between VLANs, what is this called?

router on a stick

Which of the following is NOT a typical function of a file system?

schedules processes and manages memory

What unit is used to divide the storage space on a disk drive?

sectors

a type of connector for terminating a T1 line that provides diagnostic testing for troubleshooting the connection

smart jack

Which technology is most likely to be associated with IoT?

smart watch

Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?

smurf attack

What is a partial copy of a VM that is used to restore it to a previous state?

snapshot

tightly wound coil of wire that creates a strong magnetic field when electricity is applied

solenoid

Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.

spyware

What can firewalls do to help ensure that a packet is denied if it's not part of an ongoing legitimate conversation?

stateful packet inspection

packets are denied on context as well as packet properties

stateful packet inspection

Which of the following would NOT typically be considered a goal of most IoT technologies?

store data

entire frame is read before forwarding it to the destination port

store-and-forwarding switching

What is true about WPA3? (Choose all that apply.)

strongest wireless encryption standard requires PMF backward compatible

a high-speed, baseband digital networking standard that specifies incrementally increasing data rates across fiber-optic links

synchronous optical network (SONET)

partition that contains the boot loader

system partition

If a Registry file or boot file becomes corrupted, which type of backup is usually all that's required to get the system running again?

system state

You are currently troubleshooting a network issue with your ISP's customer support agent. The agent requests that you open a command prompt and type ping 127.0.0.1. What does this accomplish?

tests that the local IP protocol is functioning

What is NOT a function that would be found in a managed switch?

the ability to transfer its switching table with neighboring switches

What is the local loop, or last mile?

the connection between the demarcation point and the CO

In Windows, what do rights define?

the types of actions a user can perform

What would be found in a router's routing table?

timestamp destination network next hop metric

issues an electrical signal on a wire, and a probe detects the signal

tone generator

configured to carry VLAN taffic

trunk port

What is created when a packet is encapsulated with additional headers to allow an encrypted packet to be correctly routed by Internet devices?

tunnel

To eliminate the potential problems caused by power fluctuations, especially on servers, you can install an _________________ power supply.

uninterruptible

power device that provides fault tolerance trough battery backup

uninterruptible power supply

What is NOT a guideline of a security policy?

uses legal terminology to protect the organization

How does a CPU perform multitasking?

using time slicing and context switching

a logical sequence of connections with bandwidth allocated for a specific transmission pathway

virtual circuit

spreads by replicating itself into programs or documents

virus

You have just installed a new disk and formatted it. You don't want to assign it a drive letter and you want to access it from your existing C: drive. What feature should you use?

volume mount points

What type of hacker uses a scanning device to find unsecured wireless networks and breaks into those networks?

wardriver

When would you most likely NOT choose to use a leased line connection?

when the link is only needed as a backup connection

In general, what level of security should use with your access points?

wireless encryption protocol

a self-contained, self-replicating program

worm


संबंधित स्टडी सेट्स

Present simple and continuous rules (advanced)

View Set

CompTIA A+ 220-1101 Exam Acronyms Quiz Part 1/5

View Set

Anatomy Two: Exam Two (Chapter 11)

View Set