Computer Systems Servicing  Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of a router?

  • To forward data packets between computer networks (correct)
  • To connect devices in a local network
  • To control the flow of data in a network
  • To provide wireless access to devices

What type of IP address is used by a virtual machine to communicate over a physical network?

  • Internet address
  • Provider address
  • Private address (correct)
  • Customer address

What does Wi-Fi stand for?

  • IEEE.801.11
  • IEEE.804.11
  • IEEE.802.11 (correct)
  • IEEE.803.11

What type of network connects multiple local area networks?

<p>Wide Area Network (WAN) (D)</p> Signup and view all the answers

What type of security protocol protects unauthorized network access by utilizing a set-up password?

<p>WPA2-Personal (B)</p> Signup and view all the answers

What occurs when an attacker or trusted insider steals data from a computer system and demands compensation for its return?

<p>Information Extortion (A)</p> Signup and view all the answers

What Windows Server service enables administrators to migrate data to a low-cost and tape media on file servers?

<p>Remote Storage Service (A)</p> Signup and view all the answers

What type of network is formed when two or more PCs are connected and share resources without going through a separate server computer?

<p>Peer to peer (D)</p> Signup and view all the answers

What is the primary function of the Ping utility tool?

<p>To test whether a particular host is reachable across an IP network (B)</p> Signup and view all the answers

What type of network assessment is used to measure network performance and identify bottlenecks?

<p>Network Monitoring (B)</p> Signup and view all the answers

What type of cable is used when one end is T568-A and the other is T568-B?

<p>Cross-Over (C)</p> Signup and view all the answers

What type of network is used to connect devices within a limited geographical area, such as a campus?

<p>Campus Area Network (A)</p> Signup and view all the answers

What is the purpose of Netstat command in Windows?

<p>To display protocol statistics and current TCP/IP network connections (B)</p> Signup and view all the answers

What type of software is used to prevent, detect, and remove possible threats to the system?

<p>Anti-virus software (C)</p> Signup and view all the answers

What is the minimum requirement for hard disk drive capacity in Windows 10?

<p>30 GB (B)</p> Signup and view all the answers

What type of indicator in Windows 7 signifies that there is a problem with the LAN driver?

<p>A cross and red indicator (B)</p> Signup and view all the answers

What is the purpose of Dxdiag command in Windows?

<p>To diagnose DirectX issues (D)</p> Signup and view all the answers

What type of card is used to connect a computer to a network?

<p>Network Interface Card (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Networking Devices

  • A router is a networking device that forwards data packets between computer networks.

IP Addresses

  • A.B.C.D is a private IP address used by a virtual machine to communicate over a physical network.

Wi-Fi

  • Wi-Fi is a trademark phrase that means IEEE.802.11.

Network Types

  • A LAN (Local Area Network) is a collection of devices connected together in one physical location.
  • A MAN (Metropolitan Area Network) is a type of network that interconnects multiple LANs.
  • A WAN (Wide Area Network) connects multiple LANs over a large geographic area.
  • A Campus Area Network is a type of LAN.

Network Security

  • WPA2-Enterprise is a type of network security that protects unauthorized access by utilizing a set-up password.
  • TKIP (Temporal Key Integrity Protocol) is a type of network security that protects unauthorized access.

Network Access Control

  • An Access Control List (ACL) consists of user matrices and capability tables that govern the rights and privileges of users.

Cyber Threats

  • Extortion occurs when an attacker steals data from a computer system and demands compensation for its return.
  • Malicious code is a type of cyber threat.
  • Theft is a type of cyber threat.

Information Systems

  • Configuration Management is a process that monitors the initial security accreditation of an information system for tracking changes.

Computer Hardware

  • The RED wire in a power supply has a voltage rating of +5V.
  • A Cross-Over network cable has one end as T568-A and the other as T568-B.

Windows Operating System

  • F1, F2, and F10 keys can be used to enter BIOS setup.
  • Windows has a feature that enables users to correct problems preventing them from booting up normally.
  • Anti-virus software is a type of software that prevents, detects, and removes possible threats to the system.

Networking Hardware

  • A Network Interface Card (NIC) is a type of hardware component that can connect over a computer network.

Windows Server

  • Remote Storage Service is a feature in Windows Server that enables administrators to migrate data to a low-cost tape media on file servers.

Network Tools

  • Ping is a utility tool that tests whether a particular host is reachable across an IP network.

USB

  • The common color for the USB 3.0 connector for standard A receptacles is Blue.

Solid State Drive (SSD)

  • Flash memory is a type of memory used in SSDs as a storage.

BIOS

  • The BIOS is originally stored in the ROM (Read-Only Memory) of a standard PC.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Wireless Routers and Wi-Fi
10 questions
Wi-Fi and Wireless Networks Chapter 30.1
80 questions
Use Quizgecko on...
Browser
Browser