Podcast
Questions and Answers
What is the primary function of a router?
What is the primary function of a router?
- To forward data packets between computer networks (correct)
- To connect devices in a local network
- To control the flow of data in a network
- To provide wireless access to devices
What type of IP address is used by a virtual machine to communicate over a physical network?
What type of IP address is used by a virtual machine to communicate over a physical network?
- Internet address
- Provider address
- Private address (correct)
- Customer address
What does Wi-Fi stand for?
What does Wi-Fi stand for?
- IEEE.801.11
- IEEE.804.11
- IEEE.802.11 (correct)
- IEEE.803.11
What type of network connects multiple local area networks?
What type of network connects multiple local area networks?
What type of security protocol protects unauthorized network access by utilizing a set-up password?
What type of security protocol protects unauthorized network access by utilizing a set-up password?
What occurs when an attacker or trusted insider steals data from a computer system and demands compensation for its return?
What occurs when an attacker or trusted insider steals data from a computer system and demands compensation for its return?
What Windows Server service enables administrators to migrate data to a low-cost and tape media on file servers?
What Windows Server service enables administrators to migrate data to a low-cost and tape media on file servers?
What type of network is formed when two or more PCs are connected and share resources without going through a separate server computer?
What type of network is formed when two or more PCs are connected and share resources without going through a separate server computer?
What is the primary function of the Ping utility tool?
What is the primary function of the Ping utility tool?
What type of network assessment is used to measure network performance and identify bottlenecks?
What type of network assessment is used to measure network performance and identify bottlenecks?
What type of cable is used when one end is T568-A and the other is T568-B?
What type of cable is used when one end is T568-A and the other is T568-B?
What type of network is used to connect devices within a limited geographical area, such as a campus?
What type of network is used to connect devices within a limited geographical area, such as a campus?
What is the purpose of Netstat command in Windows?
What is the purpose of Netstat command in Windows?
What type of software is used to prevent, detect, and remove possible threats to the system?
What type of software is used to prevent, detect, and remove possible threats to the system?
What is the minimum requirement for hard disk drive capacity in Windows 10?
What is the minimum requirement for hard disk drive capacity in Windows 10?
What type of indicator in Windows 7 signifies that there is a problem with the LAN driver?
What type of indicator in Windows 7 signifies that there is a problem with the LAN driver?
What is the purpose of Dxdiag command in Windows?
What is the purpose of Dxdiag command in Windows?
What type of card is used to connect a computer to a network?
What type of card is used to connect a computer to a network?
Flashcards are hidden until you start studying
Study Notes
Networking Devices
- A router is a networking device that forwards data packets between computer networks.
IP Addresses
- A.B.C.D is a private IP address used by a virtual machine to communicate over a physical network.
Wi-Fi
- Wi-Fi is a trademark phrase that means IEEE.802.11.
Network Types
- A LAN (Local Area Network) is a collection of devices connected together in one physical location.
- A MAN (Metropolitan Area Network) is a type of network that interconnects multiple LANs.
- A WAN (Wide Area Network) connects multiple LANs over a large geographic area.
- A Campus Area Network is a type of LAN.
Network Security
- WPA2-Enterprise is a type of network security that protects unauthorized access by utilizing a set-up password.
- TKIP (Temporal Key Integrity Protocol) is a type of network security that protects unauthorized access.
Network Access Control
- An Access Control List (ACL) consists of user matrices and capability tables that govern the rights and privileges of users.
Cyber Threats
- Extortion occurs when an attacker steals data from a computer system and demands compensation for its return.
- Malicious code is a type of cyber threat.
- Theft is a type of cyber threat.
Information Systems
- Configuration Management is a process that monitors the initial security accreditation of an information system for tracking changes.
Computer Hardware
- The RED wire in a power supply has a voltage rating of +5V.
- A Cross-Over network cable has one end as T568-A and the other as T568-B.
Windows Operating System
- F1, F2, and F10 keys can be used to enter BIOS setup.
- Windows has a feature that enables users to correct problems preventing them from booting up normally.
- Anti-virus software is a type of software that prevents, detects, and removes possible threats to the system.
Networking Hardware
- A Network Interface Card (NIC) is a type of hardware component that can connect over a computer network.
Windows Server
- Remote Storage Service is a feature in Windows Server that enables administrators to migrate data to a low-cost tape media on file servers.
Network Tools
- Ping is a utility tool that tests whether a particular host is reachable across an IP network.
USB
- The common color for the USB 3.0 connector for standard A receptacles is Blue.
Solid State Drive (SSD)
- Flash memory is a type of memory used in SSDs as a storage.
BIOS
- The BIOS is originally stored in the ROM (Read-Only Memory) of a standard PC.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.